Auto Update 2024/03/31 18:26:50

This commit is contained in:
motikan2010-bot 2024-04-01 03:26:50 +09:00
parent 7c48b84679
commit 778dd67b4c
41 changed files with 366 additions and 263 deletions

View file

@ -27,7 +27,7 @@
"forks": 3, "forks": 3,
"watchers": 43, "watchers": 43,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 4
}, },
{ {
"id": 452158483, "id": 452158483,

View file

@ -57,6 +57,6 @@
"forks": 19, "forks": 19,
"watchers": 32, "watchers": 32,
"score": 0, "score": 0,
"subscribers_count": 52 "subscribers_count": 51
} }
] ]

View file

@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195", "description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false, "fork": false,
"created_at": "2016-11-25T21:08:01Z", "created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-03-28T20:23:43Z", "updated_at": "2024-03-31T16:47:42Z",
"pushed_at": "2021-04-08T11:35:12Z", "pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 808, "stargazers_count": 809,
"watchers_count": 808, "watchers_count": 809,
"has_discussions": false, "has_discussions": false,
"forks_count": 428, "forks_count": 428,
"allow_forking": true, "allow_forking": true,
@ -463,7 +463,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 428, "forks": 428,
"watchers": 808, "watchers": 809,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },
@ -1523,6 +1523,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -303,5 +303,35 @@
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
},
{
"id": 780003073,
"name": "Upgraded_BlueBourne-CVE-2017-0785-",
"full_name": "MasterCode112\/Upgraded_BlueBourne-CVE-2017-0785-",
"owner": {
"login": "MasterCode112",
"id": 105772414,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105772414?v=4",
"html_url": "https:\/\/github.com\/MasterCode112"
},
"html_url": "https:\/\/github.com\/MasterCode112\/Upgraded_BlueBourne-CVE-2017-0785-",
"description": "upgraded of BlueBourne CVE-2017-0785 to python3 ",
"fork": false,
"created_at": "2024-03-31T12:22:11Z",
"updated_at": "2024-03-31T12:26:42Z",
"pushed_at": "2024-03-31T12:29:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -103,7 +103,7 @@
"forks": 189, "forks": 189,
"watchers": 515, "watchers": 515,
"score": 0, "score": 0,
"subscribers_count": 20 "subscribers_count": 21
}, },
{ {
"id": 151394702, "id": 151394702,

File diff suppressed because one or more lines are too long

View file

@ -13,10 +13,10 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root", "description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false, "fork": false,
"created_at": "2019-07-31T04:51:43Z", "created_at": "2019-07-31T04:51:43Z",
"updated_at": "2024-03-23T12:48:09Z", "updated_at": "2024-03-31T18:02:00Z",
"pushed_at": "2019-08-01T16:02:59Z", "pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 316, "stargazers_count": 317,
"watchers_count": 316, "watchers_count": 317,
"has_discussions": false, "has_discussions": false,
"forks_count": 115, "forks_count": 115,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 115, "forks": 115,
"watchers": 316, "watchers": 317,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
}, },

View file

@ -13,10 +13,10 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)", "description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false, "fork": false,
"created_at": "2019-02-12T06:02:06Z", "created_at": "2019-02-12T06:02:06Z",
"updated_at": "2024-03-24T21:48:25Z", "updated_at": "2024-03-31T17:45:36Z",
"pushed_at": "2019-05-09T21:34:26Z", "pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 656, "stargazers_count": 657,
"watchers_count": 656, "watchers_count": 657,
"has_discussions": false, "has_discussions": false,
"forks_count": 154, "forks_count": 154,
"allow_forking": true, "allow_forking": true,
@ -29,7 +29,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 154, "forks": 154,
"watchers": 656, "watchers": 657,
"score": 0, "score": 0,
"subscribers_count": 19 "subscribers_count": 19
}, },

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code", "description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code",
"fork": false, "fork": false,
"created_at": "2020-09-03T14:45:51Z", "created_at": "2020-09-03T14:45:51Z",
"updated_at": "2023-07-08T09:45:48Z", "updated_at": "2024-03-31T12:19:38Z",
"pushed_at": "2020-09-08T20:01:05Z", "pushed_at": "2020-09-08T20:01:05Z",
"stargazers_count": 35, "stargazers_count": 36,
"watchers_count": 35, "watchers_count": 36,
"has_discussions": false, "has_discussions": false,
"forks_count": 10, "forks_count": 10,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 10,
"watchers": 35, "watchers": 36,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -103,19 +103,19 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false, "fork": false,
"created_at": "2020-09-14T16:56:51Z", "created_at": "2020-09-14T16:56:51Z",
"updated_at": "2024-03-30T11:38:24Z", "updated_at": "2024-03-31T17:35:09Z",
"pushed_at": "2020-11-03T09:45:24Z", "pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1131, "stargazers_count": 1133,
"watchers_count": 1131, "watchers_count": 1133,
"has_discussions": false, "has_discussions": false,
"forks_count": 285, "forks_count": 286,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 285, "forks": 286,
"watchers": 1131, "watchers": 1133,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false, "fork": false,
"created_at": "2021-03-11T22:49:17Z", "created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-03-25T17:11:02Z", "updated_at": "2024-03-31T14:24:48Z",
"pushed_at": "2023-05-11T14:36:58Z", "pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1083, "stargazers_count": 1082,
"watchers_count": 1083, "watchers_count": 1082,
"has_discussions": false, "has_discussions": false,
"forks_count": 321, "forks_count": 321,
"allow_forking": true, "allow_forking": true,
@ -149,7 +149,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 321, "forks": 321,
"watchers": 1083, "watchers": 1082,
"score": 0, "score": 0,
"subscribers_count": 37 "subscribers_count": 37
} }

View file

@ -13,10 +13,10 @@
"description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境", "description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境",
"fork": false, "fork": false,
"created_at": "2021-02-03T08:14:03Z", "created_at": "2021-02-03T08:14:03Z",
"updated_at": "2024-01-23T09:37:00Z", "updated_at": "2024-03-31T14:24:41Z",
"pushed_at": "2021-02-07T09:42:36Z", "pushed_at": "2021-02-07T09:42:36Z",
"stargazers_count": 112, "stargazers_count": 111,
"watchers_count": 112, "watchers_count": 111,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 14,
"watchers": 112, "watchers": 111,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
} }

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`", "description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
"fork": false, "fork": false,
"created_at": "2022-01-29T10:14:32Z", "created_at": "2022-01-29T10:14:32Z",
"updated_at": "2024-03-27T17:05:41Z", "updated_at": "2024-03-31T17:46:00Z",
"pushed_at": "2022-03-03T17:50:03Z", "pushed_at": "2022-03-03T17:50:03Z",
"stargazers_count": 93, "stargazers_count": 94,
"watchers_count": 93, "watchers_count": 94,
"has_discussions": false, "has_discussions": false,
"forks_count": 20, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 20,
"watchers": 93, "watchers": 94,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
} }

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false, "fork": false,
"created_at": "2021-03-11T22:49:17Z", "created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-03-25T17:11:02Z", "updated_at": "2024-03-31T14:24:48Z",
"pushed_at": "2023-05-11T14:36:58Z", "pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1083, "stargazers_count": 1082,
"watchers_count": 1083, "watchers_count": 1082,
"has_discussions": false, "has_discussions": false,
"forks_count": 321, "forks_count": 321,
"allow_forking": true, "allow_forking": true,
@ -149,7 +149,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 321, "forks": 321,
"watchers": 1083, "watchers": 1082,
"score": 0, "score": 0,
"subscribers_count": 37 "subscribers_count": 37
}, },

View file

@ -43,10 +43,10 @@
"description": "Collection of materials relating to FORCEDENTRY, will eventually delete this repo and migrate the materials to my main exploit repo once finished", "description": "Collection of materials relating to FORCEDENTRY, will eventually delete this repo and migrate the materials to my main exploit repo once finished",
"fork": false, "fork": false,
"created_at": "2021-12-25T03:00:01Z", "created_at": "2021-12-25T03:00:01Z",
"updated_at": "2024-03-31T11:32:26Z", "updated_at": "2024-03-31T15:14:27Z",
"pushed_at": "2024-03-30T22:17:05Z", "pushed_at": "2024-03-30T22:17:05Z",
"stargazers_count": 72, "stargazers_count": 75,
"watchers_count": 72, "watchers_count": 75,
"has_discussions": false, "has_discussions": false,
"forks_count": 20, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 20,
"watchers": 72, "watchers": 75,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
} }

View file

@ -109,12 +109,12 @@
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits", "description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
"fork": false, "fork": false,
"created_at": "2021-07-03T15:15:12Z", "created_at": "2021-07-03T15:15:12Z",
"updated_at": "2024-03-28T06:23:40Z", "updated_at": "2024-03-31T13:57:21Z",
"pushed_at": "2021-09-13T12:12:17Z", "pushed_at": "2021-09-13T12:12:17Z",
"stargazers_count": 104, "stargazers_count": 105,
"watchers_count": 104, "watchers_count": 105,
"has_discussions": false, "has_discussions": false,
"forks_count": 38, "forks_count": 39,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -127,8 +127,8 @@
"windowsexploits" "windowsexploits"
], ],
"visibility": "public", "visibility": "public",
"forks": 38, "forks": 39,
"watchers": 104, "watchers": 105,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
}, },

View file

@ -79,10 +79,10 @@
"description": "CVE-2021-4034 1day", "description": "CVE-2021-4034 1day",
"fork": false, "fork": false,
"created_at": "2022-01-25T23:51:37Z", "created_at": "2022-01-25T23:51:37Z",
"updated_at": "2024-03-30T12:59:52Z", "updated_at": "2024-03-31T18:03:47Z",
"pushed_at": "2022-06-08T04:00:28Z", "pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1904, "stargazers_count": 1905,
"watchers_count": 1904, "watchers_count": 1905,
"has_discussions": false, "has_discussions": false,
"forks_count": 510, "forks_count": 510,
"allow_forking": true, "allow_forking": true,
@ -91,7 +91,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 510, "forks": 510,
"watchers": 1904, "watchers": 1905,
"score": 0, "score": 0,
"subscribers_count": 21 "subscribers_count": 21
}, },
@ -1305,10 +1305,10 @@
"description": "Python exploit code for CVE-2021-4034 (pwnkit)", "description": "Python exploit code for CVE-2021-4034 (pwnkit)",
"fork": false, "fork": false,
"created_at": "2022-01-26T17:53:16Z", "created_at": "2022-01-26T17:53:16Z",
"updated_at": "2024-03-20T23:28:03Z", "updated_at": "2024-03-31T18:03:09Z",
"pushed_at": "2022-01-28T00:29:15Z", "pushed_at": "2022-01-28T00:29:15Z",
"stargazers_count": 133, "stargazers_count": 134,
"watchers_count": 133, "watchers_count": 134,
"has_discussions": false, "has_discussions": false,
"forks_count": 39, "forks_count": 39,
"allow_forking": true, "allow_forking": true,
@ -1317,7 +1317,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 39, "forks": 39,
"watchers": 133, "watchers": 134,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -171,10 +171,10 @@
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.", "description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
"fork": false, "fork": false,
"created_at": "2021-12-10T06:42:37Z", "created_at": "2021-12-10T06:42:37Z",
"updated_at": "2024-02-29T03:01:44Z", "updated_at": "2024-03-31T14:25:26Z",
"pushed_at": "2021-12-11T02:49:41Z", "pushed_at": "2021-12-11T02:49:41Z",
"stargazers_count": 119, "stargazers_count": 118,
"watchers_count": 119, "watchers_count": 118,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
@ -196,7 +196,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 119, "watchers": 118,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },
@ -369,12 +369,12 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).", "description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false, "fork": false,
"created_at": "2021-12-10T12:38:20Z", "created_at": "2021-12-10T12:38:20Z",
"updated_at": "2024-03-31T06:01:45Z", "updated_at": "2024-03-31T14:25:26Z",
"pushed_at": "2023-05-11T11:29:46Z", "pushed_at": "2023-05-11T11:29:46Z",
"stargazers_count": 1087, "stargazers_count": 1086,
"watchers_count": 1087, "watchers_count": 1086,
"has_discussions": false, "has_discussions": false,
"forks_count": 523, "forks_count": 524,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -382,8 +382,8 @@
"log4shell" "log4shell"
], ],
"visibility": "public", "visibility": "public",
"forks": 523, "forks": 524,
"watchers": 1087, "watchers": 1086,
"score": 0, "score": 0,
"subscribers_count": 22 "subscribers_count": 22
}, },
@ -857,10 +857,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false, "fork": false,
"created_at": "2021-12-10T22:35:00Z", "created_at": "2021-12-10T22:35:00Z",
"updated_at": "2024-03-25T16:52:50Z", "updated_at": "2024-03-31T14:25:26Z",
"pushed_at": "2022-01-15T16:18:44Z", "pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 923, "stargazers_count": 922,
"watchers_count": 923, "watchers_count": 922,
"has_discussions": false, "has_discussions": false,
"forks_count": 140, "forks_count": 140,
"allow_forking": true, "allow_forking": true,
@ -889,7 +889,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 140, "forks": 140,
"watchers": 923, "watchers": 922,
"score": 0, "score": 0,
"subscribers_count": 25 "subscribers_count": 25
}, },
@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false, "fork": false,
"created_at": "2021-12-11T07:19:11Z", "created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-03-16T10:08:41Z", "updated_at": "2024-03-31T14:25:26Z",
"pushed_at": "2023-06-13T09:17:54Z", "pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 762, "stargazers_count": 761,
"watchers_count": 762, "watchers_count": 761,
"has_discussions": false, "has_discussions": false,
"forks_count": 112, "forks_count": 112,
"allow_forking": true, "allow_forking": true,
@ -1285,7 +1285,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 112, "forks": 112,
"watchers": 762, "watchers": 761,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },
@ -1423,10 +1423,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228", "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false, "fork": false,
"created_at": "2021-12-11T11:18:46Z", "created_at": "2021-12-11T11:18:46Z",
"updated_at": "2024-03-07T21:46:24Z", "updated_at": "2024-03-31T14:25:26Z",
"pushed_at": "2022-04-07T14:47:03Z", "pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 854, "stargazers_count": 853,
"watchers_count": 854, "watchers_count": 853,
"has_discussions": false, "has_discussions": false,
"forks_count": 174, "forks_count": 174,
"allow_forking": true, "allow_forking": true,
@ -1448,7 +1448,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 174, "forks": 174,
"watchers": 854, "watchers": 853,
"score": 0, "score": 0,
"subscribers_count": 33 "subscribers_count": 33
}, },
@ -1966,10 +1966,10 @@
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC", "description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
"fork": false, "fork": false,
"created_at": "2021-12-12T00:29:03Z", "created_at": "2021-12-12T00:29:03Z",
"updated_at": "2024-03-14T16:34:43Z", "updated_at": "2024-03-31T14:25:27Z",
"pushed_at": "2022-03-10T18:44:50Z", "pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 632, "stargazers_count": 631,
"watchers_count": 632, "watchers_count": 631,
"has_discussions": false, "has_discussions": false,
"forks_count": 98, "forks_count": 98,
"allow_forking": true, "allow_forking": true,
@ -1990,7 +1990,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 98, "forks": 98,
"watchers": 632, "watchers": 631,
"score": 0, "score": 0,
"subscribers_count": 28 "subscribers_count": 28
}, },
@ -2076,10 +2076,10 @@
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.", "description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
"fork": false, "fork": false,
"created_at": "2021-12-12T01:24:51Z", "created_at": "2021-12-12T01:24:51Z",
"updated_at": "2024-01-30T19:33:04Z", "updated_at": "2024-03-31T14:25:27Z",
"pushed_at": "2022-10-24T02:25:53Z", "pushed_at": "2022-10-24T02:25:53Z",
"stargazers_count": 498, "stargazers_count": 497,
"watchers_count": 498, "watchers_count": 497,
"has_discussions": false, "has_discussions": false,
"forks_count": 74, "forks_count": 74,
"allow_forking": true, "allow_forking": true,
@ -2088,7 +2088,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 74, "forks": 74,
"watchers": 498, "watchers": 497,
"score": 0, "score": 0,
"subscribers_count": 25 "subscribers_count": 25
}, },

View file

@ -735,10 +735,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2022-06-07T09:19:02Z", "created_at": "2022-06-07T09:19:02Z",
"updated_at": "2024-03-23T18:28:42Z", "updated_at": "2024-03-31T14:25:51Z",
"pushed_at": "2022-06-07T10:35:18Z", "pushed_at": "2022-06-07T10:35:18Z",
"stargazers_count": 327, "stargazers_count": 326,
"watchers_count": 327, "watchers_count": 326,
"has_discussions": false, "has_discussions": false,
"forks_count": 52, "forks_count": 52,
"allow_forking": true, "allow_forking": true,
@ -747,7 +747,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 52, "forks": 52,
"watchers": 327, "watchers": 326,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7
}, },

View file

@ -227,10 +227,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ", "description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false, "fork": false,
"created_at": "2022-09-26T08:58:21Z", "created_at": "2022-09-26T08:58:21Z",
"updated_at": "2024-03-25T03:07:57Z", "updated_at": "2024-03-31T14:26:05Z",
"pushed_at": "2022-09-26T13:20:38Z", "pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 301, "stargazers_count": 300,
"watchers_count": 301, "watchers_count": 300,
"has_discussions": false, "has_discussions": false,
"forks_count": 45, "forks_count": 45,
"allow_forking": true, "allow_forking": true,
@ -243,7 +243,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 45, "forks": 45,
"watchers": 301, "watchers": 300,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },
@ -441,10 +441,10 @@
"description": "A testing tool for CobaltStrike-RCE:CVE-2022-39197; Weblogic-RCE:CVE-2023-21839; MinIO:CVE-2023-28432", "description": "A testing tool for CobaltStrike-RCE:CVE-2022-39197; Weblogic-RCE:CVE-2023-21839; MinIO:CVE-2023-28432",
"fork": false, "fork": false,
"created_at": "2023-12-03T13:45:34Z", "created_at": "2023-12-03T13:45:34Z",
"updated_at": "2023-12-05T08:43:25Z", "updated_at": "2024-03-31T13:58:48Z",
"pushed_at": "2023-12-05T17:58:36Z", "pushed_at": "2023-12-05T17:58:36Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -457,7 +457,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-02-21T16:08:56Z", "created_at": "2023-02-21T16:08:56Z",
"updated_at": "2024-03-18T10:46:33Z", "updated_at": "2024-03-31T14:26:25Z",
"pushed_at": "2023-02-26T06:43:18Z", "pushed_at": "2023-02-26T06:43:18Z",
"stargazers_count": 214, "stargazers_count": 213,
"watchers_count": 214, "watchers_count": 213,
"has_discussions": false, "has_discussions": false,
"forks_count": 46, "forks_count": 46,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 46, "forks": 46,
"watchers": 214, "watchers": 213,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },
@ -193,10 +193,10 @@
"description": "A testing tool for CobaltStrike-RCE:CVE-2022-39197; Weblogic-RCE:CVE-2023-21839; MinIO:CVE-2023-28432", "description": "A testing tool for CobaltStrike-RCE:CVE-2022-39197; Weblogic-RCE:CVE-2023-21839; MinIO:CVE-2023-28432",
"fork": false, "fork": false,
"created_at": "2023-12-03T13:45:34Z", "created_at": "2023-12-03T13:45:34Z",
"updated_at": "2023-12-05T08:43:25Z", "updated_at": "2024-03-31T13:58:48Z",
"pushed_at": "2023-12-05T17:58:36Z", "pushed_at": "2023-12-05T17:58:36Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -209,7 +209,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": "JDK CVE-2023-21939", "description": "JDK CVE-2023-21939",
"fork": false, "fork": false,
"created_at": "2023-08-26T06:45:26Z", "created_at": "2023-08-26T06:45:26Z",
"updated_at": "2024-01-22T12:25:07Z", "updated_at": "2024-03-31T14:26:53Z",
"pushed_at": "2023-08-26T06:57:55Z", "pushed_at": "2023-08-26T06:57:55Z",
"stargazers_count": 98, "stargazers_count": 97,
"watchers_count": 98, "watchers_count": 97,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 14,
"watchers": 98, "watchers": 97,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -43,10 +43,10 @@
"description": "Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践", "description": "Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践",
"fork": false, "fork": false,
"created_at": "2023-05-11T07:37:52Z", "created_at": "2023-05-11T07:37:52Z",
"updated_at": "2024-03-22T07:10:50Z", "updated_at": "2024-03-31T14:26:40Z",
"pushed_at": "2023-08-08T02:30:25Z", "pushed_at": "2023-08-08T02:30:25Z",
"stargazers_count": 214, "stargazers_count": 213,
"watchers_count": 214, "watchers_count": 213,
"has_discussions": false, "has_discussions": false,
"forks_count": 35, "forks_count": 35,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 35, "forks": 35,
"watchers": 214, "watchers": 213,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -470,12 +470,12 @@
"description": "Joomla! < 4.2.8 - Unauthenticated information disclosure", "description": "Joomla! < 4.2.8 - Unauthenticated information disclosure",
"fork": false, "fork": false,
"created_at": "2023-03-24T11:50:16Z", "created_at": "2023-03-24T11:50:16Z",
"updated_at": "2024-03-30T15:59:11Z", "updated_at": "2024-03-31T16:57:53Z",
"pushed_at": "2023-12-27T11:30:46Z", "pushed_at": "2023-12-27T11:30:46Z",
"stargazers_count": 70, "stargazers_count": 71,
"watchers_count": 70, "watchers_count": 71,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -488,8 +488,8 @@
"vulnerability" "vulnerability"
], ],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 15,
"watchers": 70, "watchers": 71,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -14,7 +14,7 @@
"fork": false, "fork": false,
"created_at": "2023-04-16T20:20:32Z", "created_at": "2023-04-16T20:20:32Z",
"updated_at": "2024-01-18T05:26:53Z", "updated_at": "2024-01-18T05:26:53Z",
"pushed_at": "2024-02-02T13:47:35Z", "pushed_at": "2024-03-31T17:55:07Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "TP-Link ER7206 Omada Gigabit VPN Router uhttpd freeStrategy Command injection Vulnerability", "description": "TP-Link ER7206 Omada Gigabit VPN Router uhttpd freeStrategy Command injection Vulnerability",
"fork": false, "fork": false,
"created_at": "2024-03-31T02:04:34Z", "created_at": "2024-03-31T02:04:34Z",
"updated_at": "2024-03-31T08:07:59Z", "updated_at": "2024-03-31T12:40:03Z",
"pushed_at": "2024-03-31T02:07:27Z", "pushed_at": "2024-03-31T02:07:27Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 2, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-03-31T12:09:33Z", "updated_at": "2024-03-31T18:24:20Z",
"pushed_at": "2024-03-29T13:34:43Z", "pushed_at": "2024-03-31T18:21:33Z",
"stargazers_count": 277, "stargazers_count": 283,
"watchers_count": 277, "watchers_count": 283,
"has_discussions": false, "has_discussions": false,
"forks_count": 44, "forks_count": 46,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 44, "forks": 46,
"watchers": 277, "watchers": 283,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2024-0582 (io_uring)", "description": "LPE exploit for CVE-2024-0582 (io_uring)",
"fork": false, "fork": false,
"created_at": "2024-03-29T14:45:22Z", "created_at": "2024-03-29T14:45:22Z",
"updated_at": "2024-03-31T11:59:20Z", "updated_at": "2024-03-31T15:22:13Z",
"pushed_at": "2024-03-29T16:05:31Z", "pushed_at": "2024-03-29T16:05:31Z",
"stargazers_count": 37, "stargazers_count": 38,
"watchers_count": 37, "watchers_count": 38,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 37, "watchers": 38,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false, "fork": false,
"created_at": "2024-03-20T21:16:41Z", "created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-03-31T12:25:59Z", "updated_at": "2024-03-31T18:17:44Z",
"pushed_at": "2024-03-27T09:22:28Z", "pushed_at": "2024-03-27T09:22:28Z",
"stargazers_count": 1041, "stargazers_count": 1053,
"watchers_count": 1041, "watchers_count": 1053,
"has_discussions": false, "has_discussions": false,
"forks_count": 99, "forks_count": 101,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc" "poc"
], ],
"visibility": "public", "visibility": "public",
"forks": 99, "forks": 101,
"watchers": 1041, "watchers": 1053,
"score": 0, "score": 0,
"subscribers_count": 9 "subscribers_count": 9
} }

View file

@ -1,32 +0,0 @@
[
{
"id": 779578067,
"name": "CVE-2024-2086-GOOGLE-DRIVE",
"full_name": "MrCyberSecs\/CVE-2024-2086-GOOGLE-DRIVE",
"owner": {
"login": "MrCyberSecs",
"id": 165462852,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165462852?v=4",
"html_url": "https:\/\/github.com\/MrCyberSecs"
},
"html_url": "https:\/\/github.com\/MrCyberSecs\/CVE-2024-2086-GOOGLE-DRIVE",
"description": "The Integrate Google Drive unauthorized access of data",
"fork": false,
"created_at": "2024-03-30T07:45:18Z",
"updated_at": "2024-03-30T21:25:32Z",
"pushed_at": "2024-03-30T07:54:18Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "The Poc for CVE-2024-20931", "description": "The Poc for CVE-2024-20931",
"fork": false, "fork": false,
"created_at": "2024-02-02T01:58:49Z", "created_at": "2024-02-02T01:58:49Z",
"updated_at": "2024-03-27T18:45:37Z", "updated_at": "2024-03-31T14:27:15Z",
"pushed_at": "2024-02-02T02:05:01Z", "pushed_at": "2024-02-02T02:05:01Z",
"stargazers_count": 70, "stargazers_count": 69,
"watchers_count": 70, "watchers_count": 69,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 70, "watchers": 69,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -13,10 +13,10 @@
"description": "Report and exploit of CVE-2024-21305. ", "description": "Report and exploit of CVE-2024-21305. ",
"fork": false, "fork": false,
"created_at": "2023-12-16T23:27:34Z", "created_at": "2023-12-16T23:27:34Z",
"updated_at": "2024-03-22T13:51:25Z", "updated_at": "2024-03-31T17:55:06Z",
"pushed_at": "2024-01-14T17:21:42Z", "pushed_at": "2024-01-14T17:21:42Z",
"stargazers_count": 20, "stargazers_count": 21,
"watchers_count": 20, "watchers_count": 21,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -28,7 +28,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 20, "watchers": 21,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -13,10 +13,10 @@
"description": "This Python script exploits a vulnerability (CVE-2024-21388) in Microsoft Edge, allowing silent installation of browser extensions with elevated privileges via a private API.", "description": "This Python script exploits a vulnerability (CVE-2024-21388) in Microsoft Edge, allowing silent installation of browser extensions with elevated privileges via a private API.",
"fork": false, "fork": false,
"created_at": "2024-03-28T09:31:31Z", "created_at": "2024-03-28T09:31:31Z",
"updated_at": "2024-03-29T20:31:44Z", "updated_at": "2024-03-31T15:39:48Z",
"pushed_at": "2024-03-28T09:33:23Z", "pushed_at": "2024-03-28T09:33:23Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -13,10 +13,10 @@
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC", "description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
"fork": false, "fork": false,
"created_at": "2024-02-15T19:57:38Z", "created_at": "2024-02-15T19:57:38Z",
"updated_at": "2024-03-26T05:56:32Z", "updated_at": "2024-03-31T14:14:51Z",
"pushed_at": "2024-02-17T07:08:49Z", "pushed_at": "2024-02-17T07:08:49Z",
"stargazers_count": 135, "stargazers_count": 134,
"watchers_count": 135, "watchers_count": 134,
"has_discussions": false, "has_discussions": false,
"forks_count": 32, "forks_count": 32,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 32, "forks": 32,
"watchers": 135, "watchers": 134,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -43,10 +43,10 @@
"description": "PoC and Detection for CVE-2024-21626", "description": "PoC and Detection for CVE-2024-21626",
"fork": false, "fork": false,
"created_at": "2024-02-01T15:28:37Z", "created_at": "2024-02-01T15:28:37Z",
"updated_at": "2024-03-28T08:09:37Z", "updated_at": "2024-03-31T15:29:52Z",
"pushed_at": "2024-02-06T16:09:05Z", "pushed_at": "2024-02-06T16:09:05Z",
"stargazers_count": 52, "stargazers_count": 53,
"watchers_count": 52, "watchers_count": 53,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 52, "watchers": 53,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },
@ -253,19 +253,19 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-03-15T10:38:27Z", "created_at": "2024-03-15T10:38:27Z",
"updated_at": "2024-03-17T21:32:11Z", "updated_at": "2024-03-31T15:30:17Z",
"pushed_at": "2024-03-17T21:43:15Z", "pushed_at": "2024-03-17T21:43:15Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": "Workaround for disabling the CLI to mitigate SECURITY-3314\/CVE-2024-23897 and SECURITY-3315\/CVE-2024-23898", "description": "Workaround for disabling the CLI to mitigate SECURITY-3314\/CVE-2024-23897 and SECURITY-3315\/CVE-2024-23898",
"fork": false, "fork": false,
"created_at": "2024-01-23T19:19:04Z", "created_at": "2024-01-23T19:19:04Z",
"updated_at": "2024-03-15T03:05:36Z", "updated_at": "2024-03-31T14:14:47Z",
"pushed_at": "2024-02-20T14:13:25Z", "pushed_at": "2024-02-20T14:13:25Z",
"stargazers_count": 7, "stargazers_count": 6,
"watchers_count": 7, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 7, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -13,10 +13,10 @@
"description": "WallEscape vulnerability in util-linux", "description": "WallEscape vulnerability in util-linux",
"fork": false, "fork": false,
"created_at": "2024-03-11T00:15:03Z", "created_at": "2024-03-11T00:15:03Z",
"updated_at": "2024-03-31T08:08:52Z", "updated_at": "2024-03-31T12:59:44Z",
"pushed_at": "2024-03-30T01:32:02Z", "pushed_at": "2024-03-30T01:32:02Z",
"stargazers_count": 25, "stargazers_count": 26,
"watchers_count": 25, "watchers_count": 26,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 25, "watchers": 26,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

32
2024/CVE-2024-28247.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 780056999,
"name": "CVE-2024-28247-Pi-hole-Arbitrary-File-Read",
"full_name": "T0X1Cx\/CVE-2024-28247-Pi-hole-Arbitrary-File-Read",
"owner": {
"login": "T0X1Cx",
"id": 71453093,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71453093?v=4",
"html_url": "https:\/\/github.com\/T0X1Cx"
},
"html_url": "https:\/\/github.com\/T0X1Cx\/CVE-2024-28247-Pi-hole-Arbitrary-File-Read",
"description": "This repository provides an exploit for CVE-2024-28247, highlighting a vulnerability that permits a remote attacker to read arbitrary files on the system.",
"fork": false,
"created_at": "2024-03-31T15:25:15Z",
"updated_at": "2024-03-31T15:47:25Z",
"pushed_at": "2024-03-31T15:49:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)", "description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
"fork": false, "fork": false,
"created_at": "2024-03-11T10:14:39Z", "created_at": "2024-03-11T10:14:39Z",
"updated_at": "2024-03-31T12:26:46Z", "updated_at": "2024-03-31T18:19:30Z",
"pushed_at": "2024-03-25T12:56:16Z", "pushed_at": "2024-03-25T12:56:16Z",
"stargazers_count": 52, "stargazers_count": 53,
"watchers_count": 52, "watchers_count": 53,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 52, "watchers": 53,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": "Information for CVE-2024-3094", "description": "Information for CVE-2024-3094",
"fork": false, "fork": false,
"created_at": "2024-03-29T17:03:01Z", "created_at": "2024-03-29T17:03:01Z",
"updated_at": "2024-03-31T08:43:34Z", "updated_at": "2024-03-31T16:10:13Z",
"pushed_at": "2024-03-30T19:50:27Z", "pushed_at": "2024-03-30T19:50:27Z",
"stargazers_count": 21, "stargazers_count": 24,
"watchers_count": 21, "watchers_count": 24,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 21, "watchers": 24,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -43,19 +43,19 @@
"description": "Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)", "description": "Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)",
"fork": false, "fork": false,
"created_at": "2024-03-29T20:28:17Z", "created_at": "2024-03-29T20:28:17Z",
"updated_at": "2024-03-31T10:38:05Z", "updated_at": "2024-03-31T16:22:20Z",
"pushed_at": "2024-03-31T00:13:39Z", "pushed_at": "2024-03-31T00:13:39Z",
"stargazers_count": 31, "stargazers_count": 32,
"watchers_count": 31, "watchers_count": 32,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 6,
"watchers": 31, "watchers": 32,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -231,10 +231,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-03-30T07:38:39Z", "created_at": "2024-03-30T07:38:39Z",
"updated_at": "2024-03-31T10:41:30Z", "updated_at": "2024-03-31T15:19:03Z",
"pushed_at": "2024-03-30T08:08:40Z", "pushed_at": "2024-03-30T08:08:40Z",
"stargazers_count": 2, "stargazers_count": 4,
"watchers_count": 2, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -243,7 +243,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 2, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -261,19 +261,19 @@
"description": "History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.", "description": "History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.",
"fork": false, "fork": false,
"created_at": "2024-03-30T10:48:54Z", "created_at": "2024-03-30T10:48:54Z",
"updated_at": "2024-03-31T11:59:50Z", "updated_at": "2024-03-31T17:42:42Z",
"pushed_at": "2024-03-30T11:06:31Z", "pushed_at": "2024-03-31T14:36:49Z",
"stargazers_count": 3, "stargazers_count": 5,
"watchers_count": 3, "watchers_count": 5,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 3, "watchers": 5,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -357,10 +357,10 @@
"description": "K8S and Docker Vulnerability Check for CVE-2024-3094", "description": "K8S and Docker Vulnerability Check for CVE-2024-3094",
"fork": false, "fork": false,
"created_at": "2024-03-30T17:35:49Z", "created_at": "2024-03-30T17:35:49Z",
"updated_at": "2024-03-31T12:00:37Z", "updated_at": "2024-03-31T16:37:42Z",
"pushed_at": "2024-03-30T20:38:04Z", "pushed_at": "2024-03-31T14:36:00Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -369,7 +369,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 3, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -387,18 +387,28 @@
"description": "This project contains a shell script designed to help users identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6).", "description": "This project contains a shell script designed to help users identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6).",
"fork": false, "fork": false,
"created_at": "2024-03-30T19:23:30Z", "created_at": "2024-03-30T19:23:30Z",
"updated_at": "2024-03-30T19:54:26Z", "updated_at": "2024-03-31T17:49:29Z",
"pushed_at": "2024-03-31T09:53:55Z", "pushed_at": "2024-03-31T09:53:55Z",
"stargazers_count": 5, "stargazers_count": 5,
"watchers_count": 5, "watchers_count": 5,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": true, "web_commit_signoff_required": true,
"topics": [], "topics": [
"cve-2024-3094",
"linux",
"vulnerabilities",
"vulnerability-detection",
"vulnerability-scanners",
"xz",
"xz-compression-utilities",
"xz-files",
"xz-utils"
],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 2,
"watchers": 5, "watchers": 5,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
@ -477,12 +487,12 @@
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094", "description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
"fork": false, "fork": false,
"created_at": "2024-03-30T22:07:24Z", "created_at": "2024-03-30T22:07:24Z",
"updated_at": "2024-03-31T12:12:00Z", "updated_at": "2024-03-31T18:25:54Z",
"pushed_at": "2024-03-31T11:28:32Z", "pushed_at": "2024-03-31T11:28:32Z",
"stargazers_count": 13, "stargazers_count": 33,
"watchers_count": 13, "watchers_count": 33,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -493,8 +503,8 @@
"xz" "xz"
], ],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 7,
"watchers": 13, "watchers": 33,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -606,10 +616,10 @@
"description": "A script to detect if xz is vulnerable - CVE-2024-3094", "description": "A script to detect if xz is vulnerable - CVE-2024-3094",
"fork": false, "fork": false,
"created_at": "2024-03-31T10:45:44Z", "created_at": "2024-03-31T10:45:44Z",
"updated_at": "2024-03-31T11:08:53Z", "updated_at": "2024-03-31T13:34:17Z",
"pushed_at": "2024-03-31T11:02:02Z", "pushed_at": "2024-03-31T11:02:02Z",
"stargazers_count": 0, "stargazers_count": 2,
"watchers_count": 0, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -618,7 +628,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
}, },
@ -681,5 +691,65 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
},
{
"id": 780033593,
"name": "CVE-2024-3094-patcher",
"full_name": "Simplifi-ED\/CVE-2024-3094-patcher",
"owner": {
"login": "Simplifi-ED",
"id": 75945575,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75945575?v=4",
"html_url": "https:\/\/github.com\/Simplifi-ED"
},
"html_url": "https:\/\/github.com\/Simplifi-ED\/CVE-2024-3094-patcher",
"description": "Ansible playbook for patching CVE-2024-3094",
"fork": false,
"created_at": "2024-03-31T14:09:28Z",
"updated_at": "2024-03-31T14:09:29Z",
"pushed_at": "2024-03-31T15:36:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 780105802,
"name": "CVE-2024-3094-Nmap-NSE-script",
"full_name": "gayatriracha\/CVE-2024-3094-Nmap-NSE-script",
"owner": {
"login": "gayatriracha",
"id": 150776676,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150776676?v=4",
"html_url": "https:\/\/github.com\/gayatriracha"
},
"html_url": "https:\/\/github.com\/gayatriracha\/CVE-2024-3094-Nmap-NSE-script",
"description": null,
"fork": false,
"created_at": "2024-03-31T17:53:11Z",
"updated_at": "2024-03-31T17:53:11Z",
"pushed_at": "2024-03-31T17:56:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -186,9 +186,6 @@
- [yuziiiiiiiiii/CVE-2024-2074](https://github.com/yuziiiiiiiiii/CVE-2024-2074) - [yuziiiiiiiiii/CVE-2024-2074](https://github.com/yuziiiiiiiiii/CVE-2024-2074)
### CVE-2024-2086
- [MrCyberSecs/CVE-2024-2086-GOOGLE-DRIVE](https://github.com/MrCyberSecs/CVE-2024-2086-GOOGLE-DRIVE)
### CVE-2024-2169 ### CVE-2024-2169
- [douglasbuzatto/G3-Loop-DoS](https://github.com/douglasbuzatto/G3-Loop-DoS) - [douglasbuzatto/G3-Loop-DoS](https://github.com/douglasbuzatto/G3-Loop-DoS)
@ -221,6 +218,8 @@
- [Yuma-Tsushima07/CVE-2024-3094](https://github.com/Yuma-Tsushima07/CVE-2024-3094) - [Yuma-Tsushima07/CVE-2024-3094](https://github.com/Yuma-Tsushima07/CVE-2024-3094)
- [jfrog/cve-2024-3094-tools](https://github.com/jfrog/cve-2024-3094-tools) - [jfrog/cve-2024-3094-tools](https://github.com/jfrog/cve-2024-3094-tools)
- [krascovict/OSINT---CVE-2024-3094-](https://github.com/krascovict/OSINT---CVE-2024-3094-) - [krascovict/OSINT---CVE-2024-3094-](https://github.com/krascovict/OSINT---CVE-2024-3094-)
- [Simplifi-ED/CVE-2024-3094-patcher](https://github.com/Simplifi-ED/CVE-2024-3094-patcher)
- [gayatriracha/CVE-2024-3094-Nmap-NSE-script](https://github.com/gayatriracha/CVE-2024-3094-Nmap-NSE-script)
### CVE-2024-12883 ### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883) - [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -948,6 +947,9 @@
### CVE-2024-28116 ### CVE-2024-28116
- [akabe1/Graver](https://github.com/akabe1/Graver) - [akabe1/Graver](https://github.com/akabe1/Graver)
### CVE-2024-28247
- [T0X1Cx/CVE-2024-28247-Pi-hole-Arbitrary-File-Read](https://github.com/T0X1Cx/CVE-2024-28247-Pi-hole-Arbitrary-File-Read)
### CVE-2024-28288 ### CVE-2024-28288
- [adminquit/CVE-2024-28288](https://github.com/adminquit/CVE-2024-28288) - [adminquit/CVE-2024-28288](https://github.com/adminquit/CVE-2024-28288)
@ -34007,6 +34009,7 @@
- [sh4rknado/BlueBorn](https://github.com/sh4rknado/BlueBorn) - [sh4rknado/BlueBorn](https://github.com/sh4rknado/BlueBorn)
- [Joanmei/CVE-2017-0785](https://github.com/Joanmei/CVE-2017-0785) - [Joanmei/CVE-2017-0785](https://github.com/Joanmei/CVE-2017-0785)
- [CyberKimathi/Py3-CVE-2017-0785](https://github.com/CyberKimathi/Py3-CVE-2017-0785) - [CyberKimathi/Py3-CVE-2017-0785](https://github.com/CyberKimathi/Py3-CVE-2017-0785)
- [MasterCode112/Upgraded_BlueBourne-CVE-2017-0785-](https://github.com/MasterCode112/Upgraded_BlueBourne-CVE-2017-0785-)
### CVE-2017-0806 (2017-10-03) ### CVE-2017-0806 (2017-10-03)