mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/07/05 12:29:27
This commit is contained in:
parent
c3943106d1
commit
30ab255686
63 changed files with 547 additions and 248 deletions
|
@ -28,5 +28,35 @@
|
|||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 824318880,
|
||||
"name": "CVE-2024-6387_Check",
|
||||
"full_name": "sardine-web\/CVE-2024-6387_Check",
|
||||
"owner": {
|
||||
"login": "sardine-web",
|
||||
"id": 80635620,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4",
|
||||
"html_url": "https:\/\/github.com\/sardine-web"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387_Check",
|
||||
"description": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-04T21:20:26Z",
|
||||
"updated_at": "2024-07-05T10:10:03Z",
|
||||
"pushed_at": "2024-07-04T21:31:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-07-05T02:05:47Z",
|
||||
"updated_at": "2024-07-05T09:20:53Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1951,
|
||||
"watchers_count": 1951,
|
||||
"stargazers_count": 1952,
|
||||
"watchers_count": 1952,
|
||||
"has_discussions": true,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1951,
|
||||
"watchers": 1952,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -1,19 +1,19 @@
|
|||
[
|
||||
{
|
||||
"id": 325120713,
|
||||
"name": "elasticsearch_CVE-2015-5377",
|
||||
"full_name": "fi3ro\/elasticsearch_CVE-2015-5377",
|
||||
"name": "CVE-2015-5377",
|
||||
"full_name": "fi3ro\/CVE-2015-5377",
|
||||
"owner": {
|
||||
"login": "fi3ro",
|
||||
"id": 33458617,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33458617?v=4",
|
||||
"html_url": "https:\/\/github.com\/fi3ro"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fi3ro\/elasticsearch_CVE-2015-5377",
|
||||
"html_url": "https:\/\/github.com\/fi3ro\/CVE-2015-5377",
|
||||
"description": "Java deserialization exploit for elasticsearch 1.5.2 CVE-2015-5377",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-28T21:30:22Z",
|
||||
"updated_at": "2023-02-21T10:33:33Z",
|
||||
"updated_at": "2024-07-05T12:06:47Z",
|
||||
"pushed_at": "2022-03-30T16:56:10Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-07-05T02:05:47Z",
|
||||
"updated_at": "2024-07-05T09:20:53Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1951,
|
||||
"watchers_count": 1951,
|
||||
"stargazers_count": 1952,
|
||||
"watchers_count": 1952,
|
||||
"has_discussions": true,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1951,
|
||||
"watchers": 1952,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Fork of the send module to deal with CVE-2017-20165",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-11T10:20:27Z",
|
||||
"updated_at": "2024-05-08T06:25:26Z",
|
||||
"pushed_at": "2024-07-05T03:41:00Z",
|
||||
"updated_at": "2024-07-05T10:37:22Z",
|
||||
"pushed_at": "2024-07-05T10:37:24Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-07-05T02:05:47Z",
|
||||
"updated_at": "2024-07-05T09:20:53Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1951,
|
||||
"watchers_count": 1951,
|
||||
"stargazers_count": 1952,
|
||||
"watchers_count": 1952,
|
||||
"has_discussions": true,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1951,
|
||||
"watchers": 1952,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
"storagepathfromurl"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"forks": 21,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -413,10 +413,10 @@
|
|||
"description": " Test For CVE-2017–7921; ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T11:47:35Z",
|
||||
"updated_at": "2024-07-02T17:46:52Z",
|
||||
"updated_at": "2024-07-05T09:30:24Z",
|
||||
"pushed_at": "2024-07-02T12:00:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -425,7 +425,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-01-04T21:44:21Z",
|
||||
"updated_at": "2024-07-04T15:39:26Z",
|
||||
"pushed_at": "2024-07-04T15:39:25Z",
|
||||
"pushed_at": "2024-07-05T08:50:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -557,10 +557,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-07-05T02:05:47Z",
|
||||
"updated_at": "2024-07-05T09:20:53Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1951,
|
||||
"watchers_count": 1951,
|
||||
"stargazers_count": 1952,
|
||||
"watchers_count": 1952,
|
||||
"has_discussions": true,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -590,7 +590,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1951,
|
||||
"watchers": 1952,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -2610,5 +2610,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 824447804,
|
||||
"name": "CVE-2018-6574",
|
||||
"full_name": "athulmur\/CVE-2018-6574",
|
||||
"owner": {
|
||||
"login": "athulmur",
|
||||
"id": 60314086,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60314086?v=4",
|
||||
"html_url": "https:\/\/github.com\/athulmur"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/athulmur\/CVE-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T06:48:11Z",
|
||||
"updated_at": "2024-07-05T11:12:53Z",
|
||||
"pushed_at": "2024-07-05T11:12:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -2902,13 +2902,13 @@
|
|||
"stargazers_count": 234,
|
||||
"watchers_count": 234,
|
||||
"has_discussions": false,
|
||||
"forks_count": 76,
|
||||
"forks_count": 75,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"forks": 75,
|
||||
"watchers": 234,
|
||||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-07-04T06:11:24Z",
|
||||
"updated_at": "2024-07-05T08:29:01Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4059,
|
||||
"watchers_count": 4059,
|
||||
"stargazers_count": 4060,
|
||||
"watchers_count": 4060,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1085,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1085,
|
||||
"watchers": 4059,
|
||||
"watchers": 4060,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"forks": 31,
|
||||
"watchers": 181,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
|
|
|
@ -296,7 +296,7 @@
|
|||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -308,7 +308,7 @@
|
|||
"shitrix"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 9,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-07-05T02:05:47Z",
|
||||
"updated_at": "2024-07-05T09:20:53Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1951,
|
||||
"watchers_count": 1951,
|
||||
"stargazers_count": 1952,
|
||||
"watchers_count": 1952,
|
||||
"has_discussions": true,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1951,
|
||||
"watchers": 1952,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-07-04T06:11:24Z",
|
||||
"updated_at": "2024-07-05T08:29:01Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4059,
|
||||
"watchers_count": 4059,
|
||||
"stargazers_count": 4060,
|
||||
"watchers_count": 4060,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1085,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1085,
|
||||
"watchers": 4059,
|
||||
"watchers": 4060,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-07-05T02:05:47Z",
|
||||
"updated_at": "2024-07-05T09:20:53Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1951,
|
||||
"watchers_count": 1951,
|
||||
"stargazers_count": 1952,
|
||||
"watchers_count": 1952,
|
||||
"has_discussions": true,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1951,
|
||||
"watchers": 1952,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"forks": 19,
|
||||
"watchers": 87,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-29T10:14:32Z",
|
||||
"updated_at": "2024-06-07T11:37:20Z",
|
||||
"updated_at": "2024-07-05T12:08:57Z",
|
||||
"pushed_at": "2022-03-03T17:50:03Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -301,10 +301,10 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2024-07-04T15:39:45Z",
|
||||
"updated_at": "2024-07-05T08:17:00Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 979,
|
||||
"watchers_count": 979,
|
||||
"stargazers_count": 980,
|
||||
"watchers_count": 980,
|
||||
"has_discussions": false,
|
||||
"forks_count": 232,
|
||||
"allow_forking": true,
|
||||
|
@ -313,7 +313,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 232,
|
||||
"watchers": 979,
|
||||
"watchers": 980,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A simple repository helping to test CVE-2021-3572 in PyPA\/pip",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-07T08:36:47Z",
|
||||
"updated_at": "2021-06-07T09:47:13Z",
|
||||
"updated_at": "2024-07-05T12:10:26Z",
|
||||
"pushed_at": "2021-06-07T09:04:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -223,10 +223,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2024-07-03T01:06:30Z",
|
||||
"updated_at": "2024-07-05T07:20:06Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1549,
|
||||
"watchers_count": 1549,
|
||||
"stargazers_count": 1550,
|
||||
"watchers_count": 1550,
|
||||
"has_discussions": false,
|
||||
"forks_count": 481,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 481,
|
||||
"watchers": 1549,
|
||||
"watchers": 1550,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -73,8 +73,8 @@
|
|||
"description": "This exploit offers an in-depth look at the CVE-2021-41091 security vulnerability and provides a step-by-step guide on how to utilize the exploit script to achieve privilege escalation on a host.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-30T10:57:02Z",
|
||||
"updated_at": "2024-06-30T11:00:35Z",
|
||||
"pushed_at": "2024-06-30T11:00:32Z",
|
||||
"updated_at": "2024-07-05T12:00:35Z",
|
||||
"pushed_at": "2024-07-05T12:00:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": " kernel exploit POC for vulnerability i found in amd gpu driver",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-28T21:10:29Z",
|
||||
"updated_at": "2023-08-20T21:42:03Z",
|
||||
"updated_at": "2024-07-05T11:43:09Z",
|
||||
"pushed_at": "2023-01-06T13:04:17Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -201,10 +201,10 @@
|
|||
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T15:11:34Z",
|
||||
"updated_at": "2024-06-19T02:25:28Z",
|
||||
"updated_at": "2024-07-05T07:10:18Z",
|
||||
"pushed_at": "2024-03-28T08:46:27Z",
|
||||
"stargazers_count": 241,
|
||||
"watchers_count": 241,
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -217,7 +217,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 241,
|
||||
"watchers": 240,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -857,10 +857,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2024-07-02T13:03:15Z",
|
||||
"updated_at": "2024-07-05T10:54:39Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 929,
|
||||
"watchers_count": 929,
|
||||
"stargazers_count": 930,
|
||||
"watchers_count": 930,
|
||||
"has_discussions": false,
|
||||
"forks_count": 143,
|
||||
"allow_forking": true,
|
||||
|
@ -889,7 +889,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 143,
|
||||
"watchers": 929,
|
||||
"watchers": 930,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
@ -7073,7 +7073,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-15T21:09:00Z",
|
||||
"updated_at": "2023-06-22T04:46:02Z",
|
||||
"pushed_at": "2024-06-18T17:33:19Z",
|
||||
"pushed_at": "2024-07-05T08:38:23Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -343,10 +343,10 @@
|
|||
"description": "CVE-2022-0847 DirtyPipe Exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T11:49:40Z",
|
||||
"updated_at": "2024-03-25T06:47:30Z",
|
||||
"updated_at": "2024-07-05T10:35:57Z",
|
||||
"pushed_at": "2022-03-08T11:52:22Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -355,7 +355,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 222,
|
||||
"watchers_count": 222,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"forks": 32,
|
||||
"watchers": 222,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 9,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2024-07-03T14:26:07Z",
|
||||
"updated_at": "2024-07-05T08:03:37Z",
|
||||
"pushed_at": "2023-08-02T09:35:14Z",
|
||||
"stargazers_count": 875,
|
||||
"watchers_count": 875,
|
||||
"stargazers_count": 874,
|
||||
"watchers_count": 874,
|
||||
"has_discussions": false,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 875,
|
||||
"watchers": 874,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-0386在ubuntu22.04上的提权",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-05T03:02:13Z",
|
||||
"updated_at": "2024-07-03T06:53:08Z",
|
||||
"updated_at": "2024-07-05T06:53:35Z",
|
||||
"pushed_at": "2023-06-13T08:58:53Z",
|
||||
"stargazers_count": 381,
|
||||
"watchers_count": 381,
|
||||
"stargazers_count": 382,
|
||||
"watchers_count": 382,
|
||||
"has_discussions": false,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 381,
|
||||
"watchers": 382,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC Exploit for VM2 Sandbox Escape Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-10T08:32:26Z",
|
||||
"updated_at": "2024-06-21T17:18:05Z",
|
||||
"updated_at": "2024-07-05T07:32:44Z",
|
||||
"pushed_at": "2023-12-14T20:09:23Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-23T18:33:41Z",
|
||||
"updated_at": "2024-06-29T00:28:11Z",
|
||||
"updated_at": "2024-07-05T07:21:04Z",
|
||||
"pushed_at": "2023-10-26T11:44:46Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2024-07-03T14:44:46Z",
|
||||
"updated_at": "2024-07-05T11:07:33Z",
|
||||
"pushed_at": "2023-11-26T06:46:44Z",
|
||||
"stargazers_count": 778,
|
||||
"watchers_count": 778,
|
||||
"stargazers_count": 779,
|
||||
"watchers_count": 779,
|
||||
"has_discussions": false,
|
||||
"forks_count": 141,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 141,
|
||||
"watchers": 778,
|
||||
"watchers": 779,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2023-45288, continuation flood vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-12T07:36:39Z",
|
||||
"updated_at": "2024-05-21T23:34:40Z",
|
||||
"updated_at": "2024-07-05T12:10:37Z",
|
||||
"pushed_at": "2024-04-16T03:01:52Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-07-04T20:27:27Z",
|
||||
"pushed_at": "2024-07-04T21:22:35Z",
|
||||
"pushed_at": "2024-07-05T12:28:57Z",
|
||||
"stargazers_count": 952,
|
||||
"watchers_count": 952,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Critical use-after-free vulnerability discovered in Tinyproxy",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-07T10:03:01Z",
|
||||
"updated_at": "2024-05-10T08:01:36Z",
|
||||
"updated_at": "2024-07-05T10:39:45Z",
|
||||
"pushed_at": "2024-05-07T10:11:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T09:22:59Z",
|
||||
"updated_at": "2024-07-04T15:28:49Z",
|
||||
"updated_at": "2024-07-05T09:55:36Z",
|
||||
"pushed_at": "2024-06-18T09:35:44Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 34,
|
||||
"forks": 7,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T12:30:53Z",
|
||||
"updated_at": "2024-07-04T18:06:11Z",
|
||||
"updated_at": "2024-07-05T08:07:31Z",
|
||||
"pushed_at": "2024-06-19T12:24:50Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 114,
|
||||
"watchers": 115,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-07-04T15:58:13Z",
|
||||
"updated_at": "2024-07-05T06:43:07Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2170,
|
||||
"watchers_count": 2170,
|
||||
"stargazers_count": 2171,
|
||||
"watchers_count": 2171,
|
||||
"has_discussions": false,
|
||||
"forks_count": 283,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 283,
|
||||
"watchers": 2170,
|
||||
"watchers": 2171,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Private exploit for Cisco Nexus giving RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T23:40:49Z",
|
||||
"updated_at": "2024-07-04T19:30:50Z",
|
||||
"updated_at": "2024-07-05T07:02:37Z",
|
||||
"pushed_at": "2024-07-02T23:47:53Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T15:17:59Z",
|
||||
"updated_at": "2024-07-03T13:36:04Z",
|
||||
"updated_at": "2024-07-05T07:31:52Z",
|
||||
"pushed_at": "2024-02-19T20:00:35Z",
|
||||
"stargazers_count": 645,
|
||||
"watchers_count": 645,
|
||||
"stargazers_count": 646,
|
||||
"watchers_count": 646,
|
||||
"has_discussions": false,
|
||||
"forks_count": 143,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 143,
|
||||
"watchers": 645,
|
||||
"watchers": 646,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-02T02:51:29Z",
|
||||
"updated_at": "2024-06-21T00:12:00Z",
|
||||
"updated_at": "2024-07-05T07:05:37Z",
|
||||
"pushed_at": "2024-02-02T09:49:34Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 15,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,17 +14,17 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-02-28T21:16:10Z",
|
||||
"updated_at": "2024-06-29T01:59:53Z",
|
||||
"pushed_at": "2024-06-14T16:18:32Z",
|
||||
"pushed_at": "2024-07-05T09:37:05Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"forks": 13,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "exploit for ivanti",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-20T19:15:23Z",
|
||||
"updated_at": "2024-06-06T13:41:03Z",
|
||||
"updated_at": "2024-07-05T09:57:14Z",
|
||||
"pushed_at": "2024-01-20T19:20:25Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-03T11:33:40Z",
|
||||
"updated_at": "2024-06-30T20:21:16Z",
|
||||
"updated_at": "2024-07-05T09:57:11Z",
|
||||
"pushed_at": "2024-02-03T11:48:37Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 22,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T17:02:03Z",
|
||||
"updated_at": "2024-07-04T03:05:28Z",
|
||||
"updated_at": "2024-07-05T07:46:49Z",
|
||||
"pushed_at": "2024-07-04T10:39:15Z",
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 266,
|
||||
"forks": 56,
|
||||
"watchers": 267,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
32
2024/CVE-2024-29415.json
Normal file
32
2024/CVE-2024-29415.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 824470499,
|
||||
"name": "node-ip-vex",
|
||||
"full_name": "felipecruz91\/node-ip-vex",
|
||||
"owner": {
|
||||
"login": "felipecruz91",
|
||||
"id": 15997951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15997951?v=4",
|
||||
"html_url": "https:\/\/github.com\/felipecruz91"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/felipecruz91\/node-ip-vex",
|
||||
"description": "Sample project that uses VEX to supress CVE-2024-29415.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T07:50:29Z",
|
||||
"updated_at": "2024-07-05T11:23:09Z",
|
||||
"pushed_at": "2024-07-05T09:49:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -73,19 +73,19 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2024-07-05T06:06:12Z",
|
||||
"updated_at": "2024-07-05T09:30:45Z",
|
||||
"pushed_at": "2024-06-17T08:10:13Z",
|
||||
"stargazers_count": 300,
|
||||
"watchers_count": 300,
|
||||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 300,
|
||||
"forks": 32,
|
||||
"watchers": 303,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A Pwn2Own SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-27T13:47:52Z",
|
||||
"updated_at": "2024-07-04T03:19:11Z",
|
||||
"updated_at": "2024-07-05T06:59:58Z",
|
||||
"pushed_at": "2024-06-29T04:05:12Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 71,
|
||||
"watchers": 72,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "git clone rce CVE-2024-30002",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-03T08:01:39Z",
|
||||
"updated_at": "2024-07-03T08:03:57Z",
|
||||
"pushed_at": "2024-07-03T08:03:53Z",
|
||||
"updated_at": "2024-07-05T07:19:09Z",
|
||||
"pushed_at": "2024-07-05T07:19:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-24T10:37:26Z",
|
||||
"updated_at": "2024-07-04T14:43:46Z",
|
||||
"updated_at": "2024-07-05T06:53:36Z",
|
||||
"pushed_at": "2024-06-24T11:16:26Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 147,
|
||||
"watchers": 148,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -493,10 +493,10 @@
|
|||
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-30T22:07:24Z",
|
||||
"updated_at": "2024-07-03T17:29:45Z",
|
||||
"updated_at": "2024-07-05T10:07:42Z",
|
||||
"pushed_at": "2024-04-02T03:38:32Z",
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -510,7 +510,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 141,
|
||||
"watchers": 142,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -1798,5 +1798,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 824564785,
|
||||
"name": "CVE-2024-3094",
|
||||
"full_name": "DANO-AMP\/CVE-2024-3094",
|
||||
"owner": {
|
||||
"login": "DANO-AMP",
|
||||
"id": 40738457,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40738457?v=4",
|
||||
"html_url": "https:\/\/github.com\/DANO-AMP"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DANO-AMP\/CVE-2024-3094",
|
||||
"description": "SSH EXPLOIT BYPASS AUTH SSH",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T12:02:10Z",
|
||||
"updated_at": "2024-07-05T12:03:26Z",
|
||||
"pushed_at": "2024-07-05T12:03:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -163,10 +163,10 @@
|
|||
"description": "CosmicSting (CVE-2024-34102)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-28T23:33:21Z",
|
||||
"updated_at": "2024-07-05T00:06:40Z",
|
||||
"updated_at": "2024-07-05T12:27:07Z",
|
||||
"pushed_at": "2024-06-28T23:34:43Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -283,8 +283,8 @@
|
|||
"description": "CosmicSting: critical unauthenticated XXE vulnerability in Adobe Commerce and Magento (CVE-2024-34102)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T08:19:28Z",
|
||||
"updated_at": "2024-07-01T09:38:21Z",
|
||||
"pushed_at": "2024-07-01T09:38:18Z",
|
||||
"updated_at": "2024-07-05T09:26:05Z",
|
||||
"pushed_at": "2024-07-05T09:26:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-04T13:19:47Z",
|
||||
"updated_at": "2024-07-05T03:50:32Z",
|
||||
"updated_at": "2024-07-05T10:49:18Z",
|
||||
"pushed_at": "2024-07-04T19:18:04Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T03:02:30Z",
|
||||
"updated_at": "2024-07-05T03:05:43Z",
|
||||
"updated_at": "2024-07-05T10:11:45Z",
|
||||
"pushed_at": "2024-07-05T03:05:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-03T07:26:07Z",
|
||||
"updated_at": "2024-07-05T06:33:01Z",
|
||||
"updated_at": "2024-07-05T09:24:57Z",
|
||||
"pushed_at": "2024-07-04T04:23:40Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 17,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
32
2024/CVE-2024-39210.json
Normal file
32
2024/CVE-2024-39210.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 824474537,
|
||||
"name": "CVE-2024-39210",
|
||||
"full_name": "KRookieSec\/CVE-2024-39210",
|
||||
"owner": {
|
||||
"login": "KRookieSec",
|
||||
"id": 43315052,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43315052?v=4",
|
||||
"html_url": "https:\/\/github.com\/KRookieSec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KRookieSec\/CVE-2024-39210",
|
||||
"description": "Best house rental management system Local file contains vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T08:01:22Z",
|
||||
"updated_at": "2024-07-05T08:02:53Z",
|
||||
"pushed_at": "2024-07-05T08:02:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-39211",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-04T09:24:34Z",
|
||||
"updated_at": "2024-07-04T14:57:39Z",
|
||||
"updated_at": "2024-07-05T10:14:04Z",
|
||||
"pushed_at": "2024-07-04T14:57:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
32
2024/CVE-2024-39943.json
Normal file
32
2024/CVE-2024-39943.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 824447243,
|
||||
"name": "CVE-2024-39943-Poc",
|
||||
"full_name": "truonghuuphuc\/CVE-2024-39943-Poc",
|
||||
"owner": {
|
||||
"login": "truonghuuphuc",
|
||||
"id": 20487674,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
|
||||
"html_url": "https:\/\/github.com\/truonghuuphuc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-39943-Poc",
|
||||
"description": "CVE-2024-39943 rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js).",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T06:46:34Z",
|
||||
"updated_at": "2024-07-05T10:09:51Z",
|
||||
"pushed_at": "2024-07-05T06:51:54Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -358,12 +358,12 @@
|
|||
"description": "CVE-2024-4040 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T05:46:56Z",
|
||||
"updated_at": "2024-07-05T06:01:20Z",
|
||||
"pushed_at": "2024-07-05T05:58:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2024-07-05T11:53:45Z",
|
||||
"pushed_at": "2024-07-05T11:53:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -373,8 +373,8 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -56,10 +56,10 @@
|
|||
"description": "a signal handler race condition in OpenSSH's server (sshd)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T10:55:29Z",
|
||||
"updated_at": "2024-07-05T04:41:12Z",
|
||||
"updated_at": "2024-07-05T09:17:44Z",
|
||||
"pushed_at": "2024-07-01T10:54:02Z",
|
||||
"stargazers_count": 394,
|
||||
"watchers_count": 394,
|
||||
"stargazers_count": 396,
|
||||
"watchers_count": 396,
|
||||
"has_discussions": false,
|
||||
"forks_count": 177,
|
||||
"allow_forking": true,
|
||||
|
@ -68,7 +68,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 177,
|
||||
"watchers": 394,
|
||||
"watchers": 396,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -86,10 +86,10 @@
|
|||
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T12:16:21Z",
|
||||
"updated_at": "2024-07-05T05:05:39Z",
|
||||
"updated_at": "2024-07-05T07:01:45Z",
|
||||
"pushed_at": "2024-07-01T12:25:01Z",
|
||||
"stargazers_count": 358,
|
||||
"watchers_count": 358,
|
||||
"stargazers_count": 359,
|
||||
"watchers_count": 359,
|
||||
"has_discussions": false,
|
||||
"forks_count": 80,
|
||||
"allow_forking": true,
|
||||
|
@ -98,7 +98,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"watchers": 358,
|
||||
"watchers": 359,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -116,10 +116,10 @@
|
|||
"description": "32-bit PoC for CVE-2024-6387 \"regreSSHion\" -- mirror of the original 7etsuo\/cve-2024-6387-poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T12:26:40Z",
|
||||
"updated_at": "2024-07-05T01:48:49Z",
|
||||
"updated_at": "2024-07-05T10:07:39Z",
|
||||
"pushed_at": "2024-07-01T14:16:36Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -303,10 +303,10 @@
|
|||
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T20:33:20Z",
|
||||
"updated_at": "2024-07-05T06:02:16Z",
|
||||
"pushed_at": "2024-07-04T12:29:17Z",
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"updated_at": "2024-07-05T11:48:31Z",
|
||||
"pushed_at": "2024-07-05T11:14:02Z",
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
|
@ -321,7 +321,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 315,
|
||||
"watchers": 321,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -549,10 +549,10 @@
|
|||
"description": "Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote code execution (RCE) with root privileges. This vulnerability, identified as CVE-2024-6387, resides in the OpenSSH server component (sshd), which is designed to listen for connections from client applications.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T02:51:37Z",
|
||||
"updated_at": "2024-07-03T13:32:24Z",
|
||||
"updated_at": "2024-07-05T08:10:08Z",
|
||||
"pushed_at": "2024-07-02T03:23:00Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -561,7 +561,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -759,10 +759,10 @@
|
|||
"description": "This script, created by R4Tw1z, is designed to scan IP addresses to check if they are running a potentially vulnerable version of OpenSSH. The tool leverages multi-threading to optimize scanning performance and handle multiple IP addresses concurrently.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T06:40:09Z",
|
||||
"updated_at": "2024-07-02T09:01:58Z",
|
||||
"updated_at": "2024-07-05T10:15:26Z",
|
||||
"pushed_at": "2024-07-02T09:01:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -771,7 +771,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1500,12 +1500,12 @@
|
|||
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T18:32:46Z",
|
||||
"updated_at": "2024-07-05T01:17:29Z",
|
||||
"updated_at": "2024-07-05T09:35:40Z",
|
||||
"pushed_at": "2024-07-04T08:54:03Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1520,8 +1520,8 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 24,
|
||||
"forks": 12,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -2079,7 +2079,7 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -2095,7 +2095,7 @@
|
|||
"sshd"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -2111,10 +2111,10 @@
|
|||
"html_url": "https:\/\/github.com\/sardine-web"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387_Check",
|
||||
"description": "It Was Discovered That OpenSSH Incorrectly Handled Signal Management. A Remote Attacker Could Use This Issue To Bypass Authentication And Remotely Access Systems WithOut Proper Credentials.",
|
||||
"description": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-04T21:20:26Z",
|
||||
"updated_at": "2024-07-04T21:31:20Z",
|
||||
"updated_at": "2024-07-05T10:10:03Z",
|
||||
"pushed_at": "2024-07-04T21:31:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -2159,5 +2159,95 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 824470736,
|
||||
"name": "CVE-2024-6387-CHECK",
|
||||
"full_name": "Segurmatica\/CVE-2024-6387-CHECK",
|
||||
"owner": {
|
||||
"login": "Segurmatica",
|
||||
"id": 174778299,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174778299?v=4",
|
||||
"html_url": "https:\/\/github.com\/Segurmatica"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Segurmatica\/CVE-2024-6387-CHECK",
|
||||
"description": "CVE-2024-6387-Check es una herramienta ligera y eficiente diseñada para identificar servidores que ejecutan versiones vulnerables de OpenSSH, específicamente el fallo de seguridad conocido como regreSSHion (CVE-2024-6387). Este script facilita el análisis rápido de múltiples direcciones IP, nombres de dominio y rangos de red CIDR.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T07:51:04Z",
|
||||
"updated_at": "2024-07-05T07:51:54Z",
|
||||
"pushed_at": "2024-07-05T07:51:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 824544385,
|
||||
"name": "CVE-2024-6387-template",
|
||||
"full_name": "sardine-web\/CVE-2024-6387-template",
|
||||
"owner": {
|
||||
"login": "sardine-web",
|
||||
"id": 80635620,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4",
|
||||
"html_url": "https:\/\/github.com\/sardine-web"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387-template",
|
||||
"description": "Quick regreSSHion checker (based on software version) for nuclei CVE-2024-6387",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T11:05:26Z",
|
||||
"updated_at": "2024-07-05T11:31:11Z",
|
||||
"pushed_at": "2024-07-05T11:31:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 824549009,
|
||||
"name": "CVE-2024-6387",
|
||||
"full_name": "imv7\/CVE-2024-6387",
|
||||
"owner": {
|
||||
"login": "imv7",
|
||||
"id": 13357603,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13357603?v=4",
|
||||
"html_url": "https:\/\/github.com\/imv7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/imv7\/CVE-2024-6387",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T11:18:38Z",
|
||||
"updated_at": "2024-07-05T11:19:24Z",
|
||||
"pushed_at": "2024-07-05T11:19:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
25
README.md
25
README.md
|
@ -459,6 +459,7 @@
|
|||
- [fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-](https://github.com/fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-)
|
||||
- [neuralinhibitor/xzwhy](https://github.com/neuralinhibitor/xzwhy)
|
||||
- [shefirot/CVE-2024-3094](https://github.com/shefirot/CVE-2024-3094)
|
||||
- [DANO-AMP/CVE-2024-3094](https://github.com/DANO-AMP/CVE-2024-3094)
|
||||
|
||||
### CVE-2024-3116 (2024-04-04)
|
||||
|
||||
|
@ -946,6 +947,9 @@
|
|||
- [4lxprime/regreSSHive](https://github.com/4lxprime/regreSSHive)
|
||||
- [sardine-web/CVE-2024-6387_Check](https://github.com/sardine-web/CVE-2024-6387_Check)
|
||||
- [0x4D31/cve-2024-6387_hassh](https://github.com/0x4D31/cve-2024-6387_hassh)
|
||||
- [Segurmatica/CVE-2024-6387-CHECK](https://github.com/Segurmatica/CVE-2024-6387-CHECK)
|
||||
- [sardine-web/CVE-2024-6387-template](https://github.com/sardine-web/CVE-2024-6387-template)
|
||||
- [imv7/CVE-2024-6387](https://github.com/imv7/CVE-2024-6387)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
@ -2415,6 +2419,13 @@
|
|||
|
||||
- [ally-petitt/CVE-2024-29399](https://github.com/ally-petitt/CVE-2024-29399)
|
||||
|
||||
### CVE-2024-29415 (-)
|
||||
|
||||
<code>The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2023-42282.
|
||||
</code>
|
||||
|
||||
- [felipecruz91/node-ip-vex](https://github.com/felipecruz91/node-ip-vex)
|
||||
|
||||
### CVE-2024-29824 (2024-05-31)
|
||||
|
||||
<code>An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
|
||||
|
@ -3268,6 +3279,9 @@
|
|||
### CVE-2024-39203
|
||||
- [5r1an/CVE-2024-39203](https://github.com/5r1an/CVE-2024-39203)
|
||||
|
||||
### CVE-2024-39210
|
||||
- [KRookieSec/CVE-2024-39210](https://github.com/KRookieSec/CVE-2024-39210)
|
||||
|
||||
### CVE-2024-39211 (2024-07-04)
|
||||
|
||||
<code>Kaiten 57.128.8 allows remote attackers to enumerate user accounts via a crafted POST request, because a login response contains a user_email field only if the user account exists.
|
||||
|
@ -3296,6 +3310,13 @@
|
|||
|
||||
- [ph1ns/CVE-2024-39844](https://github.com/ph1ns/CVE-2024-39844)
|
||||
|
||||
### CVE-2024-39943 (2024-07-04)
|
||||
|
||||
<code>rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js).
|
||||
</code>
|
||||
|
||||
- [truonghuuphuc/CVE-2024-39943-Poc](https://github.com/truonghuuphuc/CVE-2024-39943-Poc)
|
||||
|
||||
### CVE-2024-65230
|
||||
- [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230)
|
||||
|
||||
|
@ -34888,6 +34909,7 @@
|
|||
- [faiqu3/cve-2018-6574](https://github.com/faiqu3/cve-2018-6574)
|
||||
- [Dannners/CVE-2018-6574-go-get-RCE](https://github.com/Dannners/CVE-2018-6574-go-get-RCE)
|
||||
- [bme2003/CVE-2018-6574](https://github.com/bme2003/CVE-2018-6574)
|
||||
- [athulmur/CVE-2018-6574](https://github.com/athulmur/CVE-2018-6574)
|
||||
|
||||
### CVE-2018-6622 (2018-08-17)
|
||||
|
||||
|
@ -41556,7 +41578,7 @@
|
|||
<code>Elasticsearch before 1.6.1 allows remote attackers to execute arbitrary code via unspecified vectors involving the transport protocol. NOTE: ZDI appears to claim that CVE-2015-3253 and CVE-2015-5377 are the same vulnerability
|
||||
</code>
|
||||
|
||||
- [fi3ro/elasticsearch_CVE-2015-5377](https://github.com/fi3ro/elasticsearch_CVE-2015-5377)
|
||||
- [fi3ro/CVE-2015-5377](https://github.com/fi3ro/CVE-2015-5377)
|
||||
|
||||
### CVE-2015-5477 (2015-07-29)
|
||||
|
||||
|
@ -44361,6 +44383,7 @@
|
|||
</code>
|
||||
|
||||
- [bigb0x/CVE-2024-6387](https://github.com/bigb0x/CVE-2024-6387)
|
||||
- [sardine-web/CVE-2024-6387_Check](https://github.com/sardine-web/CVE-2024-6387_Check)
|
||||
|
||||
### CVE-2006-6184 (2006-12-01)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue