Auto Update 2024/07/05 12:29:27

This commit is contained in:
motikan2010-bot 2024-07-05 21:29:27 +09:00
parent c3943106d1
commit 30ab255686
63 changed files with 547 additions and 248 deletions

View file

@ -28,5 +28,35 @@
"watchers": 19,
"score": 0,
"subscribers_count": 1
},
{
"id": 824318880,
"name": "CVE-2024-6387_Check",
"full_name": "sardine-web\/CVE-2024-6387_Check",
"owner": {
"login": "sardine-web",
"id": 80635620,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4",
"html_url": "https:\/\/github.com\/sardine-web"
},
"html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387_Check",
"description": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
"fork": false,
"created_at": "2024-07-04T21:20:26Z",
"updated_at": "2024-07-05T10:10:03Z",
"pushed_at": "2024-07-04T21:31:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-07-05T02:05:47Z",
"updated_at": "2024-07-05T09:20:53Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1951,
"watchers_count": 1951,
"stargazers_count": 1952,
"watchers_count": 1952,
"has_discussions": true,
"forks_count": 335,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1951,
"watchers": 1952,
"score": 0,
"subscribers_count": 35
},

View file

@ -1,19 +1,19 @@
[
{
"id": 325120713,
"name": "elasticsearch_CVE-2015-5377",
"full_name": "fi3ro\/elasticsearch_CVE-2015-5377",
"name": "CVE-2015-5377",
"full_name": "fi3ro\/CVE-2015-5377",
"owner": {
"login": "fi3ro",
"id": 33458617,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33458617?v=4",
"html_url": "https:\/\/github.com\/fi3ro"
},
"html_url": "https:\/\/github.com\/fi3ro\/elasticsearch_CVE-2015-5377",
"html_url": "https:\/\/github.com\/fi3ro\/CVE-2015-5377",
"description": "Java deserialization exploit for elasticsearch 1.5.2 CVE-2015-5377",
"fork": false,
"created_at": "2020-12-28T21:30:22Z",
"updated_at": "2023-02-21T10:33:33Z",
"updated_at": "2024-07-05T12:06:47Z",
"pushed_at": "2022-03-30T16:56:10Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-07-05T02:05:47Z",
"updated_at": "2024-07-05T09:20:53Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1951,
"watchers_count": 1951,
"stargazers_count": 1952,
"watchers_count": 1952,
"has_discussions": true,
"forks_count": 335,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1951,
"watchers": 1952,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,8 +13,8 @@
"description": "Fork of the send module to deal with CVE-2017-20165",
"fork": false,
"created_at": "2023-01-11T10:20:27Z",
"updated_at": "2024-05-08T06:25:26Z",
"pushed_at": "2024-07-05T03:41:00Z",
"updated_at": "2024-07-05T10:37:22Z",
"pushed_at": "2024-07-05T10:37:24Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-07-05T02:05:47Z",
"updated_at": "2024-07-05T09:20:53Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1951,
"watchers_count": 1951,
"stargazers_count": 1952,
"watchers_count": 1952,
"has_discussions": true,
"forks_count": 335,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1951,
"watchers": 1952,
"score": 0,
"subscribers_count": 35
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 22,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"storagepathfromurl"
],
"visibility": "public",
"forks": 22,
"forks": 21,
"watchers": 18,
"score": 0,
"subscribers_count": 3

View file

@ -413,10 +413,10 @@
"description": " Test For CVE-20177921; ",
"fork": false,
"created_at": "2024-07-02T11:47:35Z",
"updated_at": "2024-07-02T17:46:52Z",
"updated_at": "2024-07-05T09:30:24Z",
"pushed_at": "2024-07-02T12:00:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -425,7 +425,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-07-04T15:39:26Z",
"pushed_at": "2024-07-04T15:39:25Z",
"pushed_at": "2024-07-05T08:50:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -557,10 +557,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-07-05T02:05:47Z",
"updated_at": "2024-07-05T09:20:53Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1951,
"watchers_count": 1951,
"stargazers_count": 1952,
"watchers_count": 1952,
"has_discussions": true,
"forks_count": 335,
"allow_forking": true,
@ -590,7 +590,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1951,
"watchers": 1952,
"score": 0,
"subscribers_count": 35
},

View file

@ -2610,5 +2610,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824447804,
"name": "CVE-2018-6574",
"full_name": "athulmur\/CVE-2018-6574",
"owner": {
"login": "athulmur",
"id": 60314086,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60314086?v=4",
"html_url": "https:\/\/github.com\/athulmur"
},
"html_url": "https:\/\/github.com\/athulmur\/CVE-2018-6574",
"description": null,
"fork": false,
"created_at": "2024-07-05T06:48:11Z",
"updated_at": "2024-07-05T11:12:53Z",
"pushed_at": "2024-07-05T11:12:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -2902,13 +2902,13 @@
"stargazers_count": 234,
"watchers_count": 234,
"has_discussions": false,
"forks_count": 76,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 76,
"forks": 75,
"watchers": 234,
"score": 0,
"subscribers_count": 22

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-07-04T06:11:24Z",
"updated_at": "2024-07-05T08:29:01Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4059,
"watchers_count": 4059,
"stargazers_count": 4060,
"watchers_count": 4060,
"has_discussions": false,
"forks_count": 1085,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1085,
"watchers": 4059,
"watchers": 4060,
"score": 0,
"subscribers_count": 151
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 181,
"watchers_count": 181,
"has_discussions": false,
"forks_count": 30,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"forks": 31,
"watchers": 181,
"score": 0,
"subscribers_count": 6

View file

@ -296,7 +296,7 @@
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 10,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -308,7 +308,7 @@
"shitrix"
],
"visibility": "public",
"forks": 10,
"forks": 9,
"watchers": 35,
"score": 0,
"subscribers_count": 2

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-07-05T02:05:47Z",
"updated_at": "2024-07-05T09:20:53Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1951,
"watchers_count": 1951,
"stargazers_count": 1952,
"watchers_count": 1952,
"has_discussions": true,
"forks_count": 335,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1951,
"watchers": 1952,
"score": 0,
"subscribers_count": 35
}

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-07-04T06:11:24Z",
"updated_at": "2024-07-05T08:29:01Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4059,
"watchers_count": 4059,
"stargazers_count": 4060,
"watchers_count": 4060,
"has_discussions": false,
"forks_count": 1085,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1085,
"watchers": 4059,
"watchers": 4060,
"score": 0,
"subscribers_count": 151
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-07-05T02:05:47Z",
"updated_at": "2024-07-05T09:20:53Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1951,
"watchers_count": 1951,
"stargazers_count": 1952,
"watchers_count": 1952,
"has_discussions": true,
"forks_count": 335,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1951,
"watchers": 1952,
"score": 0,
"subscribers_count": 35
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 20,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 20,
"forks": 19,
"watchers": 87,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
"fork": false,
"created_at": "2022-01-29T10:14:32Z",
"updated_at": "2024-06-07T11:37:20Z",
"updated_at": "2024-07-05T12:08:57Z",
"pushed_at": "2022-03-03T17:50:03Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 99,
"watchers": 100,
"score": 0,
"subscribers_count": 5
}

View file

@ -301,10 +301,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2024-07-04T15:39:45Z",
"updated_at": "2024-07-05T08:17:00Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 979,
"watchers_count": 979,
"stargazers_count": 980,
"watchers_count": 980,
"has_discussions": false,
"forks_count": 232,
"allow_forking": true,
@ -313,7 +313,7 @@
"topics": [],
"visibility": "public",
"forks": 232,
"watchers": 979,
"watchers": 980,
"score": 0,
"subscribers_count": 27
},

View file

@ -13,10 +13,10 @@
"description": "A simple repository helping to test CVE-2021-3572 in PyPA\/pip",
"fork": false,
"created_at": "2021-06-07T08:36:47Z",
"updated_at": "2021-06-07T09:47:13Z",
"updated_at": "2024-07-05T12:10:26Z",
"pushed_at": "2021-06-07T09:04:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-07-03T01:06:30Z",
"updated_at": "2024-07-05T07:20:06Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1549,
"watchers_count": 1549,
"stargazers_count": 1550,
"watchers_count": 1550,
"has_discussions": false,
"forks_count": 481,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 481,
"watchers": 1549,
"watchers": 1550,
"score": 0,
"subscribers_count": 28
},

View file

@ -73,8 +73,8 @@
"description": "This exploit offers an in-depth look at the CVE-2021-41091 security vulnerability and provides a step-by-step guide on how to utilize the exploit script to achieve privilege escalation on a host.",
"fork": false,
"created_at": "2024-06-30T10:57:02Z",
"updated_at": "2024-06-30T11:00:35Z",
"pushed_at": "2024-06-30T11:00:32Z",
"updated_at": "2024-07-05T12:00:35Z",
"pushed_at": "2024-07-05T12:00:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": " kernel exploit POC for vulnerability i found in amd gpu driver",
"fork": false,
"created_at": "2021-10-28T21:10:29Z",
"updated_at": "2023-08-20T21:42:03Z",
"updated_at": "2024-07-05T11:43:09Z",
"pushed_at": "2023-01-06T13:04:17Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 4
}

View file

@ -201,10 +201,10 @@
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
"updated_at": "2024-06-19T02:25:28Z",
"updated_at": "2024-07-05T07:10:18Z",
"pushed_at": "2024-03-28T08:46:27Z",
"stargazers_count": 241,
"watchers_count": 241,
"stargazers_count": 240,
"watchers_count": 240,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -217,7 +217,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 241,
"watchers": 240,
"score": 0,
"subscribers_count": 5
},

View file

@ -857,10 +857,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2024-07-02T13:03:15Z",
"updated_at": "2024-07-05T10:54:39Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 929,
"watchers_count": 929,
"stargazers_count": 930,
"watchers_count": 930,
"has_discussions": false,
"forks_count": 143,
"allow_forking": true,
@ -889,7 +889,7 @@
],
"visibility": "public",
"forks": 143,
"watchers": 929,
"watchers": 930,
"score": 0,
"subscribers_count": 25
},
@ -7073,7 +7073,7 @@
"fork": false,
"created_at": "2021-12-15T21:09:00Z",
"updated_at": "2023-06-22T04:46:02Z",
"pushed_at": "2024-06-18T17:33:19Z",
"pushed_at": "2024-07-05T08:38:23Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -343,10 +343,10 @@
"description": "CVE-2022-0847 DirtyPipe Exploit.",
"fork": false,
"created_at": "2022-03-08T11:49:40Z",
"updated_at": "2024-03-25T06:47:30Z",
"updated_at": "2024-07-05T10:35:57Z",
"pushed_at": "2022-03-08T11:52:22Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 3
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 222,
"watchers_count": 222,
"has_discussions": false,
"forks_count": 31,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 31,
"forks": 32,
"watchers": 222,
"score": 0,
"subscribers_count": 7

View file

@ -18,13 +18,13 @@
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 11,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 9,
"watchers": 28,
"score": 0,
"subscribers_count": 1

View file

@ -103,10 +103,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2024-07-03T14:26:07Z",
"updated_at": "2024-07-05T08:03:37Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 875,
"watchers_count": 875,
"stargazers_count": 874,
"watchers_count": 874,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 875,
"watchers": 874,
"score": 0,
"subscribers_count": 25
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-0386在ubuntu22.04上的提权",
"fork": false,
"created_at": "2023-05-05T03:02:13Z",
"updated_at": "2024-07-03T06:53:08Z",
"updated_at": "2024-07-05T06:53:35Z",
"pushed_at": "2023-06-13T08:58:53Z",
"stargazers_count": 381,
"watchers_count": 381,
"stargazers_count": 382,
"watchers_count": 382,
"has_discussions": false,
"forks_count": 65,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 65,
"watchers": 381,
"watchers": 382,
"score": 0,
"subscribers_count": 4
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 43,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "PoC Exploit for VM2 Sandbox Escape Vulnerability",
"fork": false,
"created_at": "2023-12-10T08:32:26Z",
"updated_at": "2024-06-21T17:18:05Z",
"updated_at": "2024-07-05T07:32:44Z",
"pushed_at": "2023-12-14T20:09:23Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 1
},

View file

@ -103,10 +103,10 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-10-23T18:33:41Z",
"updated_at": "2024-06-29T00:28:11Z",
"updated_at": "2024-07-05T07:21:04Z",
"pushed_at": "2023-10-26T11:44:46Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 104,
"watchers": 105,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2024-07-03T14:44:46Z",
"updated_at": "2024-07-05T11:07:33Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 778,
"watchers_count": 778,
"stargazers_count": 779,
"watchers_count": 779,
"has_discussions": false,
"forks_count": 141,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 141,
"watchers": 778,
"watchers": 779,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2023-45288, continuation flood vulnerability",
"fork": false,
"created_at": "2024-04-12T07:36:39Z",
"updated_at": "2024-05-21T23:34:40Z",
"updated_at": "2024-07-05T12:10:37Z",
"pushed_at": "2024-04-16T03:01:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-07-04T20:27:27Z",
"pushed_at": "2024-07-04T21:22:35Z",
"pushed_at": "2024-07-05T12:28:57Z",
"stargazers_count": 952,
"watchers_count": 952,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Critical use-after-free vulnerability discovered in Tinyproxy",
"fork": false,
"created_at": "2024-05-07T10:03:01Z",
"updated_at": "2024-05-10T08:01:36Z",
"updated_at": "2024-07-05T10:39:45Z",
"pushed_at": "2024-05-07T10:11:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,19 +13,19 @@
"description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
"fork": false,
"created_at": "2024-06-18T09:22:59Z",
"updated_at": "2024-07-04T15:28:49Z",
"updated_at": "2024-07-05T09:55:36Z",
"pushed_at": "2024-06-18T09:35:44Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 34,
"forks": 7,
"watchers": 35,
"score": 0,
"subscribers_count": 2
},
@ -43,10 +43,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-07-04T18:06:11Z",
"updated_at": "2024-07-05T08:07:31Z",
"pushed_at": "2024-06-19T12:24:50Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 114,
"watchers": 115,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-07-04T15:58:13Z",
"updated_at": "2024-07-05T06:43:07Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2170,
"watchers_count": 2170,
"stargazers_count": 2171,
"watchers_count": 2171,
"has_discussions": false,
"forks_count": 283,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 283,
"watchers": 2170,
"watchers": 2171,
"score": 0,
"subscribers_count": 23
},

View file

@ -13,7 +13,7 @@
"description": "Private exploit for Cisco Nexus giving RCE",
"fork": false,
"created_at": "2024-07-02T23:40:49Z",
"updated_at": "2024-07-04T19:30:50Z",
"updated_at": "2024-07-05T07:02:37Z",
"pushed_at": "2024-07-02T23:47:53Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-07-03T13:36:04Z",
"updated_at": "2024-07-05T07:31:52Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 645,
"watchers_count": 645,
"stargazers_count": 646,
"watchers_count": 646,
"has_discussions": false,
"forks_count": 143,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 143,
"watchers": 645,
"watchers": 646,
"score": 0,
"subscribers_count": 9
},

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2024-02-02T02:51:29Z",
"updated_at": "2024-06-21T00:12:00Z",
"updated_at": "2024-07-05T07:05:37Z",
"pushed_at": "2024-02-02T09:49:34Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,17 +14,17 @@
"fork": false,
"created_at": "2024-02-28T21:16:10Z",
"updated_at": "2024-06-29T01:59:53Z",
"pushed_at": "2024-06-14T16:18:32Z",
"pushed_at": "2024-07-05T09:37:05Z",
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 91,
"score": 0,
"subscribers_count": 6

View file

@ -193,10 +193,10 @@
"description": "exploit for ivanti",
"fork": false,
"created_at": "2024-01-20T19:15:23Z",
"updated_at": "2024-06-06T13:41:03Z",
"updated_at": "2024-07-05T09:57:14Z",
"pushed_at": "2024-01-20T19:20:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit",
"fork": false,
"created_at": "2024-02-03T11:33:40Z",
"updated_at": "2024-06-30T20:21:16Z",
"updated_at": "2024-07-05T09:57:11Z",
"pushed_at": "2024-02-03T11:48:37Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 22,
"watchers": 21,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,19 +13,19 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-07-04T03:05:28Z",
"updated_at": "2024-07-05T07:46:49Z",
"pushed_at": "2024-07-04T10:39:15Z",
"stargazers_count": 266,
"watchers_count": 266,
"stargazers_count": 267,
"watchers_count": 267,
"has_discussions": false,
"forks_count": 55,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 266,
"forks": 56,
"watchers": 267,
"score": 0,
"subscribers_count": 3
},

32
2024/CVE-2024-29415.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 824470499,
"name": "node-ip-vex",
"full_name": "felipecruz91\/node-ip-vex",
"owner": {
"login": "felipecruz91",
"id": 15997951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15997951?v=4",
"html_url": "https:\/\/github.com\/felipecruz91"
},
"html_url": "https:\/\/github.com\/felipecruz91\/node-ip-vex",
"description": "Sample project that uses VEX to supress CVE-2024-29415.",
"fork": false,
"created_at": "2024-07-05T07:50:29Z",
"updated_at": "2024-07-05T11:23:09Z",
"pushed_at": "2024-07-05T09:49:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -73,19 +73,19 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-07-05T06:06:12Z",
"updated_at": "2024-07-05T09:30:45Z",
"pushed_at": "2024-06-17T08:10:13Z",
"stargazers_count": 300,
"watchers_count": 300,
"stargazers_count": 303,
"watchers_count": 303,
"has_discussions": false,
"forks_count": 31,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 300,
"forks": 32,
"watchers": 303,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": "A Pwn2Own SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE",
"fork": false,
"created_at": "2024-06-27T13:47:52Z",
"updated_at": "2024-07-04T03:19:11Z",
"updated_at": "2024-07-05T06:59:58Z",
"pushed_at": "2024-06-29T04:05:12Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 71,
"watchers": 72,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,8 +13,8 @@
"description": "git clone rce CVE-2024-30002",
"fork": false,
"created_at": "2024-07-03T08:01:39Z",
"updated_at": "2024-07-03T08:03:57Z",
"pushed_at": "2024-07-03T08:03:53Z",
"updated_at": "2024-07-05T07:19:09Z",
"pushed_at": "2024-07-05T07:19:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-24T10:37:26Z",
"updated_at": "2024-07-04T14:43:46Z",
"updated_at": "2024-07-05T06:53:36Z",
"pushed_at": "2024-06-24T11:16:26Z",
"stargazers_count": 147,
"watchers_count": 147,
"stargazers_count": 148,
"watchers_count": 148,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 147,
"watchers": 148,
"score": 0,
"subscribers_count": 1
},

View file

@ -493,10 +493,10 @@
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
"fork": false,
"created_at": "2024-03-30T22:07:24Z",
"updated_at": "2024-07-03T17:29:45Z",
"updated_at": "2024-07-05T10:07:42Z",
"pushed_at": "2024-04-02T03:38:32Z",
"stargazers_count": 141,
"watchers_count": 141,
"stargazers_count": 142,
"watchers_count": 142,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -510,7 +510,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 141,
"watchers": 142,
"score": 0,
"subscribers_count": 8
},
@ -1798,5 +1798,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824564785,
"name": "CVE-2024-3094",
"full_name": "DANO-AMP\/CVE-2024-3094",
"owner": {
"login": "DANO-AMP",
"id": 40738457,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40738457?v=4",
"html_url": "https:\/\/github.com\/DANO-AMP"
},
"html_url": "https:\/\/github.com\/DANO-AMP\/CVE-2024-3094",
"description": "SSH EXPLOIT BYPASS AUTH SSH",
"fork": false,
"created_at": "2024-07-05T12:02:10Z",
"updated_at": "2024-07-05T12:03:26Z",
"pushed_at": "2024-07-05T12:03:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -163,10 +163,10 @@
"description": "CosmicSting (CVE-2024-34102)",
"fork": false,
"created_at": "2024-06-28T23:33:21Z",
"updated_at": "2024-07-05T00:06:40Z",
"updated_at": "2024-07-05T12:27:07Z",
"pushed_at": "2024-06-28T23:34:43Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 11,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},
@ -283,8 +283,8 @@
"description": "CosmicSting: critical unauthenticated XXE vulnerability in Adobe Commerce and Magento (CVE-2024-34102)",
"fork": false,
"created_at": "2024-07-01T08:19:28Z",
"updated_at": "2024-07-01T09:38:21Z",
"pushed_at": "2024-07-01T09:38:18Z",
"updated_at": "2024-07-05T09:26:05Z",
"pushed_at": "2024-07-05T09:26:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.",
"fork": false,
"created_at": "2024-07-04T13:19:47Z",
"updated_at": "2024-07-05T03:50:32Z",
"updated_at": "2024-07-05T10:49:18Z",
"pushed_at": "2024-07-04T19:18:04Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
@ -43,10 +43,10 @@
"description": "POC",
"fork": false,
"created_at": "2024-07-05T03:02:30Z",
"updated_at": "2024-07-05T03:05:43Z",
"updated_at": "2024-07-05T10:11:45Z",
"pushed_at": "2024-07-05T03:05:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-07-03T07:26:07Z",
"updated_at": "2024-07-05T06:33:01Z",
"updated_at": "2024-07-05T09:24:57Z",
"pushed_at": "2024-07-04T04:23:40Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 17,
"watchers": 20,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-39210.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 824474537,
"name": "CVE-2024-39210",
"full_name": "KRookieSec\/CVE-2024-39210",
"owner": {
"login": "KRookieSec",
"id": 43315052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43315052?v=4",
"html_url": "https:\/\/github.com\/KRookieSec"
},
"html_url": "https:\/\/github.com\/KRookieSec\/CVE-2024-39210",
"description": "Best house rental management system Local file contains vulnerability ",
"fork": false,
"created_at": "2024-07-05T08:01:22Z",
"updated_at": "2024-07-05T08:02:53Z",
"pushed_at": "2024-07-05T08:02:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-39211",
"fork": false,
"created_at": "2024-07-04T09:24:34Z",
"updated_at": "2024-07-04T14:57:39Z",
"updated_at": "2024-07-05T10:14:04Z",
"pushed_at": "2024-07-04T14:57:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-39943.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 824447243,
"name": "CVE-2024-39943-Poc",
"full_name": "truonghuuphuc\/CVE-2024-39943-Poc",
"owner": {
"login": "truonghuuphuc",
"id": 20487674,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4",
"html_url": "https:\/\/github.com\/truonghuuphuc"
},
"html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-39943-Poc",
"description": "CVE-2024-39943 rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js).",
"fork": false,
"created_at": "2024-07-05T06:46:34Z",
"updated_at": "2024-07-05T10:09:51Z",
"pushed_at": "2024-07-05T06:51:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -358,12 +358,12 @@
"description": "CVE-2024-4040 PoC",
"fork": false,
"created_at": "2024-07-05T05:46:56Z",
"updated_at": "2024-07-05T06:01:20Z",
"pushed_at": "2024-07-05T05:58:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-07-05T11:53:45Z",
"pushed_at": "2024-07-05T11:53:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -373,8 +373,8 @@
"exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -56,10 +56,10 @@
"description": "a signal handler race condition in OpenSSH's server (sshd)",
"fork": false,
"created_at": "2024-07-01T10:55:29Z",
"updated_at": "2024-07-05T04:41:12Z",
"updated_at": "2024-07-05T09:17:44Z",
"pushed_at": "2024-07-01T10:54:02Z",
"stargazers_count": 394,
"watchers_count": 394,
"stargazers_count": 396,
"watchers_count": 396,
"has_discussions": false,
"forks_count": 177,
"allow_forking": true,
@ -68,7 +68,7 @@
"topics": [],
"visibility": "public",
"forks": 177,
"watchers": 394,
"watchers": 396,
"score": 0,
"subscribers_count": 5
},
@ -86,10 +86,10 @@
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:16:21Z",
"updated_at": "2024-07-05T05:05:39Z",
"updated_at": "2024-07-05T07:01:45Z",
"pushed_at": "2024-07-01T12:25:01Z",
"stargazers_count": 358,
"watchers_count": 358,
"stargazers_count": 359,
"watchers_count": 359,
"has_discussions": false,
"forks_count": 80,
"allow_forking": true,
@ -98,7 +98,7 @@
"topics": [],
"visibility": "public",
"forks": 80,
"watchers": 358,
"watchers": 359,
"score": 0,
"subscribers_count": 6
},
@ -116,10 +116,10 @@
"description": "32-bit PoC for CVE-2024-6387 \"regreSSHion\" -- mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:26:40Z",
"updated_at": "2024-07-05T01:48:49Z",
"updated_at": "2024-07-05T10:07:39Z",
"pushed_at": "2024-07-01T14:16:36Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 83,
"watchers": 84,
"score": 0,
"subscribers_count": 3
},
@ -303,10 +303,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-07-05T06:02:16Z",
"pushed_at": "2024-07-04T12:29:17Z",
"stargazers_count": 315,
"watchers_count": 315,
"updated_at": "2024-07-05T11:48:31Z",
"pushed_at": "2024-07-05T11:14:02Z",
"stargazers_count": 321,
"watchers_count": 321,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -321,7 +321,7 @@
],
"visibility": "public",
"forks": 66,
"watchers": 315,
"watchers": 321,
"score": 0,
"subscribers_count": 3
},
@ -549,10 +549,10 @@
"description": "Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote code execution (RCE) with root privileges. This vulnerability, identified as CVE-2024-6387, resides in the OpenSSH server component (sshd), which is designed to listen for connections from client applications.",
"fork": false,
"created_at": "2024-07-02T02:51:37Z",
"updated_at": "2024-07-03T13:32:24Z",
"updated_at": "2024-07-05T08:10:08Z",
"pushed_at": "2024-07-02T03:23:00Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -561,7 +561,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},
@ -759,10 +759,10 @@
"description": "This script, created by R4Tw1z, is designed to scan IP addresses to check if they are running a potentially vulnerable version of OpenSSH. The tool leverages multi-threading to optimize scanning performance and handle multiple IP addresses concurrently.",
"fork": false,
"created_at": "2024-07-02T06:40:09Z",
"updated_at": "2024-07-02T09:01:58Z",
"updated_at": "2024-07-05T10:15:26Z",
"pushed_at": "2024-07-02T09:01:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -771,7 +771,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -1500,12 +1500,12 @@
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) ",
"fork": false,
"created_at": "2024-07-02T18:32:46Z",
"updated_at": "2024-07-05T01:17:29Z",
"updated_at": "2024-07-05T09:35:40Z",
"pushed_at": "2024-07-04T08:54:03Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1520,8 +1520,8 @@
"rce"
],
"visibility": "public",
"forks": 11,
"watchers": 24,
"forks": 12,
"watchers": 27,
"score": 0,
"subscribers_count": 1
},
@ -2079,7 +2079,7 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -2095,7 +2095,7 @@
"sshd"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@ -2111,10 +2111,10 @@
"html_url": "https:\/\/github.com\/sardine-web"
},
"html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387_Check",
"description": "It Was Discovered That OpenSSH Incorrectly Handled Signal Management. A Remote Attacker Could Use This Issue To Bypass Authentication And Remotely Access Systems WithOut Proper Credentials.",
"description": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
"fork": false,
"created_at": "2024-07-04T21:20:26Z",
"updated_at": "2024-07-04T21:31:20Z",
"updated_at": "2024-07-05T10:10:03Z",
"pushed_at": "2024-07-04T21:31:17Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -2159,5 +2159,95 @@
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 824470736,
"name": "CVE-2024-6387-CHECK",
"full_name": "Segurmatica\/CVE-2024-6387-CHECK",
"owner": {
"login": "Segurmatica",
"id": 174778299,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174778299?v=4",
"html_url": "https:\/\/github.com\/Segurmatica"
},
"html_url": "https:\/\/github.com\/Segurmatica\/CVE-2024-6387-CHECK",
"description": "CVE-2024-6387-Check es una herramienta ligera y eficiente diseñada para identificar servidores que ejecutan versiones vulnerables de OpenSSH, específicamente el fallo de seguridad conocido como regreSSHion (CVE-2024-6387). Este script facilita el análisis rápido de múltiples direcciones IP, nombres de dominio y rangos de red CIDR.",
"fork": false,
"created_at": "2024-07-05T07:51:04Z",
"updated_at": "2024-07-05T07:51:54Z",
"pushed_at": "2024-07-05T07:51:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 824544385,
"name": "CVE-2024-6387-template",
"full_name": "sardine-web\/CVE-2024-6387-template",
"owner": {
"login": "sardine-web",
"id": 80635620,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4",
"html_url": "https:\/\/github.com\/sardine-web"
},
"html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387-template",
"description": "Quick regreSSHion checker (based on software version) for nuclei CVE-2024-6387",
"fork": false,
"created_at": "2024-07-05T11:05:26Z",
"updated_at": "2024-07-05T11:31:11Z",
"pushed_at": "2024-07-05T11:31:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 824549009,
"name": "CVE-2024-6387",
"full_name": "imv7\/CVE-2024-6387",
"owner": {
"login": "imv7",
"id": 13357603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13357603?v=4",
"html_url": "https:\/\/github.com\/imv7"
},
"html_url": "https:\/\/github.com\/imv7\/CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-07-05T11:18:38Z",
"updated_at": "2024-07-05T11:19:24Z",
"pushed_at": "2024-07-05T11:19:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -459,6 +459,7 @@
- [fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-](https://github.com/fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-)
- [neuralinhibitor/xzwhy](https://github.com/neuralinhibitor/xzwhy)
- [shefirot/CVE-2024-3094](https://github.com/shefirot/CVE-2024-3094)
- [DANO-AMP/CVE-2024-3094](https://github.com/DANO-AMP/CVE-2024-3094)
### CVE-2024-3116 (2024-04-04)
@ -946,6 +947,9 @@
- [4lxprime/regreSSHive](https://github.com/4lxprime/regreSSHive)
- [sardine-web/CVE-2024-6387_Check](https://github.com/sardine-web/CVE-2024-6387_Check)
- [0x4D31/cve-2024-6387_hassh](https://github.com/0x4D31/cve-2024-6387_hassh)
- [Segurmatica/CVE-2024-6387-CHECK](https://github.com/Segurmatica/CVE-2024-6387-CHECK)
- [sardine-web/CVE-2024-6387-template](https://github.com/sardine-web/CVE-2024-6387-template)
- [imv7/CVE-2024-6387](https://github.com/imv7/CVE-2024-6387)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -2415,6 +2419,13 @@
- [ally-petitt/CVE-2024-29399](https://github.com/ally-petitt/CVE-2024-29399)
### CVE-2024-29415 (-)
<code>The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2023-42282.
</code>
- [felipecruz91/node-ip-vex](https://github.com/felipecruz91/node-ip-vex)
### CVE-2024-29824 (2024-05-31)
<code>An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
@ -3268,6 +3279,9 @@
### CVE-2024-39203
- [5r1an/CVE-2024-39203](https://github.com/5r1an/CVE-2024-39203)
### CVE-2024-39210
- [KRookieSec/CVE-2024-39210](https://github.com/KRookieSec/CVE-2024-39210)
### CVE-2024-39211 (2024-07-04)
<code>Kaiten 57.128.8 allows remote attackers to enumerate user accounts via a crafted POST request, because a login response contains a user_email field only if the user account exists.
@ -3296,6 +3310,13 @@
- [ph1ns/CVE-2024-39844](https://github.com/ph1ns/CVE-2024-39844)
### CVE-2024-39943 (2024-07-04)
<code>rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js).
</code>
- [truonghuuphuc/CVE-2024-39943-Poc](https://github.com/truonghuuphuc/CVE-2024-39943-Poc)
### CVE-2024-65230
- [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230)
@ -34888,6 +34909,7 @@
- [faiqu3/cve-2018-6574](https://github.com/faiqu3/cve-2018-6574)
- [Dannners/CVE-2018-6574-go-get-RCE](https://github.com/Dannners/CVE-2018-6574-go-get-RCE)
- [bme2003/CVE-2018-6574](https://github.com/bme2003/CVE-2018-6574)
- [athulmur/CVE-2018-6574](https://github.com/athulmur/CVE-2018-6574)
### CVE-2018-6622 (2018-08-17)
@ -41556,7 +41578,7 @@
<code>Elasticsearch before 1.6.1 allows remote attackers to execute arbitrary code via unspecified vectors involving the transport protocol. NOTE: ZDI appears to claim that CVE-2015-3253 and CVE-2015-5377 are the same vulnerability
</code>
- [fi3ro/elasticsearch_CVE-2015-5377](https://github.com/fi3ro/elasticsearch_CVE-2015-5377)
- [fi3ro/CVE-2015-5377](https://github.com/fi3ro/CVE-2015-5377)
### CVE-2015-5477 (2015-07-29)
@ -44361,6 +44383,7 @@
</code>
- [bigb0x/CVE-2024-6387](https://github.com/bigb0x/CVE-2024-6387)
- [sardine-web/CVE-2024-6387_Check](https://github.com/sardine-web/CVE-2024-6387_Check)
### CVE-2006-6184 (2006-12-01)