Auto Update 2024/04/03 00:27:03

This commit is contained in:
motikan2010-bot 2024-04-03 09:27:03 +09:00
parent b555f103ee
commit 6d22f3393b
53 changed files with 391 additions and 259 deletions

View file

@ -13,10 +13,10 @@
"description": "CVE-2014-2630 exploit for xglance-bin ",
"fork": false,
"created_at": "2020-02-04T16:47:44Z",
"updated_at": "2021-10-23T10:41:00Z",
"updated_at": "2024-04-02T22:15:37Z",
"pushed_at": "2020-02-10T21:16:02Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-01T02:49:23Z",
"updated_at": "2024-04-02T22:05:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1899,
"watchers_count": 1899,
"stargazers_count": 1900,
"watchers_count": 1900,
"has_discussions": true,
"forks_count": 331,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 331,
"watchers": 1899,
"watchers": 1900,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2015-1769",
"fork": false,
"created_at": "2021-02-17T03:25:53Z",
"updated_at": "2024-04-02T16:59:20Z",
"updated_at": "2024-04-02T18:59:12Z",
"pushed_at": "2021-02-17T03:45:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-01T02:49:23Z",
"updated_at": "2024-04-02T22:05:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1899,
"watchers_count": 1899,
"stargazers_count": 1900,
"watchers_count": 1900,
"has_discussions": true,
"forks_count": 331,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 331,
"watchers": 1899,
"watchers": 1900,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2024-03-27T14:14:37Z",
"updated_at": "2024-04-02T22:09:55Z",
"pushed_at": "2023-09-10T20:29:05Z",
"stargazers_count": 315,
"watchers_count": 315,
"stargazers_count": 316,
"watchers_count": 316,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 315,
"watchers": 316,
"score": 0,
"subscribers_count": 22
},

View file

@ -414,10 +414,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2024-03-26T13:53:49Z",
"updated_at": "2024-04-02T22:50:31Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 420,
"watchers_count": 420,
"stargazers_count": 421,
"watchers_count": 421,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -426,7 +426,7 @@
"topics": [],
"visibility": "public",
"forks": 166,
"watchers": 420,
"watchers": 421,
"score": 0,
"subscribers_count": 9
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-01-11T10:20:27Z",
"updated_at": "2024-02-01T02:54:57Z",
"pushed_at": "2024-04-02T15:36:07Z",
"pushed_at": "2024-04-02T19:13:23Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-01T02:49:23Z",
"updated_at": "2024-04-02T22:05:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1899,
"watchers_count": 1899,
"stargazers_count": 1900,
"watchers_count": 1900,
"has_discussions": true,
"forks_count": 331,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 331,
"watchers": 1899,
"watchers": 1900,
"score": 0,
"subscribers_count": 35
},

View file

@ -360,10 +360,10 @@
"description": "PHPunit Checker CVE-2017-9841 By MrMad",
"fork": false,
"created_at": "2022-12-07T11:26:16Z",
"updated_at": "2024-04-02T16:58:23Z",
"updated_at": "2024-04-02T19:46:11Z",
"pushed_at": "2023-02-04T12:51:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -379,7 +379,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},

View file

@ -73,10 +73,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-04-01T10:32:48Z",
"updated_at": "2024-04-02T22:28:43Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 136,
"watchers_count": 136,
"stargazers_count": 137,
"watchers_count": 137,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 136,
"watchers": 137,
"score": 0,
"subscribers_count": 6
},

View file

@ -557,10 +557,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-01T02:49:23Z",
"updated_at": "2024-04-02T22:05:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1899,
"watchers_count": 1899,
"stargazers_count": 1900,
"watchers_count": 1900,
"has_discussions": true,
"forks_count": 331,
"allow_forking": true,
@ -590,7 +590,7 @@
],
"visibility": "public",
"forks": 331,
"watchers": 1899,
"watchers": 1900,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "PoC exploit for CVE-2018-5234",
"fork": false,
"created_at": "2018-05-01T16:40:30Z",
"updated_at": "2023-09-28T10:50:19Z",
"updated_at": "2024-04-02T22:18:49Z",
"pushed_at": "2018-05-02T08:50:57Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 8
},

View file

@ -1566,10 +1566,10 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2024-04-02T16:59:07Z",
"updated_at": "2024-04-02T18:58:59Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 882,
"watchers_count": 882,
"stargazers_count": 883,
"watchers_count": 883,
"has_discussions": false,
"forks_count": 240,
"allow_forking": true,
@ -1578,7 +1578,7 @@
"topics": [],
"visibility": "public",
"forks": 240,
"watchers": 882,
"watchers": 883,
"score": 0,
"subscribers_count": 55
},
@ -3588,17 +3588,17 @@
"fork": false,
"created_at": "2024-04-02T13:12:21Z",
"updated_at": "2024-04-02T17:12:32Z",
"pushed_at": "2024-04-02T17:49:32Z",
"pushed_at": "2024-04-02T18:30:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0

File diff suppressed because one or more lines are too long

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-04-02T09:57:07Z",
"updated_at": "2024-04-02T21:27:33Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4018,
"watchers_count": 4018,
"stargazers_count": 4017,
"watchers_count": 4017,
"has_discussions": false,
"forks_count": 1081,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1081,
"watchers": 4018,
"watchers": 4017,
"score": 0,
"subscribers_count": 151
},

View file

@ -13,10 +13,10 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false,
"created_at": "2019-08-30T16:32:13Z",
"updated_at": "2024-04-02T17:40:45Z",
"updated_at": "2024-04-02T18:26:16Z",
"pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 178,
"watchers_count": 178,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 177,
"watchers": 178,
"score": 0,
"subscribers_count": 6
},

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-01T02:49:23Z",
"updated_at": "2024-04-02T22:05:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1899,
"watchers_count": 1899,
"stargazers_count": 1900,
"watchers_count": 1900,
"has_discussions": true,
"forks_count": 331,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 331,
"watchers": 1899,
"watchers": 1900,
"score": 0,
"subscribers_count": 35
}

View file

@ -13,10 +13,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2024-03-26T13:53:49Z",
"updated_at": "2024-04-02T22:50:31Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 420,
"watchers_count": 420,
"stargazers_count": 421,
"watchers_count": 421,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 166,
"watchers": 420,
"watchers": 421,
"score": 0,
"subscribers_count": 9
},

View file

@ -1151,7 +1151,7 @@
"forks": 90,
"watchers": 243,
"score": 0,
"subscribers_count": 13
"subscribers_count": 14
},
{
"id": 251510910,
@ -1464,7 +1464,7 @@
"forks": 165,
"watchers": 509,
"score": 0,
"subscribers_count": 26
"subscribers_count": 27
},
{
"id": 257849182,

View file

@ -103,10 +103,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2024-04-02T17:47:40Z",
"updated_at": "2024-04-03T00:16:27Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1131,
"watchers_count": 1131,
"stargazers_count": 1132,
"watchers_count": 1132,
"has_discussions": false,
"forks_count": 286,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 286,
"watchers": 1131,
"watchers": 1132,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-04-02T09:57:07Z",
"updated_at": "2024-04-02T21:27:33Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4018,
"watchers_count": 4018,
"stargazers_count": 4017,
"watchers_count": 4017,
"has_discussions": false,
"forks_count": 1081,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1081,
"watchers": 4018,
"watchers": 4017,
"score": 0,
"subscribers_count": 151
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-01T02:49:23Z",
"updated_at": "2024-04-02T22:05:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1899,
"watchers_count": 1899,
"stargazers_count": 1900,
"watchers_count": 1900,
"has_discussions": true,
"forks_count": 331,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 331,
"watchers": 1899,
"watchers": 1900,
"score": 0,
"subscribers_count": 35
},

View file

@ -509,10 +509,10 @@
"description": "CVE-2021-3129 Exploit Checker By .\/MrMad",
"fork": false,
"created_at": "2022-12-10T03:32:34Z",
"updated_at": "2024-04-02T16:58:23Z",
"updated_at": "2024-04-02T19:46:11Z",
"pushed_at": "2024-03-20T14:21:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -524,7 +524,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -493,10 +493,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2024-03-22T17:10:23Z",
"updated_at": "2024-04-03T00:12:10Z",
"pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 784,
"watchers_count": 784,
"stargazers_count": 783,
"watchers_count": 783,
"has_discussions": false,
"forks_count": 174,
"allow_forking": true,
@ -512,7 +512,7 @@
],
"visibility": "public",
"forks": 174,
"watchers": 784,
"watchers": 783,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2024-04-02T17:40:56Z",
"updated_at": "2024-04-02T22:01:37Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1296,
"watchers_count": 1296,
"stargazers_count": 1297,
"watchers_count": 1297,
"has_discussions": false,
"forks_count": 319,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 319,
"watchers": 1296,
"watchers": 1297,
"score": 0,
"subscribers_count": 27
},

View file

@ -1423,10 +1423,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2024-03-31T14:25:26Z",
"updated_at": "2024-04-02T22:08:24Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 853,
"watchers_count": 853,
"stargazers_count": 854,
"watchers_count": 854,
"has_discussions": false,
"forks_count": 174,
"allow_forking": true,
@ -1448,7 +1448,7 @@
],
"visibility": "public",
"forks": 174,
"watchers": 853,
"watchers": 854,
"score": 0,
"subscribers_count": 33
},
@ -12572,6 +12572,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
"fork": false,
"created_at": "2022-03-19T08:10:46Z",
"updated_at": "2024-04-02T16:59:27Z",
"updated_at": "2024-04-02T18:59:19Z",
"pushed_at": "2022-09-04T17:28:56Z",
"stargazers_count": 323,
"watchers_count": 323,
"stargazers_count": 324,
"watchers_count": 324,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 323,
"watchers": 324,
"score": 0,
"subscribers_count": 6
},

View file

@ -73,10 +73,10 @@
"description": "This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and\/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.",
"fork": false,
"created_at": "2022-05-06T06:22:47Z",
"updated_at": "2024-04-02T16:59:28Z",
"updated_at": "2024-04-02T18:59:20Z",
"pushed_at": "2022-05-06T15:33:14Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -92,7 +92,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube.",
"fork": false,
"created_at": "2022-01-15T20:50:25Z",
"updated_at": "2024-01-23T03:47:47Z",
"updated_at": "2024-04-02T22:25:26Z",
"pushed_at": "2022-03-07T19:45:22Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "spring-cloud \/ spring-cloud-function,spring.cloud.function.routing-expression,RCE,0day,0-day,POC,EXP,CVE-2022-22963",
"fork": false,
"created_at": "2022-03-26T01:40:04Z",
"updated_at": "2024-04-02T16:59:27Z",
"updated_at": "2024-04-02T18:59:19Z",
"pushed_at": "2023-03-05T12:41:19Z",
"stargazers_count": 351,
"watchers_count": 351,
"stargazers_count": 352,
"watchers_count": 352,
"has_discussions": false,
"forks_count": 85,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 85,
"watchers": 351,
"watchers": 352,
"score": 0,
"subscribers_count": 11
},

View file

@ -13,10 +13,10 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2024-04-02T16:59:28Z",
"updated_at": "2024-04-02T18:59:19Z",
"pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 695,
"watchers_count": 695,
"stargazers_count": 696,
"watchers_count": 696,
"has_discussions": false,
"forks_count": 107,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 107,
"watchers": 695,
"watchers": 696,
"score": 0,
"subscribers_count": 26
},

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2024-04-02T16:59:28Z",
"updated_at": "2024-04-02T18:59:20Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 360,
"watchers_count": 360,
"stargazers_count": 361,
"watchers_count": 361,
"has_discussions": false,
"forks_count": 92,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 92,
"watchers": 360,
"watchers": 361,
"score": 0,
"subscribers_count": 8
},

View file

@ -43,10 +43,10 @@
"description": "LPE PoC of a user-after-free vulnerability in the Linux netfilter subsystem.",
"fork": false,
"created_at": "2023-01-27T14:44:39Z",
"updated_at": "2024-01-07T08:49:43Z",
"updated_at": "2024-04-02T20:20:54Z",
"pushed_at": "2023-02-04T16:27:22Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept and write-up for the CVE-2022-32832 vulnerability patched in iOS 15.6",
"fork": false,
"created_at": "2022-07-21T13:09:50Z",
"updated_at": "2024-04-02T16:59:29Z",
"updated_at": "2024-04-02T18:59:21Z",
"pushed_at": "2022-07-21T13:44:32Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 97,
"watchers_count": 97,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 96,
"watchers": 97,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2024-04-02T16:59:31Z",
"updated_at": "2024-04-02T18:59:23Z",
"pushed_at": "2022-11-18T15:47:17Z",
"stargazers_count": 529,
"watchers_count": 529,
"stargazers_count": 530,
"watchers_count": 530,
"has_discussions": false,
"forks_count": 114,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 114,
"watchers": 529,
"watchers": 530,
"score": 0,
"subscribers_count": 47
},

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2024-03-22T12:50:05Z",
"updated_at": "2024-04-02T18:26:27Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 383,
"watchers_count": 383,
"stargazers_count": 384,
"watchers_count": 384,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 383,
"watchers": 384,
"score": 0,
"subscribers_count": 11
},

View file

@ -13,10 +13,10 @@
"description": "For Aina",
"fork": false,
"created_at": "2023-12-04T15:55:22Z",
"updated_at": "2023-12-04T16:16:48Z",
"pushed_at": "2024-03-19T21:25:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-04-02T23:46:40Z",
"pushed_at": "2024-04-02T23:34:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2023-03-10T19:08:28Z",
"updated_at": "2024-03-31T20:12:39Z",
"updated_at": "2024-04-02T20:38:05Z",
"pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 159,
"watchers_count": 159,
"stargazers_count": 160,
"watchers_count": 160,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 159,
"watchers": 160,
"score": 0,
"subscribers_count": 3
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
"fork": false,
"created_at": "2023-10-10T21:40:09Z",
"updated_at": "2024-03-24T05:40:51Z",
"updated_at": "2024-04-02T19:01:05Z",
"pushed_at": "2023-10-17T22:04:13Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 29,
"watchers": 125,
"watchers": 126,
"score": 0,
"subscribers_count": 3
},

View file

@ -471,13 +471,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -43,10 +43,10 @@
"description": "RCE exploit for Microsoft SharePoint 2019",
"fork": false,
"created_at": "2024-03-30T06:26:48Z",
"updated_at": "2024-03-30T21:22:05Z",
"updated_at": "2024-04-02T20:48:15Z",
"pushed_at": "2024-03-30T06:58:57Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
"fork": false,
"created_at": "2023-11-16T23:41:27Z",
"updated_at": "2024-04-01T08:24:36Z",
"updated_at": "2024-04-02T20:19:57Z",
"pushed_at": "2023-11-23T18:37:18Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 78,
"forks": 11,
"watchers": 79,
"score": 0,
"subscribers_count": 6
}

View file

@ -78,13 +78,13 @@
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 93,
"score": 0,
"subscribers_count": 1

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-04-02T13:56:25Z",
"updated_at": "2024-04-02T23:11:26Z",
"pushed_at": "2024-03-31T22:00:43Z",
"stargazers_count": 316,
"watchers_count": 316,
"stargazers_count": 320,
"watchers_count": 320,
"has_discussions": false,
"forks_count": 52,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 316,
"forks": 53,
"watchers": 320,
"score": 0,
"subscribers_count": 5
},

View file

@ -240,34 +240,34 @@
"subscribers_count": 2
},
{
"id": 752231683,
"name": "CVE-2023-4863",
"full_name": "Microsvuln\/CVE-2023-4863",
"id": 752488530,
"name": "CVE-2023-4863-",
"full_name": "CrackerCat\/CVE-2023-4863-",
"owner": {
"login": "Microsvuln",
"id": 55649192,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55649192?v=4",
"html_url": "https:\/\/github.com\/Microsvuln"
"login": "CrackerCat",
"id": 17995064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
"html_url": "https:\/\/github.com\/CrackerCat"
},
"html_url": "https:\/\/github.com\/Microsvuln\/CVE-2023-4863",
"html_url": "https:\/\/github.com\/CrackerCat\/CVE-2023-4863-",
"description": "Triggering the famous libweb 0day vuln with libfuzzer",
"fork": false,
"created_at": "2024-02-03T12:27:37Z",
"updated_at": "2024-02-03T14:00:48Z",
"pushed_at": "2024-02-05T10:59:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"created_at": "2024-02-04T01:33:53Z",
"updated_at": "2024-02-04T01:33:53Z",
"pushed_at": "2024-02-03T12:51:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 753983723,

View file

@ -13,19 +13,19 @@
"description": "LPE exploit for CVE-2024-0582 (io_uring)",
"fork": false,
"created_at": "2024-03-29T14:45:22Z",
"updated_at": "2024-04-02T17:41:03Z",
"updated_at": "2024-04-02T20:19:43Z",
"pushed_at": "2024-03-29T16:05:31Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 16,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 64,
"forks": 18,
"watchers": 66,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-02T18:27:29Z",
"pushed_at": "2024-03-27T09:22:28Z",
"stargazers_count": 1233,
"watchers_count": 1233,
"updated_at": "2024-04-02T23:52:07Z",
"pushed_at": "2024-04-02T21:18:42Z",
"stargazers_count": 1245,
"watchers_count": 1245,
"has_discussions": false,
"forks_count": 124,
"forks_count": 125,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc"
],
"visibility": "public",
"forks": 124,
"watchers": 1233,
"forks": 125,
"watchers": 1245,
"score": 0,
"subscribers_count": 10
}

32
2024/CVE-2024-25723.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 774682652,
"name": "exploit-CVE-2024-25723",
"full_name": "david-botelho-mariano\/exploit-CVE-2024-25723",
"owner": {
"login": "david-botelho-mariano",
"id": 48680041,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48680041?v=4",
"html_url": "https:\/\/github.com\/david-botelho-mariano"
},
"html_url": "https:\/\/github.com\/david-botelho-mariano\/exploit-CVE-2024-25723",
"description": null,
"fork": false,
"created_at": "2024-03-20T01:28:09Z",
"updated_at": "2024-04-02T23:18:51Z",
"pushed_at": "2024-04-02T20:05:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "WallEscape vulnerability in util-linux",
"fork": false,
"created_at": "2024-03-11T00:15:03Z",
"updated_at": "2024-04-02T16:43:54Z",
"updated_at": "2024-04-02T18:32:27Z",
"pushed_at": "2024-03-30T01:32:02Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "This repository provides an exploit for CVE-2024-28247, highlighting a vulnerability that permits a remote attacker to read arbitrary files on the system.",
"fork": false,
"created_at": "2024-03-31T15:25:15Z",
"updated_at": "2024-03-31T15:47:25Z",
"updated_at": "2024-04-02T23:21:25Z",
"pushed_at": "2024-03-31T15:49:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
"fork": false,
"created_at": "2024-03-11T10:14:39Z",
"updated_at": "2024-04-02T06:37:07Z",
"updated_at": "2024-04-02T22:06:27Z",
"pushed_at": "2024-03-25T12:56:16Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 55,
"forks": 14,
"watchers": 56,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Information for CVE-2024-3094",
"fork": false,
"created_at": "2024-03-29T17:03:01Z",
"updated_at": "2024-04-02T00:49:47Z",
"updated_at": "2024-04-02T21:42:04Z",
"pushed_at": "2024-04-01T16:01:34Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 2
},
@ -43,10 +43,10 @@
"description": "Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)",
"fork": false,
"created_at": "2024-03-29T20:28:17Z",
"updated_at": "2024-04-02T16:47:35Z",
"updated_at": "2024-04-02T21:08:07Z",
"pushed_at": "2024-03-31T00:13:39Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 53,
"watchers": 54,
"score": 0,
"subscribers_count": 2
},
@ -357,10 +357,10 @@
"description": "K8S and Docker Vulnerability Check for CVE-2024-3094",
"fork": false,
"created_at": "2024-03-30T17:35:49Z",
"updated_at": "2024-04-02T17:52:45Z",
"updated_at": "2024-04-02T19:52:06Z",
"pushed_at": "2024-03-31T14:36:00Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -369,7 +369,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
@ -388,11 +388,11 @@
"fork": false,
"created_at": "2024-03-30T19:23:30Z",
"updated_at": "2024-04-02T14:13:24Z",
"pushed_at": "2024-04-02T10:26:39Z",
"pushed_at": "2024-04-02T20:21:36Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": true,
@ -408,7 +408,7 @@
"xz-utils"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 12,
"score": 0,
"subscribers_count": 2
@ -487,10 +487,10 @@
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
"fork": false,
"created_at": "2024-03-30T22:07:24Z",
"updated_at": "2024-04-02T12:07:32Z",
"updated_at": "2024-04-02T23:30:39Z",
"pushed_at": "2024-04-02T03:38:32Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 97,
"watchers_count": 97,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -504,7 +504,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 96,
"watchers": 97,
"score": 0,
"subscribers_count": 5
},
@ -646,10 +646,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-31T10:46:33Z",
"updated_at": "2024-04-02T12:43:32Z",
"updated_at": "2024-04-02T20:36:07Z",
"pushed_at": "2024-04-02T16:10:59Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -658,7 +658,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 2
},
@ -1006,19 +1006,19 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-04-02T18:24:58Z",
"pushed_at": "2024-04-01T20:27:27Z",
"stargazers_count": 1491,
"watchers_count": 1491,
"updated_at": "2024-04-03T00:19:41Z",
"pushed_at": "2024-04-02T19:17:37Z",
"stargazers_count": 1575,
"watchers_count": 1575,
"has_discussions": false,
"forks_count": 82,
"forks_count": 89,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 1491,
"forks": 89,
"watchers": 1575,
"score": 0,
"subscribers_count": 14
},
@ -1036,10 +1036,10 @@
"description": "Checker - CVE-2024-3094",
"fork": false,
"created_at": "2024-04-01T15:15:16Z",
"updated_at": "2024-04-01T16:31:45Z",
"updated_at": "2024-04-02T22:46:47Z",
"pushed_at": "2024-04-02T10:39:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1048,7 +1048,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -1221,10 +1221,10 @@
"description": "Detectar CVE-2024-3094",
"fork": false,
"created_at": "2024-04-02T03:36:07Z",
"updated_at": "2024-04-02T17:08:10Z",
"updated_at": "2024-04-02T20:58:00Z",
"pushed_at": "2024-04-02T03:38:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1233,7 +1233,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
@ -1266,5 +1266,95 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 781132313,
"name": "xzk8s",
"full_name": "r0binak\/xzk8s",
"owner": {
"login": "r0binak",
"id": 80983900,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80983900?v=4",
"html_url": "https:\/\/github.com\/r0binak"
},
"html_url": "https:\/\/github.com\/r0binak\/xzk8s",
"description": "Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094",
"fork": false,
"created_at": "2024-04-02T20:07:14Z",
"updated_at": "2024-04-02T21:53:31Z",
"pushed_at": "2024-04-02T20:34:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 781135899,
"name": "xz-backdoor-links",
"full_name": "przemoc\/xz-backdoor-links",
"owner": {
"login": "przemoc",
"id": 142372,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142372?v=4",
"html_url": "https:\/\/github.com\/przemoc"
},
"html_url": "https:\/\/github.com\/przemoc\/xz-backdoor-links",
"description": "apocalypxze: xz backdoor (2024) AKA CVE-2024-3094 related links",
"fork": false,
"created_at": "2024-04-02T20:17:07Z",
"updated_at": "2024-04-02T20:18:40Z",
"pushed_at": "2024-04-03T00:06:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 781191272,
"name": "CVE-2024-3094",
"full_name": "CyberGuard-Foundation\/CVE-2024-3094",
"owner": {
"login": "CyberGuard-Foundation",
"id": 165851880,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165851880?v=4",
"html_url": "https:\/\/github.com\/CyberGuard-Foundation"
},
"html_url": "https:\/\/github.com\/CyberGuard-Foundation\/CVE-2024-3094",
"description": "Our current information about the CVE-2024-3094 backdoor.",
"fork": false,
"created_at": "2024-04-02T23:10:06Z",
"updated_at": "2024-04-02T23:10:07Z",
"pushed_at": "2024-04-02T23:10:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -274,6 +274,9 @@
- [devjanger/CVE-2024-3094-XZ-Backdoor-Detector](https://github.com/devjanger/CVE-2024-3094-XZ-Backdoor-Detector)
- [ScrimForever/CVE-2024-3094](https://github.com/ScrimForever/CVE-2024-3094)
- [pentestfunctions/CVE-2024-3094](https://github.com/pentestfunctions/CVE-2024-3094)
- [r0binak/xzk8s](https://github.com/r0binak/xzk8s)
- [przemoc/xz-backdoor-links](https://github.com/przemoc/xz-backdoor-links)
- [CyberGuard-Foundation/CVE-2024-3094](https://github.com/CyberGuard-Foundation/CVE-2024-3094)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -966,6 +969,13 @@
- [hy011121/CVE-2024-25600-wordpress-Exploit-RCE](https://github.com/hy011121/CVE-2024-25600-wordpress-Exploit-RCE)
- [K3ysTr0K3R/CVE-2024-25600-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT)
### CVE-2024-25723 (2024-02-27)
<code>ZenML Server in the ZenML machine learning package before 0.46.7 for Python allows remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body. These are also patched versions: 0.44.4, 0.43.1, and 0.42.2.
</code>
- [david-botelho-mariano/exploit-CVE-2024-25723](https://github.com/david-botelho-mariano/exploit-CVE-2024-25723)
### CVE-2024-25731 (2024-03-04)
<code>The Elink Smart eSmartCam (com.cn.dq.ipc) application 2.1.5 for Android contains hardcoded AES encryption keys that can be extracted from a binary file. Thus, encryption can be defeated by an attacker who can observe packet data (e.g., over Wi-Fi).
@ -2020,7 +2030,7 @@
- [murphysecurity/libwebp-checker](https://github.com/murphysecurity/libwebp-checker)
- [LiveOverflow/webp-CVE-2023-4863](https://github.com/LiveOverflow/webp-CVE-2023-4863)
- [caoweiquan322/NotEnough](https://github.com/caoweiquan322/NotEnough)
- [Microsvuln/CVE-2023-4863](https://github.com/Microsvuln/CVE-2023-4863)
- [CrackerCat/CVE-2023-4863-](https://github.com/CrackerCat/CVE-2023-4863-)
- [alsaeroth/CVE-2023-4863-POC](https://github.com/alsaeroth/CVE-2023-4863-POC)
### CVE-2023-4911 (2023-10-03)