Auto Update 2024/04/29 18:38:44

This commit is contained in:
motikan2010-bot 2024-04-30 03:38:44 +09:00
parent d590e583a5
commit f08ee13d80
32 changed files with 135 additions and 116 deletions

View file

@ -13,12 +13,12 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2024-04-26T17:29:17Z",
"updated_at": "2024-04-29T12:50:07Z",
"pushed_at": "2023-01-22T09:39:45Z",
"stargazers_count": 380,
"watchers_count": 380,
"stargazers_count": 381,
"watchers_count": 381,
"has_discussions": false,
"forks_count": 113,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -26,8 +26,8 @@
"cve-2008-0166"
],
"visibility": "public",
"forks": 113,
"watchers": 380,
"forks": 114,
"watchers": 381,
"score": 0,
"subscribers_count": 18
},

View file

@ -13,10 +13,10 @@
"description": "Primefaces <= 5.2.21, 5.3.8 or 6.0 - Remote Code Execution Exploit",
"fork": false,
"created_at": "2018-09-03T03:11:24Z",
"updated_at": "2024-04-25T18:35:43Z",
"updated_at": "2024-04-29T15:04:06Z",
"pushed_at": "2024-02-27T11:56:02Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 81,
"watchers": 82,
"score": 0,
"subscribers_count": 2
},

View file

@ -315,11 +315,11 @@
"html_url": "https:\/\/github.com\/K3ysTr0K3R"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2018-14847-EXPLOIT",
"description": null,
"description": "A PoC exploit for CVE-2018-14847 - MikroTik WinBox File Read",
"fork": false,
"created_at": "2024-04-22T22:33:25Z",
"updated_at": "2024-04-28T23:59:37Z",
"pushed_at": "2024-04-28T23:59:34Z",
"updated_at": "2024-04-29T15:19:02Z",
"pushed_at": "2024-04-29T14:37:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -327,7 +327,22 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"credential-disclosure",
"credentials",
"cve-2018-14847",
"directory-traversal",
"exploit",
"exploitation",
"file-read",
"hacked",
"mikrotik",
"poc",
"proof-of-concept",
"router",
"routeros",
"winbox"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -120,17 +120,17 @@
"fork": false,
"created_at": "2018-10-03T10:18:04Z",
"updated_at": "2024-04-24T15:38:52Z",
"pushed_at": "2019-03-24T11:20:27Z",
"pushed_at": "2024-04-29T13:17:43Z",
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 30,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"forks": 31,
"watchers": 93,
"score": 0,
"subscribers_count": 1

View file

@ -13,8 +13,8 @@
"description": "Apache OFBiz 16.11.04 is susceptible to XML external entity injection (XXE injection)",
"fork": false,
"created_at": "2024-04-24T12:23:21Z",
"updated_at": "2024-04-28T06:33:49Z",
"pushed_at": "2024-04-28T06:33:46Z",
"updated_at": "2024-04-29T16:29:19Z",
"pushed_at": "2024-04-29T16:29:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -163,8 +163,8 @@
"description": "CVE-2019-9670 is used to find XXE bug",
"fork": false,
"created_at": "2024-04-24T12:32:18Z",
"updated_at": "2024-04-27T11:15:24Z",
"pushed_at": "2024-04-27T11:15:21Z",
"updated_at": "2024-04-29T16:49:04Z",
"pushed_at": "2024-04-29T16:49:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -43,8 +43,8 @@
"description": null,
"fork": false,
"created_at": "2024-04-29T09:39:42Z",
"updated_at": "2024-04-29T09:57:30Z",
"pushed_at": "2024-04-29T09:55:36Z",
"updated_at": "2024-04-29T12:29:16Z",
"pushed_at": "2024-04-29T12:29:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -43,8 +43,8 @@
"description": "Tool for finding CVE-2021-20323",
"fork": false,
"created_at": "2024-01-11T16:02:07Z",
"updated_at": "2024-04-29T07:55:09Z",
"pushed_at": "2024-04-29T07:55:06Z",
"updated_at": "2024-04-29T16:33:23Z",
"pushed_at": "2024-04-29T16:33:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -856,7 +856,7 @@
"stargazers_count": 1251,
"watchers_count": 1251,
"has_discussions": false,
"forks_count": 158,
"forks_count": 159,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -869,7 +869,7 @@
"vcenter"
],
"visibility": "public",
"forks": 158,
"forks": 159,
"watchers": 1251,
"score": 0,
"subscribers_count": 13

View file

@ -133,10 +133,10 @@
"description": "Confluence Server Webwork OGNL injection",
"fork": false,
"created_at": "2021-09-01T07:15:17Z",
"updated_at": "2024-04-28T03:47:21Z",
"updated_at": "2024-04-29T17:15:41Z",
"pushed_at": "2021-12-03T22:09:31Z",
"stargazers_count": 305,
"watchers_count": 305,
"stargazers_count": 304,
"watchers_count": 304,
"has_discussions": false,
"forks_count": 82,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 305,
"watchers": 304,
"score": 0,
"subscribers_count": 2
},

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/and0x00"
},
"html_url": "https:\/\/github.com\/and0x00\/CVE-2021-32789",
"description": "💣 Wordpress WooCommerce users dump exploit",
"description": "💣 Wordpress WooCommerce users dump exploit.",
"fork": false,
"created_at": "2023-02-17T19:51:24Z",
"updated_at": "2023-09-01T23:32:42Z",
"updated_at": "2024-04-29T15:45:01Z",
"pushed_at": "2023-02-17T20:06:52Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -13,8 +13,8 @@
"description": "Tool for finding CVE-2021-42063",
"fork": false,
"created_at": "2024-04-28T06:09:14Z",
"updated_at": "2024-04-28T06:10:04Z",
"pushed_at": "2024-04-28T06:09:59Z",
"updated_at": "2024-04-29T16:20:13Z",
"pushed_at": "2024-04-29T16:20:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -907,7 +907,7 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-04-29T09:38:34Z",
"updated_at": "2024-04-29T14:45:02Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1751,
"watchers_count": 1751,
@ -1423,10 +1423,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2024-04-27T16:15:50Z",
"updated_at": "2024-04-29T14:48:44Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 850,
"watchers_count": 850,
"stargazers_count": 851,
"watchers_count": 851,
"has_discussions": false,
"forks_count": 175,
"allow_forking": true,
@ -1448,7 +1448,7 @@
],
"visibility": "public",
"forks": 175,
"watchers": 850,
"watchers": 851,
"score": 0,
"subscribers_count": 33
},
@ -1526,8 +1526,8 @@
"description": null,
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2024-04-26T10:47:50Z",
"pushed_at": "2024-04-29T06:37:49Z",
"updated_at": "2024-04-29T17:48:37Z",
"pushed_at": "2024-04-29T17:50:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
@ -11705,7 +11705,7 @@
"description": ":page_with_curl: A report about CVE-2021-44228",
"fork": false,
"created_at": "2022-07-19T08:03:05Z",
"updated_at": "2023-10-28T09:52:20Z",
"updated_at": "2024-04-29T17:22:54Z",
"pushed_at": "2022-07-19T08:08:12Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-0995 exploit",
"fork": false,
"created_at": "2022-03-26T21:46:09Z",
"updated_at": "2024-04-08T13:38:08Z",
"updated_at": "2024-04-29T14:48:44Z",
"pushed_at": "2022-03-27T09:07:01Z",
"stargazers_count": 493,
"watchers_count": 493,
"stargazers_count": 494,
"watchers_count": 494,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 493,
"watchers": 494,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": "Android kernel exploitation for CVE-2022-20409",
"fork": false,
"created_at": "2022-11-21T22:42:50Z",
"updated_at": "2024-04-28T09:35:48Z",
"updated_at": "2024-04-29T13:06:42Z",
"pushed_at": "2023-08-05T20:56:12Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 141,
"watchers_count": 141,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 140,
"watchers": 141,
"score": 0,
"subscribers_count": 4
}

View file

@ -771,7 +771,7 @@
"stargazers_count": 1251,
"watchers_count": 1251,
"has_discussions": false,
"forks_count": 158,
"forks_count": 159,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -784,7 +784,7 @@
"vcenter"
],
"visibility": "public",
"forks": 158,
"forks": 159,
"watchers": 1251,
"score": 0,
"subscribers_count": 13

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-04-27T11:25:05Z",
"updated_at": "2024-04-29T17:51:49Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1132,
"watchers_count": 1132,
"stargazers_count": 1133,
"watchers_count": 1133,
"has_discussions": true,
"forks_count": 188,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 188,
"watchers": 1132,
"watchers": 1133,
"score": 0,
"subscribers_count": 19
},

View file

@ -682,10 +682,10 @@
"description": "CVE-2023-20198-RCE, support adding\/deleting users and executing cli commands\/system commands.",
"fork": false,
"created_at": "2024-04-25T06:59:53Z",
"updated_at": "2024-04-29T08:36:47Z",
"updated_at": "2024-04-29T14:03:17Z",
"pushed_at": "2024-04-25T07:32:57Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -694,7 +694,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 8,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 7,
"watchers": 34,
"score": 0,
"subscribers_count": 1

View file

@ -563,8 +563,8 @@
"description": "An issue was discovered in cPanel before 11.109.9999.116. Cross-Site Scripting can occur on the cpsrvd error page via an invalid webcall ID.",
"fork": false,
"created_at": "2024-04-21T12:26:22Z",
"updated_at": "2024-04-29T07:55:51Z",
"pushed_at": "2024-04-29T07:55:48Z",
"updated_at": "2024-04-29T16:38:58Z",
"pushed_at": "2024-04-29T16:38:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-23T19:06:36Z",
"updated_at": "2024-04-23T07:50:16Z",
"updated_at": "2024-04-29T18:31:35Z",
"pushed_at": "2023-10-29T11:12:26Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 157,
"watchers": 158,
"score": 0,
"subscribers_count": 4
}

View file

@ -236,10 +236,10 @@
"description": "CVE-2023-5360 Exploit\/POC",
"fork": false,
"created_at": "2023-11-13T12:51:34Z",
"updated_at": "2024-04-23T07:50:16Z",
"updated_at": "2024-04-29T13:46:24Z",
"pushed_at": "2023-11-21T03:56:11Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -250,7 +250,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698.",
"fork": false,
"created_at": "2024-03-29T04:11:06Z",
"updated_at": "2024-03-29T19:46:50Z",
"updated_at": "2024-04-29T14:16:29Z",
"pushed_at": "2024-03-29T04:31:31Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 181,
"watchers_count": 181,
"has_discussions": false,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"forks": 26,
"watchers": 181,
"score": 0,
"subscribers_count": 2

View file

@ -13,19 +13,19 @@
"description": "Proof-of-Concept for CVE-2024-21345",
"fork": false,
"created_at": "2024-04-26T16:38:17Z",
"updated_at": "2024-04-29T11:36:45Z",
"updated_at": "2024-04-29T13:23:19Z",
"pushed_at": "2024-04-26T16:39:48Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 43,
"forks": 15,
"watchers": 44,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-23334",
"fork": false,
"created_at": "2024-02-28T22:30:21Z",
"updated_at": "2024-03-18T15:29:36Z",
"updated_at": "2024-04-29T14:17:31Z",
"pushed_at": "2024-02-29T02:00:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 46,
"score": 0,
"subscribers_count": 2

View file

@ -13,19 +13,19 @@
"description": "Proof-of-Concept for CVE-2024-26218",
"fork": false,
"created_at": "2024-04-26T16:41:04Z",
"updated_at": "2024-04-29T11:10:02Z",
"updated_at": "2024-04-29T17:58:15Z",
"pushed_at": "2024-04-26T16:46:15Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 8,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 24,
"forks": 10,
"watchers": 26,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-27T11:03:36Z",
"updated_at": "2024-04-29T02:29:49Z",
"updated_at": "2024-04-29T17:55:49Z",
"pushed_at": "2024-04-27T11:37:02Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,8 +13,8 @@
"description": "CubeCart <= 6.5.4 is vulnerable to an arbitrary file upload that leads to remote code execution (RCE).",
"fork": false,
"created_at": "2024-04-24T16:31:17Z",
"updated_at": "2024-04-25T01:29:07Z",
"pushed_at": "2024-04-24T19:14:05Z",
"updated_at": "2024-04-29T18:09:37Z",
"pushed_at": "2024-04-29T18:09:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Scanner for CVE-2024-4040",
"fork": false,
"created_at": "2024-04-23T09:31:29Z",
"updated_at": "2024-04-28T22:49:06Z",
"updated_at": "2024-04-29T17:57:43Z",
"pushed_at": "2024-04-23T09:45:57Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 36,
"watchers": 39,
"score": 0,
"subscribers_count": 7
},
@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-25T04:45:38Z",
"updated_at": "2024-04-28T16:21:59Z",
"updated_at": "2024-04-29T14:40:31Z",
"pushed_at": "2024-04-25T04:56:50Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
@ -133,10 +133,10 @@
"description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support",
"fork": false,
"created_at": "2024-04-25T19:51:38Z",
"updated_at": "2024-04-29T07:09:57Z",
"updated_at": "2024-04-29T17:58:15Z",
"pushed_at": "2024-04-29T00:59:40Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -160,7 +160,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -1599,7 +1599,11 @@
### CVE-2024-33386
- [keaidmmc/CVE-2024-33386](https://github.com/keaidmmc/CVE-2024-33386)
### CVE-2024-33438
### CVE-2024-33438 (2024-04-29)
<code>File Upload vulnerability in CubeCart before 6.5.5 allows an authenticated user to execute arbitrary code via a crafted .phar file.
</code>
- [julio-cfa/CVE-2024-33438](https://github.com/julio-cfa/CVE-2024-33438)
### CVE-2024-65230