Auto Update 2024/07/09 12:29:56

This commit is contained in:
motikan2010-bot 2024-07-09 21:29:57 +09:00
parent 88212b6378
commit 4e291014c2
60 changed files with 453 additions and 247 deletions

View file

@ -291,10 +291,10 @@
"description": "my own script in python to exploit vulnerable (It based on TryHackMe Intro PoC Scripting room) ",
"fork": false,
"created_at": "2024-02-10T14:58:11Z",
"updated_at": "2024-03-19T05:28:15Z",
"updated_at": "2024-07-09T11:22:49Z",
"pushed_at": "2024-02-10T14:58:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -303,7 +303,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-07-09T01:01:57Z",
"updated_at": "2024-07-09T11:27:18Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1954,
"watchers_count": 1954,
"stargazers_count": 1955,
"watchers_count": 1955,
"has_discussions": true,
"forks_count": 335,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1954,
"watchers": 1955,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "Gain privileges:system -> root,as a part of https:\/\/github.com\/retme7\/CVE-2014-7911_poc",
"fork": false,
"created_at": "2015-01-26T07:02:26Z",
"updated_at": "2024-01-16T10:46:53Z",
"updated_at": "2024-07-09T08:07:47Z",
"pushed_at": "2015-01-27T09:23:52Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 12
},

View file

@ -13,10 +13,10 @@
"description": "Local root exploit for Nexus5 Android 4.4.4(KTU84P)",
"fork": false,
"created_at": "2015-01-26T06:33:52Z",
"updated_at": "2023-09-27T08:04:55Z",
"updated_at": "2024-07-09T08:07:38Z",
"pushed_at": "2015-01-27T09:43:42Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 145,
"watchers_count": 145,
"has_discussions": false,
"forks_count": 87,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 87,
"watchers": 144,
"watchers": 145,
"score": 0,
"subscribers_count": 15
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-07-09T01:01:57Z",
"updated_at": "2024-07-09T11:27:18Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1954,
"watchers_count": 1954,
"stargazers_count": 1955,
"watchers_count": 1955,
"has_discussions": true,
"forks_count": 335,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1954,
"watchers": 1955,
"score": 0,
"subscribers_count": 35
},

View file

@ -1150,13 +1150,13 @@
"stargazers_count": 271,
"watchers_count": 271,
"has_discussions": false,
"forks_count": 77,
"forks_count": 76,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 77,
"forks": 76,
"watchers": 271,
"score": 0,
"subscribers_count": 4

32
2017/CVE-2017-15099.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 826257213,
"name": "CVE-2017-15099",
"full_name": "ToontjeM\/CVE-2017-15099",
"owner": {
"login": "ToontjeM",
"id": 98271783,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98271783?v=4",
"html_url": "https:\/\/github.com\/ToontjeM"
},
"html_url": "https:\/\/github.com\/ToontjeM\/CVE-2017-15099",
"description": null,
"fork": false,
"created_at": "2024-07-09T11:07:50Z",
"updated_at": "2024-07-09T11:07:54Z",
"pushed_at": "2024-07-09T11:07:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "Fork of the send module to deal with CVE-2017-20165",
"fork": false,
"created_at": "2023-01-11T10:20:27Z",
"updated_at": "2024-07-05T10:37:22Z",
"pushed_at": "2024-07-08T16:17:07Z",
"updated_at": "2024-07-09T09:45:34Z",
"pushed_at": "2024-07-09T10:19:17Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-07-09T01:01:57Z",
"updated_at": "2024-07-09T11:27:18Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1954,
"watchers_count": 1954,
"stargazers_count": 1955,
"watchers_count": 1955,
"has_discussions": true,
"forks_count": 335,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1954,
"watchers": 1955,
"score": 0,
"subscribers_count": 35
},

View file

@ -383,10 +383,10 @@
"description": null,
"fork": false,
"created_at": "2024-02-02T03:27:31Z",
"updated_at": "2024-02-02T05:04:19Z",
"updated_at": "2024-07-09T08:34:42Z",
"pushed_at": "2024-02-07T10:01:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -395,7 +395,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -260,10 +260,10 @@
"description": "Fortinet FortiOS路径遍历漏洞 CVE-2018-13379批量检测脚本",
"fork": false,
"created_at": "2020-12-14T12:17:03Z",
"updated_at": "2022-04-13T09:25:18Z",
"updated_at": "2024-07-09T07:29:26Z",
"pushed_at": "2020-12-14T12:20:00Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -272,7 +272,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -90,17 +90,17 @@
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2024-06-30T06:54:44Z",
"pushed_at": "2021-11-08T02:19:03Z",
"pushed_at": "2024-07-09T09:01:46Z",
"stargazers_count": 516,
"watchers_count": 516,
"has_discussions": false,
"forks_count": 183,
"forks_count": 184,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 183,
"forks": 184,
"watchers": 516,
"score": 0,
"subscribers_count": 21

View file

@ -557,10 +557,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-07-09T01:01:57Z",
"updated_at": "2024-07-09T11:27:18Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1954,
"watchers_count": 1954,
"stargazers_count": 1955,
"watchers_count": 1955,
"has_discussions": true,
"forks_count": 335,
"allow_forking": true,
@ -590,7 +590,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1954,
"watchers": 1955,
"score": 0,
"subscribers_count": 35
},

View file

@ -48,7 +48,7 @@
"stargazers_count": 642,
"watchers_count": 642,
"has_discussions": false,
"forks_count": 130,
"forks_count": 129,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -67,7 +67,7 @@
"xss"
],
"visibility": "public",
"forks": 130,
"forks": 129,
"watchers": 642,
"score": 0,
"subscribers_count": 16

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2024-07-02T13:19:00Z",
"updated_at": "2024-07-09T09:50:43Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1790,
"watchers_count": 1790,
"stargazers_count": 1789,
"watchers_count": 1789,
"has_discussions": false,
"forks_count": 247,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 247,
"watchers": 1790,
"watchers": 1789,
"score": 0,
"subscribers_count": 37
},

View file

@ -43,7 +43,7 @@
"description": null,
"fork": false,
"created_at": "2023-09-01T21:35:40Z",
"updated_at": "2023-12-12T19:42:30Z",
"updated_at": "2024-07-09T07:08:41Z",
"pushed_at": "2023-09-02T10:41:51Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-07-07T09:29:52Z",
"updated_at": "2024-07-09T12:01:48Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4063,
"watchers_count": 4063,
"stargazers_count": 4065,
"watchers_count": 4065,
"has_discussions": false,
"forks_count": 1084,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1084,
"watchers": 4063,
"watchers": 4065,
"score": 0,
"subscribers_count": 151
},

View file

@ -103,10 +103,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2024-06-11T16:05:54Z",
"updated_at": "2024-07-09T11:28:14Z",
"pushed_at": "2024-06-16T15:35:20Z",
"stargazers_count": 927,
"watchers_count": 927,
"stargazers_count": 928,
"watchers_count": 928,
"has_discussions": false,
"forks_count": 179,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 179,
"watchers": 927,
"watchers": 928,
"score": 0,
"subscribers_count": 18
},
@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-07-09T01:01:57Z",
"updated_at": "2024-07-09T11:27:18Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1954,
"watchers_count": 1954,
"stargazers_count": 1955,
"watchers_count": 1955,
"has_discussions": true,
"forks_count": 335,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1954,
"watchers": 1955,
"score": 0,
"subscribers_count": 35
}

View file

@ -1660,10 +1660,10 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2024-07-08T05:47:21Z",
"updated_at": "2024-07-09T09:42:53Z",
"pushed_at": "2022-03-30T14:02:04Z",
"stargazers_count": 252,
"watchers_count": 252,
"stargazers_count": 253,
"watchers_count": 253,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -1672,7 +1672,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 252,
"watchers": 253,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-07-07T09:29:52Z",
"updated_at": "2024-07-09T12:01:48Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4063,
"watchers_count": 4063,
"stargazers_count": 4065,
"watchers_count": 4065,
"has_discussions": false,
"forks_count": 1084,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1084,
"watchers": 4063,
"watchers": 4065,
"score": 0,
"subscribers_count": 151
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-07-09T01:01:57Z",
"updated_at": "2024-07-09T11:27:18Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1954,
"watchers_count": 1954,
"stargazers_count": 1955,
"watchers_count": 1955,
"has_discussions": true,
"forks_count": 335,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1954,
"watchers": 1955,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "Git-lfs RCE exploit CVE-2020-27955 - tested on Windows on: git, gh cli, GitHub Desktop, Visual Studio, SourceTree etc.",
"fork": false,
"created_at": "2020-11-03T17:14:22Z",
"updated_at": "2023-10-07T06:50:37Z",
"updated_at": "2024-07-09T08:31:08Z",
"pushed_at": "2021-01-12T10:11:42Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 2
},

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-07-09T01:58:42Z",
"updated_at": "2024-07-09T07:05:29Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1552,
"watchers_count": 1552,
"stargazers_count": 1551,
"watchers_count": 1551,
"has_discussions": false,
"forks_count": 481,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 481,
"watchers": 1552,
"watchers": 1551,
"score": 0,
"subscribers_count": 28
},

View file

@ -13,10 +13,10 @@
"description": "A demo exploit for CVE-2021-44026, a SQL injection in Roundcube",
"fork": false,
"created_at": "2023-11-14T11:32:36Z",
"updated_at": "2024-05-17T08:32:31Z",
"updated_at": "2024-07-09T07:40:14Z",
"pushed_at": "2023-12-22T11:29:43Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -3641,13 +3641,13 @@
"stargazers_count": 3382,
"watchers_count": 3382,
"has_discussions": true,
"forks_count": 741,
"forks_count": 740,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 741,
"forks": 740,
"watchers": 3382,
"score": 0,
"subscribers_count": 57

View file

@ -78,13 +78,13 @@
"stargazers_count": 271,
"watchers_count": 271,
"has_discussions": false,
"forks_count": 77,
"forks_count": 76,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 77,
"forks": 76,
"watchers": 271,
"score": 0,
"subscribers_count": 4

View file

@ -18,13 +18,13 @@
"stargazers_count": 217,
"watchers_count": 217,
"has_discussions": false,
"forks_count": 61,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 61,
"forks": 60,
"watchers": 217,
"score": 0,
"subscribers_count": 2

View file

@ -710,13 +710,13 @@
"stargazers_count": 328,
"watchers_count": 328,
"has_discussions": false,
"forks_count": 53,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 53,
"forks": 54,
"watchers": 328,
"score": 0,
"subscribers_count": 7

View file

@ -28,5 +28,35 @@
"watchers": 30,
"score": 0,
"subscribers_count": 2
},
{
"id": 767696686,
"name": "CrackAVFee",
"full_name": "pxcs\/CrackAVFee",
"owner": {
"login": "pxcs",
"id": 151133481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151133481?v=4",
"html_url": "https:\/\/github.com\/pxcs"
},
"html_url": "https:\/\/github.com\/pxcs\/CrackAVFee",
"description": "it's a CVE-2022-3368 ( patched ), but feel free to use it for check any outdated software or reseach",
"fork": false,
"created_at": "2024-03-05T18:31:29Z",
"updated_at": "2024-07-09T09:42:07Z",
"pushed_at": "2024-07-08T16:18:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

32
2022/CVE-2022-48429.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 636352279,
"name": "CVE-2022-48429_poc",
"full_name": "echo-devim\/CVE-2022-48429_poc",
"owner": {
"login": "echo-devim",
"id": 11312542,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11312542?v=4",
"html_url": "https:\/\/github.com\/echo-devim"
},
"html_url": "https:\/\/github.com\/echo-devim\/CVE-2022-48429_poc",
"description": "PoC for CVE-2022-48429 - Youtrack stored XSS",
"fork": false,
"created_at": "2023-05-04T16:55:20Z",
"updated_at": "2024-07-09T11:39:18Z",
"pushed_at": "2023-05-04T17:01:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
"fork": false,
"created_at": "2023-06-06T14:05:09Z",
"updated_at": "2024-06-20T09:23:22Z",
"updated_at": "2024-07-09T07:18:16Z",
"pushed_at": "2023-07-14T10:40:17Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 157,
"watchers": 158,
"score": 0,
"subscribers_count": 2
},

View file

@ -73,8 +73,8 @@
"description": null,
"fork": false,
"created_at": "2024-07-05T14:00:48Z",
"updated_at": "2024-07-05T14:07:57Z",
"pushed_at": "2024-07-05T14:07:54Z",
"updated_at": "2024-07-09T08:12:28Z",
"pushed_at": "2024-07-09T08:12:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -28,5 +28,35 @@
"watchers": 123,
"score": 0,
"subscribers_count": 2
},
{
"id": 778505062,
"name": "CrackKeyIso",
"full_name": "pxcs\/CrackKeyIso",
"owner": {
"login": "pxcs",
"id": 151133481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151133481?v=4",
"html_url": "https:\/\/github.com\/pxcs"
},
"html_url": "https:\/\/github.com\/pxcs\/CrackKeyIso",
"description": "it's a CVE-2023-28229 ( patched ), but feel free to use it for check any outdated software or reseach",
"fork": false,
"created_at": "2024-03-27T20:57:46Z",
"updated_at": "2024-07-09T09:42:09Z",
"pushed_at": "2024-07-08T16:04:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -149,6 +149,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 775566247,
"name": "CLFS",
"full_name": "pxcs\/CLFS",
"owner": {
"login": "pxcs",
"id": 151133481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151133481?v=4",
"html_url": "https:\/\/github.com\/pxcs"
},
"html_url": "https:\/\/github.com\/pxcs\/CLFS",
"description": "it's a CVE-2023-28252 ( patched ), but feel free to use it for check any outdated software or reseach",
"fork": false,
"created_at": "2024-03-21T16:16:52Z",
"updated_at": "2024-07-09T09:42:04Z",
"pushed_at": "2024-07-09T03:43:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 815887734,
"name": "CVE-2023-28252",

View file

@ -103,10 +103,10 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-10-23T18:33:41Z",
"updated_at": "2024-07-05T07:21:04Z",
"updated_at": "2024-07-09T06:44:24Z",
"pushed_at": "2023-10-26T11:44:46Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 105,
"watchers": 106,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "Demo for CVE-2023-43654 - Remote Code Execution in PyTorch TorchServe",
"fork": false,
"created_at": "2024-05-28T10:02:13Z",
"updated_at": "2024-07-03T06:15:19Z",
"updated_at": "2024-07-09T11:32:21Z",
"pushed_at": "2024-06-06T08:09:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -48,7 +48,7 @@
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 16,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -62,7 +62,7 @@
"proof-of-concept"
],
"visibility": "public",
"forks": 16,
"forks": 15,
"watchers": 50,
"score": 0,
"subscribers_count": 2

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-07-09T06:01:49Z",
"updated_at": "2024-07-09T09:49:12Z",
"pushed_at": "2024-07-05T12:35:27Z",
"stargazers_count": 963,
"watchers_count": 963,
"stargazers_count": 964,
"watchers_count": 964,
"has_discussions": false,
"forks_count": 162,
"forks_count": 161,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 963,
"forks": 161,
"watchers": 964,
"score": 0,
"subscribers_count": 16
},

View file

@ -13,10 +13,10 @@
"description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
"fork": false,
"created_at": "2024-06-18T09:22:59Z",
"updated_at": "2024-07-09T05:35:12Z",
"updated_at": "2024-07-09T09:20:37Z",
"pushed_at": "2024-06-18T09:35:44Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 42,
"watchers": 45,
"score": 0,
"subscribers_count": 2
},
@ -43,19 +43,19 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-07-09T03:57:13Z",
"updated_at": "2024-07-09T11:48:47Z",
"pushed_at": "2024-06-19T12:24:50Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 127,
"watchers_count": 127,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 121,
"forks": 27,
"watchers": 127,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
"fork": false,
"created_at": "2024-04-12T15:07:42Z",
"updated_at": "2024-07-02T11:34:01Z",
"updated_at": "2024-07-09T07:11:37Z",
"pushed_at": "2024-04-18T14:31:34Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 7
},

View file

@ -43,19 +43,19 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-07-05T19:39:01Z",
"updated_at": "2024-07-09T11:29:55Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 647,
"watchers_count": 647,
"stargazers_count": 648,
"watchers_count": 648,
"has_discussions": false,
"forks_count": 143,
"forks_count": 144,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 143,
"watchers": 647,
"forks": 144,
"watchers": 648,
"score": 0,
"subscribers_count": 9
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 4,
"score": 0,
"subscribers_count": 1

View file

@ -168,10 +168,10 @@
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-24576",
"fork": false,
"created_at": "2024-04-14T02:10:55Z",
"updated_at": "2024-05-12T07:54:52Z",
"updated_at": "2024-07-09T09:14:41Z",
"pushed_at": "2024-04-14T02:30:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -180,7 +180,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},

View file

@ -248,7 +248,7 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -264,7 +264,7 @@
"wp-sqli"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0

View file

@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-07-09T04:09:30Z",
"updated_at": "2024-07-09T07:10:34Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3468,
"watchers_count": 3468,
"stargazers_count": 3469,
"watchers_count": 3469,
"has_discussions": false,
"forks_count": 235,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 235,
"watchers": 3468,
"watchers": 3469,
"score": 0,
"subscribers_count": 39
},

View file

@ -103,10 +103,10 @@
"description": "Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions with multies ways to exploit",
"fork": false,
"created_at": "2024-07-06T01:10:28Z",
"updated_at": "2024-07-08T16:17:33Z",
"updated_at": "2024-07-09T07:21:01Z",
"pushed_at": "2024-07-06T01:57:58Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -122,7 +122,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},
@ -155,35 +155,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 825518189,
"name": "CVE-2024-36401",
"full_name": "zjaycyy\/CVE-2024-36401",
"owner": {
"login": "zjaycyy",
"id": 32694091,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32694091?v=4",
"html_url": "https:\/\/github.com\/zjaycyy"
},
"html_url": "https:\/\/github.com\/zjaycyy\/CVE-2024-36401",
"description": "CVE-2024-36401-POC",
"fork": false,
"created_at": "2024-07-08T01:53:32Z",
"updated_at": "2024-07-08T02:41:11Z",
"pushed_at": "2024-07-08T02:41:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,19 +13,19 @@
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
"fork": false,
"created_at": "2024-07-06T00:49:40Z",
"updated_at": "2024-07-09T04:34:52Z",
"updated_at": "2024-07-09T09:46:48Z",
"pushed_at": "2024-07-08T12:45:40Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 14,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 74,
"forks": 16,
"watchers": 77,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "PoC of CVE-2024-37759",
"fork": false,
"created_at": "2024-06-21T02:58:40Z",
"updated_at": "2024-06-23T15:00:46Z",
"updated_at": "2024-07-09T09:12:37Z",
"pushed_at": "2024-06-23T15:00:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,8 +13,8 @@
"description": "CVE-2024-37770",
"fork": false,
"created_at": "2024-07-05T16:13:34Z",
"updated_at": "2024-07-05T16:25:35Z",
"pushed_at": "2024-07-05T16:25:32Z",
"updated_at": "2024-07-09T07:21:57Z",
"pushed_at": "2024-07-09T07:21:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

32
2024/CVE-2024-39069.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 826264577,
"name": "CVE-2024-39069",
"full_name": "AungSoePaing\/CVE-2024-39069",
"owner": {
"login": "AungSoePaing",
"id": 76258644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76258644?v=4",
"html_url": "https:\/\/github.com\/AungSoePaing"
},
"html_url": "https:\/\/github.com\/AungSoePaing\/CVE-2024-39069",
"description": "CVE-2024-39069",
"fork": false,
"created_at": "2024-07-09T11:24:44Z",
"updated_at": "2024-07-09T11:28:27Z",
"pushed_at": "2024-07-09T11:28:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,8 +43,8 @@
"description": null,
"fork": false,
"created_at": "2024-07-06T17:06:25Z",
"updated_at": "2024-07-06T17:30:16Z",
"pushed_at": "2024-07-06T17:30:12Z",
"updated_at": "2024-07-09T12:31:11Z",
"pushed_at": "2024-07-09T12:30:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -358,8 +358,8 @@
"description": "CVE-2024-4040 PoC",
"fork": false,
"created_at": "2024-07-05T05:46:56Z",
"updated_at": "2024-07-07T11:54:53Z",
"pushed_at": "2024-07-07T11:54:50Z",
"updated_at": "2024-07-09T09:48:20Z",
"pushed_at": "2024-07-09T09:48:17Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -163,10 +163,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-07-07T23:49:18Z",
"updated_at": "2024-07-09T07:36:57Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 162,
"watchers_count": 162,
"stargazers_count": 163,
"watchers_count": 163,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 162,
"watchers": 163,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2024-4883",
"fork": false,
"created_at": "2024-07-08T12:14:01Z",
"updated_at": "2024-07-09T01:30:04Z",
"updated_at": "2024-07-09T11:00:44Z",
"pushed_at": "2024-07-08T12:14:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 8,
"score": 0,
"subscribers_count": 1

View file

@ -253,10 +253,10 @@
"description": "Proof-Of-Concept (POC) for CVE-2024-4956",
"fork": false,
"created_at": "2024-05-28T21:20:53Z",
"updated_at": "2024-07-03T14:17:34Z",
"updated_at": "2024-07-09T09:51:32Z",
"pushed_at": "2024-05-29T07:37:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -273,7 +273,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": "Exploit for CVE-2024-5009",
"fork": false,
"created_at": "2024-07-08T12:15:29Z",
"updated_at": "2024-07-09T06:08:48Z",
"updated_at": "2024-07-09T08:57:31Z",
"pushed_at": "2024-07-08T12:15:41Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -116,10 +116,10 @@
"description": "32-bit PoC for CVE-2024-6387 \"regreSSHion\" -- mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:26:40Z",
"updated_at": "2024-07-09T05:08:57Z",
"updated_at": "2024-07-09T08:13:51Z",
"pushed_at": "2024-07-01T14:16:36Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 90,
"watchers": 91,
"score": 0,
"subscribers_count": 4
},
@ -303,10 +303,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-07-09T05:00:29Z",
"updated_at": "2024-07-09T08:22:46Z",
"pushed_at": "2024-07-08T18:11:44Z",
"stargazers_count": 372,
"watchers_count": 372,
"stargazers_count": 375,
"watchers_count": 375,
"has_discussions": false,
"forks_count": 76,
"allow_forking": true,
@ -321,7 +321,7 @@
],
"visibility": "public",
"forks": 76,
"watchers": 372,
"watchers": 375,
"score": 0,
"subscribers_count": 5
},
@ -1135,10 +1135,10 @@
"description": "CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure.",
"fork": false,
"created_at": "2024-07-02T11:55:39Z",
"updated_at": "2024-07-08T20:39:05Z",
"updated_at": "2024-07-09T09:05:25Z",
"pushed_at": "2024-07-08T20:39:03Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1160,7 +1160,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},
@ -1316,10 +1316,10 @@
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
"fork": false,
"created_at": "2024-07-02T14:41:43Z",
"updated_at": "2024-07-08T18:33:49Z",
"updated_at": "2024-07-09T10:38:06Z",
"pushed_at": "2024-07-02T15:16:04Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1338,7 +1338,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
@ -1506,10 +1506,10 @@
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) ",
"fork": false,
"created_at": "2024-07-02T18:32:46Z",
"updated_at": "2024-07-09T05:01:17Z",
"updated_at": "2024-07-09T06:48:51Z",
"pushed_at": "2024-07-05T15:19:28Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -1527,7 +1527,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 1
},
@ -1802,10 +1802,10 @@
"description": "SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments.",
"fork": false,
"created_at": "2024-07-03T10:26:23Z",
"updated_at": "2024-07-08T07:32:35Z",
"updated_at": "2024-07-09T08:22:08Z",
"pushed_at": "2024-07-08T07:32:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1820,7 +1820,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -2341,13 +2341,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@ -2381,5 +2381,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 826287983,
"name": "mitigate-CVE-2024-6387",
"full_name": "dgourillon\/mitigate-CVE-2024-6387",
"owner": {
"login": "dgourillon",
"id": 50948886,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50948886?v=4",
"html_url": "https:\/\/github.com\/dgourillon"
},
"html_url": "https:\/\/github.com\/dgourillon\/mitigate-CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-07-09T12:16:44Z",
"updated_at": "2024-07-09T12:16:45Z",
"pushed_at": "2024-07-09T12:16:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -979,6 +979,7 @@
- [azurejoga/CVE-2024-6387-how-to-fix](https://github.com/azurejoga/CVE-2024-6387-how-to-fix)
- [asterictnl-lvdw/CVE-2024-6387](https://github.com/asterictnl-lvdw/CVE-2024-6387)
- [vkaushik-chef/regreSSHion](https://github.com/vkaushik-chef/regreSSHion)
- [dgourillon/mitigate-CVE-2024-6387](https://github.com/dgourillon/mitigate-CVE-2024-6387)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -3195,7 +3196,6 @@
- [RevoltSecurities/CVE-2024-36401](https://github.com/RevoltSecurities/CVE-2024-36401)
- [Mr-xn/CVE-2024-36401](https://github.com/Mr-xn/CVE-2024-36401)
- [zgimszhd61/CVE-2024-36401](https://github.com/zgimszhd61/CVE-2024-36401)
- [zjaycyy/CVE-2024-36401](https://github.com/zjaycyy/CVE-2024-36401)
### CVE-2024-36416 (2024-06-10)
@ -3369,6 +3369,9 @@
### CVE-2024-39031
- [toneemarqus/CVE-2024-39031](https://github.com/toneemarqus/CVE-2024-39031)
### CVE-2024-39069
- [AungSoePaing/CVE-2024-39069](https://github.com/AungSoePaing/CVE-2024-39069)
### CVE-2024-39203 (2024-07-08)
<code>A cross-site scripting (XSS) vulnerability in the Backend Theme Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
@ -6413,6 +6416,7 @@
</code>
- [Y3A/CVE-2023-28229](https://github.com/Y3A/CVE-2023-28229)
- [pxcs/CrackKeyIso](https://github.com/pxcs/CrackKeyIso)
### CVE-2023-28231 (2023-04-11)
@ -6438,6 +6442,7 @@
- [Danasuley/CVE-2023-28252-](https://github.com/Danasuley/CVE-2023-28252-)
- [bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252](https://github.com/bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252)
- [duck-sec/CVE-2023-28252-Compiled-exe](https://github.com/duck-sec/CVE-2023-28252-Compiled-exe)
- [pxcs/CLFS](https://github.com/pxcs/CLFS)
- [Vulmatch/CVE-2023-28252](https://github.com/Vulmatch/CVE-2023-28252)
### CVE-2023-28329 (2023-03-23)
@ -12178,6 +12183,7 @@
</code>
- [Wh04m1001/CVE-2022-3368](https://github.com/Wh04m1001/CVE-2022-3368)
- [pxcs/CrackAVFee](https://github.com/pxcs/CrackAVFee)
### CVE-2022-3464 (2022-10-12)
@ -17906,6 +17912,13 @@
- [swzhouu/CVE-2022-48311](https://github.com/swzhouu/CVE-2022-48311)
### CVE-2022-48429 (2023-03-27)
<code>In JetBrains Hub before 2022.3.15573, 2022.2.15572, 2022.1.15583 reflected XSS in dashboards was possible\n
</code>
- [echo-devim/CVE-2022-48429_poc](https://github.com/echo-devim/CVE-2022-48429_poc)
### CVE-2022-48474 (2023-09-12)
<code>Control de Ciber, in its 1.650 version, is affected by a Denial of Service condition through the version function. Sending a malicious request could cause the server to check if an unrecognized component is up to date, causing a memory failure error that shuts down the process.
@ -39388,6 +39401,13 @@
- [TheDarthMole/CVE-2017-14980](https://github.com/TheDarthMole/CVE-2017-14980)
### CVE-2017-15099 (2017-11-09)
<code>INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.
</code>
- [ToontjeM/CVE-2017-15099](https://github.com/ToontjeM/CVE-2017-15099)
### CVE-2017-15120 (2018-07-27)
<code>An issue has been found in the parsing of authoritative answers in PowerDNS Recursor before 4.0.8, leading to a NULL pointer dereference when parsing a specially crafted answer containing a CNAME of a different class than IN. An unauthenticated remote attacker could cause a denial of service.