Auto Update 2024/04/22 18:29:17

This commit is contained in:
motikan2010-bot 2024-04-23 03:29:18 +09:00
parent a4e4fd1516
commit 05f1729264
38 changed files with 207 additions and 172 deletions

View file

@ -13,7 +13,7 @@
"description": "Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049",
"fork": false,
"created_at": "2016-02-18T22:38:51Z",
"updated_at": "2024-01-10T02:16:46Z",
"updated_at": "2024-04-22T14:41:59Z",
"pushed_at": "2017-07-22T19:22:55Z",
"stargazers_count": 52,
"watchers_count": 52,

View file

@ -13,7 +13,7 @@
"description": "Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049",
"fork": false,
"created_at": "2016-02-18T22:38:51Z",
"updated_at": "2024-01-10T02:16:46Z",
"updated_at": "2024-04-22T14:41:59Z",
"pushed_at": "2017-07-22T19:22:55Z",
"stargazers_count": 52,
"watchers_count": 52,

View file

@ -27,7 +27,7 @@
"forks": 26,
"watchers": 99,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
},
{
"id": 116783298,

View file

@ -452,7 +452,7 @@
"stargazers_count": 816,
"watchers_count": 816,
"has_discussions": false,
"forks_count": 426,
"forks_count": 427,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -462,7 +462,7 @@
"exploit"
],
"visibility": "public",
"forks": 426,
"forks": 427,
"watchers": 816,
"score": 0,
"subscribers_count": 11

View file

@ -1,33 +1,33 @@
[
{
"id": 132445475,
"id": 132490793,
"name": "GPON",
"full_name": "f3d0x0\/GPON",
"full_name": "ExiaHan\/GPON",
"owner": {
"login": "f3d0x0",
"id": 6794063,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6794063?v=4",
"html_url": "https:\/\/github.com\/f3d0x0"
"login": "ExiaHan",
"id": 4057890,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4057890?v=4",
"html_url": "https:\/\/github.com\/ExiaHan"
},
"html_url": "https:\/\/github.com\/f3d0x0\/GPON",
"description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https:\/\/www.vpnmentor.com\/blog\/critical-vulnerability-gpon-router\/), kudos for their work.",
"html_url": "https:\/\/github.com\/ExiaHan\/GPON",
"description": "Python exploit for Remote Code Executuion on GPON home routers (CVE-2018-10562). Initially disclosed by VPNMentor (https:\/\/www.vpnmentor.com\/blog\/critical-vulnerability-gpon-router\/), kudos for their work.",
"fork": false,
"created_at": "2018-05-07T10:34:10Z",
"updated_at": "2024-04-11T07:28:09Z",
"pushed_at": "2018-05-10T15:08:43Z",
"stargazers_count": 210,
"watchers_count": 210,
"created_at": "2018-05-07T16:56:18Z",
"updated_at": "2018-05-07T16:56:20Z",
"pushed_at": "2018-05-07T16:21:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 73,
"forks_count": 69,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 73,
"watchers": 210,
"forks": 69,
"watchers": 0,
"score": 0,
"subscribers_count": 11
"subscribers_count": 0
},
{
"id": 133550928,

View file

@ -1449,10 +1449,10 @@
"description": "Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3",
"fork": false,
"created_at": "2020-08-09T11:46:23Z",
"updated_at": "2024-04-02T00:25:17Z",
"updated_at": "2024-04-22T13:37:10Z",
"pushed_at": "2021-12-17T11:40:03Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -1461,7 +1461,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-12-06T00:53:08Z",
"updated_at": "2024-01-15T23:46:01Z",
"pushed_at": "2023-01-11T01:37:15Z",
"pushed_at": "2024-04-22T15:40:23Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,

View file

@ -103,10 +103,10 @@
"description": "CVE-2021-26084 Remote Code Execution on Confluence Servers, reference: https:\/\/github.com\/httpvoid\/writeups\/blob\/main\/Confluence-RCE.md",
"fork": false,
"created_at": "2021-09-01T02:35:04Z",
"updated_at": "2021-09-09T08:43:08Z",
"updated_at": "2024-04-22T13:37:41Z",
"pushed_at": "2021-09-01T02:34:14Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},

View file

@ -938,10 +938,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-04-21T01:46:58Z",
"updated_at": "2024-04-22T17:35:26Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 981,
"watchers_count": 981,
"stargazers_count": 982,
"watchers_count": 982,
"has_discussions": false,
"forks_count": 181,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 181,
"watchers": 981,
"watchers": 982,
"score": 0,
"subscribers_count": 14
},

View file

@ -1423,10 +1423,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2024-04-21T06:27:47Z",
"updated_at": "2024-04-22T14:35:35Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 852,
"watchers_count": 852,
"stargazers_count": 851,
"watchers_count": 851,
"has_discussions": false,
"forks_count": 175,
"allow_forking": true,
@ -1448,7 +1448,7 @@
],
"visibility": "public",
"forks": 175,
"watchers": 852,
"watchers": 851,
"score": 0,
"subscribers_count": 33
},

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-04-20T01:38:44Z",
"updated_at": "2024-04-22T14:04:41Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1128,
"watchers_count": 1128,
"stargazers_count": 1129,
"watchers_count": 1129,
"has_discussions": true,
"forks_count": 187,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 187,
"watchers": 1128,
"watchers": 1129,
"score": 0,
"subscribers_count": 18
},

View file

@ -103,10 +103,10 @@
"description": "检测域内常见一把梭漏洞包括NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare",
"fork": false,
"created_at": "2023-10-17T06:29:44Z",
"updated_at": "2024-04-22T12:03:37Z",
"updated_at": "2024-04-22T15:14:50Z",
"pushed_at": "2023-10-23T04:47:11Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-04-21T09:35:15Z",
"updated_at": "2024-04-22T15:49:33Z",
"pushed_at": "2024-04-05T06:46:47Z",
"stargazers_count": 197,
"watchers_count": 197,
"stargazers_count": 198,
"watchers_count": 198,
"has_discussions": true,
"forks_count": 23,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 197,
"watchers": 198,
"score": 0,
"subscribers_count": 6
}

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2022-39952",
"fork": false,
"created_at": "2023-02-20T15:12:33Z",
"updated_at": "2024-01-30T19:35:17Z",
"updated_at": "2024-04-22T18:18:30Z",
"pushed_at": "2023-02-25T08:52:03Z",
"stargazers_count": 267,
"watchers_count": 267,
"stargazers_count": 268,
"watchers_count": 268,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 267,
"watchers": 268,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2023-2123",
"fork": false,
"created_at": "2023-04-16T00:33:56Z",
"updated_at": "2023-09-16T21:47:12Z",
"updated_at": "2024-04-22T13:52:20Z",
"pushed_at": "2023-06-21T14:38:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "RCE exploit for Microsoft SharePoint 2019",
"fork": false,
"created_at": "2024-03-30T06:26:48Z",
"updated_at": "2024-04-19T13:33:29Z",
"updated_at": "2024-04-22T13:03:55Z",
"pushed_at": "2024-03-30T06:58:57Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2024-04-21T17:39:05Z",
"updated_at": "2024-04-22T07:13:33Z",
"pushed_at": "2024-04-22T07:13:30Z",
"updated_at": "2024-04-22T16:55:20Z",
"pushed_at": "2024-04-22T16:55:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -73,8 +73,8 @@
"description": null,
"fork": false,
"created_at": "2024-04-22T09:32:54Z",
"updated_at": "2024-04-22T09:51:12Z",
"pushed_at": "2024-04-22T09:51:08Z",
"updated_at": "2024-04-22T13:44:47Z",
"pushed_at": "2024-04-22T13:44:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
"fork": false,
"created_at": "2024-03-21T21:39:24Z",
"updated_at": "2024-04-17T03:45:15Z",
"updated_at": "2024-04-22T15:17:01Z",
"pushed_at": "2024-03-22T06:45:43Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 2
}

View file

@ -73,8 +73,8 @@
"description": null,
"fork": false,
"created_at": "2024-04-13T18:46:40Z",
"updated_at": "2024-04-14T17:40:46Z",
"pushed_at": "2024-04-14T17:40:43Z",
"updated_at": "2024-04-22T17:46:16Z",
"pushed_at": "2024-04-22T17:46:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-04-22T07:53:00Z",
"updated_at": "2024-04-22T18:01:28Z",
"pushed_at": "2024-04-08T13:43:21Z",
"stargazers_count": 417,
"watchers_count": 417,
"stargazers_count": 418,
"watchers_count": 418,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 417,
"watchers": 418,
"score": 0,
"subscribers_count": 7
},

View file

@ -329,10 +329,10 @@
"description": "Simulates CVE-2023-4966 Citrix Bleed overread bug",
"fork": false,
"created_at": "2023-12-16T21:55:04Z",
"updated_at": "2023-12-17T12:48:40Z",
"updated_at": "2024-04-22T12:46:33Z",
"pushed_at": "2023-12-31T10:40:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -341,7 +341,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "0day for Citrix Netscaler ADC and NetScaler Gateway latest versions",
"fork": false,
"created_at": "2024-03-04T08:57:27Z",
"updated_at": "2024-04-19T13:33:28Z",
"updated_at": "2024-04-22T13:03:46Z",
"pushed_at": "2024-03-04T09:36:29Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-7028 poc",
"fork": false,
"created_at": "2024-01-12T07:42:02Z",
"updated_at": "2024-02-10T18:15:26Z",
"updated_at": "2024-04-22T15:51:51Z",
"pushed_at": "2024-01-12T08:58:23Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,7 +13,7 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-22T02:27:59Z",
"updated_at": "2024-04-22T14:44:53Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 1872,
"watchers_count": 1872,

View file

@ -13,10 +13,10 @@
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
"fork": false,
"created_at": "2024-04-12T15:07:42Z",
"updated_at": "2024-04-22T11:29:18Z",
"updated_at": "2024-04-22T15:49:15Z",
"pushed_at": "2024-04-18T14:31:34Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 22,
"watchers": 24,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,19 +13,19 @@
"description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
"fork": false,
"created_at": "2024-04-22T07:05:04Z",
"updated_at": "2024-04-22T12:17:48Z",
"updated_at": "2024-04-22T18:27:28Z",
"pushed_at": "2024-04-22T10:08:45Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 3,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"forks": 8,
"watchers": 33,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-04-22T06:37:09Z",
"updated_at": "2024-04-22T15:26:07Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 191,
"watchers_count": 191,
"stargazers_count": 194,
"watchers_count": 194,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 191,
"watchers": 194,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-12T08:58:09Z",
"updated_at": "2024-04-19T13:33:29Z",
"updated_at": "2024-04-22T13:04:05Z",
"pushed_at": "2024-04-12T08:58:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-12T09:54:56Z",
"updated_at": "2024-04-19T13:33:29Z",
"updated_at": "2024-04-22T13:04:06Z",
"pushed_at": "2024-04-12T09:55:00Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "PoC and Detection for CVE-2024-21626",
"fork": false,
"created_at": "2024-02-01T15:28:37Z",
"updated_at": "2024-04-21T19:01:35Z",
"updated_at": "2024-04-22T14:03:20Z",
"pushed_at": "2024-02-06T16:09:05Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 58,
"watchers": 59,
"score": 0,
"subscribers_count": 3
},

View file

@ -73,10 +73,10 @@
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
"fork": false,
"created_at": "2024-03-13T09:17:28Z",
"updated_at": "2024-04-22T11:05:01Z",
"updated_at": "2024-04-22T16:58:41Z",
"pushed_at": "2024-03-16T00:35:12Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 89,
"watchers": 90,
"score": 0,
"subscribers_count": 5
},

View file

@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-04-21T22:35:18Z",
"updated_at": "2024-04-22T18:31:15Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3407,
"watchers_count": 3407,
"stargazers_count": 3412,
"watchers_count": 3412,
"has_discussions": false,
"forks_count": 228,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 228,
"watchers": 3407,
"watchers": 3412,
"score": 0,
"subscribers_count": 36
},

View file

@ -58,5 +58,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 790201877,
"name": "CVE-2024-31497-POC",
"full_name": "ViktorNaum\/CVE-2024-31497-POC",
"owner": {
"login": "ViktorNaum",
"id": 167753987,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167753987?v=4",
"html_url": "https:\/\/github.com\/ViktorNaum"
},
"html_url": "https:\/\/github.com\/ViktorNaum\/CVE-2024-31497-POC",
"description": null,
"fork": false,
"created_at": "2024-04-22T12:58:13Z",
"updated_at": "2024-04-22T13:04:09Z",
"pushed_at": "2024-04-22T12:58:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-32399.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 790269006,
"name": "CVE-2024-32399",
"full_name": "NN0b0dy\/CVE-2024-32399",
"owner": {
"login": "NN0b0dy",
"id": 166635896,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166635896?v=4",
"html_url": "https:\/\/github.com\/NN0b0dy"
},
"html_url": "https:\/\/github.com\/NN0b0dy\/CVE-2024-32399",
"description": null,
"fork": false,
"created_at": "2024-04-22T15:15:37Z",
"updated_at": "2024-04-22T15:16:26Z",
"pushed_at": "2024-04-22T15:16:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "D-Link NAS CVE-2024-3273 Exploit Tool",
"fork": false,
"created_at": "2024-04-07T03:09:13Z",
"updated_at": "2024-04-21T23:09:06Z",
"updated_at": "2024-04-22T14:25:16Z",
"pushed_at": "2024-04-07T04:41:26Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 59,
"watchers": 60,
"score": 0,
"subscribers_count": 3
},

View file

@ -283,10 +283,10 @@
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
"fork": false,
"created_at": "2024-04-16T14:18:08Z",
"updated_at": "2024-04-22T12:10:53Z",
"updated_at": "2024-04-22T16:55:16Z",
"pushed_at": "2024-04-16T22:35:43Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 110,
"watchers_count": 110,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -295,7 +295,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 109,
"watchers": 110,
"score": 0,
"subscribers_count": 1
},
@ -313,10 +313,10 @@
"description": "CVE-2024-3400-RCE",
"fork": false,
"created_at": "2024-04-16T16:18:56Z",
"updated_at": "2024-04-22T12:15:11Z",
"updated_at": "2024-04-22T14:53:06Z",
"pushed_at": "2024-04-22T08:50:27Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -325,7 +325,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 18,
"watchers": 23,
"score": 0,
"subscribers_count": 3
},
@ -403,10 +403,10 @@
"description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect",
"fork": false,
"created_at": "2024-04-16T21:24:15Z",
"updated_at": "2024-04-22T05:53:20Z",
"updated_at": "2024-04-22T14:37:12Z",
"pushed_at": "2024-04-17T11:03:32Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -415,7 +415,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},
@ -449,36 +449,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 787813638,
"name": "CVE-2024-3400-RCE-copy",
"full_name": "admi-n\/CVE-2024-3400-RCE-copy",
"owner": {
"login": "admi-n",
"id": 34176629,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34176629?v=4",
"html_url": "https:\/\/github.com\/admi-n"
},
"html_url": "https:\/\/github.com\/admi-n\/CVE-2024-3400-RCE-copy",
"description": "CVE-2024-3400-RCE",
"fork": false,
"created_at": "2024-04-17T08:27:52Z",
"updated_at": "2024-04-17T08:32:03Z",
"pushed_at": "2024-04-17T08:31:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 787894337,
"name": "CVE-2024-3400-Canary",

View file

@ -396,7 +396,6 @@
- [Chocapikk/CVE-2024-3400](https://github.com/Chocapikk/CVE-2024-3400)
- [ihebski/CVE-2024-3400](https://github.com/ihebski/CVE-2024-3400)
- [index2014/CVE-2024-3400-Checker](https://github.com/index2014/CVE-2024-3400-Checker)
- [admi-n/CVE-2024-3400-RCE-copy](https://github.com/admi-n/CVE-2024-3400-RCE-copy)
- [ZephrFish/CVE-2024-3400-Canary](https://github.com/ZephrFish/CVE-2024-3400-Canary)
- [ak1t4/CVE-2024-3400](https://github.com/ak1t4/CVE-2024-3400)
- [phantomradar/cve-2024-3400-poc](https://github.com/phantomradar/cve-2024-3400-poc)
@ -1524,6 +1523,7 @@
- [sh1k4ku/CVE-2024-31497](https://github.com/sh1k4ku/CVE-2024-31497)
- [edutko/cve-2024-31497](https://github.com/edutko/cve-2024-31497)
- [ViktorNaum/CVE-2024-31497-POC](https://github.com/ViktorNaum/CVE-2024-31497-POC)
### CVE-2024-31719
- [VoltaireYoung/CVE-2024-31719----AMI-Aptio-5-Vulnerability](https://github.com/VoltaireYoung/CVE-2024-31719----AMI-Aptio-5-Vulnerability)
@ -1551,6 +1551,9 @@
### CVE-2024-32258
- [liyansong2018/CVE-2024-32258](https://github.com/liyansong2018/CVE-2024-32258)
### CVE-2024-32399
- [NN0b0dy/CVE-2024-32399](https://github.com/NN0b0dy/CVE-2024-32399)
### CVE-2024-65230
- [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230)
@ -33161,7 +33164,7 @@
<code>An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.
</code>
- [f3d0x0/GPON](https://github.com/f3d0x0/GPON)
- [ExiaHan/GPON](https://github.com/ExiaHan/GPON)
- [649/Pingpon-Exploit](https://github.com/649/Pingpon-Exploit)
- [Choudai/GPON-LOADER](https://github.com/Choudai/GPON-LOADER)
- [c0ld1/GPON_RCE](https://github.com/c0ld1/GPON_RCE)