mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2024/07/09 00:28:57
This commit is contained in:
parent
52f4576634
commit
6e3a313b0a
36 changed files with 209 additions and 174 deletions
|
@ -868,5 +868,35 @@
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 825943567,
|
||||||
|
"name": "CVE-2007-2447-Exploit",
|
||||||
|
"full_name": "IamLucif3r\/CVE-2007-2447-Exploit",
|
||||||
|
"owner": {
|
||||||
|
"login": "IamLucif3r",
|
||||||
|
"id": 53969258,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53969258?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/IamLucif3r"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/IamLucif3r\/CVE-2007-2447-Exploit",
|
||||||
|
"description": "This is a exploit for CVE-2007-2447; Vulnerable SMB ",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-07-08T20:03:32Z",
|
||||||
|
"updated_at": "2024-07-08T20:10:28Z",
|
||||||
|
"pushed_at": "2024-07-08T20:10:24Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "CVE-2014-2630 exploit for xglance-bin ",
|
"description": "CVE-2014-2630 exploit for xglance-bin ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-04T16:47:44Z",
|
"created_at": "2020-02-04T16:47:44Z",
|
||||||
"updated_at": "2024-04-02T22:15:37Z",
|
"updated_at": "2024-07-08T23:56:11Z",
|
||||||
"pushed_at": "2020-02-10T21:16:02Z",
|
"pushed_at": "2020-02-10T21:16:02Z",
|
||||||
"stargazers_count": 4,
|
"stargazers_count": 5,
|
||||||
"watchers_count": 4,
|
"watchers_count": 5,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 4,
|
"watchers": 5,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -133,10 +133,10 @@
|
||||||
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
|
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2017-11-21T15:22:41Z",
|
"created_at": "2017-11-21T15:22:41Z",
|
||||||
"updated_at": "2024-07-03T21:22:12Z",
|
"updated_at": "2024-07-08T19:43:18Z",
|
||||||
"pushed_at": "2017-12-06T12:47:31Z",
|
"pushed_at": "2017-12-06T12:47:31Z",
|
||||||
"stargazers_count": 325,
|
"stargazers_count": 326,
|
||||||
"watchers_count": 325,
|
"watchers_count": 326,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 95,
|
"forks_count": 95,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -150,7 +150,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 95,
|
"forks": 95,
|
||||||
"watchers": 325,
|
"watchers": 326,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 18
|
"subscribers_count": 18
|
||||||
},
|
},
|
||||||
|
|
|
@ -258,10 +258,10 @@
|
||||||
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
|
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-04-21T16:42:31Z",
|
"created_at": "2021-04-21T16:42:31Z",
|
||||||
"updated_at": "2024-06-13T10:12:40Z",
|
"updated_at": "2024-07-08T18:22:46Z",
|
||||||
"pushed_at": "2021-04-21T16:46:37Z",
|
"pushed_at": "2021-04-21T16:46:37Z",
|
||||||
"stargazers_count": 38,
|
"stargazers_count": 39,
|
||||||
"watchers_count": 38,
|
"watchers_count": 39,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 16,
|
"forks_count": 16,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -270,7 +270,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 16,
|
"forks": 16,
|
||||||
"watchers": 38,
|
"watchers": 39,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
|
@ -2902,13 +2902,13 @@
|
||||||
"stargazers_count": 234,
|
"stargazers_count": 234,
|
||||||
"watchers_count": 234,
|
"watchers_count": 234,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 75,
|
"forks_count": 76,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 75,
|
"forks": 76,
|
||||||
"watchers": 234,
|
"watchers": 234,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 22
|
"subscribers_count": 22
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "CVE-2020-11881: unauthenticated remote DoS for MikroTik SMB service.",
|
"description": "CVE-2020-11881: unauthenticated remote DoS for MikroTik SMB service.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-06-17T12:15:56Z",
|
"created_at": "2020-06-17T12:15:56Z",
|
||||||
"updated_at": "2022-03-20T03:25:00Z",
|
"updated_at": "2024-07-08T19:26:59Z",
|
||||||
"pushed_at": "2020-09-26T13:33:27Z",
|
"pushed_at": "2020-09-26T13:33:27Z",
|
||||||
"stargazers_count": 8,
|
"stargazers_count": 9,
|
||||||
"watchers_count": 8,
|
"watchers_count": 9,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 8,
|
"watchers": 9,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-11T15:10:30Z",
|
"created_at": "2021-12-11T15:10:30Z",
|
||||||
"updated_at": "2024-07-04T15:04:40Z",
|
"updated_at": "2024-07-08T21:32:56Z",
|
||||||
"pushed_at": "2022-07-10T22:23:13Z",
|
"pushed_at": "2022-07-10T22:23:13Z",
|
||||||
"stargazers_count": 966,
|
"stargazers_count": 967,
|
||||||
"watchers_count": 966,
|
"watchers_count": 967,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 190,
|
"forks_count": 190,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -30,7 +30,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 190,
|
"forks": 190,
|
||||||
"watchers": 966,
|
"watchers": 967,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 26
|
"subscribers_count": 26
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "CVE-2022-0185",
|
"description": "CVE-2022-0185",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-01-19T06:19:38Z",
|
"created_at": "2022-01-19T06:19:38Z",
|
||||||
"updated_at": "2024-07-07T05:17:58Z",
|
"updated_at": "2024-07-08T20:49:22Z",
|
||||||
"pushed_at": "2022-04-25T04:11:33Z",
|
"pushed_at": "2022-04-25T04:11:33Z",
|
||||||
"stargazers_count": 365,
|
"stargazers_count": 366,
|
||||||
"watchers_count": 365,
|
"watchers_count": 366,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 58,
|
"forks_count": 58,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 58,
|
"forks": 58,
|
||||||
"watchers": 365,
|
"watchers": 366,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 39
|
"subscribers_count": 39
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-01-10T16:24:51Z",
|
"created_at": "2023-01-10T16:24:51Z",
|
||||||
"updated_at": "2024-07-07T23:51:05Z",
|
"updated_at": "2024-07-08T20:23:44Z",
|
||||||
"pushed_at": "2023-04-12T17:28:49Z",
|
"pushed_at": "2023-04-12T17:28:49Z",
|
||||||
"stargazers_count": 268,
|
"stargazers_count": 267,
|
||||||
"watchers_count": 268,
|
"watchers_count": 267,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 50,
|
"forks_count": 50,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 50,
|
"forks": 50,
|
||||||
"watchers": 268,
|
"watchers": 267,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 9
|
"subscribers_count": 9
|
||||||
}
|
}
|
||||||
|
|
|
@ -138,10 +138,10 @@
|
||||||
"description": "Zimbra CVE-2022-27925 PoC",
|
"description": "Zimbra CVE-2022-27925 PoC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-08-20T15:58:29Z",
|
"created_at": "2022-08-20T15:58:29Z",
|
||||||
"updated_at": "2024-06-06T08:46:22Z",
|
"updated_at": "2024-07-08T20:23:41Z",
|
||||||
"pushed_at": "2022-08-27T20:30:21Z",
|
"pushed_at": "2022-08-27T20:30:21Z",
|
||||||
"stargazers_count": 44,
|
"stargazers_count": 42,
|
||||||
"watchers_count": 44,
|
"watchers_count": 42,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 23,
|
"forks_count": 23,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -156,7 +156,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 23,
|
"forks": 23,
|
||||||
"watchers": 44,
|
"watchers": 42,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-06-10T08:31:26Z",
|
"created_at": "2023-06-10T08:31:26Z",
|
||||||
"updated_at": "2024-07-01T09:10:08Z",
|
"updated_at": "2024-07-08T22:13:14Z",
|
||||||
"pushed_at": "2024-04-05T06:46:47Z",
|
"pushed_at": "2024-04-05T06:46:47Z",
|
||||||
"stargazers_count": 235,
|
"stargazers_count": 236,
|
||||||
"watchers_count": 235,
|
"watchers_count": 236,
|
||||||
"has_discussions": true,
|
"has_discussions": true,
|
||||||
"forks_count": 33,
|
"forks_count": 33,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -28,7 +28,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 33,
|
"forks": 33,
|
||||||
"watchers": 235,
|
"watchers": 236,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 6
|
"subscribers_count": 6
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Bitrix Vulnerability CVE-2022-43959",
|
"description": "Bitrix Vulnerability CVE-2022-43959",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-10-28T08:52:17Z",
|
"created_at": "2022-10-28T08:52:17Z",
|
||||||
"updated_at": "2024-02-28T08:22:02Z",
|
"updated_at": "2024-07-08T21:00:34Z",
|
||||||
"pushed_at": "2023-03-18T10:34:26Z",
|
"pushed_at": "2023-03-18T10:34:26Z",
|
||||||
"stargazers_count": 4,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 4,
|
"watchers_count": 3,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 4,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -73,10 +73,10 @@
|
||||||
"description": "CVE-2022-46689",
|
"description": "CVE-2022-46689",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-12-26T00:08:55Z",
|
"created_at": "2022-12-26T00:08:55Z",
|
||||||
"updated_at": "2024-06-07T00:32:50Z",
|
"updated_at": "2024-07-08T20:43:26Z",
|
||||||
"pushed_at": "2023-10-10T16:53:48Z",
|
"pushed_at": "2023-10-10T16:53:48Z",
|
||||||
"stargazers_count": 116,
|
"stargazers_count": 117,
|
||||||
"watchers_count": 116,
|
"watchers_count": 117,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -85,7 +85,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 116,
|
"watchers": 117,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 8
|
"subscribers_count": 8
|
||||||
},
|
},
|
||||||
|
|
|
@ -18,13 +18,13 @@
|
||||||
"stargazers_count": 191,
|
"stargazers_count": 191,
|
||||||
"watchers_count": 191,
|
"watchers_count": 191,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 34,
|
"forks_count": 33,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 34,
|
"forks": 33,
|
||||||
"watchers": 191,
|
"watchers": 191,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 10
|
"subscribers_count": 10
|
||||||
|
|
|
@ -56,7 +56,7 @@
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
|
@ -68,7 +68,7 @@
|
||||||
"hackthebox"
|
"hackthebox"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 1,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-01-16T06:52:02Z",
|
"created_at": "2024-01-16T06:52:02Z",
|
||||||
"updated_at": "2024-07-08T14:15:46Z",
|
"updated_at": "2024-07-09T00:16:03Z",
|
||||||
"pushed_at": "2024-07-05T12:35:27Z",
|
"pushed_at": "2024-07-05T12:35:27Z",
|
||||||
"stargazers_count": 959,
|
"stargazers_count": 961,
|
||||||
"watchers_count": 959,
|
"watchers_count": 961,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 162,
|
"forks_count": 162,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 162,
|
"forks": 162,
|
||||||
"watchers": 959,
|
"watchers": 961,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 16
|
"subscribers_count": 16
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
|
"description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-06-18T09:22:59Z",
|
"created_at": "2024-06-18T09:22:59Z",
|
||||||
"updated_at": "2024-07-07T04:49:30Z",
|
"updated_at": "2024-07-08T22:49:10Z",
|
||||||
"pushed_at": "2024-06-18T09:35:44Z",
|
"pushed_at": "2024-06-18T09:35:44Z",
|
||||||
"stargazers_count": 39,
|
"stargazers_count": 41,
|
||||||
"watchers_count": 39,
|
"watchers_count": 41,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 7,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 7,
|
||||||
"watchers": 39,
|
"watchers": 41,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-03-20T21:16:41Z",
|
"created_at": "2024-03-20T21:16:41Z",
|
||||||
"updated_at": "2024-07-08T16:03:47Z",
|
"updated_at": "2024-07-08T20:23:49Z",
|
||||||
"pushed_at": "2024-04-17T16:09:54Z",
|
"pushed_at": "2024-04-17T16:09:54Z",
|
||||||
"stargazers_count": 2174,
|
"stargazers_count": 2173,
|
||||||
"watchers_count": 2174,
|
"watchers_count": 2173,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 283,
|
"forks_count": 283,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -31,7 +31,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 283,
|
"forks": 283,
|
||||||
"watchers": 2174,
|
"watchers": 2173,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 23
|
"subscribers_count": 23
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
|
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-04-13T05:53:02Z",
|
"created_at": "2024-04-13T05:53:02Z",
|
||||||
"updated_at": "2024-07-08T04:00:47Z",
|
"updated_at": "2024-07-08T20:23:50Z",
|
||||||
"pushed_at": "2024-04-16T21:00:14Z",
|
"pushed_at": "2024-04-16T21:00:14Z",
|
||||||
"stargazers_count": 245,
|
"stargazers_count": 244,
|
||||||
"watchers_count": 245,
|
"watchers_count": 244,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 56,
|
"forks_count": 56,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 56,
|
"forks": 56,
|
||||||
"watchers": 245,
|
"watchers": 244,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
|
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-02-28T21:16:10Z",
|
"created_at": "2024-02-28T21:16:10Z",
|
||||||
"updated_at": "2024-06-29T01:59:53Z",
|
"updated_at": "2024-07-08T22:34:58Z",
|
||||||
"pushed_at": "2024-07-05T09:37:05Z",
|
"pushed_at": "2024-07-05T09:37:05Z",
|
||||||
"stargazers_count": 91,
|
"stargazers_count": 92,
|
||||||
"watchers_count": 91,
|
"watchers_count": 92,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 13,
|
"forks_count": 13,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 13,
|
"forks": 13,
|
||||||
"watchers": 91,
|
"watchers": 92,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 6
|
"subscribers_count": 6
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server",
|
"description": "CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-06T17:55:25Z",
|
"created_at": "2024-07-06T17:55:25Z",
|
||||||
"updated_at": "2024-07-08T11:26:00Z",
|
"updated_at": "2024-07-09T00:10:06Z",
|
||||||
"pushed_at": "2024-07-06T18:10:20Z",
|
"pushed_at": "2024-07-06T18:10:20Z",
|
||||||
"stargazers_count": 8,
|
"stargazers_count": 9,
|
||||||
"watchers_count": 8,
|
"watchers_count": 9,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -32,7 +32,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 8,
|
"watchers": 9,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -223,10 +223,10 @@
|
||||||
"description": "CVE-2024-28955 Exploitation PoC ",
|
"description": "CVE-2024-28955 Exploitation PoC ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-01T11:49:51Z",
|
"created_at": "2024-07-01T11:49:51Z",
|
||||||
"updated_at": "2024-07-06T07:24:46Z",
|
"updated_at": "2024-07-08T19:15:04Z",
|
||||||
"pushed_at": "2024-07-01T12:53:21Z",
|
"pushed_at": "2024-07-01T12:53:21Z",
|
||||||
"stargazers_count": 24,
|
"stargazers_count": 25,
|
||||||
"watchers_count": 24,
|
"watchers_count": 25,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -244,7 +244,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 24,
|
"watchers": 25,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Jasmin ransomware web panel path traversal PoC",
|
"description": "Jasmin ransomware web panel path traversal PoC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-04-04T22:59:55Z",
|
"created_at": "2024-04-04T22:59:55Z",
|
||||||
"updated_at": "2024-05-22T21:42:43Z",
|
"updated_at": "2024-07-08T20:23:49Z",
|
||||||
"pushed_at": "2024-04-09T03:40:52Z",
|
"pushed_at": "2024-04-09T03:40:52Z",
|
||||||
"stargazers_count": 23,
|
"stargazers_count": 22,
|
||||||
"watchers_count": 23,
|
"watchers_count": 22,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 23,
|
"watchers": 22,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -1012,10 +1012,10 @@
|
||||||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-04-01T14:28:09Z",
|
"created_at": "2024-04-01T14:28:09Z",
|
||||||
"updated_at": "2024-07-08T08:13:44Z",
|
"updated_at": "2024-07-08T20:23:49Z",
|
||||||
"pushed_at": "2024-04-03T04:58:50Z",
|
"pushed_at": "2024-04-03T04:58:50Z",
|
||||||
"stargazers_count": 3470,
|
"stargazers_count": 3469,
|
||||||
"watchers_count": 3470,
|
"watchers_count": 3469,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 235,
|
"forks_count": 235,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -1024,7 +1024,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 235,
|
"forks": 235,
|
||||||
"watchers": 3470,
|
"watchers": 3469,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 39
|
"subscribers_count": 39
|
||||||
},
|
},
|
||||||
|
|
|
@ -288,13 +288,13 @@
|
||||||
"stargazers_count": 141,
|
"stargazers_count": 141,
|
||||||
"watchers_count": 141,
|
"watchers_count": 141,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 23,
|
"forks_count": 24,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 23,
|
"forks": 24,
|
||||||
"watchers": 141,
|
"watchers": 141,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
|
|
@ -283,10 +283,10 @@
|
||||||
"description": "CosmicSting: critical unauthenticated XXE vulnerability in Adobe Commerce and Magento (CVE-2024-34102)",
|
"description": "CosmicSting: critical unauthenticated XXE vulnerability in Adobe Commerce and Magento (CVE-2024-34102)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-01T08:19:28Z",
|
"created_at": "2024-07-01T08:19:28Z",
|
||||||
"updated_at": "2024-07-05T09:26:05Z",
|
"updated_at": "2024-07-08T22:50:07Z",
|
||||||
"pushed_at": "2024-07-05T09:26:02Z",
|
"pushed_at": "2024-07-05T09:26:02Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 0,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -295,7 +295,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -43,10 +43,10 @@
|
||||||
"description": "POC",
|
"description": "POC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-05T03:02:30Z",
|
"created_at": "2024-07-05T03:02:30Z",
|
||||||
"updated_at": "2024-07-05T10:11:45Z",
|
"updated_at": "2024-07-08T18:50:33Z",
|
||||||
"pushed_at": "2024-07-05T03:05:39Z",
|
"pushed_at": "2024-07-05T03:05:39Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 2,
|
"watchers_count": 3,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -55,7 +55,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 2,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,19 +13,19 @@
|
||||||
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
|
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-06T00:49:40Z",
|
"created_at": "2024-07-06T00:49:40Z",
|
||||||
"updated_at": "2024-07-08T17:58:24Z",
|
"updated_at": "2024-07-08T21:10:29Z",
|
||||||
"pushed_at": "2024-07-08T12:45:40Z",
|
"pushed_at": "2024-07-08T12:45:40Z",
|
||||||
"stargazers_count": 69,
|
"stargazers_count": 73,
|
||||||
"watchers_count": 69,
|
"watchers_count": 73,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 11,
|
"forks_count": 12,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 11,
|
"forks": 12,
|
||||||
"watchers": 69,
|
"watchers": 73,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server",
|
"description": "CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-06T18:29:13Z",
|
"created_at": "2024-07-06T18:29:13Z",
|
||||||
"updated_at": "2024-07-08T03:12:39Z",
|
"updated_at": "2024-07-09T00:11:41Z",
|
||||||
"pushed_at": "2024-07-06T18:38:16Z",
|
"pushed_at": "2024-07-06T18:38:16Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 2,
|
"watchers_count": 4,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -32,7 +32,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 2,
|
"watchers": 4,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-03T07:26:07Z",
|
"created_at": "2024-07-03T07:26:07Z",
|
||||||
"updated_at": "2024-07-08T09:05:48Z",
|
"updated_at": "2024-07-08T20:33:52Z",
|
||||||
"pushed_at": "2024-07-04T04:23:40Z",
|
"pushed_at": "2024-07-04T04:23:40Z",
|
||||||
"stargazers_count": 26,
|
"stargazers_count": 27,
|
||||||
"watchers_count": 26,
|
"watchers_count": 27,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 11,
|
"forks_count": 11,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 11,
|
"forks": 11,
|
||||||
"watchers": 26,
|
"watchers": 27,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
32
2024/CVE-2024-39031.json
Normal file
32
2024/CVE-2024-39031.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 826000412,
|
||||||
|
"name": "CVE-2024-39031",
|
||||||
|
"full_name": "toneemarqus\/CVE-2024-39031",
|
||||||
|
"owner": {
|
||||||
|
"login": "toneemarqus",
|
||||||
|
"id": 85018947,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85018947?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/toneemarqus"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/toneemarqus\/CVE-2024-39031",
|
||||||
|
"description": "Stored Cross-Side Scripting (XSS) leads to privilege escalation in SilverPeas social-networking portal",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-07-08T23:21:52Z",
|
||||||
|
"updated_at": "2024-07-08T23:40:32Z",
|
||||||
|
"pushed_at": "2024-07-08T23:40:29Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Exploit for CVE-2024-4883",
|
"description": "Exploit for CVE-2024-4883",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-08T12:14:01Z",
|
"created_at": "2024-07-08T12:14:01Z",
|
||||||
"updated_at": "2024-07-08T12:54:43Z",
|
"updated_at": "2024-07-09T00:27:44Z",
|
||||||
"pushed_at": "2024-07-08T12:14:18Z",
|
"pushed_at": "2024-07-08T12:14:18Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 2,
|
"watchers_count": 3,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 2,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Exploit for CVE-2024-4885",
|
"description": "Exploit for CVE-2024-4885",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-08T12:14:42Z",
|
"created_at": "2024-07-08T12:14:42Z",
|
||||||
"updated_at": "2024-07-08T13:00:38Z",
|
"updated_at": "2024-07-09T00:31:11Z",
|
||||||
"pushed_at": "2024-07-08T12:15:00Z",
|
"pushed_at": "2024-07-08T12:15:00Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 6,
|
||||||
"watchers_count": 3,
|
"watchers_count": 6,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 2,
|
||||||
"watchers": 3,
|
"watchers": 6,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Exploit for CVE-2024-5009",
|
"description": "Exploit for CVE-2024-5009",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-08T12:15:29Z",
|
"created_at": "2024-07-08T12:15:29Z",
|
||||||
"updated_at": "2024-07-08T13:50:41Z",
|
"updated_at": "2024-07-09T00:00:02Z",
|
||||||
"pushed_at": "2024-07-08T12:15:41Z",
|
"pushed_at": "2024-07-08T12:15:41Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 2,
|
"watchers_count": 4,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 2,
|
"watchers": 4,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -56,10 +56,10 @@
|
||||||
"description": "a signal handler race condition in OpenSSH's server (sshd)",
|
"description": "a signal handler race condition in OpenSSH's server (sshd)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-01T10:55:29Z",
|
"created_at": "2024-07-01T10:55:29Z",
|
||||||
"updated_at": "2024-07-08T11:15:21Z",
|
"updated_at": "2024-07-08T21:27:30Z",
|
||||||
"pushed_at": "2024-07-01T10:54:02Z",
|
"pushed_at": "2024-07-01T10:54:02Z",
|
||||||
"stargazers_count": 414,
|
"stargazers_count": 415,
|
||||||
"watchers_count": 414,
|
"watchers_count": 415,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 179,
|
"forks_count": 179,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -68,7 +68,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 179,
|
"forks": 179,
|
||||||
"watchers": 414,
|
"watchers": 415,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 5
|
"subscribers_count": 5
|
||||||
},
|
},
|
||||||
|
@ -86,10 +86,10 @@
|
||||||
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
|
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-01T12:16:21Z",
|
"created_at": "2024-07-01T12:16:21Z",
|
||||||
"updated_at": "2024-07-08T03:28:13Z",
|
"updated_at": "2024-07-08T21:10:06Z",
|
||||||
"pushed_at": "2024-07-01T12:25:01Z",
|
"pushed_at": "2024-07-01T12:25:01Z",
|
||||||
"stargazers_count": 367,
|
"stargazers_count": 368,
|
||||||
"watchers_count": 367,
|
"watchers_count": 368,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 82,
|
"forks_count": 82,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -98,7 +98,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 82,
|
"forks": 82,
|
||||||
"watchers": 367,
|
"watchers": 368,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 7
|
"subscribers_count": 7
|
||||||
},
|
},
|
||||||
|
@ -303,10 +303,10 @@
|
||||||
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-01T20:33:20Z",
|
"created_at": "2024-07-01T20:33:20Z",
|
||||||
"updated_at": "2024-07-08T18:11:48Z",
|
"updated_at": "2024-07-08T18:59:12Z",
|
||||||
"pushed_at": "2024-07-08T18:11:44Z",
|
"pushed_at": "2024-07-08T18:11:44Z",
|
||||||
"stargazers_count": 370,
|
"stargazers_count": 371,
|
||||||
"watchers_count": 370,
|
"watchers_count": 371,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 76,
|
"forks_count": 76,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -321,7 +321,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 76,
|
"forks": 76,
|
||||||
"watchers": 370,
|
"watchers": 371,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
},
|
},
|
||||||
|
@ -1135,8 +1135,8 @@
|
||||||
"description": "CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure.",
|
"description": "CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-02T11:55:39Z",
|
"created_at": "2024-07-02T11:55:39Z",
|
||||||
"updated_at": "2024-07-08T14:55:03Z",
|
"updated_at": "2024-07-08T20:39:05Z",
|
||||||
"pushed_at": "2024-07-02T23:32:12Z",
|
"pushed_at": "2024-07-08T20:39:03Z",
|
||||||
"stargazers_count": 8,
|
"stargazers_count": 8,
|
||||||
"watchers_count": 8,
|
"watchers_count": 8,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
@ -1659,51 +1659,21 @@
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"id": 823339380,
|
|
||||||
"name": "CVE-2024-6387-regreSSHion-Checker",
|
|
||||||
"full_name": "EkaterinaMarchetti\/CVE-2024-6387-regreSSHion-Checker",
|
|
||||||
"owner": {
|
|
||||||
"login": "EkaterinaMarchetti",
|
|
||||||
"id": 166263130,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166263130?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/EkaterinaMarchetti"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/EkaterinaMarchetti\/CVE-2024-6387-regreSSHion-Checker",
|
|
||||||
"description": null,
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2024-07-02T21:13:45Z",
|
|
||||||
"updated_at": "2024-07-02T21:13:46Z",
|
|
||||||
"pushed_at": "2024-07-02T21:13:46Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"has_discussions": false,
|
|
||||||
"forks_count": 0,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0,
|
|
||||||
"subscribers_count": 1
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 823340268,
|
"id": 823340268,
|
||||||
"name": "CVE-2024-6387-Tester",
|
"name": "CVE-2024-6387",
|
||||||
"full_name": "grupooruss\/CVE-2024-6387-Tester",
|
"full_name": "grupooruss\/CVE-2024-6387",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "grupooruss",
|
"login": "grupooruss",
|
||||||
"id": 43943489,
|
"id": 43943489,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43943489?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43943489?v=4",
|
||||||
"html_url": "https:\/\/github.com\/grupooruss"
|
"html_url": "https:\/\/github.com\/grupooruss"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/grupooruss\/CVE-2024-6387-Tester",
|
"html_url": "https:\/\/github.com\/grupooruss\/CVE-2024-6387",
|
||||||
"description": "regreSSHion vulnerability in OpenSSH CVE-2024-6387 Testing Script",
|
"description": "regreSSHion vulnerability in OpenSSH CVE-2024-6387 Testing Script",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-02T21:16:45Z",
|
"created_at": "2024-07-02T21:16:45Z",
|
||||||
"updated_at": "2024-07-06T19:00:14Z",
|
"updated_at": "2024-07-08T23:58:50Z",
|
||||||
"pushed_at": "2024-07-02T21:30:12Z",
|
"pushed_at": "2024-07-02T21:30:12Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
|
@ -2366,8 +2336,8 @@
|
||||||
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
|
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-08T11:27:49Z",
|
"created_at": "2024-07-08T11:27:49Z",
|
||||||
"updated_at": "2024-07-08T18:16:44Z",
|
"updated_at": "2024-07-08T20:03:38Z",
|
||||||
"pushed_at": "2024-07-08T18:16:41Z",
|
"pushed_at": "2024-07-08T20:03:35Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -956,8 +956,7 @@
|
||||||
- [xonoxitron/regreSSHion-checker](https://github.com/xonoxitron/regreSSHion-checker)
|
- [xonoxitron/regreSSHion-checker](https://github.com/xonoxitron/regreSSHion-checker)
|
||||||
- [BrandonLynch2402/cve-2024-6387-nuclei-template](https://github.com/BrandonLynch2402/cve-2024-6387-nuclei-template)
|
- [BrandonLynch2402/cve-2024-6387-nuclei-template](https://github.com/BrandonLynch2402/cve-2024-6387-nuclei-template)
|
||||||
- [edsonjt81/CVE-2024-6387_Check](https://github.com/edsonjt81/CVE-2024-6387_Check)
|
- [edsonjt81/CVE-2024-6387_Check](https://github.com/edsonjt81/CVE-2024-6387_Check)
|
||||||
- [EkaterinaMarchetti/CVE-2024-6387-regreSSHion-Checker](https://github.com/EkaterinaMarchetti/CVE-2024-6387-regreSSHion-Checker)
|
- [grupooruss/CVE-2024-6387](https://github.com/grupooruss/CVE-2024-6387)
|
||||||
- [grupooruss/CVE-2024-6387-Tester](https://github.com/grupooruss/CVE-2024-6387-Tester)
|
|
||||||
- [CognisysGroup/CVE-2024-6387-Checker](https://github.com/CognisysGroup/CVE-2024-6387-Checker)
|
- [CognisysGroup/CVE-2024-6387-Checker](https://github.com/CognisysGroup/CVE-2024-6387-Checker)
|
||||||
- [sxlmnwb/CVE-2024-6387](https://github.com/sxlmnwb/CVE-2024-6387)
|
- [sxlmnwb/CVE-2024-6387](https://github.com/sxlmnwb/CVE-2024-6387)
|
||||||
- [Symbolexe/CVE-2024-6387](https://github.com/Symbolexe/CVE-2024-6387)
|
- [Symbolexe/CVE-2024-6387](https://github.com/Symbolexe/CVE-2024-6387)
|
||||||
|
@ -3373,6 +3372,9 @@
|
||||||
|
|
||||||
- [Havoc10-sw/Detect_polyfill_CVE-2024-38537-](https://github.com/Havoc10-sw/Detect_polyfill_CVE-2024-38537-)
|
- [Havoc10-sw/Detect_polyfill_CVE-2024-38537-](https://github.com/Havoc10-sw/Detect_polyfill_CVE-2024-38537-)
|
||||||
|
|
||||||
|
### CVE-2024-39031
|
||||||
|
- [toneemarqus/CVE-2024-39031](https://github.com/toneemarqus/CVE-2024-39031)
|
||||||
|
|
||||||
### CVE-2024-39203 (2024-07-08)
|
### CVE-2024-39203 (2024-07-08)
|
||||||
|
|
||||||
<code>A cross-site scripting (XSS) vulnerability in the Backend Theme Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
|
<code>A cross-site scripting (XSS) vulnerability in the Backend Theme Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
|
||||||
|
@ -44391,6 +44393,7 @@
|
||||||
- [0xTabun/CVE-2007-2447](https://github.com/0xTabun/CVE-2007-2447)
|
- [0xTabun/CVE-2007-2447](https://github.com/0xTabun/CVE-2007-2447)
|
||||||
- [ShivamDey/Samba-CVE-2007-2447-Exploit](https://github.com/ShivamDey/Samba-CVE-2007-2447-Exploit)
|
- [ShivamDey/Samba-CVE-2007-2447-Exploit](https://github.com/ShivamDey/Samba-CVE-2007-2447-Exploit)
|
||||||
- [Juantos/cve-2007-2447](https://github.com/Juantos/cve-2007-2447)
|
- [Juantos/cve-2007-2447](https://github.com/Juantos/cve-2007-2447)
|
||||||
|
- [IamLucif3r/CVE-2007-2447-Exploit](https://github.com/IamLucif3r/CVE-2007-2447-Exploit)
|
||||||
|
|
||||||
### CVE-2007-3830 (2007-07-17)
|
### CVE-2007-3830 (2007-07-17)
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue