Auto Update 2024/04/07 06:27:20

This commit is contained in:
motikan2010-bot 2024-04-07 15:27:20 +09:00
parent 3e26ed55d9
commit 2b91ae6733
29 changed files with 164 additions and 98 deletions

View file

@ -133,19 +133,19 @@
"description": "可以直接反弹shell",
"fork": false,
"created_at": "2018-07-26T07:16:38Z",
"updated_at": "2023-04-05T14:06:17Z",
"updated_at": "2024-04-07T03:11:31Z",
"pushed_at": "2023-04-05T14:06:13Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 46,
"forks": 14,
"watchers": 47,
"score": 0,
"subscribers_count": 0
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2021-1675 Detection Info",
"fork": false,
"created_at": "2021-06-30T18:32:17Z",
"updated_at": "2023-09-28T11:29:08Z",
"updated_at": "2024-04-07T05:50:52Z",
"pushed_at": "2023-05-20T01:53:16Z",
"stargazers_count": 219,
"watchers_count": 219,
"stargazers_count": 218,
"watchers_count": 218,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 219,
"watchers": 218,
"score": 0,
"subscribers_count": 19
},
@ -716,7 +716,7 @@
"forks": 10,
"watchers": 20,
"score": 0,
"subscribers_count": 2
"subscribers_count": 1
},
{
"id": 384183711,

View file

@ -103,10 +103,10 @@
"description": "Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207",
"fork": false,
"created_at": "2021-09-04T15:34:03Z",
"updated_at": "2024-03-28T13:51:36Z",
"updated_at": "2024-04-07T02:46:45Z",
"pushed_at": "2023-08-25T22:42:24Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 94,
"watchers": 95,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
"updated_at": "2024-04-02T04:37:46Z",
"updated_at": "2024-04-07T03:38:06Z",
"pushed_at": "2023-04-12T17:28:49Z",
"stargazers_count": 256,
"watchers_count": 256,
"stargazers_count": 257,
"watchers_count": 257,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 256,
"watchers": 257,
"score": 0,
"subscribers_count": 9
}

View file

@ -13,10 +13,10 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false,
"created_at": "2022-08-09T15:53:48Z",
"updated_at": "2024-04-06T09:02:45Z",
"updated_at": "2024-04-07T06:18:47Z",
"pushed_at": "2023-09-27T06:44:27Z",
"stargazers_count": 272,
"watchers_count": 272,
"stargazers_count": 273,
"watchers_count": 273,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 59,
"watchers": 272,
"watchers": 273,
"score": 0,
"subscribers_count": 10
},

View file

@ -276,5 +276,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 783126137,
"name": "CVE-2023-21768",
"full_name": "Ha0-Y\/CVE-2023-21768",
"owner": {
"login": "Ha0-Y",
"id": 102413682,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102413682?v=4",
"html_url": "https:\/\/github.com\/Ha0-Y"
},
"html_url": "https:\/\/github.com\/Ha0-Y\/CVE-2023-21768",
"description": "CVE-2023-21768 Proof of Concept",
"fork": false,
"created_at": "2024-04-07T02:26:36Z",
"updated_at": "2024-04-07T02:53:21Z",
"pushed_at": "2024-04-07T02:53:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -57,7 +57,7 @@
"forks": 107,
"watchers": 28,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 612534596,

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC",
"fork": false,
"created_at": "2024-01-16T08:46:21Z",
"updated_at": "2024-03-17T14:09:11Z",
"updated_at": "2024-04-07T00:49:18Z",
"pushed_at": "2024-01-23T09:57:31Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 39,
"watchers": 449,
"score": 0,
"subscribers_count": 14
"subscribers_count": 15
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploits for a heap overflow in MiniDLNA <=1.3.2 (CVE-2023-33476)",
"fork": false,
"created_at": "2023-06-20T01:13:17Z",
"updated_at": "2024-04-06T16:34:13Z",
"updated_at": "2024-04-07T02:19:31Z",
"pushed_at": "2023-06-20T15:41:13Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
"fork": false,
"created_at": "2024-03-21T21:39:24Z",
"updated_at": "2024-04-03T09:12:35Z",
"updated_at": "2024-04-07T05:08:43Z",
"pushed_at": "2024-03-22T06:45:43Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 84,
"watchers": 85,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2024-04-06T13:42:00Z",
"updated_at": "2024-04-07T01:52:14Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 765,
"watchers_count": 765,
"stargazers_count": 766,
"watchers_count": 766,
"has_discussions": false,
"forks_count": 138,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 138,
"watchers": 765,
"watchers": 766,
"score": 0,
"subscribers_count": 9
},
@ -1308,6 +1308,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-07T00:14:49Z",
"updated_at": "2024-04-07T06:19:42Z",
"pushed_at": "2024-04-06T23:16:53Z",
"stargazers_count": 1469,
"watchers_count": 1469,
"stargazers_count": 1527,
"watchers_count": 1527,
"has_discussions": false,
"forks_count": 139,
"forks_count": 143,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,10 +30,10 @@
"poc"
],
"visibility": "public",
"forks": 139,
"watchers": 1469,
"forks": 143,
"watchers": 1527,
"score": 0,
"subscribers_count": 11
"subscribers_count": 13
},
{
"id": 781477717,

View file

@ -13,10 +13,10 @@
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
"fork": false,
"created_at": "2024-02-28T21:16:10Z",
"updated_at": "2024-04-06T09:07:45Z",
"updated_at": "2024-04-07T03:09:25Z",
"pushed_at": "2024-03-01T20:02:52Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 80,
"watchers": 81,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure",
"fork": false,
"created_at": "2024-02-02T22:59:21Z",
"updated_at": "2024-04-05T07:30:38Z",
"updated_at": "2024-04-07T00:56:30Z",
"pushed_at": "2024-02-02T23:27:10Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 79,
"watchers": 80,
"score": 0,
"subscribers_count": 2
},

View file

@ -500,10 +500,10 @@
"description": "Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)",
"fork": false,
"created_at": "2024-02-04T20:56:42Z",
"updated_at": "2024-03-28T18:21:05Z",
"updated_at": "2024-04-07T01:10:58Z",
"pushed_at": "2024-02-05T14:10:26Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": true,
"forks_count": 2,
"allow_forking": true,
@ -512,7 +512,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
"fork": false,
"created_at": "2024-03-06T03:15:03Z",
"updated_at": "2024-04-04T12:02:39Z",
"updated_at": "2024-04-07T01:26:16Z",
"pushed_at": "2024-03-11T07:57:40Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -98,7 +98,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 112,
"watchers": 113,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-04-07T00:13:13Z",
"updated_at": "2024-04-07T00:13:54Z",
"pushed_at": "2024-04-07T00:13:14Z",
"pushed_at": "2024-04-07T01:16:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,19 +13,19 @@
"description": "CHAOS RAT web panel path RCE PoC",
"fork": false,
"created_at": "2024-04-05T21:35:04Z",
"updated_at": "2024-04-07T00:09:06Z",
"updated_at": "2024-04-07T03:23:24Z",
"pushed_at": "2024-04-06T02:13:30Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"forks": 3,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -387,10 +387,10 @@
"description": "Shell scripts to identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6) or upgrading to latest version. Added Ansible Playbook",
"fork": false,
"created_at": "2024-03-30T19:23:30Z",
"updated_at": "2024-04-06T09:43:46Z",
"updated_at": "2024-04-07T04:46:39Z",
"pushed_at": "2024-04-06T05:34:16Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -415,9 +415,9 @@
],
"visibility": "public",
"forks": 7,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 2
"subscribers_count": 4
},
{
"id": 779793653,
@ -498,7 +498,7 @@
"stargazers_count": 109,
"watchers_count": 109,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -509,10 +509,10 @@
"xz"
],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 109,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
},
{
"id": 779837781,
@ -1012,21 +1012,21 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-04-06T23:47:16Z",
"updated_at": "2024-04-07T06:18:30Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3130,
"watchers_count": 3130,
"stargazers_count": 3152,
"watchers_count": 3152,
"has_discussions": false,
"forks_count": 201,
"forks_count": 202,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 201,
"watchers": 3130,
"forks": 202,
"watchers": 3152,
"score": 0,
"subscribers_count": 29
"subscribers_count": 32
},
{
"id": 780480213,
@ -1689,7 +1689,7 @@
"fork": false,
"created_at": "2024-04-06T06:29:43Z",
"updated_at": "2024-04-06T06:30:17Z",
"pushed_at": "2024-04-06T06:47:33Z",
"pushed_at": "2024-04-07T05:37:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -1702,6 +1702,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

32
2024/CVE-2024-3273.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 783134888,
"name": "CVE-2024-3273",
"full_name": "Chocapikk\/CVE-2024-3273",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-3273",
"description": "D-Link NAS CVE-2024-3273 Exploit Tool",
"fork": false,
"created_at": "2024-04-07T03:09:13Z",
"updated_at": "2024-04-07T03:40:29Z",
"pushed_at": "2024-04-07T04:41:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -292,6 +292,9 @@
- [badsectorlabs/ludus_xz_backdoor](https://github.com/badsectorlabs/ludus_xz_backdoor)
- [Juul/xz-backdoor-scan](https://github.com/Juul/xz-backdoor-scan)
### CVE-2024-3273
- [Chocapikk/CVE-2024-3273](https://github.com/Chocapikk/CVE-2024-3273)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -2905,6 +2908,7 @@
- [h1bAna/CVE-2023-21768](https://github.com/h1bAna/CVE-2023-21768)
- [zoemurmure/CVE-2023-21768-AFD-for-WinSock-EoP-exploit](https://github.com/zoemurmure/CVE-2023-21768-AFD-for-WinSock-EoP-exploit)
- [Rosayxy/Recreate-cve-2023-21768](https://github.com/Rosayxy/Recreate-cve-2023-21768)
- [Ha0-Y/CVE-2023-21768](https://github.com/Ha0-Y/CVE-2023-21768)
### CVE-2023-21823 (2023-02-14)