Auto Update 2024/03/07 00:26:41

This commit is contained in:
motikan2010-bot 2024-03-07 09:26:41 +09:00
parent 78e10c838c
commit 028babf5a1
38 changed files with 222 additions and 191 deletions

View file

@ -13,7 +13,7 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2024-02-29T22:37:08Z",
"updated_at": "2024-03-06T23:37:43Z",
"pushed_at": "2023-12-27T23:45:17Z",
"stargazers_count": 168,
"watchers_count": 168,

View file

@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 0,
"score": 0,
"subscribers_count": 2
@ -208,5 +208,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 768304075,
"name": "CVE-2014-6287",
"full_name": "zhsh9\/CVE-2014-6287",
"owner": {
"login": "zhsh9",
"id": 78374754,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78374754?v=4",
"html_url": "https:\/\/github.com\/zhsh9"
},
"html_url": "https:\/\/github.com\/zhsh9\/CVE-2014-6287",
"description": "Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c",
"fork": false,
"created_at": "2024-03-06T20:55:08Z",
"updated_at": "2024-03-06T20:57:14Z",
"pushed_at": "2024-03-06T20:55:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -28,5 +28,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 768258204,
"name": "CVE-2017-16651-Exploit",
"full_name": "sephiroth950911\/CVE-2017-16651-Exploit",
"owner": {
"login": "sephiroth950911",
"id": 61886874,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61886874?v=4",
"html_url": "https:\/\/github.com\/sephiroth950911"
},
"html_url": "https:\/\/github.com\/sephiroth950911\/CVE-2017-16651-Exploit",
"description": "CyberPunk Style CVE-2017-16651 Roundcube Webmail Exploit",
"fork": false,
"created_at": "2024-03-06T18:53:06Z",
"updated_at": "2024-03-06T18:53:58Z",
"pushed_at": "2024-03-06T18:53:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -53,10 +53,10 @@
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
"fork": false,
"created_at": "2018-01-04T23:51:12Z",
"updated_at": "2024-03-03T02:25:11Z",
"updated_at": "2024-03-06T20:05:17Z",
"pushed_at": "2018-02-27T05:22:38Z",
"stargazers_count": 543,
"watchers_count": 543,
"stargazers_count": 544,
"watchers_count": 544,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 71,
"watchers": 543,
"watchers": 544,
"score": 0,
"subscribers_count": 47
},

View file

@ -27,7 +27,7 @@
"forks": 47,
"watchers": 186,
"score": 0,
"subscribers_count": 6
"subscribers_count": 5
},
{
"id": 345279364,

View file

@ -128,7 +128,7 @@
"forks": 14,
"watchers": 41,
"score": 0,
"subscribers_count": 5
"subscribers_count": 4
},
{
"id": 261161731,

View file

@ -454,7 +454,7 @@
"forks": 27,
"watchers": 100,
"score": 0,
"subscribers_count": 4
"subscribers_count": 3
},
{
"id": 295917575,
@ -694,7 +694,7 @@
"forks": 12,
"watchers": 56,
"score": 0,
"subscribers_count": 9
"subscribers_count": 8
},
{
"id": 296468860,

View file

@ -47,7 +47,7 @@
"forks": 1080,
"watchers": 3997,
"score": 0,
"subscribers_count": 152
"subscribers_count": 151
},
{
"id": 307998445,
@ -77,7 +77,7 @@
"forks": 63,
"watchers": 282,
"score": 0,
"subscribers_count": 8
"subscribers_count": 7
},
{
"id": 308145197,
@ -377,7 +377,7 @@
"forks": 11,
"watchers": 20,
"score": 0,
"subscribers_count": 5
"subscribers_count": 4
},
{
"id": 310303375,

View file

@ -27,7 +27,7 @@
"forks": 9,
"watchers": 77,
"score": 0,
"subscribers_count": 4
"subscribers_count": 3
},
{
"id": 307620612,

View file

@ -27,6 +27,6 @@
"forks": 6,
"watchers": 26,
"score": 0,
"subscribers_count": 10
"subscribers_count": 9
}
]

View file

@ -46,7 +46,7 @@
"forks": 32,
"watchers": 207,
"score": 0,
"subscribers_count": 19
"subscribers_count": 18
},
{
"id": 303891965,

View file

@ -122,7 +122,7 @@
"forks": 65,
"watchers": 533,
"score": 0,
"subscribers_count": 9
"subscribers_count": 8
},
{
"id": 304156994,

View file

@ -318,10 +318,10 @@
"description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.",
"fork": false,
"created_at": "2020-09-28T05:00:37Z",
"updated_at": "2024-02-21T17:01:43Z",
"updated_at": "2024-03-06T21:27:27Z",
"pushed_at": "2020-10-10T17:19:51Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -339,7 +339,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 2
},

View file

@ -850,7 +850,7 @@
"forks": 8,
"watchers": 14,
"score": 0,
"subscribers_count": 2
"subscribers_count": 1
},
{
"id": 278061523,
@ -1220,7 +1220,7 @@
"forks": 17,
"watchers": 61,
"score": 0,
"subscribers_count": 4
"subscribers_count": 3
},
{
"id": 278872820,

View file

@ -27,6 +27,6 @@
"forks": 3,
"watchers": 23,
"score": 0,
"subscribers_count": 4
"subscribers_count": 3
}
]

View file

@ -27,6 +27,6 @@
"forks": 7,
"watchers": 22,
"score": 0,
"subscribers_count": 2
"subscribers_count": 1
}
]

View file

@ -152,10 +152,10 @@
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
"fork": false,
"created_at": "2021-02-24T16:31:34Z",
"updated_at": "2024-01-04T16:55:05Z",
"updated_at": "2024-03-06T21:28:01Z",
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 242,
"watchers_count": 242,
"stargazers_count": 243,
"watchers_count": 243,
"has_discussions": false,
"forks_count": 86,
"allow_forking": true,
@ -164,7 +164,7 @@
"topics": [],
"visibility": "public",
"forks": 86,
"watchers": 242,
"watchers": 243,
"score": 0,
"subscribers_count": 10
},

View file

@ -1527,7 +1527,7 @@
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2023-05-28T11:06:10Z",
"pushed_at": "2024-03-04T21:40:15Z",
"pushed_at": "2024-03-06T21:44:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.",
"fork": false,
"created_at": "2022-01-28T20:37:14Z",
"updated_at": "2024-02-22T19:00:17Z",
"updated_at": "2024-03-06T22:50:10Z",
"pushed_at": "2022-08-30T02:11:05Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 144,
"watchers_count": 144,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 143,
"watchers": 144,
"score": 0,
"subscribers_count": 3
}

View file

@ -227,10 +227,10 @@
"description": "PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.",
"fork": false,
"created_at": "2022-06-13T11:08:33Z",
"updated_at": "2024-02-25T20:44:39Z",
"updated_at": "2024-03-06T19:13:11Z",
"pushed_at": "2022-06-18T13:53:53Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -239,7 +239,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 108,
"watchers": 109,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false,
"created_at": "2022-03-23T15:03:09Z",
"updated_at": "2024-02-19T11:31:47Z",
"updated_at": "2024-03-07T00:12:48Z",
"pushed_at": "2022-03-26T05:52:15Z",
"stargazers_count": 451,
"watchers_count": 451,
"stargazers_count": 452,
"watchers_count": 452,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 451,
"watchers": 452,
"score": 0,
"subscribers_count": 20
}

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-03-03T01:39:15Z",
"updated_at": "2024-03-06T19:38:47Z",
"pushed_at": "2024-02-23T14:48:26Z",
"stargazers_count": 175,
"watchers_count": 175,
"stargazers_count": 176,
"watchers_count": 176,
"has_discussions": true,
"forks_count": 24,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 175,
"watchers": 176,
"score": 0,
"subscribers_count": 7
}

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
"fork": false,
"created_at": "2023-01-19T20:36:49Z",
"updated_at": "2024-02-02T17:40:32Z",
"updated_at": "2024-03-06T21:51:18Z",
"pushed_at": "2023-01-20T17:58:39Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 61,
"watchers": 60,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2024-03-06T11:18:55Z",
"updated_at": "2024-03-07T00:12:55Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 378,
"watchers_count": 378,
"stargazers_count": 379,
"watchers_count": 379,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 378,
"watchers": 379,
"score": 0,
"subscribers_count": 11
},
@ -103,10 +103,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2024-03-06T03:58:47Z",
"updated_at": "2024-03-07T00:12:55Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 868,
"watchers_count": 868,
"stargazers_count": 869,
"watchers_count": 869,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 868,
"watchers": 869,
"score": 0,
"subscribers_count": 25
},
@ -193,10 +193,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-04T05:08:20Z",
"updated_at": "2024-02-19T11:31:54Z",
"updated_at": "2024-03-07T00:12:55Z",
"pushed_at": "2023-01-19T08:12:40Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-11-14T20:45:31Z",
"updated_at": "2024-02-19T11:32:01Z",
"updated_at": "2024-03-07T00:13:03Z",
"pushed_at": "2023-11-14T20:54:26Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "This script complements the results obtained through the keepass-password-dumper tool when exploiting the CVE-2023-32784 vulnerability affecting KeePass.",
"fork": false,
"created_at": "2023-05-20T14:37:00Z",
"updated_at": "2023-11-02T23:39:29Z",
"updated_at": "2024-03-06T19:36:39Z",
"pushed_at": "2023-05-21T09:08:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},

View file

@ -322,10 +322,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-10T18:22:57Z",
"updated_at": "2024-02-29T12:41:50Z",
"updated_at": "2024-03-06T20:54:06Z",
"pushed_at": "2023-09-01T19:14:30Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -334,7 +334,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 67,
"watchers": 66,
"score": 0,
"subscribers_count": 9
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2024-03-05T14:54:34Z",
"updated_at": "2024-03-07T00:13:01Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 753,
"watchers_count": 753,
"stargazers_count": 754,
"watchers_count": 754,
"has_discussions": false,
"forks_count": 137,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 137,
"watchers": 753,
"watchers": 754,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-21T05:22:51Z",
"updated_at": "2024-02-27T06:58:39Z",
"updated_at": "2024-03-07T00:13:02Z",
"pushed_at": "2023-12-18T04:25:00Z",
"stargazers_count": 279,
"watchers_count": 279,
"stargazers_count": 280,
"watchers_count": 280,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 279,
"watchers": 280,
"score": 0,
"subscribers_count": 14
},

View file

@ -103,10 +103,10 @@
"description": "OpenSSH ProxyCommand RCE",
"fork": false,
"created_at": "2023-12-25T12:51:05Z",
"updated_at": "2024-01-21T05:43:03Z",
"updated_at": "2024-03-07T00:13:03Z",
"pushed_at": "2023-12-26T07:43:32Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
@ -133,10 +133,10 @@
"description": "一个验证对CVE-2023-51385",
"fork": false,
"created_at": "2023-12-25T13:13:25Z",
"updated_at": "2024-01-21T05:45:08Z",
"updated_at": "2024-03-07T00:13:04Z",
"pushed_at": "2023-12-25T15:46:42Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-03-02T15:45:52Z",
"updated_at": "2024-03-06T17:10:15Z",
"pushed_at": "2024-03-06T17:10:50Z",
"pushed_at": "2024-03-06T20:12:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2024-1512 in MasterStudy LMS WordPress Plugin.",
"fork": false,
"created_at": "2024-03-01T11:08:37Z",
"updated_at": "2024-03-01T11:17:08Z",
"updated_at": "2024-03-06T23:34:24Z",
"pushed_at": "2024-03-01T11:18:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -67,35 +67,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 766020621,
"name": "POCv2.0-for-CVE-2024-1709",
"full_name": "tr1pl3ight\/POCv2.0-for-CVE-2024-1709",
"owner": {
"login": "tr1pl3ight",
"id": 161883835,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161883835?v=4",
"html_url": "https:\/\/github.com\/tr1pl3ight"
},
"html_url": "https:\/\/github.com\/tr1pl3ight\/POCv2.0-for-CVE-2024-1709",
"description": "CVE-2024-1709 ConnectWise ScreenConnect auth bypass patch WORK 2.0 ",
"fork": false,
"created_at": "2024-03-02T05:46:40Z",
"updated_at": "2024-03-02T15:01:09Z",
"pushed_at": "2024-03-03T17:42:59Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-03-06T05:58:17Z",
"updated_at": "2024-03-06T21:55:32Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 514,
"watchers_count": 514,
"stargazers_count": 515,
"watchers_count": 515,
"has_discussions": false,
"forks_count": 117,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 117,
"watchers": 514,
"watchers": 515,
"score": 0,
"subscribers_count": 6
},
@ -133,10 +133,10 @@
"description": "CVE-2024-21413 PoC for THM Lab",
"fork": false,
"created_at": "2024-02-17T14:52:52Z",
"updated_at": "2024-03-02T02:57:49Z",
"updated_at": "2024-03-06T21:35:45Z",
"pushed_at": "2024-02-26T13:37:33Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 17,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},

View file

@ -29,36 +29,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 764804141,
"name": "CVE-2024-21762-POC",
"full_name": "c0d3b3af\/CVE-2024-21762-POC",
"owner": {
"login": "c0d3b3af",
"id": 161638405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161638405?v=4",
"html_url": "https:\/\/github.com\/c0d3b3af"
},
"html_url": "https:\/\/github.com\/c0d3b3af\/CVE-2024-21762-POC",
"description": "FortiOS 6.0 - 7.4.2 Out of bound exploit --> RCE!!!",
"fork": false,
"created_at": "2024-02-28T18:35:52Z",
"updated_at": "2024-03-03T19:21:51Z",
"pushed_at": "2024-02-28T18:58:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 764866619,
"name": "cve-2024-21762-check",
@ -90,23 +60,23 @@
"subscribers_count": 1
},
{
"id": 766583501,
"id": 766394047,
"name": "CVE-2024-21762-POC",
"full_name": "tr1pl3ight\/CVE-2024-21762-POC",
"full_name": "redCode001\/CVE-2024-21762-POC",
"owner": {
"login": "tr1pl3ight",
"id": 161883835,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161883835?v=4",
"html_url": "https:\/\/github.com\/tr1pl3ight"
"login": "redCode001",
"id": 129734113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129734113?v=4",
"html_url": "https:\/\/github.com\/redCode001"
},
"html_url": "https:\/\/github.com\/tr1pl3ight\/CVE-2024-21762-POC",
"description": "CVE-2024-21762 POC Forti VPN SSL Out of Boundary RCE",
"html_url": "https:\/\/github.com\/redCode001\/CVE-2024-21762-POC",
"description": "FortiOS 6.0 - 7.4.2 Out of bound exploit --> RCE!!!",
"fork": false,
"created_at": "2024-03-03T17:01:56Z",
"updated_at": "2024-03-03T17:45:58Z",
"pushed_at": "2024-03-03T17:50:30Z",
"stargazers_count": 4,
"watchers_count": 4,
"created_at": "2024-03-03T06:12:13Z",
"updated_at": "2024-03-03T06:12:13Z",
"pushed_at": "2024-02-28T18:58:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -115,8 +85,38 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 768318279,
"name": "CVE-2024-21762-Exploit",
"full_name": "c0d3b3af\/CVE-2024-21762-Exploit",
"owner": {
"login": "c0d3b3af",
"id": 161638405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161638405?v=4",
"html_url": "https:\/\/github.com\/c0d3b3af"
},
"html_url": "https:\/\/github.com\/c0d3b3af\/CVE-2024-21762-Exploit",
"description": "proof-of-concept out-of-bound write vuln in FortiOS ---> RCE",
"fork": false,
"created_at": "2024-03-06T21:39:22Z",
"updated_at": "2024-03-06T21:39:23Z",
"pushed_at": "2024-03-06T21:39:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -226,10 +226,10 @@
"description": "on this git you can find all information on the CVE-2024-23897",
"fork": false,
"created_at": "2024-01-27T13:27:57Z",
"updated_at": "2024-03-01T12:46:05Z",
"updated_at": "2024-03-06T22:14:44Z",
"pushed_at": "2024-01-27T14:43:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -238,7 +238,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,7 +43,7 @@
"description": "Exploit for CVE-2024-27198 - TeamCity Server",
"fork": false,
"created_at": "2024-03-05T05:43:06Z",
"updated_at": "2024-03-06T17:50:30Z",
"updated_at": "2024-03-06T20:22:31Z",
"pushed_at": "2024-03-05T06:20:55Z",
"stargazers_count": 15,
"watchers_count": 15,
@ -103,10 +103,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
"fork": false,
"created_at": "2024-03-06T03:15:03Z",
"updated_at": "2024-03-06T17:12:36Z",
"updated_at": "2024-03-06T21:21:14Z",
"pushed_at": "2024-03-06T05:08:41Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -121,7 +121,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 14,
"watchers": 17,
"score": 0,
"subscribers_count": 0
}

View file

@ -140,7 +140,6 @@
- [W01fh4cker/ScreenConnect-AuthBypass-RCE](https://github.com/W01fh4cker/ScreenConnect-AuthBypass-RCE)
- [HussainFathy/CVE-2024-1709](https://github.com/HussainFathy/CVE-2024-1709)
- [tr1pl3ight/POCv2.0-for-CVE-2024-1709](https://github.com/tr1pl3ight/POCv2.0-for-CVE-2024-1709)
### CVE-2024-2074 (-)
@ -259,9 +258,9 @@
</code>
- [Gh71m/CVE-2024-21762-POC](https://github.com/Gh71m/CVE-2024-21762-POC)
- [c0d3b3af/CVE-2024-21762-POC](https://github.com/c0d3b3af/CVE-2024-21762-POC)
- [BishopFox/cve-2024-21762-check](https://github.com/BishopFox/cve-2024-21762-check)
- [tr1pl3ight/CVE-2024-21762-POC](https://github.com/tr1pl3ight/CVE-2024-21762-POC)
- [redCode001/CVE-2024-21762-POC](https://github.com/redCode001/CVE-2024-21762-POC)
- [c0d3b3af/CVE-2024-21762-Exploit](https://github.com/c0d3b3af/CVE-2024-21762-Exploit)
### CVE-2024-21887 (2024-01-12)
@ -35570,6 +35569,7 @@
</code>
- [ropbear/CVE-2017-16651](https://github.com/ropbear/CVE-2017-16651)
- [sephiroth950911/CVE-2017-16651-Exploit](https://github.com/sephiroth950911/CVE-2017-16651-Exploit)
### CVE-2017-16720 (2018-01-05)
@ -38701,6 +38701,7 @@
- [hadrian3689/rejetto_hfs_rce](https://github.com/hadrian3689/rejetto_hfs_rce)
- [randallbanner/Rejetto-HTTP-File-Server-HFS-2.3.x---Remote-Command-Execution](https://github.com/randallbanner/Rejetto-HTTP-File-Server-HFS-2.3.x---Remote-Command-Execution)
- [0xTabun/CVE-2014-6287](https://github.com/0xTabun/CVE-2014-6287)
- [zhsh9/CVE-2014-6287](https://github.com/zhsh9/CVE-2014-6287)
### CVE-2014-6332 (2014-11-11)