Auto Update 2024/06/11 06:29:25

This commit is contained in:
motikan2010-bot 2024-06-11 15:29:25 +09:00
parent bef6bc6d0a
commit 535bdeae03
37 changed files with 291 additions and 256 deletions

View file

@ -13,7 +13,7 @@
"description": "CVE-2016-5636",
"fork": false,
"created_at": "2016-03-28T18:47:03Z",
"updated_at": "2021-02-22T10:07:02Z",
"updated_at": "2024-06-11T00:58:25Z",
"pushed_at": "2020-08-10T07:27:53Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
"fork": false,
"created_at": "2018-08-14T18:51:50Z",
"updated_at": "2024-04-12T13:19:09Z",
"updated_at": "2024-06-11T05:24:45Z",
"pushed_at": "2024-03-10T19:29:16Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 249,
"watchers_count": 249,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 248,
"watchers": 249,
"score": 0,
"subscribers_count": 6
},

View file

@ -843,7 +843,7 @@
"description": "school project",
"fork": false,
"created_at": "2023-05-15T08:13:46Z",
"updated_at": "2023-05-15T08:27:15Z",
"updated_at": "2024-06-11T02:40:07Z",
"pushed_at": "2023-10-26T14:04:31Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -150,34 +150,34 @@
"subscribers_count": 1
},
{
"id": 362129366,
"id": 364464831,
"name": "CVE-2019-18634",
"full_name": "Y3A\/CVE-2019-18634",
"full_name": "paras1te-x\/CVE-2019-18634",
"owner": {
"login": "Y3A",
"id": 62646606,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62646606?v=4",
"html_url": "https:\/\/github.com\/Y3A"
"login": "paras1te-x",
"id": 78490741,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78490741?v=4",
"html_url": "https:\/\/github.com\/paras1te-x"
},
"html_url": "https:\/\/github.com\/Y3A\/CVE-2019-18634",
"html_url": "https:\/\/github.com\/paras1te-x\/CVE-2019-18634",
"description": "exploit",
"fork": false,
"created_at": "2021-04-27T13:50:24Z",
"updated_at": "2021-06-11T07:30:23Z",
"pushed_at": "2021-06-11T07:30:20Z",
"created_at": "2021-05-05T04:53:05Z",
"updated_at": "2021-05-05T04:53:06Z",
"pushed_at": "2021-05-05T04:53:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
"subscribers_count": 0
},
{
"id": 391601106,

View file

@ -445,10 +445,10 @@
"description": "Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC",
"fork": false,
"created_at": "2023-11-05T14:32:11Z",
"updated_at": "2024-04-04T12:28:11Z",
"updated_at": "2024-06-11T03:46:51Z",
"pushed_at": "2023-12-21T06:18:47Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -457,7 +457,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 1699,
"watchers_count": 1699,
"has_discussions": false,
"forks_count": 360,
"forks_count": 359,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 360,
"forks": 359,
"watchers": 1699,
"score": 0,
"subscribers_count": 87

View file

@ -13,10 +13,10 @@
"description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境",
"fork": false,
"created_at": "2021-02-03T08:14:03Z",
"updated_at": "2024-03-31T14:24:41Z",
"updated_at": "2024-06-11T02:41:48Z",
"pushed_at": "2021-02-07T09:42:36Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 111,
"watchers": 112,
"score": 0,
"subscribers_count": 3
}

View file

@ -18,7 +18,7 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -35,7 +35,7 @@
"totvs"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1

View file

@ -410,10 +410,10 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2024-06-02T17:32:12Z",
"updated_at": "2024-06-11T00:50:47Z",
"pushed_at": "2022-04-14T11:51:18Z",
"stargazers_count": 429,
"watchers_count": 429,
"stargazers_count": 430,
"watchers_count": 430,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -422,7 +422,7 @@
"topics": [],
"visibility": "public",
"forks": 111,
"watchers": 429,
"watchers": 430,
"score": 0,
"subscribers_count": 8
},
@ -1420,36 +1420,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 403515290,
"name": "CVE-2021-3156",
"full_name": "Y3A\/CVE-2021-3156",
"owner": {
"login": "Y3A",
"id": 62646606,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62646606?v=4",
"html_url": "https:\/\/github.com\/Y3A"
},
"html_url": "https:\/\/github.com\/Y3A\/CVE-2021-3156",
"description": null,
"fork": false,
"created_at": "2021-09-06T06:48:08Z",
"updated_at": "2021-09-07T03:36:33Z",
"pushed_at": "2021-09-07T03:36:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 410319200,
"name": "sudo-exploit",
@ -2054,6 +2024,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 690307610,
"name": "Y3A-CVE-2021-3156",
"full_name": "EthicalSecurity-Agency\/Y3A-CVE-2021-3156",
"owner": {
"login": "EthicalSecurity-Agency",
"id": 128076110,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128076110?v=4",
"html_url": "https:\/\/github.com\/EthicalSecurity-Agency"
},
"html_url": "https:\/\/github.com\/EthicalSecurity-Agency\/Y3A-CVE-2021-3156",
"description": "Y3A \/ CVE-2021-3156",
"fork": false,
"created_at": "2023-09-12T00:23:42Z",
"updated_at": "2023-09-12T00:23:42Z",
"pushed_at": "2021-09-07T03:36:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 736124550,
"name": "CVE-2021-3156",

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-4154 exploit",
"fork": false,
"created_at": "2022-08-11T05:46:27Z",
"updated_at": "2024-01-03T06:23:30Z",
"updated_at": "2024-06-11T03:07:02Z",
"pushed_at": "2022-10-07T04:56:36Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 65,
"watchers": 66,
"score": 0,
"subscribers_count": 5
},

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-06-06T10:42:16Z",
"updated_at": "2024-06-11T03:46:08Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1760,
"watchers_count": 1760,
"stargazers_count": 1761,
"watchers_count": 1761,
"has_discussions": false,
"forks_count": 519,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 519,
"watchers": 1760,
"watchers": 1761,
"score": 0,
"subscribers_count": 28
},

View file

@ -13,10 +13,10 @@
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
"fork": false,
"created_at": "2022-06-07T23:26:47Z",
"updated_at": "2024-06-04T16:23:30Z",
"updated_at": "2024-06-11T01:00:39Z",
"pushed_at": "2022-11-20T03:03:53Z",
"stargazers_count": 207,
"watchers_count": 207,
"stargazers_count": 208,
"watchers_count": 208,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 207,
"watchers": 208,
"score": 0,
"subscribers_count": 3
},

View file

@ -147,6 +147,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -66,5 +66,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 813427958,
"name": "CVE-2022-36446",
"full_name": "Kang3639\/CVE-2022-36446",
"owner": {
"login": "Kang3639",
"id": 118144091,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118144091?v=4",
"html_url": "https:\/\/github.com\/Kang3639"
},
"html_url": "https:\/\/github.com\/Kang3639\/CVE-2022-36446",
"description": "CVE-2022-36446 POC 실습",
"fork": false,
"created_at": "2024-06-11T04:21:28Z",
"updated_at": "2024-06-11T05:01:36Z",
"pushed_at": "2024-06-11T05:01:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.",
"fork": false,
"created_at": "2023-07-13T13:17:20Z",
"updated_at": "2024-06-04T07:48:58Z",
"updated_at": "2024-06-11T01:32:55Z",
"pushed_at": "2024-02-11T03:01:51Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 86,
"watchers": 85,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,10 +43,10 @@
"description": "A collection of resources and information about CVE-2023-2033",
"fork": false,
"created_at": "2023-04-26T15:24:02Z",
"updated_at": "2024-05-10T05:30:03Z",
"updated_at": "2024-06-11T01:30:27Z",
"pushed_at": "2023-08-13T21:53:14Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -60,7 +60,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 19,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -202,10 +202,10 @@
"description": null,
"fork": false,
"created_at": "2023-07-10T06:38:14Z",
"updated_at": "2023-07-14T00:58:10Z",
"updated_at": "2024-06-11T03:20:39Z",
"pushed_at": "2023-07-13T06:20:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -214,7 +214,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)",
"fork": false,
"created_at": "2024-06-02T14:15:27Z",
"updated_at": "2024-06-08T22:33:50Z",
"updated_at": "2024-06-11T04:33:15Z",
"pushed_at": "2024-06-03T05:03:46Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 45,
"watchers": 48,
"score": 0,
"subscribers_count": 2
}

32
2024/CVE-2024-0195.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 813399149,
"name": "CVE-2024-0195",
"full_name": "Cappricio-Securities\/CVE-2024-0195",
"owner": {
"login": "Cappricio-Securities",
"id": 102907425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
"html_url": "https:\/\/github.com\/Cappricio-Securities"
},
"html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2024-0195",
"description": "SpiderFlow Crawler Platform - Remote Code Execution",
"fork": false,
"created_at": "2024-06-11T02:34:34Z",
"updated_at": "2024-06-11T02:35:35Z",
"pushed_at": "2024-06-11T02:35:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-06-10T22:33:04Z",
"updated_at": "2024-06-11T03:12:23Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2094,
"watchers_count": 2094,
"stargazers_count": 2095,
"watchers_count": 2095,
"has_discussions": false,
"forks_count": 268,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 268,
"watchers": 2094,
"watchers": 2095,
"score": 0,
"subscribers_count": 24
},
@ -153,6 +153,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-09T18:55:03Z",
"updated_at": "2024-06-09T18:55:47Z",
"updated_at": "2024-06-11T01:50:57Z",
"pushed_at": "2024-06-09T18:55:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "The Poc for CVE-2024-20931",
"fork": false,
"created_at": "2024-02-02T01:58:49Z",
"updated_at": "2024-05-10T03:53:53Z",
"updated_at": "2024-06-11T00:36:00Z",
"pushed_at": "2024-02-02T02:05:01Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-06-10T19:08:59Z",
"updated_at": "2024-06-11T02:35:32Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 629,
"watchers_count": 629,
"stargazers_count": 630,
"watchers_count": 630,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 140,
"watchers": 629,
"watchers": 630,
"score": 0,
"subscribers_count": 9
},

View file

@ -1416,6 +1416,36 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 813414695,
"name": "CVE-2024-24919",
"full_name": "SalehLardhi\/CVE-2024-24919",
"owner": {
"login": "SalehLardhi",
"id": 77610128,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77610128?v=4",
"html_url": "https:\/\/github.com\/SalehLardhi"
},
"html_url": "https:\/\/github.com\/SalehLardhi\/CVE-2024-24919",
"description": null,
"fork": false,
"created_at": "2024-06-11T03:33:30Z",
"updated_at": "2024-06-11T03:43:24Z",
"pushed_at": "2024-06-11T03:37:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,20 +13,20 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-06-11T00:07:25Z",
"updated_at": "2024-06-11T06:28:09Z",
"pushed_at": "2024-06-10T17:17:44Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"forks": 7,
"watchers": 18,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 775805293,
"name": "CVE-2024-28397",
"full_name": "Marven11\/CVE-2024-28397",
"owner": {
"login": "Marven11",
"id": 110723864,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110723864?v=4",
"html_url": "https:\/\/github.com\/Marven11"
},
"html_url": "https:\/\/github.com\/Marven11\/CVE-2024-28397",
"description": "to be released",
"fork": false,
"created_at": "2024-03-22T04:29:34Z",
"updated_at": "2024-03-22T08:57:56Z",
"pushed_at": "2024-03-22T04:29:35Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)",
"fork": false,
"created_at": "2024-06-10T06:12:20Z",
"updated_at": "2024-06-11T00:06:34Z",
"updated_at": "2024-06-11T02:48:58Z",
"pushed_at": "2024-06-10T07:53:44Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,8 +25,8 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 35,
"watchers": 41,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing",
"fork": false,
"created_at": "2024-06-06T18:31:57Z",
"updated_at": "2024-06-10T11:06:40Z",
"updated_at": "2024-06-11T02:39:17Z",
"pushed_at": "2024-06-06T18:38:06Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 22,
"watchers": 24,
"score": 0,
"subscribers_count": 1
}

View file

@ -394,13 +394,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@ -424,13 +424,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@ -1464,35 +1464,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 811571305,
"name": "CVE-2024-32002-linux-smash",
"full_name": "alimuhammedkose\/CVE-2024-32002-linux-smash",
"owner": {
"login": "alimuhammedkose",
"id": 117280381,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117280381?v=4",
"html_url": "https:\/\/github.com\/alimuhammedkose"
},
"html_url": "https:\/\/github.com\/alimuhammedkose\/CVE-2024-32002-linux-smash",
"description": null,
"fork": false,
"created_at": "2024-06-06T21:26:03Z",
"updated_at": "2024-06-06T21:26:19Z",
"pushed_at": "2024-06-06T21:26:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-06-08T16:09:28Z",
"updated_at": "2024-06-11T06:24:48Z",
"pushed_at": "2024-06-07T03:28:00Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 2
},
@ -43,10 +43,10 @@
"description": "CVE-2024-4367 arbitrary js execution in pdf js",
"fork": false,
"created_at": "2024-05-20T22:56:10Z",
"updated_at": "2024-06-07T14:59:25Z",
"updated_at": "2024-06-11T01:33:46Z",
"pushed_at": "2024-05-20T23:09:43Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
"fork": false,
"created_at": "2024-06-07T05:50:23Z",
"updated_at": "2024-06-11T00:15:09Z",
"pushed_at": "2024-06-07T11:49:08Z",
"stargazers_count": 62,
"watchers_count": 62,
"updated_at": "2024-06-11T04:46:45Z",
"pushed_at": "2024-06-11T04:46:42Z",
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 62,
"watchers": 63,
"score": 0,
"subscribers_count": 4
},
@ -133,10 +133,10 @@
"description": "POC & $BASH script for CVE-2024-4577",
"fork": false,
"created_at": "2024-06-07T09:51:39Z",
"updated_at": "2024-06-10T09:24:14Z",
"updated_at": "2024-06-11T04:42:50Z",
"pushed_at": "2024-06-09T16:16:30Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 1
},
@ -163,21 +163,21 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-06-10T20:10:39Z",
"updated_at": "2024-06-11T04:18:57Z",
"pushed_at": "2024-06-07T09:53:15Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 87,
"forks": 21,
"watchers": 92,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 811787647,
@ -223,19 +223,19 @@
"description": null,
"fork": false,
"created_at": "2024-06-07T10:40:37Z",
"updated_at": "2024-06-08T22:33:25Z",
"updated_at": "2024-06-11T03:58:28Z",
"pushed_at": "2024-06-07T15:06:52Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 10,
"forks": 3,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
@ -530,12 +530,12 @@
"description": "[漏洞复现] 全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP共享原创EXP支持SSRF支持绕过WAF。The world's first CVE-2024-4577 PHP-CGI RCE exploit utilizing the default PHP environment. Sharing original exploit, supports SSRF, supports WAF bypass.",
"fork": false,
"created_at": "2024-06-08T13:04:45Z",
"updated_at": "2024-06-11T00:12:13Z",
"updated_at": "2024-06-11T06:07:30Z",
"pushed_at": "2024-06-10T18:46:40Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 9,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -549,8 +549,8 @@
"xampp"
],
"visibility": "public",
"forks": 9,
"watchers": 44,
"forks": 15,
"watchers": 75,
"score": 0,
"subscribers_count": 1
},
@ -598,10 +598,10 @@
"description": "PHP CGI Argument Injection vulnerability",
"fork": false,
"created_at": "2024-06-09T14:18:21Z",
"updated_at": "2024-06-10T09:45:44Z",
"updated_at": "2024-06-11T02:34:39Z",
"pushed_at": "2024-06-09T14:20:36Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -610,7 +610,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
@ -628,10 +628,10 @@
"description": "A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-06-09T23:32:11Z",
"updated_at": "2024-06-10T14:28:31Z",
"updated_at": "2024-06-11T02:14:06Z",
"pushed_at": "2024-06-10T11:12:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -654,7 +654,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -686,6 +686,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -367,10 +367,10 @@
"description": "CVE-2024-4956 Python exploitation utility",
"fork": false,
"created_at": "2024-06-05T15:37:39Z",
"updated_at": "2024-06-08T16:13:06Z",
"updated_at": "2024-06-11T03:34:36Z",
"pushed_at": "2024-06-08T16:13:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -379,7 +379,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -397,10 +397,10 @@
"description": "POC - CVE-20244956 - Nexus Repository Manager 3 Unauthenticated Path Traversal",
"fork": false,
"created_at": "2024-06-09T10:57:29Z",
"updated_at": "2024-06-09T15:55:45Z",
"updated_at": "2024-06-11T02:16:32Z",
"pushed_at": "2024-06-09T12:53:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -409,7 +409,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -15,6 +15,13 @@
- [41yn14/CVE-2024-0039-Exploit](https://github.com/41yn14/CVE-2024-0039-Exploit)
### CVE-2024-0195 (2024-01-02)
<code>Es wurde eine Schwachstelle in spider-flow 0.4.3 gefunden. Sie wurde als kritisch eingestuft. Es betrifft die Funktion FunctionService.saveFunction der Datei src/main/java/org/spiderflow/controller/FunctionController.java. Durch Manipulieren mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
</code>
- [Cappricio-Securities/CVE-2024-0195](https://github.com/Cappricio-Securities/CVE-2024-0195)
### CVE-2024-0197 (2024-02-27)
<code>A flaw in the installer for Thales SafeNet Sentinel HASP LDK prior to 9.16 on Windows allows an attacker to escalate their privilege level via local access.\n\n
@ -1535,6 +1542,7 @@
- [satchhacker/cve-2024-24919](https://github.com/satchhacker/cve-2024-24919)
- [verylazytech/CVE-2024-24919](https://github.com/verylazytech/CVE-2024-24919)
- [protonnegativo/CVE-2024-24919](https://github.com/protonnegativo/CVE-2024-24919)
- [SalehLardhi/CVE-2024-24919](https://github.com/SalehLardhi/CVE-2024-24919)
### CVE-2024-25092 (2024-06-09)
@ -1940,9 +1948,6 @@
- [YongYe-Security/CVE-2024-28255](https://github.com/YongYe-Security/CVE-2024-28255)
### CVE-2024-28397
- [Marven11/CVE-2024-28397](https://github.com/Marven11/CVE-2024-28397)
### CVE-2024-28515 (2024-04-03)
<code>Buffer Overflow vulnerability in CSAPP_Lab CSAPP Lab3 15-213 Fall 20xx allows a remote attacker to execute arbitrary code via the lab3 of csapp,lab3/buflab-update.pl component.
@ -2252,7 +2257,6 @@
- [AD-Appledog/wakuwaku](https://github.com/AD-Appledog/wakuwaku)
- [tobelight/cve_2024_32002](https://github.com/tobelight/cve_2024_32002)
- [Basyaact/CVE-2024-32002-PoC_Chinese](https://github.com/Basyaact/CVE-2024-32002-PoC_Chinese)
- [alimuhammedkose/CVE-2024-32002-linux-smash](https://github.com/alimuhammedkose/CVE-2024-32002-linux-smash)
### CVE-2024-32004 (2024-05-14)
@ -15137,6 +15141,7 @@
- [p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE](https://github.com/p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE)
- [emirpolatt/CVE-2022-36446](https://github.com/emirpolatt/CVE-2022-36446)
- [Kang3639/CVE-2022-36446](https://github.com/Kang3639/CVE-2022-36446)
### CVE-2022-36532 (2022-09-16)
@ -17798,7 +17803,6 @@
- [Exodusro/CVE-2021-3156](https://github.com/Exodusro/CVE-2021-3156)
- [CyberCommands/CVE-2021-3156](https://github.com/CyberCommands/CVE-2021-3156)
- [0x7183/CVE-2021-3156](https://github.com/0x7183/CVE-2021-3156)
- [Y3A/CVE-2021-3156](https://github.com/Y3A/CVE-2021-3156)
- [redhawkeye/sudo-exploit](https://github.com/redhawkeye/sudo-exploit)
- [d3c3ptic0n/CVE-2021-3156](https://github.com/d3c3ptic0n/CVE-2021-3156)
- [musergi/CVE-2021-3156](https://github.com/musergi/CVE-2021-3156)
@ -17819,6 +17823,7 @@
- [mutur4/CVE-2021-3156](https://github.com/mutur4/CVE-2021-3156)
- [PurpleOzone/PE_CVE-CVE-2021-3156](https://github.com/PurpleOzone/PE_CVE-CVE-2021-3156)
- [asepsaepdin/CVE-2021-3156](https://github.com/asepsaepdin/CVE-2021-3156)
- [EthicalSecurity-Agency/Y3A-CVE-2021-3156](https://github.com/EthicalSecurity-Agency/Y3A-CVE-2021-3156)
- [DDayLuong/CVE-2021-3156](https://github.com/DDayLuong/CVE-2021-3156)
- [wurwur/CVE-2021-3156](https://github.com/wurwur/CVE-2021-3156)
- [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156)
@ -32473,7 +32478,7 @@
- [N1et/CVE-2019-18634](https://github.com/N1et/CVE-2019-18634)
- [ptef/CVE-2019-18634](https://github.com/ptef/CVE-2019-18634)
- [edsonjt81/sudo-cve-2019-18634](https://github.com/edsonjt81/sudo-cve-2019-18634)
- [Y3A/CVE-2019-18634](https://github.com/Y3A/CVE-2019-18634)
- [paras1te-x/CVE-2019-18634](https://github.com/paras1te-x/CVE-2019-18634)
- [aesophor/CVE-2019-18634](https://github.com/aesophor/CVE-2019-18634)
- [TheJoyOfHacking/saleemrashid-sudo-cve-2019-18634](https://github.com/TheJoyOfHacking/saleemrashid-sudo-cve-2019-18634)
- [DDayLuong/CVE-2019-18634](https://github.com/DDayLuong/CVE-2019-18634)