Auto Update 2024/04/01 18:27:14

This commit is contained in:
motikan2010-bot 2024-04-02 03:27:14 +09:00
parent 981b3db01c
commit 2ca89ff41e
33 changed files with 504 additions and 135 deletions

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -332,6 +332,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-01-11T10:20:27Z",
"updated_at": "2024-02-01T02:54:57Z",
"pushed_at": "2024-04-01T05:13:57Z",
"pushed_at": "2024-04-01T13:31:37Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,

View file

@ -1030,5 +1030,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 780441896,
"name": "CVE-2018-10933-PoC",
"full_name": "HSw109\/CVE-2018-10933-PoC",
"owner": {
"login": "HSw109",
"id": 144700971,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144700971?v=4",
"html_url": "https:\/\/github.com\/HSw109"
},
"html_url": "https:\/\/github.com\/HSw109\/CVE-2018-10933-PoC",
"description": "Proof of Concept for CVE-2018-10933",
"fork": false,
"created_at": "2024-04-01T13:47:26Z",
"updated_at": "2024-04-01T14:28:02Z",
"pushed_at": "2024-04-01T15:13:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -223,10 +223,10 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2024-04-01T08:51:05Z",
"updated_at": "2024-04-01T12:43:34Z",
"pushed_at": "2023-05-08T16:23:06Z",
"stargazers_count": 438,
"watchers_count": 438,
"stargazers_count": 439,
"watchers_count": 439,
"has_discussions": false,
"forks_count": 162,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 438,
"watchers": 439,
"score": 0,
"subscribers_count": 9
},

View file

@ -43,10 +43,10 @@
"description": "Outlook 2019 Remote Command Execution",
"fork": false,
"created_at": "2020-11-21T08:58:32Z",
"updated_at": "2020-11-25T16:33:09Z",
"updated_at": "2024-04-01T14:50:42Z",
"pushed_at": "2020-11-21T09:09:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE",
"fork": false,
"created_at": "2021-01-10T06:47:49Z",
"updated_at": "2024-03-13T17:02:27Z",
"updated_at": "2024-04-01T15:17:38Z",
"pushed_at": "2021-01-10T06:48:53Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 78,
"watchers": 79,
"score": 0,
"subscribers_count": 3
}

View file

@ -40,21 +40,21 @@
"html_url": "https:\/\/github.com\/jeffssh"
},
"html_url": "https:\/\/github.com\/jeffssh\/CVE-2021-30860",
"description": "Collection of materials relating to FORCEDENTRY, will eventually delete this repo and migrate the materials to my main exploit repo once finished",
"description": "Collection of materials relating to FORCEDENTRY",
"fork": false,
"created_at": "2021-12-25T03:00:01Z",
"updated_at": "2024-04-01T11:27:15Z",
"updated_at": "2024-04-01T15:01:17Z",
"pushed_at": "2024-03-30T22:17:05Z",
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"forks": 22,
"watchers": 82,
"score": 0,
"subscribers_count": 5

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-03-30T21:05:53Z",
"updated_at": "2024-04-01T13:27:40Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1737,
"watchers_count": 1737,
"stargazers_count": 1738,
"watchers_count": 1738,
"has_discussions": false,
"forks_count": 514,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 514,
"watchers": 1737,
"watchers": 1738,
"score": 0,
"subscribers_count": 28
},
@ -9726,10 +9726,10 @@
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
"fork": false,
"created_at": "2021-12-24T13:18:49Z",
"updated_at": "2024-03-21T13:13:34Z",
"updated_at": "2024-04-01T16:14:29Z",
"pushed_at": "2024-01-04T17:12:05Z",
"stargazers_count": 134,
"watchers_count": 134,
"stargazers_count": 135,
"watchers_count": 135,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -9738,7 +9738,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 134,
"watchers": 135,
"score": 0,
"subscribers_count": 6
},

39
2022/CVE-2022-24818.json Normal file
View file

@ -0,0 +1,39 @@
[
{
"id": 780425505,
"name": "CVE-2022-24818",
"full_name": "mbadanoiu\/CVE-2022-24818",
"owner": {
"login": "mbadanoiu",
"id": 18383407,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
"html_url": "https:\/\/github.com\/mbadanoiu"
},
"html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2022-24818",
"description": "CVE-2022-24818: Java Deserialization via Unchecked JNDI Lookups in GeoServer and GeoTools",
"fork": false,
"created_at": "2024-04-01T13:06:31Z",
"updated_at": "2024-04-01T16:48:19Z",
"pushed_at": "2024-04-01T16:45:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0-day",
"cve",
"cve-2022-24818",
"cves",
"deserialization",
"remote-code-execution"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-2586: Linux kernel nft_object UAF",
"fork": false,
"created_at": "2022-09-03T19:04:31Z",
"updated_at": "2023-12-24T08:24:14Z",
"updated_at": "2024-04-01T13:58:22Z",
"pushed_at": "2022-09-03T19:06:45Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -227,10 +227,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
"updated_at": "2024-03-31T14:26:05Z",
"updated_at": "2024-04-01T16:56:47Z",
"pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 300,
"watchers_count": 300,
"stargazers_count": 301,
"watchers_count": 301,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -243,7 +243,7 @@
],
"visibility": "public",
"forks": 45,
"watchers": 300,
"watchers": 301,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Automatic Mass Tool for checking vulnerability in CVE-2022-4060 - WordPress Plugin : User Post Gallery <= 2.19 - Unauthenticated RCE",
"fork": false,
"created_at": "2023-09-15T21:38:47Z",
"updated_at": "2024-03-17T02:55:55Z",
"updated_at": "2024-04-01T12:26:19Z",
"pushed_at": "2023-09-16T21:55:56Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.",
"fork": false,
"created_at": "2023-07-13T13:17:20Z",
"updated_at": "2024-03-15T02:24:35Z",
"updated_at": "2024-04-01T14:18:25Z",
"pushed_at": "2024-02-11T03:01:51Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 80,
"watchers": 81,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-07T05:43:48Z",
"updated_at": "2024-03-15T09:58:36Z",
"updated_at": "2024-04-01T14:44:40Z",
"pushed_at": "2024-03-07T06:42:37Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 1
}

View file

@ -48,13 +48,13 @@
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 11,
"score": 0,
"subscribers_count": 1

View file

@ -556,10 +556,10 @@
"description": "CVE-2023-22527 内存马注入工具",
"fork": false,
"created_at": "2024-02-11T16:46:55Z",
"updated_at": "2024-03-30T06:28:51Z",
"updated_at": "2024-04-01T13:48:41Z",
"pushed_at": "2024-02-21T05:49:59Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -568,7 +568,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 57,
"watchers": 58,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2024-03-23T11:15:48Z",
"updated_at": "2024-04-01T17:20:46Z",
"pushed_at": "2023-08-17T19:26:55Z",
"stargazers_count": 619,
"watchers_count": 619,
"stargazers_count": 620,
"watchers_count": 620,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 619,
"watchers": 620,
"score": 0,
"subscribers_count": 10
},

View file

@ -612,10 +612,10 @@
"description": "CVE-2023-38831-WINRAR-EXPLOIT GENERATOR",
"fork": false,
"created_at": "2023-09-03T14:03:45Z",
"updated_at": "2024-03-20T08:29:06Z",
"updated_at": "2024-04-01T15:23:10Z",
"pushed_at": "2024-02-27T14:33:26Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -628,7 +628,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
@ -1249,5 +1249,35 @@
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
{
"id": 780499356,
"name": "VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC",
"full_name": "solomon12354\/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC",
"owner": {
"login": "solomon12354",
"id": 84257391,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84257391?v=4",
"html_url": "https:\/\/github.com\/solomon12354"
},
"html_url": "https:\/\/github.com\/solomon12354\/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC",
"description": "This is my malware",
"fork": false,
"created_at": "2024-04-01T15:59:34Z",
"updated_at": "2024-04-01T16:03:18Z",
"pushed_at": "2024-04-01T16:08:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-04-01T09:39:26Z",
"updated_at": "2024-04-01T18:02:36Z",
"pushed_at": "2024-03-31T22:00:43Z",
"stargazers_count": 290,
"watchers_count": 290,
"stargazers_count": 298,
"watchers_count": 298,
"has_discussions": false,
"forks_count": 47,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 290,
"forks": 48,
"watchers": 298,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-01-17T01:24:15Z",
"updated_at": "2024-03-31T10:43:18Z",
"pushed_at": "2024-01-17T01:31:57Z",
"pushed_at": "2024-04-01T18:20:26Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,

View file

@ -138,13 +138,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -13,19 +13,19 @@
"description": "LPE exploit for CVE-2024-0582 (io_uring)",
"fork": false,
"created_at": "2024-03-29T14:45:22Z",
"updated_at": "2024-04-01T11:47:42Z",
"updated_at": "2024-04-01T17:38:04Z",
"pushed_at": "2024-03-29T16:05:31Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 12,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 51,
"forks": 14,
"watchers": 55,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-01T12:18:37Z",
"updated_at": "2024-04-01T17:27:37Z",
"pushed_at": "2024-03-27T09:22:28Z",
"stargazers_count": 1116,
"watchers_count": 1116,
"stargazers_count": 1133,
"watchers_count": 1133,
"has_discussions": false,
"forks_count": 114,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 114,
"watchers": 1116,
"watchers": 1133,
"score": 0,
"subscribers_count": 10
}

View file

@ -52,10 +52,10 @@
"description": "A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability",
"fork": false,
"created_at": "2024-02-23T17:26:28Z",
"updated_at": "2024-03-07T18:43:45Z",
"updated_at": "2024-04-01T18:07:45Z",
"pushed_at": "2024-02-26T12:00:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -64,7 +64,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Report and exploit of CVE-2024-21305. ",
"fork": false,
"created_at": "2023-12-16T23:27:34Z",
"updated_at": "2024-03-31T20:10:48Z",
"updated_at": "2024-04-01T16:16:26Z",
"pushed_at": "2024-01-14T17:21:42Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 2
}

View file

@ -73,10 +73,10 @@
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
"fork": false,
"created_at": "2024-03-13T09:17:28Z",
"updated_at": "2024-04-01T09:14:26Z",
"updated_at": "2024-04-01T12:35:18Z",
"pushed_at": "2024-03-16T00:35:12Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 75,
"watchers": 76,
"score": 0,
"subscribers_count": 4
},

32
2024/CVE-2024-22640.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 780492523,
"name": "CVE-2024-22640",
"full_name": "zunak\/CVE-2024-22640",
"owner": {
"login": "zunak",
"id": 14941490,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14941490?v=4",
"html_url": "https:\/\/github.com\/zunak"
},
"html_url": "https:\/\/github.com\/zunak\/CVE-2024-22640",
"description": null,
"fork": false,
"created_at": "2024-04-01T15:43:07Z",
"updated_at": "2024-04-01T15:43:07Z",
"pushed_at": "2024-04-01T16:23:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-22641.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 780504370,
"name": "CVE-2024-22641",
"full_name": "zunak\/CVE-2024-22641",
"owner": {
"login": "zunak",
"id": 14941490,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14941490?v=4",
"html_url": "https:\/\/github.com\/zunak"
},
"html_url": "https:\/\/github.com\/zunak\/CVE-2024-22641",
"description": null,
"fork": false,
"created_at": "2024-04-01T16:11:28Z",
"updated_at": "2024-04-01T16:11:28Z",
"pushed_at": "2024-04-01T16:13:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "WallEscape vulnerability in util-linux",
"fork": false,
"created_at": "2024-03-11T00:15:03Z",
"updated_at": "2024-04-01T12:10:44Z",
"updated_at": "2024-04-01T15:50:43Z",
"pushed_at": "2024-03-30T01:32:02Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
"fork": false,
"created_at": "2024-03-11T10:14:39Z",
"updated_at": "2024-03-31T18:19:30Z",
"updated_at": "2024-04-01T13:27:31Z",
"pushed_at": "2024-03-25T12:56:16Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 11,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 53,
"forks": 13,
"watchers": 54,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Information for CVE-2024-3094",
"fork": false,
"created_at": "2024-03-29T17:03:01Z",
"updated_at": "2024-04-01T10:39:33Z",
"pushed_at": "2024-03-31T20:14:33Z",
"stargazers_count": 33,
"watchers_count": 33,
"updated_at": "2024-04-01T16:22:55Z",
"pushed_at": "2024-04-01T16:01:34Z",
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 2
},
@ -43,19 +43,19 @@
"description": "Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)",
"fork": false,
"created_at": "2024-03-29T20:28:17Z",
"updated_at": "2024-04-01T11:58:02Z",
"updated_at": "2024-04-01T18:06:43Z",
"pushed_at": "2024-03-31T00:13:39Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 42,
"forks": 11,
"watchers": 45,
"score": 0,
"subscribers_count": 2
},
@ -261,10 +261,10 @@
"description": "History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.",
"fork": false,
"created_at": "2024-03-30T10:48:54Z",
"updated_at": "2024-04-01T03:53:29Z",
"pushed_at": "2024-03-31T14:36:49Z",
"stargazers_count": 6,
"watchers_count": 6,
"updated_at": "2024-04-01T16:29:23Z",
"pushed_at": "2024-04-01T15:12:50Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -273,7 +273,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
@ -387,10 +387,10 @@
"description": "This project contains a shell script designed to help users identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6).",
"fork": false,
"created_at": "2024-03-30T19:23:30Z",
"updated_at": "2024-03-31T17:49:29Z",
"updated_at": "2024-04-01T16:52:07Z",
"pushed_at": "2024-03-31T09:53:55Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -409,7 +409,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
@ -487,10 +487,10 @@
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
"fork": false,
"created_at": "2024-03-30T22:07:24Z",
"updated_at": "2024-04-01T12:18:10Z",
"updated_at": "2024-04-01T16:42:48Z",
"pushed_at": "2024-03-31T22:09:33Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -504,7 +504,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 70,
"watchers": 74,
"score": 0,
"subscribers_count": 1
},
@ -646,10 +646,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-31T10:46:33Z",
"updated_at": "2024-04-01T12:20:48Z",
"pushed_at": "2024-04-01T12:28:49Z",
"stargazers_count": 4,
"watchers_count": 4,
"updated_at": "2024-04-01T15:04:05Z",
"pushed_at": "2024-04-01T14:18:53Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -658,7 +658,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},
@ -826,10 +826,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-01T02:25:33Z",
"updated_at": "2024-04-01T02:33:56Z",
"updated_at": "2024-04-01T13:10:39Z",
"pushed_at": "2024-04-01T03:09:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -838,7 +838,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
@ -961,5 +961,190 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 780415912,
"name": "CVE-2024-3094",
"full_name": "reuteras\/CVE-2024-3094",
"owner": {
"login": "reuteras",
"id": 449846,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/449846?v=4",
"html_url": "https:\/\/github.com\/reuteras"
},
"html_url": "https:\/\/github.com\/reuteras\/CVE-2024-3094",
"description": "Obsidian notes about CVE-2024-3094",
"fork": false,
"created_at": "2024-04-01T12:41:00Z",
"updated_at": "2024-04-01T14:28:09Z",
"pushed_at": "2024-04-01T13:29:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 780459560,
"name": "xzbot",
"full_name": "amlweems\/xzbot",
"owner": {
"login": "amlweems",
"id": 117625,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117625?v=4",
"html_url": "https:\/\/github.com\/amlweems"
},
"html_url": "https:\/\/github.com\/amlweems\/xzbot",
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-04-01T18:29:37Z",
"pushed_at": "2024-04-01T18:30:11Z",
"stargazers_count": 329,
"watchers_count": 329,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 329,
"score": 0,
"subscribers_count": 0
},
{
"id": 780480213,
"name": "CVE-2024-3094",
"full_name": "gustavorobertux\/CVE-2024-3094",
"owner": {
"login": "gustavorobertux",
"id": 38466612,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38466612?v=4",
"html_url": "https:\/\/github.com\/gustavorobertux"
},
"html_url": "https:\/\/github.com\/gustavorobertux\/CVE-2024-3094",
"description": "Checker - CVE-2024-3094",
"fork": false,
"created_at": "2024-04-01T15:15:16Z",
"updated_at": "2024-04-01T16:31:45Z",
"pushed_at": "2024-04-01T15:32:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 780489939,
"name": "detectar_cve-2024-3094",
"full_name": "ackemed\/detectar_cve-2024-3094",
"owner": {
"login": "ackemed",
"id": 112708193,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112708193?v=4",
"html_url": "https:\/\/github.com\/ackemed"
},
"html_url": "https:\/\/github.com\/ackemed\/detectar_cve-2024-3094",
"description": null,
"fork": false,
"created_at": "2024-04-01T15:36:58Z",
"updated_at": "2024-04-01T15:36:59Z",
"pushed_at": "2024-04-01T15:36:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 780503272,
"name": "xz-cve-2024-3094",
"full_name": "0xlane\/xz-cve-2024-3094",
"owner": {
"login": "0xlane",
"id": 22788893,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22788893?v=4",
"html_url": "https:\/\/github.com\/0xlane"
},
"html_url": "https:\/\/github.com\/0xlane\/xz-cve-2024-3094",
"description": "XZ Backdoor Extract",
"fork": false,
"created_at": "2024-04-01T16:08:50Z",
"updated_at": "2024-04-01T16:12:18Z",
"pushed_at": "2024-04-01T16:09:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2024-3094",
"xz",
"xz-utils"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 780517704,
"name": "CVE-2024-3094",
"full_name": "dah4k\/CVE-2024-3094",
"owner": {
"login": "dah4k",
"id": 84741290,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84741290?v=4",
"html_url": "https:\/\/github.com\/dah4k"
},
"html_url": "https:\/\/github.com\/dah4k\/CVE-2024-3094",
"description": null,
"fork": false,
"created_at": "2024-04-01T16:42:47Z",
"updated_at": "2024-04-01T16:43:31Z",
"pushed_at": "2024-04-01T18:17:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -227,6 +227,12 @@
- [mightysai1997/CVE-2024-3094-info](https://github.com/mightysai1997/CVE-2024-3094-info)
- [mightysai1997/CVE-2024-3094](https://github.com/mightysai1997/CVE-2024-3094)
- [mesutgungor/xz-backdoor-vulnerability](https://github.com/mesutgungor/xz-backdoor-vulnerability)
- [reuteras/CVE-2024-3094](https://github.com/reuteras/CVE-2024-3094)
- [amlweems/xzbot](https://github.com/amlweems/xzbot)
- [gustavorobertux/CVE-2024-3094](https://github.com/gustavorobertux/CVE-2024-3094)
- [ackemed/detectar_cve-2024-3094](https://github.com/ackemed/detectar_cve-2024-3094)
- [0xlane/xz-cve-2024-3094](https://github.com/0xlane/xz-cve-2024-3094)
- [dah4k/CVE-2024-3094](https://github.com/dah4k/CVE-2024-3094)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -451,6 +457,12 @@
### CVE-2024-22534
- [austino2000/CVE-2024-22534](https://github.com/austino2000/CVE-2024-22534)
### CVE-2024-22640
- [zunak/CVE-2024-22640](https://github.com/zunak/CVE-2024-22640)
### CVE-2024-22641
- [zunak/CVE-2024-22641](https://github.com/zunak/CVE-2024-22641)
### CVE-2024-22752 (2024-03-07)
<code>Insecure permissions issue in EaseUS MobiMover 6.0.5 Build 21620 allows attackers to gain escalated privileges via use of crafted executable launched from the application installation directory.
@ -5877,6 +5889,7 @@
- [SpamixOfficial/CVE-2023-38831](https://github.com/SpamixOfficial/CVE-2023-38831)
- [r1yaz/winDED](https://github.com/r1yaz/winDED)
- [youmulijiang/evil-winrar](https://github.com/youmulijiang/evil-winrar)
- [solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC](https://github.com/solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC)
### CVE-2023-38836 (2023-08-21)
@ -10645,6 +10658,13 @@
- [Acceis/exploit-CVE-2022-24780](https://github.com/Acceis/exploit-CVE-2022-24780)
### CVE-2022-24818 (2022-04-13)
<code>GeoTools is an open source Java library that provides tools for geospatial data. The GeoTools library has a number of data sources that can perform unchecked JNDI lookups, which in turn can be used to perform class deserialization and result in arbitrary code execution. Similar to the Log4J case, the vulnerability can be triggered if the JNDI names are user-provided, but requires admin-level login to be triggered. The lookups are now restricted in GeoTools 26.4, GeoTools 25.6, and GeoTools 24.6. Users unable to upgrade should ensure that any downstream application should not allow usage of remotely provided JNDI strings.
</code>
- [mbadanoiu/CVE-2022-24818](https://github.com/mbadanoiu/CVE-2022-24818)
### CVE-2022-24834 (2023-07-13)
<code>Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.
@ -32273,6 +32293,7 @@
- [cyberharsh/Libssh-server-CVE-2018-10933](https://github.com/cyberharsh/Libssh-server-CVE-2018-10933)
- [Rubikcuv5/CVE-2018-10933](https://github.com/Rubikcuv5/CVE-2018-10933)
- [SilasSpringer/CVE-2018-10933](https://github.com/SilasSpringer/CVE-2018-10933)
- [HSw109/CVE-2018-10933-PoC](https://github.com/HSw109/CVE-2018-10933-PoC)
### CVE-2018-10936 (2018-08-30)