mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/04/01 18:27:14
This commit is contained in:
parent
981b3db01c
commit
2ca89ff41e
33 changed files with 504 additions and 135 deletions
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -332,6 +332,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-01-11T10:20:27Z",
|
||||
"updated_at": "2024-02-01T02:54:57Z",
|
||||
"pushed_at": "2024-04-01T05:13:57Z",
|
||||
"pushed_at": "2024-04-01T13:31:37Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1030,5 +1030,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 780441896,
|
||||
"name": "CVE-2018-10933-PoC",
|
||||
"full_name": "HSw109\/CVE-2018-10933-PoC",
|
||||
"owner": {
|
||||
"login": "HSw109",
|
||||
"id": 144700971,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144700971?v=4",
|
||||
"html_url": "https:\/\/github.com\/HSw109"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HSw109\/CVE-2018-10933-PoC",
|
||||
"description": "Proof of Concept for CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T13:47:26Z",
|
||||
"updated_at": "2024-04-01T14:28:02Z",
|
||||
"pushed_at": "2024-04-01T15:13:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -223,10 +223,10 @@
|
|||
"description": "CVE-2019-2725 命令回显",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T01:57:05Z",
|
||||
"updated_at": "2024-04-01T08:51:05Z",
|
||||
"updated_at": "2024-04-01T12:43:34Z",
|
||||
"pushed_at": "2023-05-08T16:23:06Z",
|
||||
"stargazers_count": 438,
|
||||
"watchers_count": 438,
|
||||
"stargazers_count": 439,
|
||||
"watchers_count": 439,
|
||||
"has_discussions": false,
|
||||
"forks_count": 162,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 162,
|
||||
"watchers": 438,
|
||||
"watchers": 439,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Outlook 2019 Remote Command Execution",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-21T08:58:32Z",
|
||||
"updated_at": "2020-11-25T16:33:09Z",
|
||||
"updated_at": "2024-04-01T14:50:42Z",
|
||||
"pushed_at": "2020-11-21T09:09:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-10T06:47:49Z",
|
||||
"updated_at": "2024-03-13T17:02:27Z",
|
||||
"updated_at": "2024-04-01T15:17:38Z",
|
||||
"pushed_at": "2021-01-10T06:48:53Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -40,21 +40,21 @@
|
|||
"html_url": "https:\/\/github.com\/jeffssh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jeffssh\/CVE-2021-30860",
|
||||
"description": "Collection of materials relating to FORCEDENTRY, will eventually delete this repo and migrate the materials to my main exploit repo once finished",
|
||||
"description": "Collection of materials relating to FORCEDENTRY",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-25T03:00:01Z",
|
||||
"updated_at": "2024-04-01T11:27:15Z",
|
||||
"updated_at": "2024-04-01T15:01:17Z",
|
||||
"pushed_at": "2024-03-30T22:17:05Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"forks": 22,
|
||||
"watchers": 82,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
|
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-03-30T21:05:53Z",
|
||||
"updated_at": "2024-04-01T13:27:40Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1737,
|
||||
"watchers_count": 1737,
|
||||
"stargazers_count": 1738,
|
||||
"watchers_count": 1738,
|
||||
"has_discussions": false,
|
||||
"forks_count": 514,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 514,
|
||||
"watchers": 1737,
|
||||
"watchers": 1738,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
@ -9726,10 +9726,10 @@
|
|||
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-24T13:18:49Z",
|
||||
"updated_at": "2024-03-21T13:13:34Z",
|
||||
"updated_at": "2024-04-01T16:14:29Z",
|
||||
"pushed_at": "2024-01-04T17:12:05Z",
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -9738,7 +9738,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 134,
|
||||
"watchers": 135,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
39
2022/CVE-2022-24818.json
Normal file
39
2022/CVE-2022-24818.json
Normal file
|
@ -0,0 +1,39 @@
|
|||
[
|
||||
{
|
||||
"id": 780425505,
|
||||
"name": "CVE-2022-24818",
|
||||
"full_name": "mbadanoiu\/CVE-2022-24818",
|
||||
"owner": {
|
||||
"login": "mbadanoiu",
|
||||
"id": 18383407,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
|
||||
"html_url": "https:\/\/github.com\/mbadanoiu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2022-24818",
|
||||
"description": "CVE-2022-24818: Java Deserialization via Unchecked JNDI Lookups in GeoServer and GeoTools",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T13:06:31Z",
|
||||
"updated_at": "2024-04-01T16:48:19Z",
|
||||
"pushed_at": "2024-04-01T16:45:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0-day",
|
||||
"cve",
|
||||
"cve-2022-24818",
|
||||
"cves",
|
||||
"deserialization",
|
||||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-2586: Linux kernel nft_object UAF",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-03T19:04:31Z",
|
||||
"updated_at": "2023-12-24T08:24:14Z",
|
||||
"updated_at": "2024-04-01T13:58:22Z",
|
||||
"pushed_at": "2022-09-03T19:06:45Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -227,10 +227,10 @@
|
|||
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-26T08:58:21Z",
|
||||
"updated_at": "2024-03-31T14:26:05Z",
|
||||
"updated_at": "2024-04-01T16:56:47Z",
|
||||
"pushed_at": "2022-09-26T13:20:38Z",
|
||||
"stargazers_count": 300,
|
||||
"watchers_count": 300,
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 300,
|
||||
"watchers": 301,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Automatic Mass Tool for checking vulnerability in CVE-2022-4060 - WordPress Plugin : User Post Gallery <= 2.19 - Unauthenticated RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-15T21:38:47Z",
|
||||
"updated_at": "2024-03-17T02:55:55Z",
|
||||
"updated_at": "2024-04-01T12:26:19Z",
|
||||
"pushed_at": "2023-09-16T21:55:56Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-13T13:17:20Z",
|
||||
"updated_at": "2024-03-15T02:24:35Z",
|
||||
"updated_at": "2024-04-01T14:18:25Z",
|
||||
"pushed_at": "2024-02-11T03:01:51Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-07T05:43:48Z",
|
||||
"updated_at": "2024-03-15T09:58:36Z",
|
||||
"updated_at": "2024-04-01T14:44:40Z",
|
||||
"pushed_at": "2024-03-07T06:42:37Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -556,10 +556,10 @@
|
|||
"description": "CVE-2023-22527 内存马注入工具",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-11T16:46:55Z",
|
||||
"updated_at": "2024-03-30T06:28:51Z",
|
||||
"updated_at": "2024-04-01T13:48:41Z",
|
||||
"pushed_at": "2024-02-21T05:49:59Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -568,7 +568,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Original PoC for CVE-2023-32784",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T17:08:55Z",
|
||||
"updated_at": "2024-03-23T11:15:48Z",
|
||||
"updated_at": "2024-04-01T17:20:46Z",
|
||||
"pushed_at": "2023-08-17T19:26:55Z",
|
||||
"stargazers_count": 619,
|
||||
"watchers_count": 619,
|
||||
"stargazers_count": 620,
|
||||
"watchers_count": 620,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 619,
|
||||
"watchers": 620,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -612,10 +612,10 @@
|
|||
"description": "CVE-2023-38831-WINRAR-EXPLOIT GENERATOR",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-03T14:03:45Z",
|
||||
"updated_at": "2024-03-20T08:29:06Z",
|
||||
"updated_at": "2024-04-01T15:23:10Z",
|
||||
"pushed_at": "2024-02-27T14:33:26Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -628,7 +628,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1249,5 +1249,35 @@
|
|||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 780499356,
|
||||
"name": "VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC",
|
||||
"full_name": "solomon12354\/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC",
|
||||
"owner": {
|
||||
"login": "solomon12354",
|
||||
"id": 84257391,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84257391?v=4",
|
||||
"html_url": "https:\/\/github.com\/solomon12354"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/solomon12354\/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC",
|
||||
"description": "This is my malware",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T15:59:34Z",
|
||||
"updated_at": "2024-04-01T16:03:18Z",
|
||||
"pushed_at": "2024-04-01T16:08:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-04-01T09:39:26Z",
|
||||
"updated_at": "2024-04-01T18:02:36Z",
|
||||
"pushed_at": "2024-03-31T22:00:43Z",
|
||||
"stargazers_count": 290,
|
||||
"watchers_count": 290,
|
||||
"stargazers_count": 298,
|
||||
"watchers_count": 298,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 290,
|
||||
"forks": 48,
|
||||
"watchers": 298,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-01-17T01:24:15Z",
|
||||
"updated_at": "2024-03-31T10:43:18Z",
|
||||
"pushed_at": "2024-01-17T01:31:57Z",
|
||||
"pushed_at": "2024-04-01T18:20:26Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -138,13 +138,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "LPE exploit for CVE-2024-0582 (io_uring)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T14:45:22Z",
|
||||
"updated_at": "2024-04-01T11:47:42Z",
|
||||
"updated_at": "2024-04-01T17:38:04Z",
|
||||
"pushed_at": "2024-03-29T16:05:31Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 51,
|
||||
"forks": 14,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-04-01T12:18:37Z",
|
||||
"updated_at": "2024-04-01T17:27:37Z",
|
||||
"pushed_at": "2024-03-27T09:22:28Z",
|
||||
"stargazers_count": 1116,
|
||||
"watchers_count": 1116,
|
||||
"stargazers_count": 1133,
|
||||
"watchers_count": 1133,
|
||||
"has_discussions": false,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 1116,
|
||||
"watchers": 1133,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
}
|
||||
|
|
|
@ -52,10 +52,10 @@
|
|||
"description": "A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-23T17:26:28Z",
|
||||
"updated_at": "2024-03-07T18:43:45Z",
|
||||
"updated_at": "2024-04-01T18:07:45Z",
|
||||
"pushed_at": "2024-02-26T12:00:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -64,7 +64,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Report and exploit of CVE-2024-21305. ",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-16T23:27:34Z",
|
||||
"updated_at": "2024-03-31T20:10:48Z",
|
||||
"updated_at": "2024-04-01T16:16:26Z",
|
||||
"pushed_at": "2024-01-14T17:21:42Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-13T09:17:28Z",
|
||||
"updated_at": "2024-04-01T09:14:26Z",
|
||||
"updated_at": "2024-04-01T12:35:18Z",
|
||||
"pushed_at": "2024-03-16T00:35:12Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
32
2024/CVE-2024-22640.json
Normal file
32
2024/CVE-2024-22640.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 780492523,
|
||||
"name": "CVE-2024-22640",
|
||||
"full_name": "zunak\/CVE-2024-22640",
|
||||
"owner": {
|
||||
"login": "zunak",
|
||||
"id": 14941490,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14941490?v=4",
|
||||
"html_url": "https:\/\/github.com\/zunak"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zunak\/CVE-2024-22640",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T15:43:07Z",
|
||||
"updated_at": "2024-04-01T15:43:07Z",
|
||||
"pushed_at": "2024-04-01T16:23:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-22641.json
Normal file
32
2024/CVE-2024-22641.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 780504370,
|
||||
"name": "CVE-2024-22641",
|
||||
"full_name": "zunak\/CVE-2024-22641",
|
||||
"owner": {
|
||||
"login": "zunak",
|
||||
"id": 14941490,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14941490?v=4",
|
||||
"html_url": "https:\/\/github.com\/zunak"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zunak\/CVE-2024-22641",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T16:11:28Z",
|
||||
"updated_at": "2024-04-01T16:11:28Z",
|
||||
"pushed_at": "2024-04-01T16:13:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WallEscape vulnerability in util-linux",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-11T00:15:03Z",
|
||||
"updated_at": "2024-04-01T12:10:44Z",
|
||||
"updated_at": "2024-04-01T15:50:43Z",
|
||||
"pushed_at": "2024-03-30T01:32:02Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-11T10:14:39Z",
|
||||
"updated_at": "2024-03-31T18:19:30Z",
|
||||
"updated_at": "2024-04-01T13:27:31Z",
|
||||
"pushed_at": "2024-03-25T12:56:16Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 53,
|
||||
"forks": 13,
|
||||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Information for CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T17:03:01Z",
|
||||
"updated_at": "2024-04-01T10:39:33Z",
|
||||
"pushed_at": "2024-03-31T20:14:33Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"updated_at": "2024-04-01T16:22:55Z",
|
||||
"pushed_at": "2024-04-01T16:01:34Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -43,19 +43,19 @@
|
|||
"description": "Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T20:28:17Z",
|
||||
"updated_at": "2024-04-01T11:58:02Z",
|
||||
"updated_at": "2024-04-01T18:06:43Z",
|
||||
"pushed_at": "2024-03-31T00:13:39Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 42,
|
||||
"forks": 11,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -261,10 +261,10 @@
|
|||
"description": "History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-30T10:48:54Z",
|
||||
"updated_at": "2024-04-01T03:53:29Z",
|
||||
"pushed_at": "2024-03-31T14:36:49Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"updated_at": "2024-04-01T16:29:23Z",
|
||||
"pushed_at": "2024-04-01T15:12:50Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -273,7 +273,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -387,10 +387,10 @@
|
|||
"description": "This project contains a shell script designed to help users identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6).",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-30T19:23:30Z",
|
||||
"updated_at": "2024-03-31T17:49:29Z",
|
||||
"updated_at": "2024-04-01T16:52:07Z",
|
||||
"pushed_at": "2024-03-31T09:53:55Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -409,7 +409,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -487,10 +487,10 @@
|
|||
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-30T22:07:24Z",
|
||||
"updated_at": "2024-04-01T12:18:10Z",
|
||||
"updated_at": "2024-04-01T16:42:48Z",
|
||||
"pushed_at": "2024-03-31T22:09:33Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -504,7 +504,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 70,
|
||||
"watchers": 74,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -646,10 +646,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-31T10:46:33Z",
|
||||
"updated_at": "2024-04-01T12:20:48Z",
|
||||
"pushed_at": "2024-04-01T12:28:49Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"updated_at": "2024-04-01T15:04:05Z",
|
||||
"pushed_at": "2024-04-01T14:18:53Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -658,7 +658,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -826,10 +826,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T02:25:33Z",
|
||||
"updated_at": "2024-04-01T02:33:56Z",
|
||||
"updated_at": "2024-04-01T13:10:39Z",
|
||||
"pushed_at": "2024-04-01T03:09:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -838,7 +838,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -961,5 +961,190 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 780415912,
|
||||
"name": "CVE-2024-3094",
|
||||
"full_name": "reuteras\/CVE-2024-3094",
|
||||
"owner": {
|
||||
"login": "reuteras",
|
||||
"id": 449846,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/449846?v=4",
|
||||
"html_url": "https:\/\/github.com\/reuteras"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/reuteras\/CVE-2024-3094",
|
||||
"description": "Obsidian notes about CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T12:41:00Z",
|
||||
"updated_at": "2024-04-01T14:28:09Z",
|
||||
"pushed_at": "2024-04-01T13:29:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 780459560,
|
||||
"name": "xzbot",
|
||||
"full_name": "amlweems\/xzbot",
|
||||
"owner": {
|
||||
"login": "amlweems",
|
||||
"id": 117625,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117625?v=4",
|
||||
"html_url": "https:\/\/github.com\/amlweems"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amlweems\/xzbot",
|
||||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-04-01T18:29:37Z",
|
||||
"pushed_at": "2024-04-01T18:30:11Z",
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 329,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 780480213,
|
||||
"name": "CVE-2024-3094",
|
||||
"full_name": "gustavorobertux\/CVE-2024-3094",
|
||||
"owner": {
|
||||
"login": "gustavorobertux",
|
||||
"id": 38466612,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38466612?v=4",
|
||||
"html_url": "https:\/\/github.com\/gustavorobertux"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gustavorobertux\/CVE-2024-3094",
|
||||
"description": "Checker - CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T15:15:16Z",
|
||||
"updated_at": "2024-04-01T16:31:45Z",
|
||||
"pushed_at": "2024-04-01T15:32:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 780489939,
|
||||
"name": "detectar_cve-2024-3094",
|
||||
"full_name": "ackemed\/detectar_cve-2024-3094",
|
||||
"owner": {
|
||||
"login": "ackemed",
|
||||
"id": 112708193,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112708193?v=4",
|
||||
"html_url": "https:\/\/github.com\/ackemed"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ackemed\/detectar_cve-2024-3094",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T15:36:58Z",
|
||||
"updated_at": "2024-04-01T15:36:59Z",
|
||||
"pushed_at": "2024-04-01T15:36:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 780503272,
|
||||
"name": "xz-cve-2024-3094",
|
||||
"full_name": "0xlane\/xz-cve-2024-3094",
|
||||
"owner": {
|
||||
"login": "0xlane",
|
||||
"id": 22788893,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22788893?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xlane"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xlane\/xz-cve-2024-3094",
|
||||
"description": "XZ Backdoor Extract",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T16:08:50Z",
|
||||
"updated_at": "2024-04-01T16:12:18Z",
|
||||
"pushed_at": "2024-04-01T16:09:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2024-3094",
|
||||
"xz",
|
||||
"xz-utils"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 780517704,
|
||||
"name": "CVE-2024-3094",
|
||||
"full_name": "dah4k\/CVE-2024-3094",
|
||||
"owner": {
|
||||
"login": "dah4k",
|
||||
"id": 84741290,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84741290?v=4",
|
||||
"html_url": "https:\/\/github.com\/dah4k"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dah4k\/CVE-2024-3094",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T16:42:47Z",
|
||||
"updated_at": "2024-04-01T16:43:31Z",
|
||||
"pushed_at": "2024-04-01T18:17:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
21
README.md
21
README.md
|
@ -227,6 +227,12 @@
|
|||
- [mightysai1997/CVE-2024-3094-info](https://github.com/mightysai1997/CVE-2024-3094-info)
|
||||
- [mightysai1997/CVE-2024-3094](https://github.com/mightysai1997/CVE-2024-3094)
|
||||
- [mesutgungor/xz-backdoor-vulnerability](https://github.com/mesutgungor/xz-backdoor-vulnerability)
|
||||
- [reuteras/CVE-2024-3094](https://github.com/reuteras/CVE-2024-3094)
|
||||
- [amlweems/xzbot](https://github.com/amlweems/xzbot)
|
||||
- [gustavorobertux/CVE-2024-3094](https://github.com/gustavorobertux/CVE-2024-3094)
|
||||
- [ackemed/detectar_cve-2024-3094](https://github.com/ackemed/detectar_cve-2024-3094)
|
||||
- [0xlane/xz-cve-2024-3094](https://github.com/0xlane/xz-cve-2024-3094)
|
||||
- [dah4k/CVE-2024-3094](https://github.com/dah4k/CVE-2024-3094)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
@ -451,6 +457,12 @@
|
|||
### CVE-2024-22534
|
||||
- [austino2000/CVE-2024-22534](https://github.com/austino2000/CVE-2024-22534)
|
||||
|
||||
### CVE-2024-22640
|
||||
- [zunak/CVE-2024-22640](https://github.com/zunak/CVE-2024-22640)
|
||||
|
||||
### CVE-2024-22641
|
||||
- [zunak/CVE-2024-22641](https://github.com/zunak/CVE-2024-22641)
|
||||
|
||||
### CVE-2024-22752 (2024-03-07)
|
||||
|
||||
<code>Insecure permissions issue in EaseUS MobiMover 6.0.5 Build 21620 allows attackers to gain escalated privileges via use of crafted executable launched from the application installation directory.
|
||||
|
@ -5877,6 +5889,7 @@
|
|||
- [SpamixOfficial/CVE-2023-38831](https://github.com/SpamixOfficial/CVE-2023-38831)
|
||||
- [r1yaz/winDED](https://github.com/r1yaz/winDED)
|
||||
- [youmulijiang/evil-winrar](https://github.com/youmulijiang/evil-winrar)
|
||||
- [solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC](https://github.com/solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC)
|
||||
|
||||
### CVE-2023-38836 (2023-08-21)
|
||||
|
||||
|
@ -10645,6 +10658,13 @@
|
|||
|
||||
- [Acceis/exploit-CVE-2022-24780](https://github.com/Acceis/exploit-CVE-2022-24780)
|
||||
|
||||
### CVE-2022-24818 (2022-04-13)
|
||||
|
||||
<code>GeoTools is an open source Java library that provides tools for geospatial data. The GeoTools library has a number of data sources that can perform unchecked JNDI lookups, which in turn can be used to perform class deserialization and result in arbitrary code execution. Similar to the Log4J case, the vulnerability can be triggered if the JNDI names are user-provided, but requires admin-level login to be triggered. The lookups are now restricted in GeoTools 26.4, GeoTools 25.6, and GeoTools 24.6. Users unable to upgrade should ensure that any downstream application should not allow usage of remotely provided JNDI strings.
|
||||
</code>
|
||||
|
||||
- [mbadanoiu/CVE-2022-24818](https://github.com/mbadanoiu/CVE-2022-24818)
|
||||
|
||||
### CVE-2022-24834 (2023-07-13)
|
||||
|
||||
<code>Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.
|
||||
|
@ -32273,6 +32293,7 @@
|
|||
- [cyberharsh/Libssh-server-CVE-2018-10933](https://github.com/cyberharsh/Libssh-server-CVE-2018-10933)
|
||||
- [Rubikcuv5/CVE-2018-10933](https://github.com/Rubikcuv5/CVE-2018-10933)
|
||||
- [SilasSpringer/CVE-2018-10933](https://github.com/SilasSpringer/CVE-2018-10933)
|
||||
- [HSw109/CVE-2018-10933-PoC](https://github.com/HSw109/CVE-2018-10933-PoC)
|
||||
|
||||
### CVE-2018-10936 (2018-08-30)
|
||||
|
||||
|
|
Loading…
Reference in a new issue