mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/03/30 00:26:48
This commit is contained in:
parent
c3a0e96eac
commit
2eb5207e19
26 changed files with 292 additions and 98 deletions
|
@ -73,10 +73,10 @@
|
|||
"description": "kernel exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T10:52:51Z",
|
||||
"updated_at": "2024-03-14T20:44:36Z",
|
||||
"updated_at": "2024-03-29T20:00:55Z",
|
||||
"pushed_at": "2022-02-07T14:33:56Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "A standalone POC for CVE-2019-12840",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-09T17:48:39Z",
|
||||
"updated_at": "2023-09-28T11:07:56Z",
|
||||
"updated_at": "2024-03-29T21:01:15Z",
|
||||
"pushed_at": "2019-11-10T13:26:41Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -267,6 +267,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -248,6 +248,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 32
|
||||
"subscribers_count": 33
|
||||
},
|
||||
{
|
||||
"id": 320642790,
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Python script for exploiting command injection in Open PLC Webserver v3",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-28T21:31:45Z",
|
||||
"updated_at": "2024-03-28T23:17:50Z",
|
||||
"updated_at": "2024-03-29T19:41:59Z",
|
||||
"pushed_at": "2024-03-28T22:14:23Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -90,8 +90,8 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -79,10 +79,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2024-03-29T08:58:25Z",
|
||||
"updated_at": "2024-03-30T00:08:06Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1901,
|
||||
"watchers_count": 1901,
|
||||
"stargazers_count": 1902,
|
||||
"watchers_count": 1902,
|
||||
"has_discussions": false,
|
||||
"forks_count": 510,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 510,
|
||||
"watchers": 1901,
|
||||
"watchers": 1902,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -213,34 +213,34 @@
|
|||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 443609406,
|
||||
"id": 444081415,
|
||||
"name": "-cve-2021-45232",
|
||||
"full_name": "itxfahdi\/-cve-2021-45232",
|
||||
"full_name": "xiju2003\/-cve-2021-45232",
|
||||
"owner": {
|
||||
"login": "itxfahdi",
|
||||
"id": 67527602,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67527602?v=4",
|
||||
"html_url": "https:\/\/github.com\/itxfahdi"
|
||||
"login": "xiju2003",
|
||||
"id": 17631407,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17631407?v=4",
|
||||
"html_url": "https:\/\/github.com\/xiju2003"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/itxfahdi\/-cve-2021-45232",
|
||||
"html_url": "https:\/\/github.com\/xiju2003\/-cve-2021-45232",
|
||||
"description": "The vulnerability affects Apache APISIX Dashboard version 2.10.1",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-01T19:31:13Z",
|
||||
"updated_at": "2022-01-01T20:22:16Z",
|
||||
"created_at": "2022-01-03T14:01:32Z",
|
||||
"updated_at": "2022-01-03T14:01:33Z",
|
||||
"pushed_at": "2022-01-01T20:22:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 444659919,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2021-45468, an Imperva WAF bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T05:36:46Z",
|
||||
"updated_at": "2023-06-21T21:03:27Z",
|
||||
"updated_at": "2024-03-29T23:53:10Z",
|
||||
"pushed_at": "2021-12-21T21:03:08Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -48,10 +48,10 @@
|
|||
"description": "[PoC] Privilege escalation & code execution via LFI in PwnDoC ",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-11T15:26:14Z",
|
||||
"updated_at": "2023-02-12T09:53:27Z",
|
||||
"updated_at": "2024-03-29T19:00:28Z",
|
||||
"pushed_at": "2023-02-11T15:30:56Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -66,7 +66,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The exploit targets a critical privilege escalation vulnerability in macOS versions Monterey, Ventura, and Sonoma.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-26T11:01:54Z",
|
||||
"updated_at": "2024-03-29T16:19:38Z",
|
||||
"updated_at": "2024-03-29T18:38:51Z",
|
||||
"pushed_at": "2024-03-26T17:16:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-15T12:03:51Z",
|
||||
"updated_at": "2024-03-28T12:30:31Z",
|
||||
"updated_at": "2024-03-29T21:01:15Z",
|
||||
"pushed_at": "2024-03-16T21:22:27Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -39,7 +39,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-03-29T17:37:37Z",
|
||||
"updated_at": "2024-03-29T21:52:50Z",
|
||||
"pushed_at": "2024-03-29T13:34:43Z",
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 242,
|
||||
"forks": 43,
|
||||
"watchers": 246,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
"description": "PoC for CVE-2023-4911",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-04T14:12:16Z",
|
||||
"updated_at": "2024-03-26T05:11:04Z",
|
||||
"updated_at": "2024-03-29T21:31:45Z",
|
||||
"pushed_at": "2023-10-04T14:16:36Z",
|
||||
"stargazers_count": 374,
|
||||
"watchers_count": 374,
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "This script exploits the CVE-2024-0204 vulnerability in Fortra GoAnywhere MFT, allowing the creation of unauthorized administrative users, for educational and authorized testing purposes.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-24T20:10:34Z",
|
||||
"updated_at": "2024-01-25T19:06:26Z",
|
||||
"updated_at": "2024-03-29T21:32:33Z",
|
||||
"pushed_at": "2024-01-24T20:17:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "LPE exploit for CVE-2024-0582 (io_uring)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T14:45:22Z",
|
||||
"updated_at": "2024-03-29T16:31:36Z",
|
||||
"updated_at": "2024-03-29T23:50:46Z",
|
||||
"pushed_at": "2024-03-29T16:05:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-03-29T18:25:20Z",
|
||||
"updated_at": "2024-03-30T00:28:43Z",
|
||||
"pushed_at": "2024-03-27T09:22:28Z",
|
||||
"stargazers_count": 792,
|
||||
"watchers_count": 792,
|
||||
"stargazers_count": 835,
|
||||
"watchers_count": 835,
|
||||
"has_discussions": false,
|
||||
"forks_count": 85,
|
||||
"forks_count": 88,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 792,
|
||||
"forks": 88,
|
||||
"watchers": 835,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T04:11:06Z",
|
||||
"updated_at": "2024-03-29T17:44:55Z",
|
||||
"updated_at": "2024-03-29T19:46:50Z",
|
||||
"pushed_at": "2024-03-29T04:31:31Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-08T02:31:41Z",
|
||||
"updated_at": "2024-03-12T13:33:25Z",
|
||||
"updated_at": "2024-03-29T20:19:15Z",
|
||||
"pushed_at": "2024-03-12T13:33:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This Python script exploits a vulnerability (CVE-2024-21388) in Microsoft Edge, allowing silent installation of browser extensions with elevated privileges via a private API.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-28T09:31:31Z",
|
||||
"updated_at": "2024-03-28T19:41:43Z",
|
||||
"updated_at": "2024-03-29T20:31:44Z",
|
||||
"pushed_at": "2024-03-28T09:33:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-09T14:31:56Z",
|
||||
"updated_at": "2024-03-24T21:09:52Z",
|
||||
"updated_at": "2024-03-29T23:58:16Z",
|
||||
"pushed_at": "2024-02-09T15:14:03Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"forks": 13,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WallEscape vulnerability in util-linux",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-11T00:15:03Z",
|
||||
"updated_at": "2024-03-29T14:19:04Z",
|
||||
"updated_at": "2024-03-29T20:52:43Z",
|
||||
"pushed_at": "2024-03-12T00:28:14Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 18,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,8 +13,196 @@
|
|||
"description": "Information for CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T17:03:01Z",
|
||||
"updated_at": "2024-03-29T17:06:14Z",
|
||||
"pushed_at": "2024-03-29T18:25:51Z",
|
||||
"updated_at": "2024-03-29T22:51:36Z",
|
||||
"pushed_at": "2024-03-29T22:39:55Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 779430633,
|
||||
"name": "CVE-2024-3094-checker",
|
||||
"full_name": "FabioBaroni\/CVE-2024-3094-checker",
|
||||
"owner": {
|
||||
"login": "FabioBaroni",
|
||||
"id": 2703045,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2703045?v=4",
|
||||
"html_url": "https:\/\/github.com\/FabioBaroni"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FabioBaroni\/CVE-2024-3094-checker",
|
||||
"description": "Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T20:28:17Z",
|
||||
"updated_at": "2024-03-29T20:31:30Z",
|
||||
"pushed_at": "2024-03-29T20:52:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 779437270,
|
||||
"name": "CVE-2024-3094-Vulnerabity-Checker",
|
||||
"full_name": "lypd0\/CVE-2024-3094-Vulnerabity-Checker",
|
||||
"owner": {
|
||||
"login": "lypd0",
|
||||
"id": 146327014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146327014?v=4",
|
||||
"html_url": "https:\/\/github.com\/lypd0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lypd0\/CVE-2024-3094-Vulnerabity-Checker",
|
||||
"description": "Verify that your XZ Utils version is not vulnerable to CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T20:52:27Z",
|
||||
"updated_at": "2024-03-29T23:14:02Z",
|
||||
"pushed_at": "2024-03-29T21:56:17Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"check",
|
||||
"checker",
|
||||
"cve-2024-3094",
|
||||
"exploit",
|
||||
"scanner",
|
||||
"script",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 779449882,
|
||||
"name": "xz_utils-CVE-2024-3094",
|
||||
"full_name": "OpensourceICTSolutions\/xz_utils-CVE-2024-3094",
|
||||
"owner": {
|
||||
"login": "OpensourceICTSolutions",
|
||||
"id": 68592870,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68592870?v=4",
|
||||
"html_url": "https:\/\/github.com\/OpensourceICTSolutions"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/OpensourceICTSolutions\/xz_utils-CVE-2024-3094",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T21:41:42Z",
|
||||
"updated_at": "2024-03-29T21:41:42Z",
|
||||
"pushed_at": "2024-03-29T21:42:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 779473804,
|
||||
"name": "xz_cve-2024-3094_detection",
|
||||
"full_name": "bioless\/xz_cve-2024-3094_detection",
|
||||
"owner": {
|
||||
"login": "bioless",
|
||||
"id": 10271875,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10271875?v=4",
|
||||
"html_url": "https:\/\/github.com\/bioless"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bioless\/xz_cve-2024-3094_detection",
|
||||
"description": "Script to detect CVE-2024-3094.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T23:20:22Z",
|
||||
"updated_at": "2024-03-29T23:23:15Z",
|
||||
"pushed_at": "2024-03-29T23:23:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 779474128,
|
||||
"name": "CVE-2024-3094_xz_check",
|
||||
"full_name": "Hacker-Hermanos\/CVE-2024-3094_xz_check",
|
||||
"owner": {
|
||||
"login": "Hacker-Hermanos",
|
||||
"id": 152432195,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152432195?v=4",
|
||||
"html_url": "https:\/\/github.com\/Hacker-Hermanos"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Hacker-Hermanos\/CVE-2024-3094_xz_check",
|
||||
"description": "This repository contains a Bash script and a one-liner command to verify if a system is running a vulnerable version of the \"xz\" utility, as specified by CVE-2024-3094.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T23:21:44Z",
|
||||
"updated_at": "2024-03-30T00:14:21Z",
|
||||
"pushed_at": "2024-03-30T00:04:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 779476965,
|
||||
"name": "CVE-2024-3094",
|
||||
"full_name": "Fractal-Tess\/CVE-2024-3094",
|
||||
"owner": {
|
||||
"login": "Fractal-Tess",
|
||||
"id": 75957529,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75957529?v=4",
|
||||
"html_url": "https:\/\/github.com\/Fractal-Tess"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Fractal-Tess\/CVE-2024-3094",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T23:36:07Z",
|
||||
"updated_at": "2024-03-29T23:36:13Z",
|
||||
"pushed_at": "2024-03-30T00:28:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -197,6 +197,12 @@
|
|||
|
||||
### CVE-2024-3094
|
||||
- [byinarie/CVE-2024-3094-info](https://github.com/byinarie/CVE-2024-3094-info)
|
||||
- [FabioBaroni/CVE-2024-3094-checker](https://github.com/FabioBaroni/CVE-2024-3094-checker)
|
||||
- [lypd0/CVE-2024-3094-Vulnerabity-Checker](https://github.com/lypd0/CVE-2024-3094-Vulnerabity-Checker)
|
||||
- [OpensourceICTSolutions/xz_utils-CVE-2024-3094](https://github.com/OpensourceICTSolutions/xz_utils-CVE-2024-3094)
|
||||
- [bioless/xz_cve-2024-3094_detection](https://github.com/bioless/xz_cve-2024-3094_detection)
|
||||
- [Hacker-Hermanos/CVE-2024-3094_xz_check](https://github.com/Hacker-Hermanos/CVE-2024-3094_xz_check)
|
||||
- [Fractal-Tess/CVE-2024-3094](https://github.com/Fractal-Tess/CVE-2024-3094)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
@ -20900,7 +20906,7 @@
|
|||
- [jxpsx/CVE-2021-45232-RCE](https://github.com/jxpsx/CVE-2021-45232-RCE)
|
||||
- [wuppp/cve-2021-45232-exp](https://github.com/wuppp/cve-2021-45232-exp)
|
||||
- [dskho/CVE-2021-45232](https://github.com/dskho/CVE-2021-45232)
|
||||
- [itxfahdi/-cve-2021-45232](https://github.com/itxfahdi/-cve-2021-45232)
|
||||
- [xiju2003/-cve-2021-45232](https://github.com/xiju2003/-cve-2021-45232)
|
||||
- [GYLQ/CVE-2021-45232-RCE](https://github.com/GYLQ/CVE-2021-45232-RCE)
|
||||
- [fany0r/CVE-2021-45232-RCE](https://github.com/fany0r/CVE-2021-45232-RCE)
|
||||
- [yggcwhat/Demo](https://github.com/yggcwhat/Demo)
|
||||
|
|
Loading…
Reference in a new issue