Auto Update 2024/06/07 18:29:48

This commit is contained in:
motikan2010-bot 2024-06-08 03:29:48 +09:00
parent d808f25676
commit 825969d7ad
48 changed files with 416 additions and 223 deletions

View file

@ -13,10 +13,10 @@
"description": "Linux local root exploit for CVE-2014-0038",
"fork": false,
"created_at": "2014-02-02T12:34:57Z",
"updated_at": "2024-05-31T11:34:06Z",
"updated_at": "2024-06-07T14:57:50Z",
"pushed_at": "2014-04-18T10:26:02Z",
"stargazers_count": 191,
"watchers_count": 191,
"stargazers_count": 192,
"watchers_count": 192,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 47,
"watchers": 191,
"watchers": 192,
"score": 0,
"subscribers_count": 18
},

View file

@ -147,6 +147,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -87,6 +87,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -73,10 +73,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-06-06T10:32:21Z",
"updated_at": "2024-06-07T15:07:01Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 161,
"watchers_count": 161,
"stargazers_count": 163,
"watchers_count": 163,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 161,
"watchers": 163,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": " double-free bug in WhatsApp exploit poc",
"fork": false,
"created_at": "2019-10-03T09:26:24Z",
"updated_at": "2024-04-17T06:03:21Z",
"updated_at": "2024-06-07T13:28:46Z",
"pushed_at": "2021-03-19T17:23:25Z",
"stargazers_count": 267,
"watchers_count": 267,
"stargazers_count": 268,
"watchers_count": 268,
"has_discussions": false,
"forks_count": 82,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 267,
"watchers": 268,
"score": 0,
"subscribers_count": 16
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-06T16:11:05Z",
"updated_at": "2024-06-06T17:25:08Z",
"updated_at": "2024-06-07T13:02:02Z",
"pushed_at": "2024-06-06T16:12:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,8 +25,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -170,10 +170,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-06-05T06:55:28Z",
"updated_at": "2024-06-07T15:59:49Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 606,
"watchers_count": 606,
"stargazers_count": 607,
"watchers_count": 607,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
@ -182,7 +182,7 @@
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 606,
"watchers": 607,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
"fork": false,
"created_at": "2020-01-17T05:35:01Z",
"updated_at": "2023-10-09T07:13:26Z",
"updated_at": "2024-06-07T14:56:45Z",
"pushed_at": "2022-12-15T07:33:15Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 85,
"watchers": 86,
"score": 0,
"subscribers_count": 2
}

View file

@ -172,10 +172,10 @@
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-07-01T09:47:13Z",
"updated_at": "2024-05-31T12:26:10Z",
"updated_at": "2024-06-07T14:59:39Z",
"pushed_at": "2021-07-05T06:46:12Z",
"stargazers_count": 328,
"watchers_count": 328,
"stargazers_count": 329,
"watchers_count": 329,
"has_discussions": false,
"forks_count": 79,
"allow_forking": true,
@ -193,7 +193,7 @@
],
"visibility": "public",
"forks": 79,
"watchers": 328,
"watchers": 329,
"score": 0,
"subscribers_count": 14
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2024-06-06T16:59:56Z",
"updated_at": "2024-06-07T14:53:29Z",
"pushed_at": "2023-07-10T16:41:49Z",
"stargazers_count": 290,
"watchers_count": 290,
"stargazers_count": 291,
"watchers_count": 291,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 290,
"watchers": 291,
"score": 0,
"subscribers_count": 8
},

View file

@ -73,10 +73,10 @@
"description": "Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)",
"fork": false,
"created_at": "2021-09-16T02:11:36Z",
"updated_at": "2024-06-05T16:37:09Z",
"updated_at": "2024-06-07T12:53:26Z",
"pushed_at": "2021-09-16T10:39:04Z",
"stargazers_count": 235,
"watchers_count": 235,
"stargazers_count": 236,
"watchers_count": 236,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 235,
"watchers": 236,
"score": 0,
"subscribers_count": 12
},

View file

@ -1335,10 +1335,10 @@
"description": "Proof of Concept (PoC) CVE-2021-4034 ",
"fork": false,
"created_at": "2022-01-26T18:01:26Z",
"updated_at": "2024-06-07T09:25:59Z",
"updated_at": "2024-06-07T14:58:30Z",
"pushed_at": "2022-02-07T15:42:00Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -1363,7 +1363,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 87,
"watchers": 88,
"score": 0,
"subscribers_count": 3
},

View file

@ -3636,10 +3636,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2024-06-07T01:48:46Z",
"updated_at": "2024-06-07T14:58:29Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3370,
"watchers_count": 3370,
"stargazers_count": 3371,
"watchers_count": 3371,
"has_discussions": true,
"forks_count": 740,
"allow_forking": true,
@ -3648,7 +3648,7 @@
"topics": [],
"visibility": "public",
"forks": 740,
"watchers": 3370,
"watchers": 3371,
"score": 0,
"subscribers_count": 57
},

View file

@ -13,10 +13,10 @@
"description": "Local privilege escalation PoC for Linux kernel CVE-2022-1015",
"fork": false,
"created_at": "2022-04-02T03:27:11Z",
"updated_at": "2024-05-29T02:20:12Z",
"updated_at": "2024-06-07T13:04:47Z",
"pushed_at": "2022-04-03T01:36:45Z",
"stargazers_count": 194,
"watchers_count": 194,
"stargazers_count": 195,
"watchers_count": 195,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 194,
"watchers": 195,
"score": 0,
"subscribers_count": 7
},

43
2022/CVE-2022-30203.json Normal file
View file

@ -0,0 +1,43 @@
[
{
"id": 811928581,
"name": "dubiousdisk",
"full_name": "Wack0\/dubiousdisk",
"owner": {
"login": "Wack0",
"id": 2650838,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2650838?v=4",
"html_url": "https:\/\/github.com\/Wack0"
},
"html_url": "https:\/\/github.com\/Wack0\/dubiousdisk",
"description": "The Porygon-Z that's super effective against Secure Boot! (CVE-2022-30203, CVE-2023-21560, CVE-2023-28269, CVE-2023-28249, and more...)",
"fork": false,
"created_at": "2024-06-07T15:25:33Z",
"updated_at": "2024-06-07T15:46:24Z",
"pushed_at": "2024-06-07T15:26:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bitlocker",
"cve-2022-30203",
"cve-2023-21560",
"cve-2023-28249",
"cve-2023-28269",
"secure-boot",
"uefi",
"vulnerability",
"windows-boot",
"writeup"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-06-07T08:12:34Z",
"updated_at": "2024-06-07T17:05:43Z",
"pushed_at": "2024-04-05T06:46:47Z",
"stargazers_count": 222,
"watchers_count": 222,
"stargazers_count": 223,
"watchers_count": 223,
"has_discussions": true,
"forks_count": 31,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 31,
"watchers": 222,
"watchers": 223,
"score": 0,
"subscribers_count": 6
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-04-20T08:51:20Z",
"updated_at": "2023-08-29T16:26:12Z",
"updated_at": "2024-06-07T14:56:32Z",
"pushed_at": "2023-04-20T08:52:29Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "TP-Link Archer AX21 - Unauthenticated Command Injection [Loader]",
"fork": false,
"created_at": "2023-09-09T15:53:22Z",
"updated_at": "2024-05-03T18:28:34Z",
"updated_at": "2024-06-07T14:59:41Z",
"pushed_at": "2023-09-09T15:58:39Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

43
2023/CVE-2023-21560.json Normal file
View file

@ -0,0 +1,43 @@
[
{
"id": 811928581,
"name": "dubiousdisk",
"full_name": "Wack0\/dubiousdisk",
"owner": {
"login": "Wack0",
"id": 2650838,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2650838?v=4",
"html_url": "https:\/\/github.com\/Wack0"
},
"html_url": "https:\/\/github.com\/Wack0\/dubiousdisk",
"description": "The Porygon-Z that's super effective against Secure Boot! (CVE-2022-30203, CVE-2023-21560, CVE-2023-28269, CVE-2023-28249, and more...)",
"fork": false,
"created_at": "2024-06-07T15:25:33Z",
"updated_at": "2024-06-07T15:46:24Z",
"pushed_at": "2024-06-07T15:26:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bitlocker",
"cve-2022-30203",
"cve-2023-21560",
"cve-2023-28249",
"cve-2023-28269",
"secure-boot",
"uefi",
"vulnerability",
"windows-boot",
"writeup"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2024-05-26T14:43:09Z",
"updated_at": "2024-06-07T14:55:35Z",
"pushed_at": "2023-07-10T16:35:49Z",
"stargazers_count": 467,
"watchers_count": 467,
"stargazers_count": 468,
"watchers_count": 468,
"has_discussions": false,
"forks_count": 163,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 163,
"watchers": 467,
"watchers": 468,
"score": 0,
"subscribers_count": 10
},
@ -73,10 +73,10 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2023-03-10T19:08:28Z",
"updated_at": "2024-06-02T04:19:38Z",
"updated_at": "2024-06-07T14:59:33Z",
"pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 163,
"watchers_count": 163,
"stargazers_count": 164,
"watchers_count": 164,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 40,
"watchers": 163,
"watchers": 164,
"score": 0,
"subscribers_count": 3
},

View file

@ -556,10 +556,10 @@
"description": "CVE-2023-22527 内存马注入工具",
"fork": false,
"created_at": "2024-02-11T16:46:55Z",
"updated_at": "2024-05-31T12:37:15Z",
"updated_at": "2024-06-07T14:57:27Z",
"pushed_at": "2024-02-21T05:49:59Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -568,7 +568,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 64,
"watchers": 65,
"score": 0,
"subscribers_count": 1
},
@ -586,10 +586,10 @@
"description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理",
"fork": false,
"created_at": "2024-02-26T02:34:44Z",
"updated_at": "2024-06-07T06:36:41Z",
"updated_at": "2024-06-07T14:56:33Z",
"pushed_at": "2024-04-24T02:34:16Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -598,7 +598,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "PoC Exploit for VM2 Sandbox Escape Vulnerability",
"fork": false,
"created_at": "2023-12-10T08:32:26Z",
"updated_at": "2024-03-26T15:54:06Z",
"updated_at": "2024-06-07T14:59:41Z",
"pushed_at": "2023-12-14T20:09:23Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit",
"fork": false,
"created_at": "2024-05-17T12:07:14Z",
"updated_at": "2024-06-05T16:33:41Z",
"updated_at": "2024-06-07T14:59:27Z",
"pushed_at": "2024-05-21T11:54:57Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
"fork": false,
"created_at": "2024-03-21T21:39:24Z",
"updated_at": "2024-06-05T16:12:10Z",
"updated_at": "2024-06-07T14:59:39Z",
"pushed_at": "2024-03-22T06:45:43Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 105,
"watchers": 106,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2024-06-07T03:32:38Z",
"updated_at": "2024-06-07T14:56:26Z",
"pushed_at": "2024-05-16T07:42:00Z",
"stargazers_count": 167,
"watchers_count": 167,
"stargazers_count": 168,
"watchers_count": 168,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 167,
"watchers": 168,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept code for Android APEX key reuse vulnerability",
"fork": false,
"created_at": "2024-01-26T21:17:38Z",
"updated_at": "2024-06-06T06:01:16Z",
"updated_at": "2024-06-07T14:58:24Z",
"pushed_at": "2024-01-31T19:33:59Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 69,
"watchers": 70,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-06-06T17:18:44Z",
"updated_at": "2024-06-07T14:38:11Z",
"pushed_at": "2024-05-29T14:55:57Z",
"stargazers_count": 780,
"watchers_count": 780,
"stargazers_count": 781,
"watchers_count": 781,
"has_discussions": false,
"forks_count": 138,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 138,
"watchers": 780,
"watchers": 781,
"score": 0,
"subscribers_count": 13
},

View file

@ -193,8 +193,8 @@
"description": null,
"fork": false,
"created_at": "2023-11-11T06:51:03Z",
"updated_at": "2024-06-07T06:08:39Z",
"pushed_at": "2024-06-07T06:08:37Z",
"updated_at": "2024-06-07T15:40:08Z",
"pushed_at": "2024-06-07T15:40:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)",
"fork": false,
"created_at": "2024-06-02T14:15:27Z",
"updated_at": "2024-06-07T07:32:45Z",
"updated_at": "2024-06-07T14:56:24Z",
"pushed_at": "2024-06-03T05:03:46Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 41,
"watchers": 42,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,19 +13,19 @@
"description": "LPE exploit for CVE-2024-0582 (io_uring)",
"fork": false,
"created_at": "2024-03-29T14:45:22Z",
"updated_at": "2024-06-06T03:21:04Z",
"updated_at": "2024-06-07T16:57:36Z",
"pushed_at": "2024-03-29T16:05:31Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 81,
"forks": 22,
"watchers": 82,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-06-07T10:39:15Z",
"updated_at": "2024-06-07T18:32:21Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2079,
"watchers_count": 2079,
"stargazers_count": 2080,
"watchers_count": 2080,
"has_discussions": false,
"forks_count": 265,
"forks_count": 266,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc"
],
"visibility": "public",
"forks": 265,
"watchers": 2079,
"forks": 266,
"watchers": 2080,
"score": 0,
"subscribers_count": 24
},

View file

@ -13,10 +13,10 @@
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
"fork": false,
"created_at": "2024-04-12T15:07:42Z",
"updated_at": "2024-06-05T13:08:56Z",
"updated_at": "2024-06-07T14:58:23Z",
"pushed_at": "2024-04-18T14:31:34Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
"fork": false,
"created_at": "2024-04-22T07:05:04Z",
"updated_at": "2024-06-04T08:03:02Z",
"updated_at": "2024-06-07T14:58:23Z",
"pushed_at": "2024-05-09T16:39:55Z",
"stargazers_count": 204,
"watchers_count": 204,
"stargazers_count": 205,
"watchers_count": 205,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 204,
"watchers": 205,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
"fork": false,
"created_at": "2024-02-15T19:57:38Z",
"updated_at": "2024-05-29T02:18:55Z",
"updated_at": "2024-06-07T14:59:44Z",
"pushed_at": "2024-02-17T07:08:49Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 148,
"watchers_count": 148,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 146,
"watchers": 148,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
"fork": false,
"created_at": "2024-02-28T21:16:10Z",
"updated_at": "2024-06-04T10:26:24Z",
"updated_at": "2024-06-07T14:59:43Z",
"pushed_at": "2024-03-01T20:02:52Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 88,
"watchers": 89,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "Time Based SQL Injection in Zabbix Server Audit Log --> RCE",
"fork": false,
"created_at": "2024-05-20T03:29:09Z",
"updated_at": "2024-06-07T10:20:07Z",
"updated_at": "2024-06-07T16:56:43Z",
"pushed_at": "2024-05-21T10:30:49Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 93,
"watchers": 95,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection",
"fork": false,
"created_at": "2024-05-20T14:34:09Z",
"updated_at": "2024-06-05T17:25:05Z",
"updated_at": "2024-06-07T14:57:51Z",
"pushed_at": "2024-05-21T11:56:19Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 4
},

View file

@ -301,8 +301,8 @@
"description": null,
"fork": false,
"created_at": "2024-06-06T03:59:06Z",
"updated_at": "2024-06-06T06:04:27Z",
"pushed_at": "2024-06-06T06:04:24Z",
"updated_at": "2024-06-07T17:15:46Z",
"pushed_at": "2024-06-07T17:15:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested)",
"fork": false,
"created_at": "2024-04-09T08:08:07Z",
"updated_at": "2024-06-05T03:28:01Z",
"updated_at": "2024-06-07T17:50:04Z",
"pushed_at": "2024-04-13T09:02:39Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,12 +13,12 @@
"description": "Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )",
"fork": false,
"created_at": "2024-05-31T20:11:37Z",
"updated_at": "2024-06-07T05:01:48Z",
"pushed_at": "2024-06-05T17:53:55Z",
"stargazers_count": 41,
"watchers_count": 41,
"updated_at": "2024-06-07T14:56:40Z",
"pushed_at": "2024-06-07T18:00:34Z",
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"vulnerability-scanners"
],
"visibility": "public",
"forks": 9,
"watchers": 41,
"forks": 10,
"watchers": 42,
"score": 0,
"subscribers_count": 1
},
@ -50,10 +50,10 @@
"description": "Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit ",
"fork": false,
"created_at": "2024-06-03T19:08:24Z",
"updated_at": "2024-06-07T04:30:30Z",
"updated_at": "2024-06-07T13:55:39Z",
"pushed_at": "2024-06-03T19:20:10Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -83,7 +83,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-29269",
"fork": false,
"created_at": "2024-04-03T02:02:27Z",
"updated_at": "2024-04-10T01:45:55Z",
"updated_at": "2024-06-07T15:48:55Z",
"pushed_at": "2024-04-03T02:19:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -73,10 +73,10 @@
"description": "An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.",
"fork": false,
"created_at": "2024-05-19T19:05:00Z",
"updated_at": "2024-05-27T13:38:34Z",
"updated_at": "2024-06-07T15:48:38Z",
"pushed_at": "2024-05-19T19:12:32Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing",
"fork": false,
"created_at": "2024-06-06T18:31:57Z",
"updated_at": "2024-06-07T11:24:45Z",
"updated_at": "2024-06-07T16:27:42Z",
"pushed_at": "2024-06-06T18:38:06Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 15,
"watchers": 17,
"score": 0,
"subscribers_count": 1
}

View file

@ -493,10 +493,10 @@
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
"fork": false,
"created_at": "2024-03-30T22:07:24Z",
"updated_at": "2024-05-08T17:52:55Z",
"updated_at": "2024-06-07T18:31:54Z",
"pushed_at": "2024-04-02T03:38:32Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 139,
"watchers_count": 139,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -510,7 +510,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 138,
"watchers": 139,
"score": 0,
"subscribers_count": 8
},
@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-06-06T19:46:55Z",
"updated_at": "2024-06-07T12:47:59Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3469,
"watchers_count": 3469,
"stargazers_count": 3470,
"watchers_count": 3470,
"has_discussions": false,
"forks_count": 232,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 232,
"watchers": 3469,
"watchers": 3470,
"score": 0,
"subscribers_count": 39
},

View file

@ -73,7 +73,7 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-06-07T11:40:11Z",
"updated_at": "2024-06-07T15:16:59Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 436,
"watchers_count": 436,
@ -235,10 +235,10 @@
"description": "CVE-2024-32002 RCE PoC",
"fork": false,
"created_at": "2024-05-18T15:05:28Z",
"updated_at": "2024-06-07T07:55:34Z",
"updated_at": "2024-06-07T14:59:24Z",
"pushed_at": "2024-05-18T15:12:59Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -251,7 +251,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 87,
"watchers": 88,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Scanner for CVE-2024-4040",
"fork": false,
"created_at": "2024-04-23T09:31:29Z",
"updated_at": "2024-05-23T10:06:33Z",
"updated_at": "2024-06-07T14:57:33Z",
"pushed_at": "2024-05-17T06:48:43Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 8
},
@ -268,10 +268,10 @@
"description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.",
"fork": false,
"created_at": "2024-05-03T23:29:53Z",
"updated_at": "2024-05-28T18:15:09Z",
"updated_at": "2024-06-07T14:00:51Z",
"pushed_at": "2024-05-04T00:05:16Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -280,7 +280,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-4367 arbitrary js execution in pdf js",
"fork": false,
"created_at": "2024-05-20T22:56:10Z",
"updated_at": "2024-06-06T03:02:42Z",
"updated_at": "2024-06-07T14:59:25Z",
"pushed_at": "2024-05-20T23:09:43Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
"fork": false,
"created_at": "2024-06-07T05:50:23Z",
"updated_at": "2024-06-07T12:14:00Z",
"updated_at": "2024-06-07T18:22:49Z",
"pushed_at": "2024-06-07T11:49:08Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 8,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 28,
"forks": 13,
"watchers": 40,
"score": 0,
"subscribers_count": 0
},
@ -133,19 +133,19 @@
"description": "POC & $BASH script for CVE-2024-4577",
"fork": false,
"created_at": "2024-06-07T09:51:39Z",
"updated_at": "2024-06-07T11:40:10Z",
"pushed_at": "2024-06-07T10:46:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"updated_at": "2024-06-07T18:16:59Z",
"pushed_at": "2024-06-07T13:41:36Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
@ -163,10 +163,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-06-07T12:11:04Z",
"updated_at": "2024-06-07T18:13:15Z",
"pushed_at": "2024-06-07T09:53:15Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 11,
"watchers": 28,
"score": 0,
"subscribers_count": 0
},
@ -223,19 +223,19 @@
"description": null,
"fork": false,
"created_at": "2024-06-07T10:40:37Z",
"updated_at": "2024-06-07T11:44:30Z",
"pushed_at": "2024-06-07T11:44:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"updated_at": "2024-06-07T17:02:50Z",
"pushed_at": "2024-06-07T15:06:52Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"forks": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 0
},
@ -268,5 +268,95 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 811856232,
"name": "CVE-2024-4577",
"full_name": "Wh02m1\/CVE-2024-4577",
"owner": {
"login": "Wh02m1",
"id": 21974999,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21974999?v=4",
"html_url": "https:\/\/github.com\/Wh02m1"
},
"html_url": "https:\/\/github.com\/Wh02m1\/CVE-2024-4577",
"description": null,
"fork": false,
"created_at": "2024-06-07T12:49:20Z",
"updated_at": "2024-06-07T17:02:41Z",
"pushed_at": "2024-06-07T14:29:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 811966277,
"name": "CVE-2024-4577",
"full_name": "Sysc4ll3r\/CVE-2024-4577",
"owner": {
"login": "Sysc4ll3r",
"id": 158176899,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158176899?v=4",
"html_url": "https:\/\/github.com\/Sysc4ll3r"
},
"html_url": "https:\/\/github.com\/Sysc4ll3r\/CVE-2024-4577",
"description": "Nuclei Template for CVE-2024-4577",
"fork": false,
"created_at": "2024-06-07T17:01:20Z",
"updated_at": "2024-06-07T17:36:54Z",
"pushed_at": "2024-06-07T17:36:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 811966807,
"name": "CVE-2024-4577-RCE-EXP",
"full_name": "WanLiChangChengWanLiChang\/CVE-2024-4577-RCE-EXP",
"owner": {
"login": "WanLiChangChengWanLiChang",
"id": 171075497,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171075497?v=4",
"html_url": "https:\/\/github.com\/WanLiChangChengWanLiChang"
},
"html_url": "https:\/\/github.com\/WanLiChangChengWanLiChang\/CVE-2024-4577-RCE-EXP",
"description": null,
"fork": false,
"created_at": "2024-06-07T17:02:52Z",
"updated_at": "2024-06-07T17:26:21Z",
"pushed_at": "2024-06-07T17:26:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -630,6 +630,9 @@
- [zjhzjhhh/CVE-2024-4577](https://github.com/zjhzjhhh/CVE-2024-4577)
- [huseyinstif/CVE-2024-4577-Nuclei-Template](https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template)
- [taida957789/CVE-2024-4577](https://github.com/taida957789/CVE-2024-4577)
- [Wh02m1/CVE-2024-4577](https://github.com/Wh02m1/CVE-2024-4577)
- [Sysc4ll3r/CVE-2024-4577](https://github.com/Sysc4ll3r/CVE-2024-4577)
- [WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP](https://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP)
### CVE-2024-4701 (2024-05-10)
@ -4227,6 +4230,13 @@
- [zoemurmure/CVE-2023-21554-PoC](https://github.com/zoemurmure/CVE-2023-21554-PoC)
- [3tternp/CVE-2023-21554](https://github.com/3tternp/CVE-2023-21554)
### CVE-2023-21560 (2023-01-10)
<code>Windows Boot Manager Security Feature Bypass Vulnerability
</code>
- [Wack0/dubiousdisk](https://github.com/Wack0/dubiousdisk)
### CVE-2023-21608 (2023-01-18)
<code>Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
@ -14061,6 +14071,13 @@
- [shri142/ZipScan](https://github.com/shri142/ZipScan)
- [alien-keric/CVE-2022-30190](https://github.com/alien-keric/CVE-2022-30190)
### CVE-2022-30203 (2022-07-12)
<code>Windows Boot Manager Security Feature Bypass Vulnerability
</code>
- [Wack0/dubiousdisk](https://github.com/Wack0/dubiousdisk)
### CVE-2022-30206 (2022-07-12)
<code>Windows Print Spooler Elevation of Privilege Vulnerability