Auto Update 2024/07/02 12:29:08

This commit is contained in:
motikan2010-bot 2024-07-02 21:29:08 +09:00
parent daebc5f714
commit 22ca9c0e61
47 changed files with 853 additions and 273 deletions

View file

@ -10,13 +10,13 @@
"html_url": "https:\/\/github.com\/bigb0x"
},
"html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-6387",
"description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 and CVE-2008-4109.",
"description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.",
"fork": false,
"created_at": "2024-07-01T20:45:53Z",
"updated_at": "2024-07-02T03:57:18Z",
"pushed_at": "2024-07-02T02:04:55Z",
"stargazers_count": 7,
"watchers_count": 7,
"updated_at": "2024-07-02T10:56:11Z",
"pushed_at": "2024-07-02T10:55:06Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 10,
"score": 0,
"subscribers_count": 0
}

View file

@ -10,13 +10,13 @@
"html_url": "https:\/\/github.com\/bigb0x"
},
"html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-6387",
"description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 and CVE-2008-4109.",
"description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.",
"fork": false,
"created_at": "2024-07-01T20:45:53Z",
"updated_at": "2024-07-02T03:57:18Z",
"pushed_at": "2024-07-02T02:04:55Z",
"stargazers_count": 7,
"watchers_count": 7,
"updated_at": "2024-07-02T10:56:11Z",
"pushed_at": "2024-07-02T10:55:06Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 10,
"score": 0,
"subscribers_count": 0
}

View file

@ -73,10 +73,10 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-08T14:19:51Z",
"updated_at": "2024-06-15T06:21:06Z",
"updated_at": "2024-07-02T06:16:54Z",
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -92,7 +92,7 @@
],
"visibility": "public",
"forks": 54,
"watchers": 125,
"watchers": 126,
"score": 0,
"subscribers_count": 2
},

View file

@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-06-30T03:10:17Z",
"updated_at": "2024-07-02T09:02:18Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 831,
"watchers_count": 831,
"stargazers_count": 832,
"watchers_count": 832,
"has_discussions": false,
"forks_count": 426,
"allow_forking": true,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 426,
"watchers": 831,
"watchers": 832,
"score": 0,
"subscribers_count": 11
},

View file

@ -343,10 +343,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-07-01T03:46:01Z",
"updated_at": "2024-07-02T07:07:08Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 165,
"watchers": 166,
"score": 0,
"subscribers_count": 4
},

View file

@ -398,5 +398,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 823083361,
"name": "HikVision-CVE-2017-7921",
"full_name": "kooroshsanaei\/HikVision-CVE-2017-7921",
"owner": {
"login": "kooroshsanaei",
"id": 59454315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59454315?v=4",
"html_url": "https:\/\/github.com\/kooroshsanaei"
},
"html_url": "https:\/\/github.com\/kooroshsanaei\/HikVision-CVE-2017-7921",
"description": " Test For CVE-20177921; ",
"fork": false,
"created_at": "2024-07-02T11:47:35Z",
"updated_at": "2024-07-02T12:09:54Z",
"pushed_at": "2024-07-02T12:00:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-06-25T21:01:45Z",
"pushed_at": "2024-06-25T21:01:45Z",
"pushed_at": "2024-07-02T09:07:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Explotation framework for CVE-2019-11687",
"fork": false,
"created_at": "2019-12-15T08:52:17Z",
"updated_at": "2023-09-28T11:09:04Z",
"updated_at": "2024-07-02T11:27:36Z",
"pushed_at": "2021-05-16T13:16:34Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}

View file

@ -520,5 +520,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823053626,
"name": "CVE-2019-2215",
"full_name": "raymontag\/CVE-2019-2215",
"owner": {
"login": "raymontag",
"id": 106421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106421?v=4",
"html_url": "https:\/\/github.com\/raymontag"
},
"html_url": "https:\/\/github.com\/raymontag\/CVE-2019-2215",
"description": null,
"fork": false,
"created_at": "2024-07-02T10:35:30Z",
"updated_at": "2024-07-02T10:37:12Z",
"pushed_at": "2024-07-02T10:37:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -223,10 +223,10 @@
"description": "CVE-2019-5736 POCs",
"fork": false,
"created_at": "2019-02-20T12:23:13Z",
"updated_at": "2024-03-11T12:28:20Z",
"updated_at": "2024-07-02T11:29:27Z",
"pushed_at": "2020-06-22T13:04:55Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 80,
"watchers": 81,
"score": 0,
"subscribers_count": 8
},

View file

@ -103,10 +103,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2024-06-20T16:00:31Z",
"updated_at": "2024-07-02T10:30:43Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1154,
"watchers_count": 1154,
"stargazers_count": 1156,
"watchers_count": 1156,
"has_discussions": false,
"forks_count": 286,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 286,
"watchers": 1154,
"watchers": 1156,
"score": 0,
"subscribers_count": 35
},
@ -170,10 +170,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-06-28T10:19:49Z",
"updated_at": "2024-07-02T10:16:00Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 611,
"watchers_count": 611,
"stargazers_count": 612,
"watchers_count": 612,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
@ -182,7 +182,7 @@
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 611,
"watchers": 612,
"score": 0,
"subscribers_count": 13
},

View file

@ -889,10 +889,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-07-01T03:46:01Z",
"updated_at": "2024-07-02T07:07:08Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -901,7 +901,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 165,
"watchers": 166,
"score": 0,
"subscribers_count": 4
},

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-07-01T14:05:30Z",
"updated_at": "2024-07-02T06:34:09Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1273,
"watchers_count": 1273,
"stargazers_count": 1274,
"watchers_count": 1274,
"has_discussions": false,
"forks_count": 161,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 161,
"watchers": 1273,
"watchers": 1274,
"score": 0,
"subscribers_count": 14
}

View file

@ -938,10 +938,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-06-27T09:41:31Z",
"updated_at": "2024-07-02T11:56:44Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 1009,
"watchers_count": 1009,
"stargazers_count": 1010,
"watchers_count": 1010,
"has_discussions": false,
"forks_count": 180,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 180,
"watchers": 1009,
"watchers": 1010,
"score": 0,
"subscribers_count": 14
},

View file

@ -1359,5 +1359,42 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823003815,
"name": "Grafana-Decryptor-for-CVE-2021-43798",
"full_name": "Sic4rio\/Grafana-Decryptor-for-CVE-2021-43798",
"owner": {
"login": "Sic4rio",
"id": 75425513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75425513?v=4",
"html_url": "https:\/\/github.com\/Sic4rio"
},
"html_url": "https:\/\/github.com\/Sic4rio\/Grafana-Decryptor-for-CVE-2021-43798",
"description": "Grafana Decryptor for CVE-2021-43798",
"fork": false,
"created_at": "2024-07-02T08:43:45Z",
"updated_at": "2024-07-02T09:00:01Z",
"pushed_at": "2024-07-02T08:45:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cracking",
"cve-2021-43798",
"decryption",
"decryptor",
"grafana",
"password"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -7257,10 +7257,10 @@
"description": "log4shell (CVE-2021-44228) scanning tool",
"fork": false,
"created_at": "2021-12-16T09:26:37Z",
"updated_at": "2023-09-28T11:34:10Z",
"updated_at": "2024-07-02T10:01:48Z",
"pushed_at": "2021-12-16T10:00:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -7289,7 +7289,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload",
"fork": false,
"created_at": "2023-02-08T17:37:09Z",
"updated_at": "2024-06-01T21:11:00Z",
"updated_at": "2024-07-02T07:48:29Z",
"pushed_at": "2023-02-09T15:59:30Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -223,10 +223,10 @@
"description": "Linux Kernel 1-Day Analysis & Exploitation",
"fork": false,
"created_at": "2023-08-06T10:46:49Z",
"updated_at": "2023-11-08T15:45:14Z",
"updated_at": "2024-07-02T09:40:21Z",
"pushed_at": "2023-08-08T00:42:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-07-01T14:05:30Z",
"updated_at": "2024-07-02T06:34:09Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1273,
"watchers_count": 1273,
"stargazers_count": 1274,
"watchers_count": 1274,
"has_discussions": false,
"forks_count": 161,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 161,
"watchers": 1273,
"watchers": 1274,
"score": 0,
"subscribers_count": 14
},

View file

@ -103,10 +103,10 @@
"description": "CVE-2022-25765 pdfkit <0.8.6 command injection.",
"fork": false,
"created_at": "2022-12-20T14:59:41Z",
"updated_at": "2024-05-19T15:31:58Z",
"updated_at": "2024-07-02T10:01:35Z",
"pushed_at": "2022-12-21T14:19:03Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -125,7 +125,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-41852 Proof of Concept (unofficial)",
"fork": false,
"created_at": "2022-10-14T12:09:19Z",
"updated_at": "2024-03-21T05:52:51Z",
"updated_at": "2024-07-02T09:41:09Z",
"pushed_at": "2022-10-20T08:01:38Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 3
}

View file

@ -230,13 +230,13 @@
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 5,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 4,
"watchers": 13,
"score": 0,
"subscribers_count": 1

View file

@ -18,7 +18,7 @@
"stargazers_count": 263,
"watchers_count": 263,
"has_discussions": false,
"forks_count": 58,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -34,7 +34,7 @@
"use-after-free"
],
"visibility": "public",
"forks": 58,
"forks": 60,
"watchers": 263,
"score": 0,
"subscribers_count": 5

View file

@ -13,10 +13,10 @@
"description": "pocs & exploit for CVE-2023-24871 (rce + lpe)",
"fork": false,
"created_at": "2024-06-21T15:01:15Z",
"updated_at": "2024-07-01T20:45:57Z",
"updated_at": "2024-07-02T06:37:12Z",
"pushed_at": "2024-06-25T15:33:32Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 1
}

View file

@ -52,7 +52,7 @@
"stargazers_count": 262,
"watchers_count": 262,
"has_discussions": false,
"forks_count": 35,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -66,7 +66,7 @@
"poc"
],
"visibility": "public",
"forks": 35,
"forks": 36,
"watchers": 262,
"score": 0,
"subscribers_count": 4

View file

@ -262,10 +262,10 @@
"description": "Metabase Pre-auth RCE",
"fork": false,
"created_at": "2023-08-02T13:21:58Z",
"updated_at": "2024-03-11T13:13:07Z",
"updated_at": "2024-07-02T10:01:40Z",
"pushed_at": "2023-08-03T10:07:15Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -285,7 +285,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-07-01T15:36:37Z",
"updated_at": "2024-07-02T09:30:21Z",
"pushed_at": "2024-06-19T04:31:02Z",
"stargazers_count": 946,
"watchers_count": 946,
"stargazers_count": 947,
"watchers_count": 947,
"has_discussions": false,
"forks_count": 162,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 946,
"watchers": 947,
"score": 0,
"subscribers_count": 15
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-5360 Auto Shell Upload WordPress Royal Elementor 1.3.78 Shell Upload",
"fork": false,
"created_at": "2023-10-21T10:51:08Z",
"updated_at": "2024-03-24T19:49:12Z",
"updated_at": "2024-07-02T11:49:48Z",
"pushed_at": "2023-10-21T10:52:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
"fork": false,
"created_at": "2024-06-18T09:22:59Z",
"updated_at": "2024-07-01T15:39:31Z",
"updated_at": "2024-07-02T10:35:47Z",
"pushed_at": "2024-06-18T09:35:44Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 2
},
@ -43,10 +43,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-07-02T03:07:58Z",
"updated_at": "2024-07-02T11:22:20Z",
"pushed_at": "2024-06-19T12:24:50Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 96,
"watchers": 101,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-07-02T00:35:12Z",
"updated_at": "2024-07-02T11:37:19Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2162,
"watchers_count": 2162,
"stargazers_count": 2163,
"watchers_count": 2163,
"has_discussions": false,
"forks_count": 283,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 283,
"watchers": 2162,
"watchers": 2163,
"score": 0,
"subscribers_count": 23
},

View file

@ -13,10 +13,10 @@
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
"fork": false,
"created_at": "2024-04-12T15:07:42Z",
"updated_at": "2024-06-07T14:58:23Z",
"updated_at": "2024-07-02T11:34:01Z",
"pushed_at": "2024-04-18T14:31:34Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 6
},

View file

@ -28,5 +28,35 @@
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 822946778,
"name": "CVE-2024-21006_jar",
"full_name": "lightr3d\/CVE-2024-21006_jar",
"owner": {
"login": "lightr3d",
"id": 113666792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113666792?v=4",
"html_url": "https:\/\/github.com\/lightr3d"
},
"html_url": "https:\/\/github.com\/lightr3d\/CVE-2024-21006_jar",
"description": "CVE-2024-21006 exp",
"fork": false,
"created_at": "2024-07-02T06:25:14Z",
"updated_at": "2024-07-02T07:43:01Z",
"pushed_at": "2024-07-02T07:38:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -48,13 +48,13 @@
"stargazers_count": 644,
"watchers_count": 644,
"has_discussions": false,
"forks_count": 142,
"forks_count": 143,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 142,
"forks": 143,
"watchers": 644,
"score": 0,
"subscribers_count": 9

View file

@ -1,32 +0,0 @@
[
{
"id": 745408511,
"name": "avo-CVE-2024-22411",
"full_name": "tamaloa\/avo-CVE-2024-22411",
"owner": {
"login": "tamaloa",
"id": 118779,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118779?v=4",
"html_url": "https:\/\/github.com\/tamaloa"
},
"html_url": "https:\/\/github.com\/tamaloa\/avo-CVE-2024-22411",
"description": null,
"fork": false,
"created_at": "2024-01-19T09:19:52Z",
"updated_at": "2024-01-19T09:22:19Z",
"pushed_at": "2024-01-19T09:27:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -211,10 +211,10 @@
"description": null,
"fork": false,
"created_at": "2024-05-05T02:18:00Z",
"updated_at": "2024-06-30T05:18:59Z",
"updated_at": "2024-07-02T11:56:05Z",
"pushed_at": "2024-06-12T08:31:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -223,7 +223,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 61,
"score": 0,
"subscribers_count": 1

View file

@ -10,13 +10,13 @@
"html_url": "https:\/\/github.com\/th3gokul"
},
"html_url": "https:\/\/github.com\/th3gokul\/CVE-2024-27292",
"description": null,
"description": "CVE-2024-27292 : Docassemble V1.4.96 Unauthenticated Path Traversal",
"fork": false,
"created_at": "2024-07-02T04:41:35Z",
"updated_at": "2024-07-02T05:03:38Z",
"pushed_at": "2024-07-02T05:03:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-07-02T11:39:58Z",
"pushed_at": "2024-07-02T11:39:54Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}

View file

@ -163,10 +163,10 @@
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
"fork": false,
"created_at": "2024-05-14T14:21:49Z",
"updated_at": "2024-07-01T12:02:08Z",
"updated_at": "2024-07-02T10:44:20Z",
"pushed_at": "2024-07-01T09:29:02Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -195,7 +195,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 82,
"watchers": 83,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.",
"fork": false,
"created_at": "2024-06-19T01:46:33Z",
"updated_at": "2024-07-01T11:42:08Z",
"updated_at": "2024-07-02T09:13:53Z",
"pushed_at": "2024-06-19T01:52:05Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},

View file

@ -163,10 +163,10 @@
"description": "CVE-2024-28995 POC Vulnerability Scanner",
"fork": false,
"created_at": "2024-06-14T23:05:40Z",
"updated_at": "2024-07-01T18:56:51Z",
"updated_at": "2024-07-02T09:12:18Z",
"pushed_at": "2024-06-15T12:21:28Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
@ -223,12 +223,12 @@
"description": "CVE-2024-28955 Exploitation PoC ",
"fork": false,
"created_at": "2024-07-01T11:49:51Z",
"updated_at": "2024-07-02T00:25:34Z",
"updated_at": "2024-07-02T11:59:43Z",
"pushed_at": "2024-07-01T12:53:21Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -243,8 +243,8 @@
"solarwinds"
],
"visibility": "public",
"forks": 1,
"watchers": 7,
"forks": 2,
"watchers": 12,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,8 +43,8 @@
"description": "CVE-2024-34102: Unauthenticated Magento XXE",
"fork": false,
"created_at": "2024-06-27T18:10:13Z",
"updated_at": "2024-07-02T02:53:01Z",
"pushed_at": "2024-06-27T18:43:12Z",
"updated_at": "2024-07-02T11:40:36Z",
"pushed_at": "2024-07-02T11:40:33Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
@ -103,10 +103,10 @@
"description": "POC for CVE-2024-34102 : Unauthenticated Magento XXE and bypassing WAF , You will get http connection on ur webhook",
"fork": false,
"created_at": "2024-06-28T12:45:40Z",
"updated_at": "2024-07-01T03:20:27Z",
"updated_at": "2024-07-02T12:02:29Z",
"pushed_at": "2024-07-01T03:20:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -163,10 +163,10 @@
"description": "CosmicSting (CVE-2024-34102)",
"fork": false,
"created_at": "2024-06-28T23:33:21Z",
"updated_at": "2024-07-01T16:51:46Z",
"updated_at": "2024-07-02T11:38:34Z",
"pushed_at": "2024-06-28T23:34:43Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -133,8 +133,8 @@
"description": "CVE-2024-34470 : An Unauthenticated Path Traversal Vulnerability in HSC Mailinspector",
"fork": false,
"created_at": "2024-06-23T02:23:57Z",
"updated_at": "2024-07-02T04:59:23Z",
"pushed_at": "2024-07-02T04:59:19Z",
"updated_at": "2024-07-02T11:42:41Z",
"pushed_at": "2024-07-02T11:42:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -104,7 +104,7 @@
"fork": false,
"created_at": "2024-05-22T23:18:20Z",
"updated_at": "2024-06-12T16:35:44Z",
"pushed_at": "2024-06-14T02:21:24Z",
"pushed_at": "2024-07-02T07:46:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -620,10 +620,10 @@
"description": "A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-06-09T23:32:11Z",
"updated_at": "2024-06-26T12:36:15Z",
"updated_at": "2024-07-02T07:02:07Z",
"pushed_at": "2024-06-10T11:12:44Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -646,7 +646,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -57,13 +57,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 2

View file

@ -1,4 +1,47 @@
[
{
"id": 496026600,
"name": "spirit",
"full_name": "theaog\/spirit",
"owner": {
"login": "theaog",
"id": 100999228,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100999228?v=4",
"html_url": "https:\/\/github.com\/theaog"
},
"html_url": "https:\/\/github.com\/theaog\/spirit",
"description": "Spirit - Network Pentest Tools CVE-2024-6387",
"fork": false,
"created_at": "2022-05-25T00:13:18Z",
"updated_at": "2024-07-02T09:11:59Z",
"pushed_at": "2024-06-29T13:46:12Z",
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"banner",
"bot",
"brute",
"brute-force",
"cve-2024-6387",
"hacking",
"hacking-tools",
"honeypot",
"pentest",
"pentesting",
"scanner",
"ssh"
],
"visibility": "public",
"forks": 11,
"watchers": 56,
"score": 0,
"subscribers_count": 0
},
{
"id": 822546559,
"name": "cve-2024-6387-poc",
@ -13,19 +56,19 @@
"description": "a signal handler race condition in OpenSSH's server (sshd)",
"fork": false,
"created_at": "2024-07-01T10:55:29Z",
"updated_at": "2024-07-02T06:28:58Z",
"updated_at": "2024-07-02T12:33:43Z",
"pushed_at": "2024-07-01T10:54:02Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 243,
"watchers_count": 243,
"has_discussions": false,
"forks_count": 136,
"forks_count": 149,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 136,
"watchers": 189,
"forks": 149,
"watchers": 243,
"score": 0,
"subscribers_count": 3
},
@ -43,19 +86,19 @@
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:16:21Z",
"updated_at": "2024-07-02T06:26:47Z",
"updated_at": "2024-07-02T12:06:21Z",
"pushed_at": "2024-07-01T12:25:01Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 84,
"watchers_count": 84,
"has_discussions": false,
"forks_count": 34,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 71,
"forks": 42,
"watchers": 84,
"score": 0,
"subscribers_count": 3
},
@ -73,12 +116,12 @@
"description": "32-bit PoC for CVE-2024-6387 \"regreSSHion\" -- mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:26:40Z",
"updated_at": "2024-07-02T06:10:57Z",
"updated_at": "2024-07-02T11:18:19Z",
"pushed_at": "2024-07-01T14:16:36Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 16,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -91,8 +134,8 @@
"ssh"
],
"visibility": "public",
"forks": 16,
"watchers": 32,
"forks": 26,
"watchers": 37,
"score": 0,
"subscribers_count": 2
},
@ -140,10 +183,10 @@
"description": null,
"fork": false,
"created_at": "2024-07-01T12:51:18Z",
"updated_at": "2024-07-01T22:04:25Z",
"updated_at": "2024-07-02T11:07:03Z",
"pushed_at": "2024-07-01T13:34:47Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -152,7 +195,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
@ -260,19 +303,19 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-07-02T06:30:10Z",
"pushed_at": "2024-07-02T06:00:31Z",
"stargazers_count": 60,
"watchers_count": 60,
"updated_at": "2024-07-02T12:30:27Z",
"pushed_at": "2024-07-02T12:28:41Z",
"stargazers_count": 133,
"watchers_count": 133,
"has_discussions": false,
"forks_count": 12,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 60,
"forks": 31,
"watchers": 133,
"score": 0,
"subscribers_count": 1
},
@ -287,13 +330,13 @@
"html_url": "https:\/\/github.com\/bigb0x"
},
"html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-6387",
"description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 and CVE-2008-4109.",
"description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.",
"fork": false,
"created_at": "2024-07-01T20:45:53Z",
"updated_at": "2024-07-02T03:57:18Z",
"pushed_at": "2024-07-02T02:04:55Z",
"stargazers_count": 7,
"watchers_count": 7,
"updated_at": "2024-07-02T10:56:11Z",
"pushed_at": "2024-07-02T10:55:06Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -302,7 +345,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
@ -320,10 +363,10 @@
"description": "CLI Tool to Check SSH Servers for Vulnerability to CVE-2024-6387",
"fork": false,
"created_at": "2024-07-01T22:53:32Z",
"updated_at": "2024-07-02T01:44:42Z",
"pushed_at": "2024-07-01T23:05:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"updated_at": "2024-07-02T09:55:51Z",
"pushed_at": "2024-07-02T09:47:43Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -332,7 +375,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -355,13 +398,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0
@ -380,10 +423,10 @@
"description": "OpenSSH CVE-2024-6387 Vulnerability Checker",
"fork": false,
"created_at": "2024-07-02T01:24:04Z",
"updated_at": "2024-07-02T01:55:40Z",
"updated_at": "2024-07-02T10:07:48Z",
"pushed_at": "2024-07-02T01:31:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -392,7 +435,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
@ -410,19 +453,19 @@
"description": null,
"fork": false,
"created_at": "2024-07-02T01:39:10Z",
"updated_at": "2024-07-02T06:30:28Z",
"updated_at": "2024-07-02T09:58:58Z",
"pushed_at": "2024-07-02T01:54:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"forks": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},
@ -500,19 +543,19 @@
"description": "Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote code execution (RCE) with root privileges. This vulnerability, identified as CVE-2024-6387, resides in the OpenSSH server component (sshd), which is designed to listen for connections from client applications.",
"fork": false,
"created_at": "2024-07-02T02:51:37Z",
"updated_at": "2024-07-02T04:35:52Z",
"updated_at": "2024-07-02T10:20:04Z",
"pushed_at": "2024-07-02T03:23:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
@ -560,8 +603,8 @@
"description": null,
"fork": false,
"created_at": "2024-07-02T03:27:03Z",
"updated_at": "2024-07-02T03:54:38Z",
"pushed_at": "2024-07-02T03:54:35Z",
"updated_at": "2024-07-02T09:17:56Z",
"pushed_at": "2024-07-02T09:17:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -590,8 +633,8 @@
"description": null,
"fork": false,
"created_at": "2024-07-02T03:42:35Z",
"updated_at": "2024-07-02T04:01:28Z",
"pushed_at": "2024-07-02T04:01:24Z",
"updated_at": "2024-07-02T09:57:38Z",
"pushed_at": "2024-07-02T09:57:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -650,19 +693,19 @@
"description": "CVE-2024-6387 exploit",
"fork": false,
"created_at": "2024-07-02T04:09:44Z",
"updated_at": "2024-07-02T05:59:34Z",
"updated_at": "2024-07-02T08:51:25Z",
"pushed_at": "2024-07-02T04:45:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
@ -695,5 +738,435 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 822953002,
"name": "CVE-2024-6387",
"full_name": "R4Tw1z\/CVE-2024-6387",
"owner": {
"login": "R4Tw1z",
"id": 150011273,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150011273?v=4",
"html_url": "https:\/\/github.com\/R4Tw1z"
},
"html_url": "https:\/\/github.com\/R4Tw1z\/CVE-2024-6387",
"description": "This script, created by R4Tw1z, is designed to scan IP addresses to check if they are running a potentially vulnerable version of OpenSSH. The tool leverages multi-threading to optimize scanning performance and handle multiple IP addresses concurrently.",
"fork": false,
"created_at": "2024-07-02T06:40:09Z",
"updated_at": "2024-07-02T09:01:58Z",
"pushed_at": "2024-07-02T09:01:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 822958334,
"name": "CVE-2024-6387",
"full_name": "d0rb\/CVE-2024-6387",
"owner": {
"login": "d0rb",
"id": 10403781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
"html_url": "https:\/\/github.com\/d0rb"
},
"html_url": "https:\/\/github.com\/d0rb\/CVE-2024-6387",
"description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.",
"fork": false,
"created_at": "2024-07-02T06:53:35Z",
"updated_at": "2024-07-02T11:16:32Z",
"pushed_at": "2024-07-02T06:57:34Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},
{
"id": 822958759,
"name": "CVE-2024-6387-SSH-RCE",
"full_name": "oliferFord\/CVE-2024-6387-SSH-RCE",
"owner": {
"login": "oliferFord",
"id": 174417538,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174417538?v=4",
"html_url": "https:\/\/github.com\/oliferFord"
},
"html_url": "https:\/\/github.com\/oliferFord\/CVE-2024-6387-SSH-RCE",
"description": null,
"fork": false,
"created_at": "2024-07-02T06:54:54Z",
"updated_at": "2024-07-02T07:04:17Z",
"pushed_at": "2024-07-02T07:04:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 822978721,
"name": "regression-scanner",
"full_name": "CiderAndWhisky\/regression-scanner",
"owner": {
"login": "CiderAndWhisky",
"id": 30117084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30117084?v=4",
"html_url": "https:\/\/github.com\/CiderAndWhisky"
},
"html_url": "https:\/\/github.com\/CiderAndWhisky\/regression-scanner",
"description": "Used to detect ssh servers vulnerable to CVE-2024-6387. Shameless robbery from https:\/\/github.com\/bigb0x\/CVE-2024-6387 using ChatGPT to translate the code to PHP.",
"fork": false,
"created_at": "2024-07-02T07:42:46Z",
"updated_at": "2024-07-02T09:06:07Z",
"pushed_at": "2024-07-02T09:06:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 822991113,
"name": "CVE-2024-6387_PoC",
"full_name": "shamo0\/CVE-2024-6387_PoC",
"owner": {
"login": "shamo0",
"id": 48299520,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4",
"html_url": "https:\/\/github.com\/shamo0"
},
"html_url": "https:\/\/github.com\/shamo0\/CVE-2024-6387_PoC",
"description": "Script for checking CVE-2024-6387 (regreSSHion)",
"fork": false,
"created_at": "2024-07-02T08:13:23Z",
"updated_at": "2024-07-02T10:00:56Z",
"pushed_at": "2024-07-02T08:40:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"checker",
"cve-2024-6387",
"exploit",
"openssh",
"poc",
"rce",
"regresshion",
"ssh",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 822993766,
"name": "CVE-2024-6387-nmap",
"full_name": "paradessia\/CVE-2024-6387-nmap",
"owner": {
"login": "paradessia",
"id": 38862216,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38862216?v=4",
"html_url": "https:\/\/github.com\/paradessia"
},
"html_url": "https:\/\/github.com\/paradessia\/CVE-2024-6387-nmap",
"description": "CVE-2024-6387-nmap",
"fork": false,
"created_at": "2024-07-02T08:19:55Z",
"updated_at": "2024-07-02T08:26:50Z",
"pushed_at": "2024-07-02T08:26:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 823030467,
"name": "CVE-2024-6387",
"full_name": "SecWithMoh\/CVE-2024-6387",
"owner": {
"login": "SecWithMoh",
"id": 92855054,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92855054?v=4",
"html_url": "https:\/\/github.com\/SecWithMoh"
},
"html_url": "https:\/\/github.com\/SecWithMoh\/CVE-2024-6387",
"description": "This Go program scans targets for CVE-2024-6387 in OpenSSH, categorizing servers by vulnerability status and port availability.",
"fork": false,
"created_at": "2024-07-02T09:41:40Z",
"updated_at": "2024-07-02T10:05:05Z",
"pushed_at": "2024-07-02T10:05:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 823031972,
"name": "CVE-2024-6387-Updated-x64bit",
"full_name": "PrincipalAnthony\/CVE-2024-6387-Updated-x64bit",
"owner": {
"login": "PrincipalAnthony",
"id": 174432334,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174432334?v=4",
"html_url": "https:\/\/github.com\/PrincipalAnthony"
},
"html_url": "https:\/\/github.com\/PrincipalAnthony\/CVE-2024-6387-Updated-x64bit",
"description": "Private x64 RCE exploit for CVE-2024-6387 [02.07.2024] from exploit.in",
"fork": false,
"created_at": "2024-07-02T09:45:04Z",
"updated_at": "2024-07-02T09:46:30Z",
"pushed_at": "2024-07-02T09:46:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 823040737,
"name": "CVE-2024-6387-POC",
"full_name": "k4t3pr0\/CVE-2024-6387-POC",
"owner": {
"login": "k4t3pr0",
"id": 127739423,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127739423?v=4",
"html_url": "https:\/\/github.com\/k4t3pr0"
},
"html_url": "https:\/\/github.com\/k4t3pr0\/CVE-2024-6387-POC",
"description": null,
"fork": false,
"created_at": "2024-07-02T10:05:43Z",
"updated_at": "2024-07-02T10:08:23Z",
"pushed_at": "2024-07-02T10:08:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 823053102,
"name": "CVE-2024-6387-Mitigation-Ansible-Playbook",
"full_name": "DanWiseProgramming\/CVE-2024-6387-Mitigation-Ansible-Playbook",
"owner": {
"login": "DanWiseProgramming",
"id": 22768251,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22768251?v=4",
"html_url": "https:\/\/github.com\/DanWiseProgramming"
},
"html_url": "https:\/\/github.com\/DanWiseProgramming\/CVE-2024-6387-Mitigation-Ansible-Playbook",
"description": "An Ansible Playbook to mitigate the risk of RCE (CVE-2024-6387) until platforms update OpenSSH to a non-vulnerable version.",
"fork": false,
"created_at": "2024-07-02T10:34:17Z",
"updated_at": "2024-07-02T11:05:58Z",
"pushed_at": "2024-07-02T11:05:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 823065840,
"name": "openssh-cve-2024-6387.sh",
"full_name": "rumochnaya\/openssh-cve-2024-6387.sh",
"owner": {
"login": "rumochnaya",
"id": 8115717,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8115717?v=4",
"html_url": "https:\/\/github.com\/rumochnaya"
},
"html_url": "https:\/\/github.com\/rumochnaya\/openssh-cve-2024-6387.sh",
"description": "openssh-cve-2024-6387.sh",
"fork": false,
"created_at": "2024-07-02T11:05:07Z",
"updated_at": "2024-07-02T11:23:39Z",
"pushed_at": "2024-07-02T11:23:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 823067387,
"name": "CVE-2024-6387-Mitigation",
"full_name": "zenzue\/CVE-2024-6387-Mitigation",
"owner": {
"login": "zenzue",
"id": 19271340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19271340?v=4",
"html_url": "https:\/\/github.com\/zenzue"
},
"html_url": "https:\/\/github.com\/zenzue\/CVE-2024-6387-Mitigation",
"description": "Mitigation Guide for CVE-2024-6387 in OpenSSH",
"fork": false,
"created_at": "2024-07-02T11:08:40Z",
"updated_at": "2024-07-02T11:17:15Z",
"pushed_at": "2024-07-02T11:17:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 823086763,
"name": "CVE-2024-6387-Check",
"full_name": "devarshishimpi\/CVE-2024-6387-Check",
"owner": {
"login": "devarshishimpi",
"id": 43378923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43378923?v=4",
"html_url": "https:\/\/github.com\/devarshishimpi"
},
"html_url": "https:\/\/github.com\/devarshishimpi\/CVE-2024-6387-Check",
"description": null,
"fork": false,
"created_at": "2024-07-02T11:55:39Z",
"updated_at": "2024-07-02T11:55:42Z",
"pushed_at": "2024-07-02T11:55:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 823099379,
"name": "cve-2024-6387_AImade",
"full_name": "hssmo\/cve-2024-6387_AImade",
"owner": {
"login": "hssmo",
"id": 99412060,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99412060?v=4",
"html_url": "https:\/\/github.com\/hssmo"
},
"html_url": "https:\/\/github.com\/hssmo\/cve-2024-6387_AImade",
"description": "cve-2024-6387_AImade",
"fork": false,
"created_at": "2024-07-02T12:24:25Z",
"updated_at": "2024-07-02T12:32:15Z",
"pushed_at": "2024-07-02T12:32:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -865,6 +865,7 @@
<code>A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
</code>
- [theaog/spirit](https://github.com/theaog/spirit)
- [zgzhang/cve-2024-6387-poc](https://github.com/zgzhang/cve-2024-6387-poc)
- [acrono/cve-2024-6387-poc](https://github.com/acrono/cve-2024-6387-poc)
- [lflare/cve-2024-6387-poc](https://github.com/lflare/cve-2024-6387-poc)
@ -888,6 +889,20 @@
- [Mufti22/CVE-2024-6387-checkher](https://github.com/Mufti22/CVE-2024-6387-checkher)
- [thegenetic/CVE-2024-6387-exploit](https://github.com/thegenetic/CVE-2024-6387-exploit)
- [HadesNull123/CVE-2024-6387_Check](https://github.com/HadesNull123/CVE-2024-6387_Check)
- [R4Tw1z/CVE-2024-6387](https://github.com/R4Tw1z/CVE-2024-6387)
- [d0rb/CVE-2024-6387](https://github.com/d0rb/CVE-2024-6387)
- [oliferFord/CVE-2024-6387-SSH-RCE](https://github.com/oliferFord/CVE-2024-6387-SSH-RCE)
- [CiderAndWhisky/regression-scanner](https://github.com/CiderAndWhisky/regression-scanner)
- [shamo0/CVE-2024-6387_PoC](https://github.com/shamo0/CVE-2024-6387_PoC)
- [paradessia/CVE-2024-6387-nmap](https://github.com/paradessia/CVE-2024-6387-nmap)
- [SecWithMoh/CVE-2024-6387](https://github.com/SecWithMoh/CVE-2024-6387)
- [PrincipalAnthony/CVE-2024-6387-Updated-x64bit](https://github.com/PrincipalAnthony/CVE-2024-6387-Updated-x64bit)
- [k4t3pr0/CVE-2024-6387-POC](https://github.com/k4t3pr0/CVE-2024-6387-POC)
- [DanWiseProgramming/CVE-2024-6387-Mitigation-Ansible-Playbook](https://github.com/DanWiseProgramming/CVE-2024-6387-Mitigation-Ansible-Playbook)
- [rumochnaya/openssh-cve-2024-6387.sh](https://github.com/rumochnaya/openssh-cve-2024-6387.sh)
- [zenzue/CVE-2024-6387-Mitigation](https://github.com/zenzue/CVE-2024-6387-Mitigation)
- [devarshishimpi/CVE-2024-6387-Check](https://github.com/devarshishimpi/CVE-2024-6387-Check)
- [hssmo/cve-2024-6387_AImade](https://github.com/hssmo/cve-2024-6387_AImade)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -976,6 +991,7 @@
</code>
- [momika233/CVE-2024-21006](https://github.com/momika233/CVE-2024-21006)
- [lightr3d/CVE-2024-21006_jar](https://github.com/lightr3d/CVE-2024-21006_jar)
### CVE-2024-21107 (2024-04-16)
@ -1199,13 +1215,6 @@
- [omranisecurity/CVE-2024-22393](https://github.com/omranisecurity/CVE-2024-22393)
### CVE-2024-22411 (2024-01-16)
<code>Avo is a framework to create admin panels for Ruby on Rails apps. In Avo 3 pre12, any HTML inside text that is passed to `error` or `succeed` in an `Avo::BaseAction` subclass will be rendered directly without sanitization in the toast/notification that appears in the UI on Action completion. A malicious user could exploit this vulnerability to trigger a cross site scripting attack on an unsuspecting user. This issue has been addressed in the 3.3.0 and 2.47.0 releases of Avo. Users are advised to upgrade.
</code>
- [tamaloa/avo-CVE-2024-22411](https://github.com/tamaloa/avo-CVE-2024-22411)
### CVE-2024-22416 (2024-01-17)
<code>pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` API allows any API call to be made using GET requests. Since the session cookie is not set to `SameSite: strict`, this opens the library up to severe attack possibilities via a Cross-Site Request Forgery (CSRF) attack. As a result any API call can be made via a CSRF attack by an unauthenticated user. This issue has been addressed in release `0.5.0b3.dev78`. All users are advised to upgrade.
@ -23301,6 +23310,7 @@
- [xchg-rax-rax/CVE-2021-43798](https://github.com/xchg-rax-rax/CVE-2021-43798)
- [topyagyuu/CVE-2021-43798](https://github.com/topyagyuu/CVE-2021-43798)
- [MalekAlthubiany/CVE-2021-43798](https://github.com/MalekAlthubiany/CVE-2021-43798)
- [Sic4rio/Grafana-Decryptor-for-CVE-2021-43798](https://github.com/Sic4rio/Grafana-Decryptor-for-CVE-2021-43798)
### CVE-2021-43799 (2022-01-25)
@ -30318,6 +30328,7 @@
- [jsirichai/CVE-2019-2215](https://github.com/jsirichai/CVE-2019-2215)
- [willboka/CVE-2019-2215-HuaweiP20Lite](https://github.com/willboka/CVE-2019-2215-HuaweiP20Lite)
- [mutur4/CVE-2019-2215](https://github.com/mutur4/CVE-2019-2215)
- [raymontag/CVE-2019-2215](https://github.com/raymontag/CVE-2019-2215)
### CVE-2019-2525 (2019-01-16)
@ -38162,6 +38173,7 @@
- [AnonkiGroup/AnonHik](https://github.com/AnonkiGroup/AnonHik)
- [b3pwn3d/CVE-2017-7921](https://github.com/b3pwn3d/CVE-2017-7921)
- [yousouf-Tasfin/cve-2017-7921-Mass-Exploit](https://github.com/yousouf-Tasfin/cve-2017-7921-Mass-Exploit)
- [kooroshsanaei/HikVision-CVE-2017-7921](https://github.com/kooroshsanaei/HikVision-CVE-2017-7921)
### CVE-2017-7998 (2018-01-08)