Auto Update 2024/06/17 06:29:22

This commit is contained in:
motikan2010-bot 2024-06-17 15:29:22 +09:00
parent b9dd205938
commit 82f7be9c34
55 changed files with 249 additions and 179 deletions

View file

@ -1055,8 +1055,8 @@
"description": "my personal POC of CVE-2016-5195(dirtyCOW)",
"fork": false,
"created_at": "2021-04-16T05:59:04Z",
"updated_at": "2022-03-13T13:00:42Z",
"pushed_at": "2021-05-24T14:13:18Z",
"updated_at": "2024-06-17T00:25:30Z",
"pushed_at": "2024-06-17T00:25:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-01-11T10:20:27Z",
"updated_at": "2024-05-08T06:25:26Z",
"pushed_at": "2024-06-10T05:36:27Z",
"pushed_at": "2024-06-17T05:18:59Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": "nginx http request smugling error_page directive",
"fork": false,
"created_at": "2023-09-16T19:47:18Z",
"updated_at": "2024-04-28T12:37:14Z",
"updated_at": "2024-06-17T00:52:06Z",
"pushed_at": "2023-09-16T19:49:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2024-05-28T14:47:54Z",
"updated_at": "2024-06-17T03:58:57Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 659,
"watchers_count": 659,
"stargazers_count": 660,
"watchers_count": 660,
"has_discussions": false,
"forks_count": 152,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 152,
"watchers": 659,
"watchers": 660,
"score": 0,
"subscribers_count": 19
},

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-06-16T10:52:37Z",
"updated_at": "2024-06-17T02:44:47Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1268,
"watchers_count": 1268,
"stargazers_count": 1269,
"watchers_count": 1269,
"has_discussions": false,
"forks_count": 160,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 160,
"watchers": 1268,
"watchers": 1269,
"score": 0,
"subscribers_count": 14
}

View file

@ -470,10 +470,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2024-06-07T21:01:43Z",
"updated_at": "2024-06-17T02:31:54Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 930,
"watchers_count": 930,
"stargazers_count": 931,
"watchers_count": 931,
"has_discussions": false,
"forks_count": 236,
"allow_forking": true,
@ -482,7 +482,7 @@
"topics": [],
"visibility": "public",
"forks": 236,
"watchers": 930,
"watchers": 931,
"score": 0,
"subscribers_count": 27
},

View file

@ -13,10 +13,10 @@
"description": "Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)",
"fork": false,
"created_at": "2022-05-27T21:09:03Z",
"updated_at": "2024-03-28T01:21:40Z",
"updated_at": "2024-06-17T05:33:55Z",
"pushed_at": "2022-10-19T21:24:35Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability ",
"fork": false,
"created_at": "2021-12-13T17:26:49Z",
"updated_at": "2024-06-03T10:53:44Z",
"updated_at": "2024-06-17T00:40:41Z",
"pushed_at": "2024-03-16T08:25:52Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 74,
"watchers": 75,
"score": 0,
"subscribers_count": 3
}

View file

@ -5493,10 +5493,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2024-05-26T15:06:02Z",
"updated_at": "2024-06-17T04:51:34Z",
"pushed_at": "2024-04-24T05:35:26Z",
"stargazers_count": 380,
"watchers_count": 380,
"stargazers_count": 381,
"watchers_count": 381,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -5511,7 +5511,7 @@
],
"visibility": "public",
"forks": 53,
"watchers": 380,
"watchers": 381,
"score": 0,
"subscribers_count": 12
},
@ -12362,7 +12362,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 725731160,

View file

@ -1155,8 +1155,8 @@
"description": "my personal exploit of CVE-2022-0847(dirty pipe)",
"fork": false,
"created_at": "2022-03-12T11:31:46Z",
"updated_at": "2022-12-24T10:24:03Z",
"pushed_at": "2022-03-14T17:51:29Z",
"updated_at": "2024-06-17T00:32:08Z",
"pushed_at": "2024-06-17T00:32:05Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,

View file

@ -18,7 +18,7 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"local-privilege-escalation"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-06-16T10:52:37Z",
"updated_at": "2024-06-17T02:44:47Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1268,
"watchers_count": 1268,
"stargazers_count": 1269,
"watchers_count": 1269,
"has_discussions": false,
"forks_count": 160,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 160,
"watchers": 1268,
"watchers": 1269,
"score": 0,
"subscribers_count": 14
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"wordpress-plugin"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 8,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)",
"fork": false,
"created_at": "2022-05-27T21:09:03Z",
"updated_at": "2024-03-28T01:21:40Z",
"updated_at": "2024-06-17T05:33:55Z",
"pushed_at": "2022-10-19T21:24:35Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 2
}

View file

@ -597,13 +597,13 @@
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 35,
"score": 0,
"subscribers_count": 1

View file

@ -18,13 +18,13 @@
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 9,
"score": 0,
"subscribers_count": 1

View file

@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-17T17:16:46Z",
"updated_at": "2024-05-12T03:51:53Z",
"updated_at": "2024-06-17T02:40:05Z",
"pushed_at": "2023-08-21T21:22:40Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
}

View file

@ -95,13 +95,13 @@
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 36,
"score": 0,
"subscribers_count": 2

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
"fork": false,
"created_at": "2023-06-06T14:05:09Z",
"updated_at": "2024-05-28T11:56:08Z",
"updated_at": "2024-06-17T03:48:13Z",
"pushed_at": "2023-07-14T10:40:17Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 155,
"watchers_count": 155,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 154,
"watchers": 155,
"score": 0,
"subscribers_count": 2
},

View file

@ -177,6 +177,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -18,7 +18,7 @@
"stargazers_count": 214,
"watchers_count": 214,
"has_discussions": false,
"forks_count": 30,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,7 +31,7 @@
"sharepoint"
],
"visibility": "public",
"forks": 30,
"forks": 31,
"watchers": 214,
"score": 0,
"subscribers_count": 4

View file

@ -18,13 +18,13 @@
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"forks": 33,
"watchers": 130,
"score": 0,
"subscribers_count": 2

View file

@ -31,6 +31,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 46,
"score": 0,
"subscribers_count": 1

View file

@ -133,10 +133,10 @@
"description": "CVE-2023-33246 RocketMQ RCE Detect By Version and Exploit",
"fork": false,
"created_at": "2023-06-01T14:48:26Z",
"updated_at": "2024-06-06T02:02:31Z",
"updated_at": "2024-06-17T04:13:07Z",
"pushed_at": "2023-06-07T13:07:30Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 98,
"watchers": 99,
"score": 0,
"subscribers_count": 3
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 109,
"watchers_count": 109,
"has_discussions": false,
"forks_count": 28,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"forks": 29,
"watchers": 109,
"score": 0,
"subscribers_count": 3

View file

@ -239,13 +239,13 @@
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 40,
"score": 0,
"subscribers_count": 5
@ -1309,5 +1309,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 816148658,
"name": "WinRAR_CVE-2023-38831",
"full_name": "imbyter\/WinRAR_CVE-2023-38831",
"owner": {
"login": "imbyter",
"id": 53294133,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53294133?v=4",
"html_url": "https:\/\/github.com\/imbyter"
},
"html_url": "https:\/\/github.com\/imbyter\/WinRAR_CVE-2023-38831",
"description": null,
"fork": false,
"created_at": "2024-06-17T06:14:51Z",
"updated_at": "2024-06-17T06:14:52Z",
"pushed_at": "2024-06-17T06:14:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-06-16T20:46:47Z",
"updated_at": "2024-06-17T04:55:35Z",
"pushed_at": "2024-06-12T19:17:54Z",
"stargazers_count": 882,
"watchers_count": 882,
"stargazers_count": 888,
"watchers_count": 888,
"has_discussions": false,
"forks_count": 151,
"forks_count": 152,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 151,
"watchers": 882,
"forks": 152,
"watchers": 888,
"score": 0,
"subscribers_count": 13
},

View file

@ -193,10 +193,10 @@
"description": "CVE-2023-4911",
"fork": false,
"created_at": "2023-10-11T14:49:22Z",
"updated_at": "2024-06-13T18:58:17Z",
"updated_at": "2024-06-17T02:18:05Z",
"pushed_at": "2023-10-11T15:15:18Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -209,7 +209,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -18,7 +18,7 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -34,7 +34,7 @@
"server-side-template-injection"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 6,
"score": 0,
"subscribers_count": 1

View file

@ -18,13 +18,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -18,13 +18,13 @@
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 38,
"score": 0,
"subscribers_count": 3

View file

@ -108,7 +108,7 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -127,7 +127,7 @@
"wordpress"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 8,
"score": 0,
"subscribers_count": 2

View file

@ -18,7 +18,7 @@
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -38,7 +38,7 @@
"wordpress"
],
"visibility": "public",
"forks": 21,
"forks": 22,
"watchers": 66,
"score": 0,
"subscribers_count": 2

View file

@ -111,13 +111,13 @@
"stargazers_count": 237,
"watchers_count": 237,
"has_discussions": false,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 39,
"forks": 40,
"watchers": 237,
"score": 0,
"subscribers_count": 6

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-06-15T22:23:18Z",
"updated_at": "2024-06-17T05:31:45Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2120,
"watchers_count": 2120,
"stargazers_count": 2121,
"watchers_count": 2121,
"has_discussions": false,
"forks_count": 272,
"forks_count": 275,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc"
],
"visibility": "public",
"forks": 272,
"watchers": 2120,
"forks": 275,
"watchers": 2121,
"score": 0,
"subscribers_count": 24
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 17,
"score": 0,
"subscribers_count": 5

View file

@ -18,13 +18,13 @@
"stargazers_count": 149,
"watchers_count": 149,
"has_discussions": false,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"forks": 33,
"watchers": 149,
"score": 0,
"subscribers_count": 4

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-21683 Confluence Post Auth RCE",
"fork": false,
"created_at": "2024-05-23T09:05:40Z",
"updated_at": "2024-06-14T12:35:04Z",
"updated_at": "2024-06-17T05:42:31Z",
"pushed_at": "2024-05-27T03:47:36Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 110,
"watchers": 111,
"score": 0,
"subscribers_count": 1
},

View file

@ -177,6 +177,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,19 +13,19 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-06-16T23:08:42Z",
"updated_at": "2024-06-17T06:21:39Z",
"pushed_at": "2024-06-15T10:32:38Z",
"stargazers_count": 209,
"watchers_count": 209,
"stargazers_count": 213,
"watchers_count": 213,
"has_discussions": false,
"forks_count": 42,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 209,
"forks": 44,
"watchers": 213,
"score": 0,
"subscribers_count": 2
},
@ -43,19 +43,19 @@
"description": "Windows LPE",
"fork": false,
"created_at": "2024-06-11T08:03:29Z",
"updated_at": "2024-06-17T00:05:18Z",
"updated_at": "2024-06-17T06:12:08Z",
"pushed_at": "2024-06-11T20:41:59Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 35,
"forks": 13,
"watchers": 42,
"score": 0,
"subscribers_count": 1
},
@ -73,21 +73,21 @@
"description": "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel",
"fork": false,
"created_at": "2024-06-12T11:11:16Z",
"updated_at": "2024-06-17T00:16:45Z",
"updated_at": "2024-06-17T05:33:29Z",
"pushed_at": "2024-06-13T07:30:48Z",
"stargazers_count": 132,
"watchers_count": 132,
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 10,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 132,
"forks": 16,
"watchers": 147,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 815768749,

View file

@ -18,13 +18,13 @@
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 26,
"score": 0,
"subscribers_count": 0

View file

@ -13,19 +13,19 @@
"description": "POC for CVE-2024-27804",
"fork": false,
"created_at": "2024-05-14T14:17:06Z",
"updated_at": "2024-06-14T05:59:05Z",
"updated_at": "2024-06-17T02:24:28Z",
"pushed_at": "2024-05-14T14:55:23Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 23,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 117,
"forks": 24,
"watchers": 118,
"score": 0,
"subscribers_count": 5
}

View file

@ -48,13 +48,13 @@
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 59,
"score": 0,
"subscribers_count": 1
@ -168,7 +168,7 @@
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -194,7 +194,7 @@
"wordpress-plugin"
],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 80,
"score": 0,
"subscribers_count": 3

View file

@ -1,32 +1,32 @@
[
{
"id": 815671742,
"id": 815806664,
"name": "CVE-2024-30078-",
"full_name": "alperenugurlu\/CVE-2024-30078-",
"full_name": "lvyitian\/CVE-2024-30078-",
"owner": {
"login": "alperenugurlu",
"id": 64872731,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64872731?v=4",
"html_url": "https:\/\/github.com\/alperenugurlu"
"login": "lvyitian",
"id": 20856162,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20856162?v=4",
"html_url": "https:\/\/github.com\/lvyitian"
},
"html_url": "https:\/\/github.com\/alperenugurlu\/CVE-2024-30078-",
"html_url": "https:\/\/github.com\/lvyitian\/CVE-2024-30078-",
"description": "CVE-2024-30078 Detection and Command Execution Script",
"fork": false,
"created_at": "2024-06-15T19:37:56Z",
"updated_at": "2024-06-16T23:21:22Z",
"created_at": "2024-06-16T08:06:03Z",
"updated_at": "2024-06-16T08:06:04Z",
"pushed_at": "2024-06-15T20:21:26Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 27,
"forks": 9,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 24,
"score": 0,
"subscribers_count": 1

View file

@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-06-16T02:17:49Z",
"updated_at": "2024-06-17T06:03:01Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3465,
"watchers_count": 3465,
"stargazers_count": 3467,
"watchers_count": 3467,
"has_discussions": false,
"forks_count": 234,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 234,
"watchers": 3465,
"watchers": 3467,
"score": 0,
"subscribers_count": 40
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -36,7 +36,7 @@
"sqli"
],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 48,
"score": 0,
"subscribers_count": 1

32
2024/CVE-2024-37889.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 816119624,
"name": "CVE-2024-37889",
"full_name": "uname-s\/CVE-2024-37889",
"owner": {
"login": "uname-s",
"id": 94480739,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94480739?v=4",
"html_url": "https:\/\/github.com\/uname-s"
},
"html_url": "https:\/\/github.com\/uname-s\/CVE-2024-37889",
"description": null,
"fork": false,
"created_at": "2024-06-17T04:50:00Z",
"updated_at": "2024-06-17T05:36:53Z",
"pushed_at": "2024-06-17T05:36:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
}
]

View file

@ -163,10 +163,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-06-16T23:58:03Z",
"updated_at": "2024-06-17T04:52:25Z",
"pushed_at": "2024-06-07T09:53:15Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 133,
"watchers_count": 133,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 131,
"watchers": 133,
"score": 0,
"subscribers_count": 4
},
@ -595,13 +595,13 @@
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 13,
"score": 0,
"subscribers_count": 1

View file

@ -2199,7 +2199,7 @@
<code>Windows Wi-Fi Driver Remote Code Execution Vulnerability
</code>
- [alperenugurlu/CVE-2024-30078-](https://github.com/alperenugurlu/CVE-2024-30078-)
- [lvyitian/CVE-2024-30078-](https://github.com/lvyitian/CVE-2024-30078-)
### CVE-2024-30212 (2024-05-28)
@ -2753,6 +2753,13 @@
- [optistream/securenvoy-cve-2024-37393](https://github.com/optistream/securenvoy-cve-2024-37393)
### CVE-2024-37889 (2024-06-14)
<code>MyFinances is a web application for managing finances. MyFinances has a way to access other customer invoices while signed in as a user. This method allows an actor to access PII and financial information from another account. The vulnerability is fixed in 0.4.6.
</code>
- [uname-s/CVE-2024-37889](https://github.com/uname-s/CVE-2024-37889)
### CVE-2024-38396 (2024-06-16)
<code>An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395.
@ -7983,6 +7990,7 @@
- [youmulijiang/evil-winrar](https://github.com/youmulijiang/evil-winrar)
- [solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC](https://github.com/solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC)
- [RomainBayle08/CVE-2023-38831](https://github.com/RomainBayle08/CVE-2023-38831)
- [imbyter/WinRAR_CVE-2023-38831](https://github.com/imbyter/WinRAR_CVE-2023-38831)
### CVE-2023-38836 (2023-08-21)