Auto Update 2024/03/31 18:26:50

This commit is contained in:
motikan2010-bot 2024-04-01 03:26:50 +09:00
parent 7c48b84679
commit 778dd67b4c
41 changed files with 366 additions and 263 deletions

View file

@ -27,7 +27,7 @@
"forks": 3,
"watchers": 43,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 452158483,

View file

@ -57,6 +57,6 @@
"forks": 19,
"watchers": 32,
"score": 0,
"subscribers_count": 52
"subscribers_count": 51
}
]

View file

@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-03-28T20:23:43Z",
"updated_at": "2024-03-31T16:47:42Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 808,
"watchers_count": 808,
"stargazers_count": 809,
"watchers_count": 809,
"has_discussions": false,
"forks_count": 428,
"allow_forking": true,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 428,
"watchers": 808,
"watchers": 809,
"score": 0,
"subscribers_count": 11
},
@ -1523,6 +1523,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -303,5 +303,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 780003073,
"name": "Upgraded_BlueBourne-CVE-2017-0785-",
"full_name": "MasterCode112\/Upgraded_BlueBourne-CVE-2017-0785-",
"owner": {
"login": "MasterCode112",
"id": 105772414,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105772414?v=4",
"html_url": "https:\/\/github.com\/MasterCode112"
},
"html_url": "https:\/\/github.com\/MasterCode112\/Upgraded_BlueBourne-CVE-2017-0785-",
"description": "upgraded of BlueBourne CVE-2017-0785 to python3 ",
"fork": false,
"created_at": "2024-03-31T12:22:11Z",
"updated_at": "2024-03-31T12:26:42Z",
"pushed_at": "2024-03-31T12:29:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -103,7 +103,7 @@
"forks": 189,
"watchers": 515,
"score": 0,
"subscribers_count": 20
"subscribers_count": 21
},
{
"id": 151394702,

File diff suppressed because one or more lines are too long

View file

@ -13,10 +13,10 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2024-03-23T12:48:09Z",
"updated_at": "2024-03-31T18:02:00Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 316,
"watchers_count": 316,
"stargazers_count": 317,
"watchers_count": 317,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 316,
"watchers": 317,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2024-03-24T21:48:25Z",
"updated_at": "2024-03-31T17:45:36Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 656,
"watchers_count": 656,
"stargazers_count": 657,
"watchers_count": 657,
"has_discussions": false,
"forks_count": 154,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 154,
"watchers": 656,
"watchers": 657,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code",
"fork": false,
"created_at": "2020-09-03T14:45:51Z",
"updated_at": "2023-07-08T09:45:48Z",
"updated_at": "2024-03-31T12:19:38Z",
"pushed_at": "2020-09-08T20:01:05Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 4
},

View file

@ -103,19 +103,19 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2024-03-30T11:38:24Z",
"updated_at": "2024-03-31T17:35:09Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1131,
"watchers_count": 1131,
"stargazers_count": 1133,
"watchers_count": 1133,
"has_discussions": false,
"forks_count": 285,
"forks_count": 286,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 285,
"watchers": 1131,
"forks": 286,
"watchers": 1133,
"score": 0,
"subscribers_count": 35
},

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-03-25T17:11:02Z",
"updated_at": "2024-03-31T14:24:48Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1083,
"watchers_count": 1083,
"stargazers_count": 1082,
"watchers_count": 1082,
"has_discussions": false,
"forks_count": 321,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 321,
"watchers": 1083,
"watchers": 1082,
"score": 0,
"subscribers_count": 37
}

View file

@ -13,10 +13,10 @@
"description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境",
"fork": false,
"created_at": "2021-02-03T08:14:03Z",
"updated_at": "2024-01-23T09:37:00Z",
"updated_at": "2024-03-31T14:24:41Z",
"pushed_at": "2021-02-07T09:42:36Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 112,
"watchers": 111,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
"fork": false,
"created_at": "2022-01-29T10:14:32Z",
"updated_at": "2024-03-27T17:05:41Z",
"updated_at": "2024-03-31T17:46:00Z",
"pushed_at": "2022-03-03T17:50:03Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 5
}

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-03-25T17:11:02Z",
"updated_at": "2024-03-31T14:24:48Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1083,
"watchers_count": 1083,
"stargazers_count": 1082,
"watchers_count": 1082,
"has_discussions": false,
"forks_count": 321,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 321,
"watchers": 1083,
"watchers": 1082,
"score": 0,
"subscribers_count": 37
},

View file

@ -43,10 +43,10 @@
"description": "Collection of materials relating to FORCEDENTRY, will eventually delete this repo and migrate the materials to my main exploit repo once finished",
"fork": false,
"created_at": "2021-12-25T03:00:01Z",
"updated_at": "2024-03-31T11:32:26Z",
"updated_at": "2024-03-31T15:14:27Z",
"pushed_at": "2024-03-30T22:17:05Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 72,
"watchers": 75,
"score": 0,
"subscribers_count": 5
}

View file

@ -109,12 +109,12 @@
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
"fork": false,
"created_at": "2021-07-03T15:15:12Z",
"updated_at": "2024-03-28T06:23:40Z",
"updated_at": "2024-03-31T13:57:21Z",
"pushed_at": "2021-09-13T12:12:17Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 38,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -127,8 +127,8 @@
"windowsexploits"
],
"visibility": "public",
"forks": 38,
"watchers": 104,
"forks": 39,
"watchers": 105,
"score": 0,
"subscribers_count": 8
},

View file

@ -79,10 +79,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2024-03-30T12:59:52Z",
"updated_at": "2024-03-31T18:03:47Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1904,
"watchers_count": 1904,
"stargazers_count": 1905,
"watchers_count": 1905,
"has_discussions": false,
"forks_count": 510,
"allow_forking": true,
@ -91,7 +91,7 @@
"topics": [],
"visibility": "public",
"forks": 510,
"watchers": 1904,
"watchers": 1905,
"score": 0,
"subscribers_count": 21
},
@ -1305,10 +1305,10 @@
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
"fork": false,
"created_at": "2022-01-26T17:53:16Z",
"updated_at": "2024-03-20T23:28:03Z",
"updated_at": "2024-03-31T18:03:09Z",
"pushed_at": "2022-01-28T00:29:15Z",
"stargazers_count": 133,
"watchers_count": 133,
"stargazers_count": 134,
"watchers_count": 134,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -1317,7 +1317,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 133,
"watchers": 134,
"score": 0,
"subscribers_count": 2
},

View file

@ -171,10 +171,10 @@
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
"fork": false,
"created_at": "2021-12-10T06:42:37Z",
"updated_at": "2024-02-29T03:01:44Z",
"updated_at": "2024-03-31T14:25:26Z",
"pushed_at": "2021-12-11T02:49:41Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -196,7 +196,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 119,
"watchers": 118,
"score": 0,
"subscribers_count": 6
},
@ -369,12 +369,12 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2024-03-31T06:01:45Z",
"updated_at": "2024-03-31T14:25:26Z",
"pushed_at": "2023-05-11T11:29:46Z",
"stargazers_count": 1087,
"watchers_count": 1087,
"stargazers_count": 1086,
"watchers_count": 1086,
"has_discussions": false,
"forks_count": 523,
"forks_count": 524,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -382,8 +382,8 @@
"log4shell"
],
"visibility": "public",
"forks": 523,
"watchers": 1087,
"forks": 524,
"watchers": 1086,
"score": 0,
"subscribers_count": 22
},
@ -857,10 +857,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2024-03-25T16:52:50Z",
"updated_at": "2024-03-31T14:25:26Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 923,
"watchers_count": 923,
"stargazers_count": 922,
"watchers_count": 922,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@ -889,7 +889,7 @@
],
"visibility": "public",
"forks": 140,
"watchers": 923,
"watchers": 922,
"score": 0,
"subscribers_count": 25
},
@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-03-16T10:08:41Z",
"updated_at": "2024-03-31T14:25:26Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 762,
"watchers_count": 762,
"stargazers_count": 761,
"watchers_count": 761,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -1285,7 +1285,7 @@
],
"visibility": "public",
"forks": 112,
"watchers": 762,
"watchers": 761,
"score": 0,
"subscribers_count": 11
},
@ -1423,10 +1423,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2024-03-07T21:46:24Z",
"updated_at": "2024-03-31T14:25:26Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 854,
"watchers_count": 854,
"stargazers_count": 853,
"watchers_count": 853,
"has_discussions": false,
"forks_count": 174,
"allow_forking": true,
@ -1448,7 +1448,7 @@
],
"visibility": "public",
"forks": 174,
"watchers": 854,
"watchers": 853,
"score": 0,
"subscribers_count": 33
},
@ -1966,10 +1966,10 @@
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2024-03-14T16:34:43Z",
"updated_at": "2024-03-31T14:25:27Z",
"pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 632,
"watchers_count": 632,
"stargazers_count": 631,
"watchers_count": 631,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
@ -1990,7 +1990,7 @@
],
"visibility": "public",
"forks": 98,
"watchers": 632,
"watchers": 631,
"score": 0,
"subscribers_count": 28
},
@ -2076,10 +2076,10 @@
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-12T01:24:51Z",
"updated_at": "2024-01-30T19:33:04Z",
"updated_at": "2024-03-31T14:25:27Z",
"pushed_at": "2022-10-24T02:25:53Z",
"stargazers_count": 498,
"watchers_count": 498,
"stargazers_count": 497,
"watchers_count": 497,
"has_discussions": false,
"forks_count": 74,
"allow_forking": true,
@ -2088,7 +2088,7 @@
"topics": [],
"visibility": "public",
"forks": 74,
"watchers": 498,
"watchers": 497,
"score": 0,
"subscribers_count": 25
},

View file

@ -735,10 +735,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-07T09:19:02Z",
"updated_at": "2024-03-23T18:28:42Z",
"updated_at": "2024-03-31T14:25:51Z",
"pushed_at": "2022-06-07T10:35:18Z",
"stargazers_count": 327,
"watchers_count": 327,
"stargazers_count": 326,
"watchers_count": 326,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -747,7 +747,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 327,
"watchers": 326,
"score": 0,
"subscribers_count": 7
},

View file

@ -227,10 +227,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
"updated_at": "2024-03-25T03:07:57Z",
"updated_at": "2024-03-31T14:26:05Z",
"pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 301,
"watchers_count": 301,
"stargazers_count": 300,
"watchers_count": 300,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -243,7 +243,7 @@
],
"visibility": "public",
"forks": 45,
"watchers": 301,
"watchers": 300,
"score": 0,
"subscribers_count": 5
},
@ -441,10 +441,10 @@
"description": "A testing tool for CobaltStrike-RCE:CVE-2022-39197; Weblogic-RCE:CVE-2023-21839; MinIO:CVE-2023-28432",
"fork": false,
"created_at": "2023-12-03T13:45:34Z",
"updated_at": "2023-12-05T08:43:25Z",
"updated_at": "2024-03-31T13:58:48Z",
"pushed_at": "2023-12-05T17:58:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -457,7 +457,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-02-21T16:08:56Z",
"updated_at": "2024-03-18T10:46:33Z",
"updated_at": "2024-03-31T14:26:25Z",
"pushed_at": "2023-02-26T06:43:18Z",
"stargazers_count": 214,
"watchers_count": 214,
"stargazers_count": 213,
"watchers_count": 213,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 214,
"watchers": 213,
"score": 0,
"subscribers_count": 3
},
@ -193,10 +193,10 @@
"description": "A testing tool for CobaltStrike-RCE:CVE-2022-39197; Weblogic-RCE:CVE-2023-21839; MinIO:CVE-2023-28432",
"fork": false,
"created_at": "2023-12-03T13:45:34Z",
"updated_at": "2023-12-05T08:43:25Z",
"updated_at": "2024-03-31T13:58:48Z",
"pushed_at": "2023-12-05T17:58:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -209,7 +209,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "JDK CVE-2023-21939",
"fork": false,
"created_at": "2023-08-26T06:45:26Z",
"updated_at": "2024-01-22T12:25:07Z",
"updated_at": "2024-03-31T14:26:53Z",
"pushed_at": "2023-08-26T06:57:55Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 97,
"watchers_count": 97,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 98,
"watchers": 97,
"score": 0,
"subscribers_count": 0
}

View file

@ -43,10 +43,10 @@
"description": "Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践",
"fork": false,
"created_at": "2023-05-11T07:37:52Z",
"updated_at": "2024-03-22T07:10:50Z",
"updated_at": "2024-03-31T14:26:40Z",
"pushed_at": "2023-08-08T02:30:25Z",
"stargazers_count": 214,
"watchers_count": 214,
"stargazers_count": 213,
"watchers_count": 213,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 214,
"watchers": 213,
"score": 0,
"subscribers_count": 4
},

View file

@ -470,12 +470,12 @@
"description": "Joomla! < 4.2.8 - Unauthenticated information disclosure",
"fork": false,
"created_at": "2023-03-24T11:50:16Z",
"updated_at": "2024-03-30T15:59:11Z",
"updated_at": "2024-03-31T16:57:53Z",
"pushed_at": "2023-12-27T11:30:46Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -488,8 +488,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 14,
"watchers": 70,
"forks": 15,
"watchers": 71,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-04-16T20:20:32Z",
"updated_at": "2024-01-18T05:26:53Z",
"pushed_at": "2024-02-02T13:47:35Z",
"pushed_at": "2024-03-31T17:55:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "TP-Link ER7206 Omada Gigabit VPN Router uhttpd freeStrategy Command injection Vulnerability",
"fork": false,
"created_at": "2024-03-31T02:04:34Z",
"updated_at": "2024-03-31T08:07:59Z",
"updated_at": "2024-03-31T12:40:03Z",
"pushed_at": "2024-03-31T02:07:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-03-31T12:09:33Z",
"pushed_at": "2024-03-29T13:34:43Z",
"stargazers_count": 277,
"watchers_count": 277,
"updated_at": "2024-03-31T18:24:20Z",
"pushed_at": "2024-03-31T18:21:33Z",
"stargazers_count": 283,
"watchers_count": 283,
"has_discussions": false,
"forks_count": 44,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 277,
"forks": 46,
"watchers": 283,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2024-0582 (io_uring)",
"fork": false,
"created_at": "2024-03-29T14:45:22Z",
"updated_at": "2024-03-31T11:59:20Z",
"updated_at": "2024-03-31T15:22:13Z",
"pushed_at": "2024-03-29T16:05:31Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-03-31T12:25:59Z",
"updated_at": "2024-03-31T18:17:44Z",
"pushed_at": "2024-03-27T09:22:28Z",
"stargazers_count": 1041,
"watchers_count": 1041,
"stargazers_count": 1053,
"watchers_count": 1053,
"has_discussions": false,
"forks_count": 99,
"forks_count": 101,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc"
],
"visibility": "public",
"forks": 99,
"watchers": 1041,
"forks": 101,
"watchers": 1053,
"score": 0,
"subscribers_count": 9
}

View file

@ -1,32 +0,0 @@
[
{
"id": 779578067,
"name": "CVE-2024-2086-GOOGLE-DRIVE",
"full_name": "MrCyberSecs\/CVE-2024-2086-GOOGLE-DRIVE",
"owner": {
"login": "MrCyberSecs",
"id": 165462852,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165462852?v=4",
"html_url": "https:\/\/github.com\/MrCyberSecs"
},
"html_url": "https:\/\/github.com\/MrCyberSecs\/CVE-2024-2086-GOOGLE-DRIVE",
"description": "The Integrate Google Drive unauthorized access of data",
"fork": false,
"created_at": "2024-03-30T07:45:18Z",
"updated_at": "2024-03-30T21:25:32Z",
"pushed_at": "2024-03-30T07:54:18Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "The Poc for CVE-2024-20931",
"fork": false,
"created_at": "2024-02-02T01:58:49Z",
"updated_at": "2024-03-27T18:45:37Z",
"updated_at": "2024-03-31T14:27:15Z",
"pushed_at": "2024-02-02T02:05:01Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 70,
"watchers": 69,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Report and exploit of CVE-2024-21305. ",
"fork": false,
"created_at": "2023-12-16T23:27:34Z",
"updated_at": "2024-03-22T13:51:25Z",
"updated_at": "2024-03-31T17:55:06Z",
"pushed_at": "2024-01-14T17:21:42Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "This Python script exploits a vulnerability (CVE-2024-21388) in Microsoft Edge, allowing silent installation of browser extensions with elevated privileges via a private API.",
"fork": false,
"created_at": "2024-03-28T09:31:31Z",
"updated_at": "2024-03-29T20:31:44Z",
"updated_at": "2024-03-31T15:39:48Z",
"pushed_at": "2024-03-28T09:33:23Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
"fork": false,
"created_at": "2024-02-15T19:57:38Z",
"updated_at": "2024-03-26T05:56:32Z",
"updated_at": "2024-03-31T14:14:51Z",
"pushed_at": "2024-02-17T07:08:49Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 134,
"watchers_count": 134,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 135,
"watchers": 134,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,10 +43,10 @@
"description": "PoC and Detection for CVE-2024-21626",
"fork": false,
"created_at": "2024-02-01T15:28:37Z",
"updated_at": "2024-03-28T08:09:37Z",
"updated_at": "2024-03-31T15:29:52Z",
"pushed_at": "2024-02-06T16:09:05Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 52,
"watchers": 53,
"score": 0,
"subscribers_count": 3
},
@ -253,19 +253,19 @@
"description": null,
"fork": false,
"created_at": "2024-03-15T10:38:27Z",
"updated_at": "2024-03-17T21:32:11Z",
"updated_at": "2024-03-31T15:30:17Z",
"pushed_at": "2024-03-17T21:43:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Workaround for disabling the CLI to mitigate SECURITY-3314\/CVE-2024-23897 and SECURITY-3315\/CVE-2024-23898",
"fork": false,
"created_at": "2024-01-23T19:19:04Z",
"updated_at": "2024-03-15T03:05:36Z",
"updated_at": "2024-03-31T14:14:47Z",
"pushed_at": "2024-02-20T14:13:25Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 6,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "WallEscape vulnerability in util-linux",
"fork": false,
"created_at": "2024-03-11T00:15:03Z",
"updated_at": "2024-03-31T08:08:52Z",
"updated_at": "2024-03-31T12:59:44Z",
"pushed_at": "2024-03-30T01:32:02Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-28247.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 780056999,
"name": "CVE-2024-28247-Pi-hole-Arbitrary-File-Read",
"full_name": "T0X1Cx\/CVE-2024-28247-Pi-hole-Arbitrary-File-Read",
"owner": {
"login": "T0X1Cx",
"id": 71453093,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71453093?v=4",
"html_url": "https:\/\/github.com\/T0X1Cx"
},
"html_url": "https:\/\/github.com\/T0X1Cx\/CVE-2024-28247-Pi-hole-Arbitrary-File-Read",
"description": "This repository provides an exploit for CVE-2024-28247, highlighting a vulnerability that permits a remote attacker to read arbitrary files on the system.",
"fork": false,
"created_at": "2024-03-31T15:25:15Z",
"updated_at": "2024-03-31T15:47:25Z",
"pushed_at": "2024-03-31T15:49:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
"fork": false,
"created_at": "2024-03-11T10:14:39Z",
"updated_at": "2024-03-31T12:26:46Z",
"updated_at": "2024-03-31T18:19:30Z",
"pushed_at": "2024-03-25T12:56:16Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 52,
"watchers": 53,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Information for CVE-2024-3094",
"fork": false,
"created_at": "2024-03-29T17:03:01Z",
"updated_at": "2024-03-31T08:43:34Z",
"updated_at": "2024-03-31T16:10:13Z",
"pushed_at": "2024-03-30T19:50:27Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 21,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},
@ -43,19 +43,19 @@
"description": "Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)",
"fork": false,
"created_at": "2024-03-29T20:28:17Z",
"updated_at": "2024-03-31T10:38:05Z",
"updated_at": "2024-03-31T16:22:20Z",
"pushed_at": "2024-03-31T00:13:39Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 31,
"forks": 6,
"watchers": 32,
"score": 0,
"subscribers_count": 1
},
@ -231,10 +231,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-30T07:38:39Z",
"updated_at": "2024-03-31T10:41:30Z",
"updated_at": "2024-03-31T15:19:03Z",
"pushed_at": "2024-03-30T08:08:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -243,7 +243,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -261,19 +261,19 @@
"description": "History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.",
"fork": false,
"created_at": "2024-03-30T10:48:54Z",
"updated_at": "2024-03-31T11:59:50Z",
"pushed_at": "2024-03-30T11:06:31Z",
"stargazers_count": 3,
"watchers_count": 3,
"updated_at": "2024-03-31T17:42:42Z",
"pushed_at": "2024-03-31T14:36:49Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
@ -357,10 +357,10 @@
"description": "K8S and Docker Vulnerability Check for CVE-2024-3094",
"fork": false,
"created_at": "2024-03-30T17:35:49Z",
"updated_at": "2024-03-31T12:00:37Z",
"pushed_at": "2024-03-30T20:38:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"updated_at": "2024-03-31T16:37:42Z",
"pushed_at": "2024-03-31T14:36:00Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -369,7 +369,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -387,18 +387,28 @@
"description": "This project contains a shell script designed to help users identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6).",
"fork": false,
"created_at": "2024-03-30T19:23:30Z",
"updated_at": "2024-03-30T19:54:26Z",
"updated_at": "2024-03-31T17:49:29Z",
"pushed_at": "2024-03-31T09:53:55Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": true,
"topics": [],
"topics": [
"cve-2024-3094",
"linux",
"vulnerabilities",
"vulnerability-detection",
"vulnerability-scanners",
"xz",
"xz-compression-utilities",
"xz-files",
"xz-utils"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1
@ -477,12 +487,12 @@
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
"fork": false,
"created_at": "2024-03-30T22:07:24Z",
"updated_at": "2024-03-31T12:12:00Z",
"updated_at": "2024-03-31T18:25:54Z",
"pushed_at": "2024-03-31T11:28:32Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 3,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -493,8 +503,8 @@
"xz"
],
"visibility": "public",
"forks": 3,
"watchers": 13,
"forks": 7,
"watchers": 33,
"score": 0,
"subscribers_count": 1
},
@ -606,10 +616,10 @@
"description": "A script to detect if xz is vulnerable - CVE-2024-3094",
"fork": false,
"created_at": "2024-03-31T10:45:44Z",
"updated_at": "2024-03-31T11:08:53Z",
"updated_at": "2024-03-31T13:34:17Z",
"pushed_at": "2024-03-31T11:02:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -618,7 +628,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
@ -681,5 +691,65 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 780033593,
"name": "CVE-2024-3094-patcher",
"full_name": "Simplifi-ED\/CVE-2024-3094-patcher",
"owner": {
"login": "Simplifi-ED",
"id": 75945575,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75945575?v=4",
"html_url": "https:\/\/github.com\/Simplifi-ED"
},
"html_url": "https:\/\/github.com\/Simplifi-ED\/CVE-2024-3094-patcher",
"description": "Ansible playbook for patching CVE-2024-3094",
"fork": false,
"created_at": "2024-03-31T14:09:28Z",
"updated_at": "2024-03-31T14:09:29Z",
"pushed_at": "2024-03-31T15:36:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 780105802,
"name": "CVE-2024-3094-Nmap-NSE-script",
"full_name": "gayatriracha\/CVE-2024-3094-Nmap-NSE-script",
"owner": {
"login": "gayatriracha",
"id": 150776676,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150776676?v=4",
"html_url": "https:\/\/github.com\/gayatriracha"
},
"html_url": "https:\/\/github.com\/gayatriracha\/CVE-2024-3094-Nmap-NSE-script",
"description": null,
"fork": false,
"created_at": "2024-03-31T17:53:11Z",
"updated_at": "2024-03-31T17:53:11Z",
"pushed_at": "2024-03-31T17:56:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -186,9 +186,6 @@
- [yuziiiiiiiiii/CVE-2024-2074](https://github.com/yuziiiiiiiiii/CVE-2024-2074)
### CVE-2024-2086
- [MrCyberSecs/CVE-2024-2086-GOOGLE-DRIVE](https://github.com/MrCyberSecs/CVE-2024-2086-GOOGLE-DRIVE)
### CVE-2024-2169
- [douglasbuzatto/G3-Loop-DoS](https://github.com/douglasbuzatto/G3-Loop-DoS)
@ -221,6 +218,8 @@
- [Yuma-Tsushima07/CVE-2024-3094](https://github.com/Yuma-Tsushima07/CVE-2024-3094)
- [jfrog/cve-2024-3094-tools](https://github.com/jfrog/cve-2024-3094-tools)
- [krascovict/OSINT---CVE-2024-3094-](https://github.com/krascovict/OSINT---CVE-2024-3094-)
- [Simplifi-ED/CVE-2024-3094-patcher](https://github.com/Simplifi-ED/CVE-2024-3094-patcher)
- [gayatriracha/CVE-2024-3094-Nmap-NSE-script](https://github.com/gayatriracha/CVE-2024-3094-Nmap-NSE-script)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -948,6 +947,9 @@
### CVE-2024-28116
- [akabe1/Graver](https://github.com/akabe1/Graver)
### CVE-2024-28247
- [T0X1Cx/CVE-2024-28247-Pi-hole-Arbitrary-File-Read](https://github.com/T0X1Cx/CVE-2024-28247-Pi-hole-Arbitrary-File-Read)
### CVE-2024-28288
- [adminquit/CVE-2024-28288](https://github.com/adminquit/CVE-2024-28288)
@ -34007,6 +34009,7 @@
- [sh4rknado/BlueBorn](https://github.com/sh4rknado/BlueBorn)
- [Joanmei/CVE-2017-0785](https://github.com/Joanmei/CVE-2017-0785)
- [CyberKimathi/Py3-CVE-2017-0785](https://github.com/CyberKimathi/Py3-CVE-2017-0785)
- [MasterCode112/Upgraded_BlueBourne-CVE-2017-0785-](https://github.com/MasterCode112/Upgraded_BlueBourne-CVE-2017-0785-)
### CVE-2017-0806 (2017-10-03)