Auto Update 2024/11/28 00:50:29

This commit is contained in:
motikan2010-bot 2024-11-28 09:50:29 +09:00
parent bedc360d0e
commit f4091f6a5c
27 changed files with 219 additions and 84 deletions

View file

@ -45,10 +45,10 @@
"description": "Custom exploit written for enumerating usernames as per CVE-2016-6210",
"fork": false,
"created_at": "2023-03-19T19:16:36Z",
"updated_at": "2023-03-20T10:05:04Z",
"updated_at": "2024-11-27T22:45:03Z",
"pushed_at": "2024-03-23T16:12:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "Proof of Concept for CVE-2019-18634",
"fork": false,
"created_at": "2020-02-07T18:07:03Z",
"updated_at": "2024-11-12T12:05:13Z",
"updated_at": "2024-11-27T21:33:37Z",
"pushed_at": "2021-09-12T02:55:24Z",
"stargazers_count": 208,
"watchers_count": 208,
"stargazers_count": 209,
"watchers_count": 209,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 208,
"watchers": 209,
"score": 0,
"subscribers_count": 3
},

View file

@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -395,10 +395,10 @@
"description": "CVE-2021-3560 analysis",
"fork": false,
"created_at": "2022-01-31T09:02:23Z",
"updated_at": "2023-03-05T11:58:45Z",
"updated_at": "2024-11-27T19:11:24Z",
"pushed_at": "2022-05-23T02:23:38Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -407,7 +407,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},

View file

@ -3891,7 +3891,7 @@
"forks": 4,
"watchers": 1,
"score": 0,
"subscribers_count": 41
"subscribers_count": 40
},
{
"id": 437774679,

View file

@ -293,10 +293,10 @@
"description": "Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.",
"fork": false,
"created_at": "2022-03-08T09:10:51Z",
"updated_at": "2024-09-19T01:51:18Z",
"updated_at": "2024-11-27T21:12:32Z",
"pushed_at": "2022-03-08T09:14:25Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -305,7 +305,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 59,
"watchers": 58,
"score": 0,
"subscribers_count": 5
},

View file

@ -76,10 +76,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T20:03:51Z",
"updated_at": "2024-07-09T02:15:06Z",
"updated_at": "2024-11-28T00:21:37Z",
"pushed_at": "2024-01-12T20:15:47Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 5
}

View file

@ -14,10 +14,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-11-27T10:51:18Z",
"updated_at": "2024-11-27T23:22:53Z",
"pushed_at": "2024-08-01T15:09:15Z",
"stargazers_count": 297,
"watchers_count": 297,
"stargazers_count": 298,
"watchers_count": 298,
"has_discussions": true,
"forks_count": 44,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 44,
"watchers": 297,
"watchers": 298,
"score": 0,
"subscribers_count": 7
},

View file

@ -14,10 +14,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2024-11-09T11:43:25Z",
"updated_at": "2024-11-27T21:45:01Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 392,
"watchers_count": 392,
"stargazers_count": 393,
"watchers_count": 393,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 392,
"watchers": 393,
"score": 0,
"subscribers_count": 11
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T20:03:51Z",
"updated_at": "2024-07-09T02:15:06Z",
"updated_at": "2024-11-28T00:21:37Z",
"pushed_at": "2024-01-12T20:15:47Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 5
}

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-11-26T07:52:29Z",
"updated_at": "2024-11-27T16:44:47Z",
"updated_at": "2024-11-27T23:36:42Z",
"pushed_at": "2024-11-26T08:06:06Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"forks": 2,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE).",
"fork": false,
"created_at": "2023-12-13T09:31:36Z",
"updated_at": "2024-11-04T19:19:56Z",
"updated_at": "2024-11-27T21:19:08Z",
"pushed_at": "2024-08-30T06:37:53Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 80,
"watchers": 81,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-11-26T17:02:25Z",
"updated_at": "2024-11-27T18:47:19Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2286,
"watchers_count": 2286,
"stargazers_count": 2285,
"watchers_count": 2285,
"has_discussions": false,
"forks_count": 298,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 298,
"watchers": 2286,
"watchers": 2285,
"score": 0,
"subscribers_count": 24
},

View file

@ -161,5 +161,74 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 895213023,
"name": "cve-2024-10914-port",
"full_name": "retuci0\/cve-2024-10914-port",
"owner": {
"login": "retuci0",
"id": 165311393,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165311393?v=4",
"html_url": "https:\/\/github.com\/retuci0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/retuci0\/cve-2024-10914-port",
"description": "dlink vulnerability thing in python and rust",
"fork": false,
"created_at": "2024-11-27T19:11:55Z",
"updated_at": "2024-11-27T19:12:49Z",
"pushed_at": "2024-11-27T19:12:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 895284938,
"name": "CVE-2024-10914-EXPLOIT",
"full_name": "K3ysTr0K3R\/CVE-2024-10914-EXPLOIT",
"owner": {
"login": "K3ysTr0K3R",
"id": 70909693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
"html_url": "https:\/\/github.com\/K3ysTr0K3R",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2024-10914-EXPLOIT",
"description": "A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-11-27T23:10:20Z",
"updated_at": "2024-11-27T23:33:14Z",
"pushed_at": "2024-11-27T23:31:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-10914",
"ethical-hacking",
"exploit",
"exploitation",
"hacking",
"proof-of-concept"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -29,5 +29,36 @@
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 895217936,
"name": "CVE-2024-11680",
"full_name": "exploitboom\/CVE-2024-11680",
"owner": {
"login": "exploitboom",
"id": 189791933,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/189791933?v=4",
"html_url": "https:\/\/github.com\/exploitboom",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/exploitboom\/CVE-2024-11680",
"description": null,
"fork": false,
"created_at": "2024-11-27T19:25:17Z",
"updated_at": "2024-11-27T19:27:10Z",
"pushed_at": "2024-11-27T19:26:01Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
"fork": false,
"created_at": "2024-04-12T15:07:42Z",
"updated_at": "2024-11-27T11:48:24Z",
"updated_at": "2024-11-27T20:52:39Z",
"pushed_at": "2024-04-18T14:31:34Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 53,
"watchers": 54,
"score": 0,
"subscribers_count": 7
},

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-11-16T07:32:20Z",
"updated_at": "2024-11-27T22:38:24Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 193,
"watchers_count": 193,
"stargazers_count": 194,
"watchers_count": 194,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 193,
"watchers": 194,
"score": 0,
"subscribers_count": 2
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 149,
"watchers_count": 149,
"has_discussions": false,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"forks": 33,
"watchers": 149,
"score": 0,
"subscribers_count": 3

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-24T10:37:26Z",
"updated_at": "2024-11-22T09:17:50Z",
"updated_at": "2024-11-27T22:51:52Z",
"pushed_at": "2024-07-31T19:11:55Z",
"stargazers_count": 237,
"watchers_count": 237,
"stargazers_count": 238,
"watchers_count": 238,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 237,
"watchers": 238,
"score": 0,
"subscribers_count": 3
},

View file

@ -81,13 +81,13 @@
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 10,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 9,
"watchers": 28,
"score": 0,
"subscribers_count": 2
@ -174,13 +174,13 @@
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 11,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 10,
"watchers": 40,
"score": 0,
"subscribers_count": 1

View file

@ -470,5 +470,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 895213731,
"name": "CVE-2024-36401",
"full_name": "0x0d3ad\/CVE-2024-36401",
"owner": {
"login": "0x0d3ad",
"id": 18898977,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18898977?v=4",
"html_url": "https:\/\/github.com\/0x0d3ad",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0x0d3ad\/CVE-2024-36401",
"description": "CVE-2024-36401 GeoServer Remote Code Execution",
"fork": false,
"created_at": "2024-11-27T19:13:49Z",
"updated_at": "2024-11-28T00:22:12Z",
"pushed_at": "2024-11-27T19:20:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-44258",
"fork": false,
"created_at": "2024-10-29T09:45:03Z",
"updated_at": "2024-11-24T19:28:06Z",
"updated_at": "2024-11-27T20:00:28Z",
"pushed_at": "2024-11-02T19:20:44Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 57,
"watchers": 58,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
"fork": false,
"created_at": "2024-11-07T21:03:30Z",
"updated_at": "2024-11-27T15:44:48Z",
"updated_at": "2024-11-27T19:14:30Z",
"pushed_at": "2024-11-14T16:25:52Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 68,
"watchers": 69,
"score": 0,
"subscribers_count": 0
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 174,
"watchers_count": 174,
"has_discussions": false,
"forks_count": 30,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"forks": 29,
"watchers": 174,
"score": 0,
"subscribers_count": 8

View file

@ -138,10 +138,10 @@
"description": "Testing POC for use cases",
"fork": false,
"created_at": "2024-11-24T07:33:06Z",
"updated_at": "2024-11-26T14:05:02Z",
"updated_at": "2024-11-27T22:55:46Z",
"pushed_at": "2024-11-24T07:56:49Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "a signal handler race condition in OpenSSH's server (sshd)",
"fork": false,
"created_at": "2024-07-01T10:55:29Z",
"updated_at": "2024-11-26T03:27:29Z",
"updated_at": "2024-11-28T00:20:21Z",
"pushed_at": "2024-07-01T10:54:02Z",
"stargazers_count": 464,
"watchers_count": 464,
"stargazers_count": 465,
"watchers_count": 465,
"has_discussions": false,
"forks_count": 182,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 182,
"watchers": 464,
"watchers": 465,
"score": 0,
"subscribers_count": 5
},

View file

@ -2112,6 +2112,8 @@
- [Egi08/CVE-2024-10914](https://github.com/Egi08/CVE-2024-10914)
- [Bu0uCat/D-Link-NAS-CVE-2024-10914-](https://github.com/Bu0uCat/D-Link-NAS-CVE-2024-10914-)
- [ThemeHackers/CVE-2024-10914](https://github.com/ThemeHackers/CVE-2024-10914)
- [retuci0/cve-2024-10914-port](https://github.com/retuci0/cve-2024-10914-port)
- [K3ysTr0K3R/CVE-2024-10914-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-10914-EXPLOIT)
### CVE-2024-10924 (2024-11-15)
@ -2205,6 +2207,7 @@
</code>
- [famixcm/CVE-2024-11680](https://github.com/famixcm/CVE-2024-11680)
- [exploitboom/CVE-2024-11680](https://github.com/exploitboom/CVE-2024-11680)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -5120,6 +5123,7 @@
- [kkhackz0013/CVE-2024-36401](https://github.com/kkhackz0013/CVE-2024-36401)
- [thestar0/CVE-2024-36401-WoodpeckerPlugin](https://github.com/thestar0/CVE-2024-36401-WoodpeckerPlugin)
- [XiaomingX/cve-2024-36401-poc](https://github.com/XiaomingX/cve-2024-36401-poc)
- [0x0d3ad/CVE-2024-36401](https://github.com/0x0d3ad/CVE-2024-36401)
### CVE-2024-36416 (2024-06-10)