mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/04/22 18:29:17
This commit is contained in:
parent
a4e4fd1516
commit
05f1729264
38 changed files with 207 additions and 172 deletions
|
@ -13,7 +13,7 @@
|
|||
"description": "Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-18T22:38:51Z",
|
||||
"updated_at": "2024-01-10T02:16:46Z",
|
||||
"updated_at": "2024-04-22T14:41:59Z",
|
||||
"pushed_at": "2017-07-22T19:22:55Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-18T22:38:51Z",
|
||||
"updated_at": "2024-01-10T02:16:46Z",
|
||||
"updated_at": "2024-04-22T14:41:59Z",
|
||||
"pushed_at": "2017-07-22T19:22:55Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 26,
|
||||
"watchers": 99,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
"subscribers_count": 8
|
||||
},
|
||||
{
|
||||
"id": 116783298,
|
||||
|
|
|
@ -452,7 +452,7 @@
|
|||
"stargazers_count": 816,
|
||||
"watchers_count": 816,
|
||||
"has_discussions": false,
|
||||
"forks_count": 426,
|
||||
"forks_count": 427,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -462,7 +462,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 426,
|
||||
"forks": 427,
|
||||
"watchers": 816,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
|
|
|
@ -1,33 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 132445475,
|
||||
"id": 132490793,
|
||||
"name": "GPON",
|
||||
"full_name": "f3d0x0\/GPON",
|
||||
"full_name": "ExiaHan\/GPON",
|
||||
"owner": {
|
||||
"login": "f3d0x0",
|
||||
"id": 6794063,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6794063?v=4",
|
||||
"html_url": "https:\/\/github.com\/f3d0x0"
|
||||
"login": "ExiaHan",
|
||||
"id": 4057890,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4057890?v=4",
|
||||
"html_url": "https:\/\/github.com\/ExiaHan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/f3d0x0\/GPON",
|
||||
"description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https:\/\/www.vpnmentor.com\/blog\/critical-vulnerability-gpon-router\/), kudos for their work.",
|
||||
"html_url": "https:\/\/github.com\/ExiaHan\/GPON",
|
||||
"description": "Python exploit for Remote Code Executuion on GPON home routers (CVE-2018-10562). Initially disclosed by VPNMentor (https:\/\/www.vpnmentor.com\/blog\/critical-vulnerability-gpon-router\/), kudos for their work.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-07T10:34:10Z",
|
||||
"updated_at": "2024-04-11T07:28:09Z",
|
||||
"pushed_at": "2018-05-10T15:08:43Z",
|
||||
"stargazers_count": 210,
|
||||
"watchers_count": 210,
|
||||
"created_at": "2018-05-07T16:56:18Z",
|
||||
"updated_at": "2018-05-07T16:56:20Z",
|
||||
"pushed_at": "2018-05-07T16:21:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 73,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 73,
|
||||
"watchers": 210,
|
||||
"forks": 69,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 133550928,
|
||||
|
|
|
@ -1449,10 +1449,10 @@
|
|||
"description": "Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-09T11:46:23Z",
|
||||
"updated_at": "2024-04-02T00:25:17Z",
|
||||
"updated_at": "2024-04-22T13:37:10Z",
|
||||
"pushed_at": "2021-12-17T11:40:03Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -1461,7 +1461,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-12-06T00:53:08Z",
|
||||
"updated_at": "2024-01-15T23:46:01Z",
|
||||
"pushed_at": "2023-01-11T01:37:15Z",
|
||||
"pushed_at": "2024-04-22T15:40:23Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2021-26084 Remote Code Execution on Confluence Servers, reference: https:\/\/github.com\/httpvoid\/writeups\/blob\/main\/Confluence-RCE.md",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T02:35:04Z",
|
||||
"updated_at": "2021-09-09T08:43:08Z",
|
||||
"updated_at": "2024-04-22T13:37:41Z",
|
||||
"pushed_at": "2021-09-01T02:34:14Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -938,10 +938,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2024-04-21T01:46:58Z",
|
||||
"updated_at": "2024-04-22T17:35:26Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 981,
|
||||
"watchers_count": 981,
|
||||
"stargazers_count": 982,
|
||||
"watchers_count": 982,
|
||||
"has_discussions": false,
|
||||
"forks_count": 181,
|
||||
"allow_forking": true,
|
||||
|
@ -952,7 +952,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 181,
|
||||
"watchers": 981,
|
||||
"watchers": 982,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -1423,10 +1423,10 @@
|
|||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:18:46Z",
|
||||
"updated_at": "2024-04-21T06:27:47Z",
|
||||
"updated_at": "2024-04-22T14:35:35Z",
|
||||
"pushed_at": "2022-04-07T14:47:03Z",
|
||||
"stargazers_count": 852,
|
||||
"watchers_count": 852,
|
||||
"stargazers_count": 851,
|
||||
"watchers_count": 851,
|
||||
"has_discussions": false,
|
||||
"forks_count": 175,
|
||||
"allow_forking": true,
|
||||
|
@ -1448,7 +1448,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 175,
|
||||
"watchers": 852,
|
||||
"watchers": 851,
|
||||
"score": 0,
|
||||
"subscribers_count": 33
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2024-04-20T01:38:44Z",
|
||||
"updated_at": "2024-04-22T14:04:41Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1128,
|
||||
"watchers_count": 1128,
|
||||
"stargazers_count": 1129,
|
||||
"watchers_count": 1129,
|
||||
"has_discussions": true,
|
||||
"forks_count": 187,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 187,
|
||||
"watchers": 1128,
|
||||
"watchers": 1129,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "检测域内常见一把梭漏洞,包括:NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-17T06:29:44Z",
|
||||
"updated_at": "2024-04-22T12:03:37Z",
|
||||
"updated_at": "2024-04-22T15:14:50Z",
|
||||
"pushed_at": "2023-10-23T04:47:11Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-04-21T09:35:15Z",
|
||||
"updated_at": "2024-04-22T15:49:33Z",
|
||||
"pushed_at": "2024-04-05T06:46:47Z",
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"has_discussions": true,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 197,
|
||||
"watchers": 198,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2022-39952",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-20T15:12:33Z",
|
||||
"updated_at": "2024-01-30T19:35:17Z",
|
||||
"updated_at": "2024-04-22T18:18:30Z",
|
||||
"pushed_at": "2023-02-25T08:52:03Z",
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 267,
|
||||
"watchers": 268,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2023-2123",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-16T00:33:56Z",
|
||||
"updated_at": "2023-09-16T21:47:12Z",
|
||||
"updated_at": "2024-04-22T13:52:20Z",
|
||||
"pushed_at": "2023-06-21T14:38:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "RCE exploit for Microsoft SharePoint 2019",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-30T06:26:48Z",
|
||||
"updated_at": "2024-04-19T13:33:29Z",
|
||||
"updated_at": "2024-04-22T13:03:55Z",
|
||||
"pushed_at": "2024-03-30T06:58:57Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 8,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-21T17:39:05Z",
|
||||
"updated_at": "2024-04-22T07:13:33Z",
|
||||
"pushed_at": "2024-04-22T07:13:30Z",
|
||||
"updated_at": "2024-04-22T16:55:20Z",
|
||||
"pushed_at": "2024-04-22T16:55:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -73,8 +73,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-22T09:32:54Z",
|
||||
"updated_at": "2024-04-22T09:51:12Z",
|
||||
"pushed_at": "2024-04-22T09:51:08Z",
|
||||
"updated_at": "2024-04-22T13:44:47Z",
|
||||
"pushed_at": "2024-04-22T13:44:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-21T21:39:24Z",
|
||||
"updated_at": "2024-04-17T03:45:15Z",
|
||||
"updated_at": "2024-04-22T15:17:01Z",
|
||||
"pushed_at": "2024-03-22T06:45:43Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -73,8 +73,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T18:46:40Z",
|
||||
"updated_at": "2024-04-14T17:40:46Z",
|
||||
"pushed_at": "2024-04-14T17:40:43Z",
|
||||
"updated_at": "2024-04-22T17:46:16Z",
|
||||
"pushed_at": "2024-04-22T17:46:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-04-22T07:53:00Z",
|
||||
"updated_at": "2024-04-22T18:01:28Z",
|
||||
"pushed_at": "2024-04-08T13:43:21Z",
|
||||
"stargazers_count": 417,
|
||||
"watchers_count": 417,
|
||||
"stargazers_count": 418,
|
||||
"watchers_count": 418,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 417,
|
||||
"watchers": 418,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -329,10 +329,10 @@
|
|||
"description": "Simulates CVE-2023-4966 Citrix Bleed overread bug",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-16T21:55:04Z",
|
||||
"updated_at": "2023-12-17T12:48:40Z",
|
||||
"updated_at": "2024-04-22T12:46:33Z",
|
||||
"pushed_at": "2023-12-31T10:40:08Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -341,7 +341,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "0day for Citrix Netscaler ADC and NetScaler Gateway latest versions",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-04T08:57:27Z",
|
||||
"updated_at": "2024-04-19T13:33:28Z",
|
||||
"updated_at": "2024-04-22T13:03:46Z",
|
||||
"pushed_at": "2024-03-04T09:36:29Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-7028 poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-12T07:42:02Z",
|
||||
"updated_at": "2024-02-10T18:15:26Z",
|
||||
"updated_at": "2024-04-22T15:51:51Z",
|
||||
"pushed_at": "2024-01-12T08:58:23Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-04-22T02:27:59Z",
|
||||
"updated_at": "2024-04-22T14:44:53Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 1872,
|
||||
"watchers_count": 1872,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-12T15:07:42Z",
|
||||
"updated_at": "2024-04-22T11:29:18Z",
|
||||
"updated_at": "2024-04-22T15:49:15Z",
|
||||
"pushed_at": "2024-04-18T14:31:34Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 22,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-22T07:05:04Z",
|
||||
"updated_at": "2024-04-22T12:17:48Z",
|
||||
"updated_at": "2024-04-22T18:27:28Z",
|
||||
"pushed_at": "2024-04-22T10:08:45Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"forks": 8,
|
||||
"watchers": 33,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T05:53:02Z",
|
||||
"updated_at": "2024-04-22T06:37:09Z",
|
||||
"updated_at": "2024-04-22T15:26:07Z",
|
||||
"pushed_at": "2024-04-16T21:00:14Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 191,
|
||||
"watchers": 194,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-12T08:58:09Z",
|
||||
"updated_at": "2024-04-19T13:33:29Z",
|
||||
"updated_at": "2024-04-22T13:04:05Z",
|
||||
"pushed_at": "2024-04-12T08:58:12Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-12T09:54:56Z",
|
||||
"updated_at": "2024-04-19T13:33:29Z",
|
||||
"updated_at": "2024-04-22T13:04:06Z",
|
||||
"pushed_at": "2024-04-12T09:55:00Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC and Detection for CVE-2024-21626",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-01T15:28:37Z",
|
||||
"updated_at": "2024-04-21T19:01:35Z",
|
||||
"updated_at": "2024-04-22T14:03:20Z",
|
||||
"pushed_at": "2024-02-06T16:09:05Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-13T09:17:28Z",
|
||||
"updated_at": "2024-04-22T11:05:01Z",
|
||||
"updated_at": "2024-04-22T16:58:41Z",
|
||||
"pushed_at": "2024-03-16T00:35:12Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 89,
|
||||
"watchers": 90,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -1012,10 +1012,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-04-21T22:35:18Z",
|
||||
"updated_at": "2024-04-22T18:31:15Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3407,
|
||||
"watchers_count": 3407,
|
||||
"stargazers_count": 3412,
|
||||
"watchers_count": 3412,
|
||||
"has_discussions": false,
|
||||
"forks_count": 228,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,7 +1024,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 228,
|
||||
"watchers": 3407,
|
||||
"watchers": 3412,
|
||||
"score": 0,
|
||||
"subscribers_count": 36
|
||||
},
|
||||
|
|
|
@ -58,5 +58,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 790201877,
|
||||
"name": "CVE-2024-31497-POC",
|
||||
"full_name": "ViktorNaum\/CVE-2024-31497-POC",
|
||||
"owner": {
|
||||
"login": "ViktorNaum",
|
||||
"id": 167753987,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167753987?v=4",
|
||||
"html_url": "https:\/\/github.com\/ViktorNaum"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ViktorNaum\/CVE-2024-31497-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-22T12:58:13Z",
|
||||
"updated_at": "2024-04-22T13:04:09Z",
|
||||
"pushed_at": "2024-04-22T12:58:15Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-32399.json
Normal file
32
2024/CVE-2024-32399.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 790269006,
|
||||
"name": "CVE-2024-32399",
|
||||
"full_name": "NN0b0dy\/CVE-2024-32399",
|
||||
"owner": {
|
||||
"login": "NN0b0dy",
|
||||
"id": 166635896,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166635896?v=4",
|
||||
"html_url": "https:\/\/github.com\/NN0b0dy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NN0b0dy\/CVE-2024-32399",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-22T15:15:37Z",
|
||||
"updated_at": "2024-04-22T15:16:26Z",
|
||||
"pushed_at": "2024-04-22T15:16:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "D-Link NAS CVE-2024-3273 Exploit Tool",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-07T03:09:13Z",
|
||||
"updated_at": "2024-04-21T23:09:06Z",
|
||||
"updated_at": "2024-04-22T14:25:16Z",
|
||||
"pushed_at": "2024-04-07T04:41:26Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -283,10 +283,10 @@
|
|||
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T14:18:08Z",
|
||||
"updated_at": "2024-04-22T12:10:53Z",
|
||||
"updated_at": "2024-04-22T16:55:16Z",
|
||||
"pushed_at": "2024-04-16T22:35:43Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -295,7 +295,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 109,
|
||||
"watchers": 110,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -313,10 +313,10 @@
|
|||
"description": "CVE-2024-3400-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T16:18:56Z",
|
||||
"updated_at": "2024-04-22T12:15:11Z",
|
||||
"updated_at": "2024-04-22T14:53:06Z",
|
||||
"pushed_at": "2024-04-22T08:50:27Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -325,7 +325,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 18,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -403,10 +403,10 @@
|
|||
"description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T21:24:15Z",
|
||||
"updated_at": "2024-04-22T05:53:20Z",
|
||||
"updated_at": "2024-04-22T14:37:12Z",
|
||||
"pushed_at": "2024-04-17T11:03:32Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -415,7 +415,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -449,36 +449,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 787813638,
|
||||
"name": "CVE-2024-3400-RCE-copy",
|
||||
"full_name": "admi-n\/CVE-2024-3400-RCE-copy",
|
||||
"owner": {
|
||||
"login": "admi-n",
|
||||
"id": 34176629,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34176629?v=4",
|
||||
"html_url": "https:\/\/github.com\/admi-n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/admi-n\/CVE-2024-3400-RCE-copy",
|
||||
"description": "CVE-2024-3400-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-17T08:27:52Z",
|
||||
"updated_at": "2024-04-17T08:32:03Z",
|
||||
"pushed_at": "2024-04-17T08:31:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 787894337,
|
||||
"name": "CVE-2024-3400-Canary",
|
||||
|
|
|
@ -396,7 +396,6 @@
|
|||
- [Chocapikk/CVE-2024-3400](https://github.com/Chocapikk/CVE-2024-3400)
|
||||
- [ihebski/CVE-2024-3400](https://github.com/ihebski/CVE-2024-3400)
|
||||
- [index2014/CVE-2024-3400-Checker](https://github.com/index2014/CVE-2024-3400-Checker)
|
||||
- [admi-n/CVE-2024-3400-RCE-copy](https://github.com/admi-n/CVE-2024-3400-RCE-copy)
|
||||
- [ZephrFish/CVE-2024-3400-Canary](https://github.com/ZephrFish/CVE-2024-3400-Canary)
|
||||
- [ak1t4/CVE-2024-3400](https://github.com/ak1t4/CVE-2024-3400)
|
||||
- [phantomradar/cve-2024-3400-poc](https://github.com/phantomradar/cve-2024-3400-poc)
|
||||
|
@ -1524,6 +1523,7 @@
|
|||
|
||||
- [sh1k4ku/CVE-2024-31497](https://github.com/sh1k4ku/CVE-2024-31497)
|
||||
- [edutko/cve-2024-31497](https://github.com/edutko/cve-2024-31497)
|
||||
- [ViktorNaum/CVE-2024-31497-POC](https://github.com/ViktorNaum/CVE-2024-31497-POC)
|
||||
|
||||
### CVE-2024-31719
|
||||
- [VoltaireYoung/CVE-2024-31719----AMI-Aptio-5-Vulnerability](https://github.com/VoltaireYoung/CVE-2024-31719----AMI-Aptio-5-Vulnerability)
|
||||
|
@ -1551,6 +1551,9 @@
|
|||
### CVE-2024-32258
|
||||
- [liyansong2018/CVE-2024-32258](https://github.com/liyansong2018/CVE-2024-32258)
|
||||
|
||||
### CVE-2024-32399
|
||||
- [NN0b0dy/CVE-2024-32399](https://github.com/NN0b0dy/CVE-2024-32399)
|
||||
|
||||
### CVE-2024-65230
|
||||
- [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230)
|
||||
|
||||
|
@ -33161,7 +33164,7 @@
|
|||
<code>An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.
|
||||
</code>
|
||||
|
||||
- [f3d0x0/GPON](https://github.com/f3d0x0/GPON)
|
||||
- [ExiaHan/GPON](https://github.com/ExiaHan/GPON)
|
||||
- [649/Pingpon-Exploit](https://github.com/649/Pingpon-Exploit)
|
||||
- [Choudai/GPON-LOADER](https://github.com/Choudai/GPON-LOADER)
|
||||
- [c0ld1/GPON_RCE](https://github.com/c0ld1/GPON_RCE)
|
||||
|
|
Loading…
Reference in a new issue