mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 17:44:10 +01:00
Auto Update 2024/09/28 00:30:14
This commit is contained in:
parent
6758d79742
commit
3ffb5326a3
23 changed files with 152 additions and 121 deletions
|
@ -447,10 +447,10 @@
|
|||
"description": "Dirty Cow exploit - CVE-2016-5195",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-25T21:08:01Z",
|
||||
"updated_at": "2024-09-26T06:39:13Z",
|
||||
"updated_at": "2024-09-27T20:22:25Z",
|
||||
"pushed_at": "2021-04-08T11:35:12Z",
|
||||
"stargazers_count": 847,
|
||||
"watchers_count": 847,
|
||||
"stargazers_count": 848,
|
||||
"watchers_count": 848,
|
||||
"has_discussions": false,
|
||||
"forks_count": 427,
|
||||
"allow_forking": true,
|
||||
|
@ -463,7 +463,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 427,
|
||||
"watchers": 847,
|
||||
"watchers": 848,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -313,36 +313,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 453222352,
|
||||
"name": "CVE-2018-16763",
|
||||
"full_name": "Luigi31415\/CVE-2018-16763",
|
||||
"owner": {
|
||||
"login": "Luigi31415",
|
||||
"id": 74961214,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74961214?v=4",
|
||||
"html_url": "https:\/\/github.com\/Luigi31415"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Luigi31415\/CVE-2018-16763",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T21:30:27Z",
|
||||
"updated_at": "2022-01-29T10:15:47Z",
|
||||
"pushed_at": "2022-01-29T10:23:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 498394246,
|
||||
"name": "CVE-2018-16763-FuelCMS-1.4.1-RCE",
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-13T19:34:17Z",
|
||||
"updated_at": "2024-09-14T14:59:38Z",
|
||||
"updated_at": "2024-09-27T22:36:33Z",
|
||||
"pushed_at": "2018-05-18T12:26:53Z",
|
||||
"stargazers_count": 409,
|
||||
"watchers_count": 409,
|
||||
"stargazers_count": 410,
|
||||
"watchers_count": 410,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 409,
|
||||
"watchers": 410,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 31,
|
||||
"watchers": 181,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
"subscribers_count": 7
|
||||
},
|
||||
{
|
||||
"id": 427663719,
|
||||
|
|
|
@ -171,6 +171,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 4
|
||||
}
|
||||
]
|
|
@ -550,6 +550,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -77,10 +77,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-30T14:36:58Z",
|
||||
"updated_at": "2024-03-16T16:31:01Z",
|
||||
"updated_at": "2024-09-27T22:36:00Z",
|
||||
"pushed_at": "2023-09-30T14:39:33Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -89,7 +89,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -137,10 +137,10 @@
|
|||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T00:56:36Z",
|
||||
"updated_at": "2024-09-24T15:03:32Z",
|
||||
"updated_at": "2024-09-27T23:51:33Z",
|
||||
"pushed_at": "2023-05-04T19:24:39Z",
|
||||
"stargazers_count": 1049,
|
||||
"watchers_count": 1049,
|
||||
"stargazers_count": 1050,
|
||||
"watchers_count": 1050,
|
||||
"has_discussions": false,
|
||||
"forks_count": 307,
|
||||
"allow_forking": true,
|
||||
|
@ -153,7 +153,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 307,
|
||||
"watchers": 1049,
|
||||
"watchers": 1050,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -223,10 +223,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2024-09-21T07:33:29Z",
|
||||
"updated_at": "2024-09-27T23:24:10Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1576,
|
||||
"watchers_count": 1576,
|
||||
"stargazers_count": 1577,
|
||||
"watchers_count": 1577,
|
||||
"has_discussions": false,
|
||||
"forks_count": 483,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 483,
|
||||
"watchers": 1576,
|
||||
"watchers": 1577,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -1423,10 +1423,10 @@
|
|||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:18:46Z",
|
||||
"updated_at": "2024-09-16T19:54:17Z",
|
||||
"updated_at": "2024-09-27T19:49:38Z",
|
||||
"pushed_at": "2022-04-07T14:47:03Z",
|
||||
"stargazers_count": 854,
|
||||
"watchers_count": 854,
|
||||
"stargazers_count": 852,
|
||||
"watchers_count": 852,
|
||||
"has_discussions": false,
|
||||
"forks_count": 175,
|
||||
"allow_forking": true,
|
||||
|
@ -1448,7 +1448,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 175,
|
||||
"watchers": 854,
|
||||
"watchers": 852,
|
||||
"score": 0,
|
||||
"subscribers_count": 33
|
||||
},
|
||||
|
@ -1966,10 +1966,10 @@
|
|||
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T00:29:03Z",
|
||||
"updated_at": "2024-09-16T19:54:17Z",
|
||||
"updated_at": "2024-09-27T19:44:04Z",
|
||||
"pushed_at": "2022-03-10T18:44:50Z",
|
||||
"stargazers_count": 635,
|
||||
"watchers_count": 635,
|
||||
"stargazers_count": 634,
|
||||
"watchers_count": 634,
|
||||
"has_discussions": false,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
|
@ -1990,7 +1990,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 98,
|
||||
"watchers": 635,
|
||||
"watchers": 634,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
@ -3636,10 +3636,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2024-09-27T17:50:56Z",
|
||||
"updated_at": "2024-09-27T19:49:39Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3399,
|
||||
"watchers_count": 3399,
|
||||
"stargazers_count": 3397,
|
||||
"watchers_count": 3397,
|
||||
"has_discussions": true,
|
||||
"forks_count": 738,
|
||||
"allow_forking": true,
|
||||
|
@ -3648,7 +3648,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 738,
|
||||
"watchers": 3399,
|
||||
"watchers": 3397,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
@ -3666,10 +3666,10 @@
|
|||
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T04:14:18Z",
|
||||
"updated_at": "2024-08-12T20:18:51Z",
|
||||
"updated_at": "2024-09-27T19:49:39Z",
|
||||
"pushed_at": "2022-01-21T11:43:49Z",
|
||||
"stargazers_count": 252,
|
||||
"watchers_count": 252,
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"has_discussions": true,
|
||||
"forks_count": 90,
|
||||
"allow_forking": true,
|
||||
|
@ -3678,7 +3678,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 90,
|
||||
"watchers": 252,
|
||||
"watchers": 251,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -5625,10 +5625,10 @@
|
|||
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T10:04:42Z",
|
||||
"updated_at": "2024-08-14T06:00:31Z",
|
||||
"updated_at": "2024-09-27T19:49:39Z",
|
||||
"pushed_at": "2022-12-27T17:57:19Z",
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"stargazers_count": 434,
|
||||
"watchers_count": 434,
|
||||
"has_discussions": true,
|
||||
"forks_count": 97,
|
||||
"allow_forking": true,
|
||||
|
@ -5646,7 +5646,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 97,
|
||||
"watchers": 435,
|
||||
"watchers": 434,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -1155,10 +1155,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2024-09-24T16:59:11Z",
|
||||
"updated_at": "2024-09-27T23:55:24Z",
|
||||
"pushed_at": "2023-05-20T05:55:45Z",
|
||||
"stargazers_count": 536,
|
||||
"watchers_count": 536,
|
||||
"stargazers_count": 537,
|
||||
"watchers_count": 537,
|
||||
"has_discussions": false,
|
||||
"forks_count": 140,
|
||||
"allow_forking": true,
|
||||
|
@ -1167,7 +1167,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 140,
|
||||
"watchers": 536,
|
||||
"watchers": 537,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -74,7 +74,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-04-17T13:36:34Z",
|
||||
"updated_at": "2024-08-09T00:44:23Z",
|
||||
"pushed_at": "2024-09-05T22:11:39Z",
|
||||
"pushed_at": "2024-09-27T22:37:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-09-16T09:11:21Z",
|
||||
"updated_at": "2024-07-27T09:07:06Z",
|
||||
"pushed_at": "2024-09-05T18:24:50Z",
|
||||
"pushed_at": "2024-09-27T18:32:13Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1494,5 +1494,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 864245047,
|
||||
"name": "CVE-2023-38831-exploit-generator",
|
||||
"full_name": "technicalcorp2\/CVE-2023-38831-exploit-generator",
|
||||
"owner": {
|
||||
"login": "technicalcorp2",
|
||||
"id": 183143582,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/183143582?v=4",
|
||||
"html_url": "https:\/\/github.com\/technicalcorp2"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/technicalcorp2\/CVE-2023-38831-exploit-generator",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-27T19:11:07Z",
|
||||
"updated_at": "2024-09-27T19:14:08Z",
|
||||
"pushed_at": "2024-09-27T19:14:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Proof of Concept Exploit for CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T18:12:38Z",
|
||||
"updated_at": "2024-09-26T23:12:16Z",
|
||||
"updated_at": "2024-09-27T22:49:20Z",
|
||||
"pushed_at": "2024-09-24T18:27:47Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T19:24:55Z",
|
||||
"updated_at": "2024-09-27T15:12:29Z",
|
||||
"updated_at": "2024-09-27T22:33:15Z",
|
||||
"pushed_at": "2024-09-25T21:57:51Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 22,
|
||||
"forks": 11,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pre-Auth Exploit for CVE-2024-40711",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-15T17:25:32Z",
|
||||
"updated_at": "2024-09-24T20:02:08Z",
|
||||
"updated_at": "2024-09-27T22:32:40Z",
|
||||
"pushed_at": "2024-09-15T17:28:41Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2024-45519 unauthenticated OS commoand Injection in Zimbra prior to 8.8.15***.",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-26T01:13:19Z",
|
||||
"updated_at": "2024-09-26T10:52:14Z",
|
||||
"updated_at": "2024-09-27T22:48:58Z",
|
||||
"pushed_at": "2024-09-26T01:34:12Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC scanner for CVE-2024-47176",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-27T01:22:43Z",
|
||||
"updated_at": "2024-09-27T18:02:45Z",
|
||||
"pushed_at": "2024-09-27T18:02:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"updated_at": "2024-09-28T00:03:15Z",
|
||||
"pushed_at": "2024-09-27T20:57:43Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -43,8 +43,38 @@
|
|||
"description": "CUPS Browsd Check_CVE-2024-47176",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-27T18:23:16Z",
|
||||
"updated_at": "2024-09-27T18:29:08Z",
|
||||
"pushed_at": "2024-09-27T18:29:04Z",
|
||||
"updated_at": "2024-09-27T18:43:29Z",
|
||||
"pushed_at": "2024-09-27T18:43:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 864262917,
|
||||
"name": "CVE-2024-47176-Scanner",
|
||||
"full_name": "tonyarris\/CVE-2024-47176-Scanner",
|
||||
"owner": {
|
||||
"login": "tonyarris",
|
||||
"id": 58807068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58807068?v=4",
|
||||
"html_url": "https:\/\/github.com\/tonyarris"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tonyarris\/CVE-2024-47176-Scanner",
|
||||
"description": "Scanner for the CUPS vulnerability CVE-2024-47176",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-27T20:04:21Z",
|
||||
"updated_at": "2024-09-27T20:09:21Z",
|
||||
"pushed_at": "2024-09-27T20:09:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC honeypot for detecting exploit attempts against CVE-2024-47177",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-27T05:18:23Z",
|
||||
"updated_at": "2024-09-27T05:34:09Z",
|
||||
"updated_at": "2024-09-27T21:00:38Z",
|
||||
"pushed_at": "2024-09-27T05:26:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "a signal handler race condition in OpenSSH's server (sshd)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T10:55:29Z",
|
||||
"updated_at": "2024-09-20T18:03:03Z",
|
||||
"updated_at": "2024-09-27T20:37:25Z",
|
||||
"pushed_at": "2024-07-01T10:54:02Z",
|
||||
"stargazers_count": 457,
|
||||
"watchers_count": 457,
|
||||
"stargazers_count": 458,
|
||||
"watchers_count": 458,
|
||||
"has_discussions": false,
|
||||
"forks_count": 181,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 181,
|
||||
"watchers": 457,
|
||||
"watchers": 458,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -260,10 +260,10 @@
|
|||
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T20:33:20Z",
|
||||
"updated_at": "2024-09-27T13:30:07Z",
|
||||
"updated_at": "2024-09-27T19:37:12Z",
|
||||
"pushed_at": "2024-09-24T19:18:56Z",
|
||||
"stargazers_count": 441,
|
||||
"watchers_count": 441,
|
||||
"stargazers_count": 442,
|
||||
"watchers_count": 442,
|
||||
"has_discussions": false,
|
||||
"forks_count": 84,
|
||||
"allow_forking": true,
|
||||
|
@ -278,7 +278,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 84,
|
||||
"watchers": 441,
|
||||
"watchers": 442,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T16:40:49Z",
|
||||
"updated_at": "2024-09-27T17:59:53Z",
|
||||
"pushed_at": "2024-09-27T14:01:04Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"updated_at": "2024-09-27T22:15:57Z",
|
||||
"pushed_at": "2024-09-27T20:59:23Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -5168,6 +5168,7 @@
|
|||
### CVE-2024-47176
|
||||
- [GO0dspeed/spill](https://github.com/GO0dspeed/spill)
|
||||
- [workabhiwin09/CVE-2024-47176](https://github.com/workabhiwin09/CVE-2024-47176)
|
||||
- [tonyarris/CVE-2024-47176-Scanner](https://github.com/tonyarris/CVE-2024-47176-Scanner)
|
||||
|
||||
### CVE-2024-47177
|
||||
- [referefref/cupspot-2024-47177](https://github.com/referefref/cupspot-2024-47177)
|
||||
|
@ -10664,6 +10665,7 @@
|
|||
- [yezzfusl/cve_2023_38831_scanner](https://github.com/yezzfusl/cve_2023_38831_scanner)
|
||||
- [FirFirdaus/CVE-2023-38831](https://github.com/FirFirdaus/CVE-2023-38831)
|
||||
- [ra3edAJ/LAB-DFIR-cve-2023-38831](https://github.com/ra3edAJ/LAB-DFIR-cve-2023-38831)
|
||||
- [technicalcorp2/CVE-2023-38831-exploit-generator](https://github.com/technicalcorp2/CVE-2023-38831-exploit-generator)
|
||||
|
||||
### CVE-2023-38836 (2023-08-21)
|
||||
|
||||
|
@ -38778,7 +38780,6 @@
|
|||
- [wizardy0ga/THM-Vulnerability_Capstone-CVE-2018-16763](https://github.com/wizardy0ga/THM-Vulnerability_Capstone-CVE-2018-16763)
|
||||
- [NyxByt3/CVE-2018-16763](https://github.com/NyxByt3/CVE-2018-16763)
|
||||
- [BrunoPincho/cve-2018-16763-rust](https://github.com/BrunoPincho/cve-2018-16763-rust)
|
||||
- [Luigi31415/CVE-2018-16763](https://github.com/Luigi31415/CVE-2018-16763)
|
||||
- [p0dalirius/CVE-2018-16763-FuelCMS-1.4.1-RCE](https://github.com/p0dalirius/CVE-2018-16763-FuelCMS-1.4.1-RCE)
|
||||
- [not1cyyy/CVE-2018-16763](https://github.com/not1cyyy/CVE-2018-16763)
|
||||
- [antisecc/CVE-2018-16763](https://github.com/antisecc/CVE-2018-16763)
|
||||
|
|
Loading…
Add table
Reference in a new issue