Auto Update 2024/07/09 00:28:57

This commit is contained in:
motikan2010-bot 2024-07-09 09:28:57 +09:00
parent 52f4576634
commit 6e3a313b0a
36 changed files with 209 additions and 174 deletions

View file

@ -868,5 +868,35 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 825943567,
"name": "CVE-2007-2447-Exploit",
"full_name": "IamLucif3r\/CVE-2007-2447-Exploit",
"owner": {
"login": "IamLucif3r",
"id": 53969258,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53969258?v=4",
"html_url": "https:\/\/github.com\/IamLucif3r"
},
"html_url": "https:\/\/github.com\/IamLucif3r\/CVE-2007-2447-Exploit",
"description": "This is a exploit for CVE-2007-2447; Vulnerable SMB ",
"fork": false,
"created_at": "2024-07-08T20:03:32Z",
"updated_at": "2024-07-08T20:10:28Z",
"pushed_at": "2024-07-08T20:10:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "CVE-2014-2630 exploit for xglance-bin ", "description": "CVE-2014-2630 exploit for xglance-bin ",
"fork": false, "fork": false,
"created_at": "2020-02-04T16:47:44Z", "created_at": "2020-02-04T16:47:44Z",
"updated_at": "2024-04-02T22:15:37Z", "updated_at": "2024-07-08T23:56:11Z",
"pushed_at": "2020-02-10T21:16:02Z", "pushed_at": "2020-02-10T21:16:02Z",
"stargazers_count": 4, "stargazers_count": 5,
"watchers_count": 4, "watchers_count": 5,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 4, "watchers": 5,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -133,10 +133,10 @@
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.", "description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false, "fork": false,
"created_at": "2017-11-21T15:22:41Z", "created_at": "2017-11-21T15:22:41Z",
"updated_at": "2024-07-03T21:22:12Z", "updated_at": "2024-07-08T19:43:18Z",
"pushed_at": "2017-12-06T12:47:31Z", "pushed_at": "2017-12-06T12:47:31Z",
"stargazers_count": 325, "stargazers_count": 326,
"watchers_count": 325, "watchers_count": 326,
"has_discussions": false, "has_discussions": false,
"forks_count": 95, "forks_count": 95,
"allow_forking": true, "allow_forking": true,
@ -150,7 +150,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 95, "forks": 95,
"watchers": 325, "watchers": 326,
"score": 0, "score": 0,
"subscribers_count": 18 "subscribers_count": 18
}, },

View file

@ -258,10 +258,10 @@
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.", "description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
"fork": false, "fork": false,
"created_at": "2021-04-21T16:42:31Z", "created_at": "2021-04-21T16:42:31Z",
"updated_at": "2024-06-13T10:12:40Z", "updated_at": "2024-07-08T18:22:46Z",
"pushed_at": "2021-04-21T16:46:37Z", "pushed_at": "2021-04-21T16:46:37Z",
"stargazers_count": 38, "stargazers_count": 39,
"watchers_count": 38, "watchers_count": 39,
"has_discussions": false, "has_discussions": false,
"forks_count": 16, "forks_count": 16,
"allow_forking": true, "allow_forking": true,
@ -270,7 +270,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 16, "forks": 16,
"watchers": 38, "watchers": 39,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -2902,13 +2902,13 @@
"stargazers_count": 234, "stargazers_count": 234,
"watchers_count": 234, "watchers_count": 234,
"has_discussions": false, "has_discussions": false,
"forks_count": 75, "forks_count": 76,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 75, "forks": 76,
"watchers": 234, "watchers": 234,
"score": 0, "score": 0,
"subscribers_count": 22 "subscribers_count": 22

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-11881: unauthenticated remote DoS for MikroTik SMB service.", "description": "CVE-2020-11881: unauthenticated remote DoS for MikroTik SMB service.",
"fork": false, "fork": false,
"created_at": "2020-06-17T12:15:56Z", "created_at": "2020-06-17T12:15:56Z",
"updated_at": "2022-03-20T03:25:00Z", "updated_at": "2024-07-08T19:26:59Z",
"pushed_at": "2020-09-26T13:33:27Z", "pushed_at": "2020-09-26T13:33:27Z",
"stargazers_count": 8, "stargazers_count": 9,
"watchers_count": 8, "watchers_count": 9,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 8, "watchers": 9,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false, "fork": false,
"created_at": "2021-12-11T15:10:30Z", "created_at": "2021-12-11T15:10:30Z",
"updated_at": "2024-07-04T15:04:40Z", "updated_at": "2024-07-08T21:32:56Z",
"pushed_at": "2022-07-10T22:23:13Z", "pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 966, "stargazers_count": 967,
"watchers_count": 966, "watchers_count": 967,
"has_discussions": false, "has_discussions": false,
"forks_count": 190, "forks_count": 190,
"allow_forking": true, "allow_forking": true,
@ -30,7 +30,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 190, "forks": 190,
"watchers": 966, "watchers": 967,
"score": 0, "score": 0,
"subscribers_count": 26 "subscribers_count": 26
}, },

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-0185", "description": "CVE-2022-0185",
"fork": false, "fork": false,
"created_at": "2022-01-19T06:19:38Z", "created_at": "2022-01-19T06:19:38Z",
"updated_at": "2024-07-07T05:17:58Z", "updated_at": "2024-07-08T20:49:22Z",
"pushed_at": "2022-04-25T04:11:33Z", "pushed_at": "2022-04-25T04:11:33Z",
"stargazers_count": 365, "stargazers_count": 366,
"watchers_count": 365, "watchers_count": 366,
"has_discussions": false, "has_discussions": false,
"forks_count": 58, "forks_count": 58,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 58, "forks": 58,
"watchers": 365, "watchers": 366,
"score": 0, "score": 0,
"subscribers_count": 39 "subscribers_count": 39
}, },

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()", "description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false, "fork": false,
"created_at": "2023-01-10T16:24:51Z", "created_at": "2023-01-10T16:24:51Z",
"updated_at": "2024-07-07T23:51:05Z", "updated_at": "2024-07-08T20:23:44Z",
"pushed_at": "2023-04-12T17:28:49Z", "pushed_at": "2023-04-12T17:28:49Z",
"stargazers_count": 268, "stargazers_count": 267,
"watchers_count": 268, "watchers_count": 267,
"has_discussions": false, "has_discussions": false,
"forks_count": 50, "forks_count": 50,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 50, "forks": 50,
"watchers": 268, "watchers": 267,
"score": 0, "score": 0,
"subscribers_count": 9 "subscribers_count": 9
} }

View file

@ -138,10 +138,10 @@
"description": "Zimbra CVE-2022-27925 PoC", "description": "Zimbra CVE-2022-27925 PoC",
"fork": false, "fork": false,
"created_at": "2022-08-20T15:58:29Z", "created_at": "2022-08-20T15:58:29Z",
"updated_at": "2024-06-06T08:46:22Z", "updated_at": "2024-07-08T20:23:41Z",
"pushed_at": "2022-08-27T20:30:21Z", "pushed_at": "2022-08-27T20:30:21Z",
"stargazers_count": 44, "stargazers_count": 42,
"watchers_count": 44, "watchers_count": 42,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
@ -156,7 +156,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 44, "watchers": 42,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692", "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false, "fork": false,
"created_at": "2023-06-10T08:31:26Z", "created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-07-01T09:10:08Z", "updated_at": "2024-07-08T22:13:14Z",
"pushed_at": "2024-04-05T06:46:47Z", "pushed_at": "2024-04-05T06:46:47Z",
"stargazers_count": 235, "stargazers_count": 236,
"watchers_count": 235, "watchers_count": 236,
"has_discussions": true, "has_discussions": true,
"forks_count": 33, "forks_count": 33,
"allow_forking": true, "allow_forking": true,
@ -28,7 +28,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 33, "forks": 33,
"watchers": 235, "watchers": 236,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -13,10 +13,10 @@
"description": "Bitrix Vulnerability CVE-2022-43959", "description": "Bitrix Vulnerability CVE-2022-43959",
"fork": false, "fork": false,
"created_at": "2022-10-28T08:52:17Z", "created_at": "2022-10-28T08:52:17Z",
"updated_at": "2024-02-28T08:22:02Z", "updated_at": "2024-07-08T21:00:34Z",
"pushed_at": "2023-03-18T10:34:26Z", "pushed_at": "2023-03-18T10:34:26Z",
"stargazers_count": 4, "stargazers_count": 3,
"watchers_count": 4, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 4, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -73,10 +73,10 @@
"description": "CVE-2022-46689", "description": "CVE-2022-46689",
"fork": false, "fork": false,
"created_at": "2022-12-26T00:08:55Z", "created_at": "2022-12-26T00:08:55Z",
"updated_at": "2024-06-07T00:32:50Z", "updated_at": "2024-07-08T20:43:26Z",
"pushed_at": "2023-10-10T16:53:48Z", "pushed_at": "2023-10-10T16:53:48Z",
"stargazers_count": 116, "stargazers_count": 117,
"watchers_count": 116, "watchers_count": 117,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -85,7 +85,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 116, "watchers": 117,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
}, },

View file

@ -18,13 +18,13 @@
"stargazers_count": 191, "stargazers_count": 191,
"watchers_count": 191, "watchers_count": 191,
"has_discussions": false, "has_discussions": false,
"forks_count": 34, "forks_count": 33,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 34, "forks": 33,
"watchers": 191, "watchers": 191,
"score": 0, "score": 0,
"subscribers_count": 10 "subscribers_count": 10

View file

@ -56,7 +56,7 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -68,7 +68,7 @@
"hackthebox" "hackthebox"
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-07-08T14:15:46Z", "updated_at": "2024-07-09T00:16:03Z",
"pushed_at": "2024-07-05T12:35:27Z", "pushed_at": "2024-07-05T12:35:27Z",
"stargazers_count": 959, "stargazers_count": 961,
"watchers_count": 959, "watchers_count": 961,
"has_discussions": false, "has_discussions": false,
"forks_count": 162, "forks_count": 162,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 162, "forks": 162,
"watchers": 959, "watchers": 961,
"score": 0, "score": 0,
"subscribers_count": 16 "subscribers_count": 16
}, },

View file

@ -13,10 +13,10 @@
"description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely", "description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
"fork": false, "fork": false,
"created_at": "2024-06-18T09:22:59Z", "created_at": "2024-06-18T09:22:59Z",
"updated_at": "2024-07-07T04:49:30Z", "updated_at": "2024-07-08T22:49:10Z",
"pushed_at": "2024-06-18T09:35:44Z", "pushed_at": "2024-06-18T09:35:44Z",
"stargazers_count": 39, "stargazers_count": 41,
"watchers_count": 39, "watchers_count": 41,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 39, "watchers": 41,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false, "fork": false,
"created_at": "2024-03-20T21:16:41Z", "created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-07-08T16:03:47Z", "updated_at": "2024-07-08T20:23:49Z",
"pushed_at": "2024-04-17T16:09:54Z", "pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2174, "stargazers_count": 2173,
"watchers_count": 2174, "watchers_count": 2173,
"has_discussions": false, "has_discussions": false,
"forks_count": 283, "forks_count": 283,
"allow_forking": true, "allow_forking": true,
@ -31,7 +31,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 283, "forks": 283,
"watchers": 2174, "watchers": 2173,
"score": 0, "score": 0,
"subscribers_count": 23 "subscribers_count": 23
}, },

View file

@ -13,10 +13,10 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false, "fork": false,
"created_at": "2024-04-13T05:53:02Z", "created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-07-08T04:00:47Z", "updated_at": "2024-07-08T20:23:50Z",
"pushed_at": "2024-04-16T21:00:14Z", "pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 245, "stargazers_count": 244,
"watchers_count": 245, "watchers_count": 244,
"has_discussions": false, "has_discussions": false,
"forks_count": 56, "forks_count": 56,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 56, "forks": 56,
"watchers": 245, "watchers": 244,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -13,10 +13,10 @@
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762", "description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
"fork": false, "fork": false,
"created_at": "2024-02-28T21:16:10Z", "created_at": "2024-02-28T21:16:10Z",
"updated_at": "2024-06-29T01:59:53Z", "updated_at": "2024-07-08T22:34:58Z",
"pushed_at": "2024-07-05T09:37:05Z", "pushed_at": "2024-07-05T09:37:05Z",
"stargazers_count": 91, "stargazers_count": 92,
"watchers_count": 91, "watchers_count": 92,
"has_discussions": false, "has_discussions": false,
"forks_count": 13, "forks_count": 13,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 13, "forks": 13,
"watchers": 91, "watchers": 92,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server", "description": "CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server",
"fork": false, "fork": false,
"created_at": "2024-07-06T17:55:25Z", "created_at": "2024-07-06T17:55:25Z",
"updated_at": "2024-07-08T11:26:00Z", "updated_at": "2024-07-09T00:10:06Z",
"pushed_at": "2024-07-06T18:10:20Z", "pushed_at": "2024-07-06T18:10:20Z",
"stargazers_count": 8, "stargazers_count": 9,
"watchers_count": 8, "watchers_count": 9,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 8, "watchers": 9,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -223,10 +223,10 @@
"description": "CVE-2024-28955 Exploitation PoC ", "description": "CVE-2024-28955 Exploitation PoC ",
"fork": false, "fork": false,
"created_at": "2024-07-01T11:49:51Z", "created_at": "2024-07-01T11:49:51Z",
"updated_at": "2024-07-06T07:24:46Z", "updated_at": "2024-07-08T19:15:04Z",
"pushed_at": "2024-07-01T12:53:21Z", "pushed_at": "2024-07-01T12:53:21Z",
"stargazers_count": 24, "stargazers_count": 25,
"watchers_count": 24, "watchers_count": 25,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -244,7 +244,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 24, "watchers": 25,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -13,10 +13,10 @@
"description": "Jasmin ransomware web panel path traversal PoC", "description": "Jasmin ransomware web panel path traversal PoC",
"fork": false, "fork": false,
"created_at": "2024-04-04T22:59:55Z", "created_at": "2024-04-04T22:59:55Z",
"updated_at": "2024-05-22T21:42:43Z", "updated_at": "2024-07-08T20:23:49Z",
"pushed_at": "2024-04-09T03:40:52Z", "pushed_at": "2024-04-09T03:40:52Z",
"stargazers_count": 23, "stargazers_count": 22,
"watchers_count": 23, "watchers_count": 22,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 23, "watchers": 22,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false, "fork": false,
"created_at": "2024-04-01T14:28:09Z", "created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-07-08T08:13:44Z", "updated_at": "2024-07-08T20:23:49Z",
"pushed_at": "2024-04-03T04:58:50Z", "pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3470, "stargazers_count": 3469,
"watchers_count": 3470, "watchers_count": 3469,
"has_discussions": false, "has_discussions": false,
"forks_count": 235, "forks_count": 235,
"allow_forking": true, "allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 235, "forks": 235,
"watchers": 3470, "watchers": 3469,
"score": 0, "score": 0,
"subscribers_count": 39 "subscribers_count": 39
}, },

View file

@ -288,13 +288,13 @@
"stargazers_count": 141, "stargazers_count": 141,
"watchers_count": 141, "watchers_count": 141,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 24,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 24,
"watchers": 141, "watchers": 141,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -283,10 +283,10 @@
"description": "CosmicSting: critical unauthenticated XXE vulnerability in Adobe Commerce and Magento (CVE-2024-34102)", "description": "CosmicSting: critical unauthenticated XXE vulnerability in Adobe Commerce and Magento (CVE-2024-34102)",
"fork": false, "fork": false,
"created_at": "2024-07-01T08:19:28Z", "created_at": "2024-07-01T08:19:28Z",
"updated_at": "2024-07-05T09:26:05Z", "updated_at": "2024-07-08T22:50:07Z",
"pushed_at": "2024-07-05T09:26:02Z", "pushed_at": "2024-07-05T09:26:02Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -295,7 +295,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -43,10 +43,10 @@
"description": "POC", "description": "POC",
"fork": false, "fork": false,
"created_at": "2024-07-05T03:02:30Z", "created_at": "2024-07-05T03:02:30Z",
"updated_at": "2024-07-05T10:11:45Z", "updated_at": "2024-07-08T18:50:33Z",
"pushed_at": "2024-07-05T03:05:39Z", "pushed_at": "2024-07-05T03:05:39Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,19 +13,19 @@
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.", "description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
"fork": false, "fork": false,
"created_at": "2024-07-06T00:49:40Z", "created_at": "2024-07-06T00:49:40Z",
"updated_at": "2024-07-08T17:58:24Z", "updated_at": "2024-07-08T21:10:29Z",
"pushed_at": "2024-07-08T12:45:40Z", "pushed_at": "2024-07-08T12:45:40Z",
"stargazers_count": 69, "stargazers_count": 73,
"watchers_count": 69, "watchers_count": 73,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 12,
"watchers": 69, "watchers": 73,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server", "description": "CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server",
"fork": false, "fork": false,
"created_at": "2024-07-06T18:29:13Z", "created_at": "2024-07-06T18:29:13Z",
"updated_at": "2024-07-08T03:12:39Z", "updated_at": "2024-07-09T00:11:41Z",
"pushed_at": "2024-07-06T18:38:16Z", "pushed_at": "2024-07-06T18:38:16Z",
"stargazers_count": 2, "stargazers_count": 4,
"watchers_count": 2, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-07-03T07:26:07Z", "created_at": "2024-07-03T07:26:07Z",
"updated_at": "2024-07-08T09:05:48Z", "updated_at": "2024-07-08T20:33:52Z",
"pushed_at": "2024-07-04T04:23:40Z", "pushed_at": "2024-07-04T04:23:40Z",
"stargazers_count": 26, "stargazers_count": 27,
"watchers_count": 26, "watchers_count": 27,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 26, "watchers": 27,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

32
2024/CVE-2024-39031.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 826000412,
"name": "CVE-2024-39031",
"full_name": "toneemarqus\/CVE-2024-39031",
"owner": {
"login": "toneemarqus",
"id": 85018947,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85018947?v=4",
"html_url": "https:\/\/github.com\/toneemarqus"
},
"html_url": "https:\/\/github.com\/toneemarqus\/CVE-2024-39031",
"description": "Stored Cross-Side Scripting (XSS) leads to privilege escalation in SilverPeas social-networking portal",
"fork": false,
"created_at": "2024-07-08T23:21:52Z",
"updated_at": "2024-07-08T23:40:32Z",
"pushed_at": "2024-07-08T23:40:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2024-4883", "description": "Exploit for CVE-2024-4883",
"fork": false, "fork": false,
"created_at": "2024-07-08T12:14:01Z", "created_at": "2024-07-08T12:14:01Z",
"updated_at": "2024-07-08T12:54:43Z", "updated_at": "2024-07-09T00:27:44Z",
"pushed_at": "2024-07-08T12:14:18Z", "pushed_at": "2024-07-08T12:14:18Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2024-4885", "description": "Exploit for CVE-2024-4885",
"fork": false, "fork": false,
"created_at": "2024-07-08T12:14:42Z", "created_at": "2024-07-08T12:14:42Z",
"updated_at": "2024-07-08T13:00:38Z", "updated_at": "2024-07-09T00:31:11Z",
"pushed_at": "2024-07-08T12:15:00Z", "pushed_at": "2024-07-08T12:15:00Z",
"stargazers_count": 3, "stargazers_count": 6,
"watchers_count": 3, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 3, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2024-5009", "description": "Exploit for CVE-2024-5009",
"fork": false, "fork": false,
"created_at": "2024-07-08T12:15:29Z", "created_at": "2024-07-08T12:15:29Z",
"updated_at": "2024-07-08T13:50:41Z", "updated_at": "2024-07-09T00:00:02Z",
"pushed_at": "2024-07-08T12:15:41Z", "pushed_at": "2024-07-08T12:15:41Z",
"stargazers_count": 2, "stargazers_count": 4,
"watchers_count": 2, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -56,10 +56,10 @@
"description": "a signal handler race condition in OpenSSH's server (sshd)", "description": "a signal handler race condition in OpenSSH's server (sshd)",
"fork": false, "fork": false,
"created_at": "2024-07-01T10:55:29Z", "created_at": "2024-07-01T10:55:29Z",
"updated_at": "2024-07-08T11:15:21Z", "updated_at": "2024-07-08T21:27:30Z",
"pushed_at": "2024-07-01T10:54:02Z", "pushed_at": "2024-07-01T10:54:02Z",
"stargazers_count": 414, "stargazers_count": 415,
"watchers_count": 414, "watchers_count": 415,
"has_discussions": false, "has_discussions": false,
"forks_count": 179, "forks_count": 179,
"allow_forking": true, "allow_forking": true,
@ -68,7 +68,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 179, "forks": 179,
"watchers": 414, "watchers": 415,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },
@ -86,10 +86,10 @@
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc", "description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false, "fork": false,
"created_at": "2024-07-01T12:16:21Z", "created_at": "2024-07-01T12:16:21Z",
"updated_at": "2024-07-08T03:28:13Z", "updated_at": "2024-07-08T21:10:06Z",
"pushed_at": "2024-07-01T12:25:01Z", "pushed_at": "2024-07-01T12:25:01Z",
"stargazers_count": 367, "stargazers_count": 368,
"watchers_count": 367, "watchers_count": 368,
"has_discussions": false, "has_discussions": false,
"forks_count": 82, "forks_count": 82,
"allow_forking": true, "allow_forking": true,
@ -98,7 +98,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 82, "forks": 82,
"watchers": 367, "watchers": 368,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7
}, },
@ -303,10 +303,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH", "description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false, "fork": false,
"created_at": "2024-07-01T20:33:20Z", "created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-07-08T18:11:48Z", "updated_at": "2024-07-08T18:59:12Z",
"pushed_at": "2024-07-08T18:11:44Z", "pushed_at": "2024-07-08T18:11:44Z",
"stargazers_count": 370, "stargazers_count": 371,
"watchers_count": 370, "watchers_count": 371,
"has_discussions": false, "has_discussions": false,
"forks_count": 76, "forks_count": 76,
"allow_forking": true, "allow_forking": true,
@ -321,7 +321,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 76, "forks": 76,
"watchers": 370, "watchers": 371,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },
@ -1135,8 +1135,8 @@
"description": "CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure.", "description": "CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure.",
"fork": false, "fork": false,
"created_at": "2024-07-02T11:55:39Z", "created_at": "2024-07-02T11:55:39Z",
"updated_at": "2024-07-08T14:55:03Z", "updated_at": "2024-07-08T20:39:05Z",
"pushed_at": "2024-07-02T23:32:12Z", "pushed_at": "2024-07-08T20:39:03Z",
"stargazers_count": 8, "stargazers_count": 8,
"watchers_count": 8, "watchers_count": 8,
"has_discussions": false, "has_discussions": false,
@ -1659,51 +1659,21 @@
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
{
"id": 823339380,
"name": "CVE-2024-6387-regreSSHion-Checker",
"full_name": "EkaterinaMarchetti\/CVE-2024-6387-regreSSHion-Checker",
"owner": {
"login": "EkaterinaMarchetti",
"id": 166263130,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166263130?v=4",
"html_url": "https:\/\/github.com\/EkaterinaMarchetti"
},
"html_url": "https:\/\/github.com\/EkaterinaMarchetti\/CVE-2024-6387-regreSSHion-Checker",
"description": null,
"fork": false,
"created_at": "2024-07-02T21:13:45Z",
"updated_at": "2024-07-02T21:13:46Z",
"pushed_at": "2024-07-02T21:13:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{ {
"id": 823340268, "id": 823340268,
"name": "CVE-2024-6387-Tester", "name": "CVE-2024-6387",
"full_name": "grupooruss\/CVE-2024-6387-Tester", "full_name": "grupooruss\/CVE-2024-6387",
"owner": { "owner": {
"login": "grupooruss", "login": "grupooruss",
"id": 43943489, "id": 43943489,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43943489?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43943489?v=4",
"html_url": "https:\/\/github.com\/grupooruss" "html_url": "https:\/\/github.com\/grupooruss"
}, },
"html_url": "https:\/\/github.com\/grupooruss\/CVE-2024-6387-Tester", "html_url": "https:\/\/github.com\/grupooruss\/CVE-2024-6387",
"description": "regreSSHion vulnerability in OpenSSH CVE-2024-6387 Testing Script", "description": "regreSSHion vulnerability in OpenSSH CVE-2024-6387 Testing Script",
"fork": false, "fork": false,
"created_at": "2024-07-02T21:16:45Z", "created_at": "2024-07-02T21:16:45Z",
"updated_at": "2024-07-06T19:00:14Z", "updated_at": "2024-07-08T23:58:50Z",
"pushed_at": "2024-07-02T21:30:12Z", "pushed_at": "2024-07-02T21:30:12Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
@ -2366,8 +2336,8 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false, "fork": false,
"created_at": "2024-07-08T11:27:49Z", "created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-07-08T18:16:44Z", "updated_at": "2024-07-08T20:03:38Z",
"pushed_at": "2024-07-08T18:16:41Z", "pushed_at": "2024-07-08T20:03:35Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -956,8 +956,7 @@
- [xonoxitron/regreSSHion-checker](https://github.com/xonoxitron/regreSSHion-checker) - [xonoxitron/regreSSHion-checker](https://github.com/xonoxitron/regreSSHion-checker)
- [BrandonLynch2402/cve-2024-6387-nuclei-template](https://github.com/BrandonLynch2402/cve-2024-6387-nuclei-template) - [BrandonLynch2402/cve-2024-6387-nuclei-template](https://github.com/BrandonLynch2402/cve-2024-6387-nuclei-template)
- [edsonjt81/CVE-2024-6387_Check](https://github.com/edsonjt81/CVE-2024-6387_Check) - [edsonjt81/CVE-2024-6387_Check](https://github.com/edsonjt81/CVE-2024-6387_Check)
- [EkaterinaMarchetti/CVE-2024-6387-regreSSHion-Checker](https://github.com/EkaterinaMarchetti/CVE-2024-6387-regreSSHion-Checker) - [grupooruss/CVE-2024-6387](https://github.com/grupooruss/CVE-2024-6387)
- [grupooruss/CVE-2024-6387-Tester](https://github.com/grupooruss/CVE-2024-6387-Tester)
- [CognisysGroup/CVE-2024-6387-Checker](https://github.com/CognisysGroup/CVE-2024-6387-Checker) - [CognisysGroup/CVE-2024-6387-Checker](https://github.com/CognisysGroup/CVE-2024-6387-Checker)
- [sxlmnwb/CVE-2024-6387](https://github.com/sxlmnwb/CVE-2024-6387) - [sxlmnwb/CVE-2024-6387](https://github.com/sxlmnwb/CVE-2024-6387)
- [Symbolexe/CVE-2024-6387](https://github.com/Symbolexe/CVE-2024-6387) - [Symbolexe/CVE-2024-6387](https://github.com/Symbolexe/CVE-2024-6387)
@ -3373,6 +3372,9 @@
- [Havoc10-sw/Detect_polyfill_CVE-2024-38537-](https://github.com/Havoc10-sw/Detect_polyfill_CVE-2024-38537-) - [Havoc10-sw/Detect_polyfill_CVE-2024-38537-](https://github.com/Havoc10-sw/Detect_polyfill_CVE-2024-38537-)
### CVE-2024-39031
- [toneemarqus/CVE-2024-39031](https://github.com/toneemarqus/CVE-2024-39031)
### CVE-2024-39203 (2024-07-08) ### CVE-2024-39203 (2024-07-08)
<code>A cross-site scripting (XSS) vulnerability in the Backend Theme Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. <code>A cross-site scripting (XSS) vulnerability in the Backend Theme Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
@ -44391,6 +44393,7 @@
- [0xTabun/CVE-2007-2447](https://github.com/0xTabun/CVE-2007-2447) - [0xTabun/CVE-2007-2447](https://github.com/0xTabun/CVE-2007-2447)
- [ShivamDey/Samba-CVE-2007-2447-Exploit](https://github.com/ShivamDey/Samba-CVE-2007-2447-Exploit) - [ShivamDey/Samba-CVE-2007-2447-Exploit](https://github.com/ShivamDey/Samba-CVE-2007-2447-Exploit)
- [Juantos/cve-2007-2447](https://github.com/Juantos/cve-2007-2447) - [Juantos/cve-2007-2447](https://github.com/Juantos/cve-2007-2447)
- [IamLucif3r/CVE-2007-2447-Exploit](https://github.com/IamLucif3r/CVE-2007-2447-Exploit)
### CVE-2007-3830 (2007-07-17) ### CVE-2007-3830 (2007-07-17)