Auto Update 2024/04/16 18:31:42

This commit is contained in:
motikan2010-bot 2024-04-17 03:31:42 +09:00
parent 3b5ddc2220
commit b4f67055e9
40 changed files with 366 additions and 172 deletions

View file

@ -13,10 +13,10 @@
"description": "A proof of concept exploit for the CVE-2013-1965 vulnerability affecting Apache Struts 2",
"fork": false,
"created_at": "2015-06-04T18:47:35Z",
"updated_at": "2016-09-22T09:01:38Z",
"updated_at": "2024-04-16T13:56:07Z",
"pushed_at": "2015-06-02T22:28:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -491,7 +491,7 @@
"forks": 0,
"watchers": 11,
"score": 0,
"subscribers_count": 11
"subscribers_count": 12
},
{
"id": 155115549,

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-0230 Exploit POC",
"fork": false,
"created_at": "2020-08-13T15:18:32Z",
"updated_at": "2022-11-09T18:09:00Z",
"updated_at": "2024-04-16T13:54:52Z",
"pushed_at": "2020-08-21T07:35:11Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -225,10 +225,10 @@
"description": "Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215",
"fork": false,
"created_at": "2020-06-07T15:03:07Z",
"updated_at": "2024-04-01T04:07:40Z",
"updated_at": "2024-04-16T15:23:19Z",
"pushed_at": "2022-09-04T14:16:50Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -242,7 +242,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,12 +13,12 @@
"description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation",
"fork": false,
"created_at": "2020-11-23T10:24:07Z",
"updated_at": "2024-04-12T09:22:53Z",
"updated_at": "2024-04-16T15:36:46Z",
"pushed_at": "2021-03-16T13:53:37Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"windows"
],
"visibility": "public",
"forks": 39,
"watchers": 111,
"forks": 40,
"watchers": 112,
"score": 0,
"subscribers_count": 6
},

View file

@ -88,5 +88,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 787421344,
"name": "CVE-2020-27786",
"full_name": "ii4gsp\/CVE-2020-27786",
"owner": {
"login": "ii4gsp",
"id": 150011478,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150011478?v=4",
"html_url": "https:\/\/github.com\/ii4gsp"
},
"html_url": "https:\/\/github.com\/ii4gsp\/CVE-2020-27786",
"description": null,
"fork": false,
"created_at": "2024-04-16T13:45:35Z",
"updated_at": "2024-04-16T13:53:17Z",
"pushed_at": "2024-04-16T16:11:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2021-05-21T07:57:50Z",
"updated_at": "2023-08-28T13:45:27Z",
"updated_at": "2024-04-16T14:55:40Z",
"pushed_at": "2021-09-29T15:28:01Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -14,11 +14,11 @@
"fork": false,
"created_at": "2020-08-15T07:42:50Z",
"updated_at": "2024-02-11T18:29:33Z",
"pushed_at": "2023-08-15T17:57:06Z",
"pushed_at": "2024-04-16T15:11:54Z",
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -37,7 +37,7 @@
"urls"
],
"visibility": "public",
"forks": 15,
"forks": 16,
"watchers": 77,
"score": 0,
"subscribers_count": 7

View file

@ -13,10 +13,10 @@
"description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119",
"fork": false,
"created_at": "2021-01-15T17:32:24Z",
"updated_at": "2024-02-18T16:19:55Z",
"updated_at": "2024-04-16T12:34:59Z",
"pushed_at": "2021-01-23T01:25:22Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 140,
"watchers_count": 140,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 139,
"watchers": 140,
"score": 0,
"subscribers_count": 10
},

View file

@ -48,7 +48,7 @@
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -57,7 +57,7 @@
"poc"
],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 78,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
"updated_at": "2024-04-03T12:02:29Z",
"updated_at": "2024-04-16T15:49:10Z",
"pushed_at": "2021-03-29T12:33:38Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"has_discussions": true,
"forks_count": 23,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 122,
"watchers": 123,
"score": 0,
"subscribers_count": 11
}

View file

@ -43,10 +43,10 @@
"description": "Gex is an iOS 14.7 jailbreak using CVE-2021-30807 IOMFB & CVE-2021-30860 exploit(s)",
"fork": false,
"created_at": "2021-11-30T14:56:04Z",
"updated_at": "2024-02-23T07:52:24Z",
"updated_at": "2024-04-16T17:33:09Z",
"pushed_at": "2022-02-12T14:53:09Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "远程代码执行S2-062 CVE-2021-31805验证POC",
"fork": false,
"created_at": "2022-04-15T01:50:14Z",
"updated_at": "2024-02-20T07:02:44Z",
"updated_at": "2024-04-16T13:53:41Z",
"pushed_at": "2022-04-17T08:19:59Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 128,
"watchers": 129,
"score": 0,
"subscribers_count": 4
},

View file

@ -133,10 +133,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2024-03-31T09:51:22Z",
"updated_at": "2024-04-16T12:32:10Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 121,
"watchers_count": 121,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -148,7 +148,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 120,
"watchers": 121,
"score": 0,
"subscribers_count": 2
},

View file

@ -84,13 +84,13 @@
"stargazers_count": 1913,
"watchers_count": 1913,
"has_discussions": false,
"forks_count": 510,
"forks_count": 509,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 510,
"forks": 509,
"watchers": 1913,
"score": 0,
"subscribers_count": 21
@ -1952,10 +1952,10 @@
"description": "Proof of concept for pwnkit vulnerability",
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
"updated_at": "2024-04-07T17:13:30Z",
"updated_at": "2024-04-16T16:12:09Z",
"pushed_at": "2023-01-12T19:23:29Z",
"stargazers_count": 336,
"watchers_count": 336,
"stargazers_count": 335,
"watchers_count": 335,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -1964,7 +1964,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 336,
"watchers": 335,
"score": 0,
"subscribers_count": 6
},
@ -4489,10 +4489,10 @@
"html_url": "https:\/\/github.com\/mutur4"
},
"html_url": "https:\/\/github.com\/mutur4\/CVE-2021-4034",
"description": null,
"description": "A pwnkit N-Day exploit ",
"fork": false,
"created_at": "2023-01-24T08:29:44Z",
"updated_at": "2023-07-26T19:45:45Z",
"updated_at": "2024-04-16T12:52:34Z",
"pushed_at": "2024-04-10T14:48:27Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2024-04-11T13:44:04Z",
"updated_at": "2024-04-16T16:10:43Z",
"pushed_at": "2021-11-11T17:09:56Z",
"stargazers_count": 459,
"watchers_count": 459,
"stargazers_count": 458,
"watchers_count": 458,
"has_discussions": false,
"forks_count": 96,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 96,
"watchers": 459,
"watchers": 458,
"score": 0,
"subscribers_count": 13
},

View file

@ -108,10 +108,10 @@
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
"fork": false,
"created_at": "2021-12-13T23:15:05Z",
"updated_at": "2024-04-01T21:10:50Z",
"updated_at": "2024-04-16T16:10:51Z",
"pushed_at": "2022-01-13T12:35:19Z",
"stargazers_count": 268,
"watchers_count": 268,
"stargazers_count": 267,
"watchers_count": 267,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -122,7 +122,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 268,
"watchers": 267,
"score": 0,
"subscribers_count": 7
},

View file

@ -857,7 +857,7 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2024-04-12T22:42:33Z",
"updated_at": "2024-04-16T16:37:24Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 924,
"watchers_count": 924,
@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-04-16T04:49:02Z",
"updated_at": "2024-04-16T14:58:19Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1745,
"watchers_count": 1745,
"stargazers_count": 1746,
"watchers_count": 1746,
"has_discussions": false,
"forks_count": 514,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 514,
"watchers": 1745,
"watchers": 1746,
"score": 0,
"subscribers_count": 28
},
@ -8790,10 +8790,10 @@
"description": "Exploiting CVE-2021-44228 in vCenter for remote code execution and more. ",
"fork": false,
"created_at": "2021-12-19T14:48:30Z",
"updated_at": "2024-04-12T22:42:25Z",
"updated_at": "2024-04-16T16:11:55Z",
"pushed_at": "2021-12-22T15:56:21Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -8802,7 +8802,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 97,
"watchers": 96,
"score": 0,
"subscribers_count": 7
},

View file

@ -1185,10 +1185,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2024-04-14T16:15:20Z",
"updated_at": "2024-04-16T17:24:26Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 508,
"watchers_count": 508,
"stargazers_count": 507,
"watchers_count": 507,
"has_discussions": false,
"forks_count": 136,
"allow_forking": true,
@ -1197,7 +1197,7 @@
"topics": [],
"visibility": "public",
"forks": 136,
"watchers": 508,
"watchers": 507,
"score": 0,
"subscribers_count": 15
},

View file

@ -13,10 +13,10 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
"updated_at": "2024-04-06T23:35:01Z",
"updated_at": "2024-04-16T16:55:30Z",
"pushed_at": "2023-05-27T15:39:41Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 213,
"watchers_count": 213,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 212,
"watchers": 213,
"score": 0,
"subscribers_count": 7
}

View file

@ -48,10 +48,10 @@
"description": "[PoC] Privilege escalation & code execution via LFI in PwnDoC ",
"fork": false,
"created_at": "2023-02-11T15:26:14Z",
"updated_at": "2024-03-29T19:00:28Z",
"updated_at": "2024-04-16T17:40:38Z",
"pushed_at": "2023-02-11T15:30:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -66,7 +66,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-20963 PoC (Android WorkSource parcel\/unparcel logic mismatch)",
"fork": false,
"created_at": "2023-06-12T10:44:59Z",
"updated_at": "2024-04-15T07:27:31Z",
"updated_at": "2024-04-16T15:58:11Z",
"pushed_at": "2024-04-12T18:23:49Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 30,
"watchers": 32,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-2255 Libre Office ",
"fork": false,
"created_at": "2023-07-10T20:54:56Z",
"updated_at": "2024-04-05T10:53:58Z",
"updated_at": "2024-04-16T14:57:48Z",
"pushed_at": "2023-07-10T21:00:09Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2024-04-16T01:44:47Z",
"updated_at": "2024-04-16T13:48:56Z",
"pushed_at": "2023-08-17T19:26:55Z",
"stargazers_count": 619,
"watchers_count": 619,
"stargazers_count": 620,
"watchers_count": 620,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 619,
"watchers": 620,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": "Pwn2Own Vancouver 2023 Ubuntu LPE exploit",
"fork": false,
"created_at": "2023-09-01T07:41:23Z",
"updated_at": "2024-04-15T03:35:19Z",
"updated_at": "2024-04-16T12:56:01Z",
"pushed_at": "2023-11-12T00:42:29Z",
"stargazers_count": 150,
"watchers_count": 150,
"stargazers_count": 151,
"watchers_count": 151,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 150,
"watchers": 151,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
"fork": false,
"created_at": "2024-03-21T21:39:24Z",
"updated_at": "2024-04-13T04:47:00Z",
"updated_at": "2024-04-16T13:50:00Z",
"pushed_at": "2024-03-22T06:45:43Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 91,
"watchers": 92,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "lazy way to create CVE-2023-38831 winrar file for testing",
"fork": false,
"created_at": "2023-08-24T16:03:07Z",
"updated_at": "2024-01-24T11:25:04Z",
"updated_at": "2024-04-16T17:11:09Z",
"pushed_at": "2023-08-24T16:13:02Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 4
},
@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2024-04-13T14:41:34Z",
"updated_at": "2024-04-16T17:11:15Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 768,
"watchers_count": 768,
"stargazers_count": 769,
"watchers_count": 769,
"has_discussions": false,
"forks_count": 139,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 139,
"watchers": 768,
"watchers": 769,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-04-16T08:02:15Z",
"updated_at": "2024-04-16T15:07:26Z",
"pushed_at": "2024-04-08T13:43:21Z",
"stargazers_count": 403,
"watchers_count": 403,
"stargazers_count": 404,
"watchers_count": 404,
"has_discussions": false,
"forks_count": 61,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 403,
"forks": 63,
"watchers": 404,
"score": 0,
"subscribers_count": 7
},

View file

@ -298,5 +298,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 787494467,
"name": "CVE-2023-50164Analysis-",
"full_name": "AsfandAliMemon25\/CVE-2023-50164Analysis-",
"owner": {
"login": "AsfandAliMemon25",
"id": 154571318,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154571318?v=4",
"html_url": "https:\/\/github.com\/AsfandAliMemon25"
},
"html_url": "https:\/\/github.com\/AsfandAliMemon25\/CVE-2023-50164Analysis-",
"description": null,
"fork": false,
"created_at": "2024-04-16T16:20:04Z",
"updated_at": "2024-04-16T17:36:32Z",
"pushed_at": "2024-04-16T17:09:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-6319 proof of concept",
"fork": false,
"created_at": "2024-04-11T18:58:17Z",
"updated_at": "2024-04-16T08:27:50Z",
"updated_at": "2024-04-16T13:58:09Z",
"pushed_at": "2024-04-13T10:31:33Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-16T09:14:48Z",
"updated_at": "2024-04-16T17:26:02Z",
"pushed_at": "2024-04-10T23:22:55Z",
"stargazers_count": 1839,
"watchers_count": 1839,
"stargazers_count": 1841,
"watchers_count": 1841,
"has_discussions": false,
"forks_count": 227,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 227,
"watchers": 1839,
"watchers": 1841,
"score": 0,
"subscribers_count": 19
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-04-16T07:14:33Z",
"updated_at": "2024-04-16T07:14:33Z",
"pushed_at": "2024-04-16T08:24:49Z",
"pushed_at": "2024-04-16T15:03:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,19 +13,19 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-04-16T12:29:33Z",
"updated_at": "2024-04-16T18:26:02Z",
"pushed_at": "2024-04-13T06:03:18Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 5,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 28,
"forks": 12,
"watchers": 59,
"score": 0,
"subscribers_count": 2
}

View file

@ -103,10 +103,10 @@
"description": "Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)",
"fork": false,
"created_at": "2024-03-13T22:57:00Z",
"updated_at": "2024-03-27T23:12:59Z",
"updated_at": "2024-04-16T17:32:59Z",
"pushed_at": "2024-03-24T22:01:21Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2024-04-01T15:43:07Z",
"updated_at": "2024-04-01T15:43:07Z",
"updated_at": "2024-04-16T17:19:46Z",
"pushed_at": "2024-04-01T16:23:46Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -1012,19 +1012,19 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-04-16T11:53:45Z",
"updated_at": "2024-04-16T15:24:48Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3371,
"watchers_count": 3371,
"stargazers_count": 3372,
"watchers_count": 3372,
"has_discussions": false,
"forks_count": 227,
"forks_count": 226,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 227,
"watchers": 3371,
"forks": 226,
"watchers": 3372,
"score": 0,
"subscribers_count": 34
},
@ -1107,7 +1107,7 @@
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1118,7 +1118,7 @@
"xz-utils"
],
"visibility": "public",
"forks": 4,
"forks": 3,
"watchers": 14,
"score": 0,
"subscribers_count": 2
@ -1446,10 +1446,10 @@
"description": "Verify if your installed version of xz-utils is vulnerable to CVE-2024-3094 backdoor",
"fork": false,
"created_at": "2024-04-03T13:09:32Z",
"updated_at": "2024-04-03T14:39:09Z",
"updated_at": "2024-04-16T17:57:55Z",
"pushed_at": "2024-04-03T14:02:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1458,7 +1458,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -1633,10 +1633,10 @@
"description": "A small repo with a single playbook.",
"fork": false,
"created_at": "2024-04-04T14:52:09Z",
"updated_at": "2024-04-04T14:52:09Z",
"updated_at": "2024-04-16T16:04:25Z",
"pushed_at": "2024-04-05T11:12:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1645,7 +1645,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-13T14:00:31Z",
"updated_at": "2024-04-16T12:21:39Z",
"updated_at": "2024-04-16T17:52:44Z",
"pushed_at": "2024-04-13T14:03:19Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},
@ -103,8 +103,8 @@
"description": null,
"fork": false,
"created_at": "2024-04-13T18:14:47Z",
"updated_at": "2024-04-13T18:15:16Z",
"pushed_at": "2024-04-13T18:15:42Z",
"updated_at": "2024-04-16T13:04:58Z",
"pushed_at": "2024-04-16T13:04:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -223,19 +223,19 @@
"description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect",
"fork": false,
"created_at": "2024-04-16T01:43:24Z",
"updated_at": "2024-04-16T09:00:02Z",
"updated_at": "2024-04-16T18:34:07Z",
"pushed_at": "2024-04-16T02:08:47Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
@ -253,7 +253,7 @@
"description": null,
"fork": false,
"created_at": "2024-04-16T07:31:22Z",
"updated_at": "2024-04-16T07:34:57Z",
"updated_at": "2024-04-16T17:18:12Z",
"pushed_at": "2024-04-16T07:41:28Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -268,5 +268,95 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 787437309,
"name": "CVE-2024-3400",
"full_name": "h4x0r-dz\/CVE-2024-3400",
"owner": {
"login": "h4x0r-dz",
"id": 26070859,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
"html_url": "https:\/\/github.com\/h4x0r-dz"
},
"html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-3400",
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
"fork": false,
"created_at": "2024-04-16T14:18:08Z",
"updated_at": "2024-04-16T18:34:21Z",
"pushed_at": "2024-04-16T16:33:08Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 14,
"score": 0,
"subscribers_count": 0
},
{
"id": 787493956,
"name": "CVE-2024-3400",
"full_name": "W01fh4cker\/CVE-2024-3400",
"owner": {
"login": "W01fh4cker",
"id": 101872898,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4",
"html_url": "https:\/\/github.com\/W01fh4cker"
},
"html_url": "https:\/\/github.com\/W01fh4cker\/CVE-2024-3400",
"description": "CVE-2024-3400",
"fork": false,
"created_at": "2024-04-16T16:18:56Z",
"updated_at": "2024-04-16T16:18:57Z",
"pushed_at": "2024-04-16T16:18:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 787515205,
"name": "CVE-2024-3400-POC",
"full_name": "CONDITIONBLACK\/CVE-2024-3400-POC",
"owner": {
"login": "CONDITIONBLACK",
"id": 6516181,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6516181?v=4",
"html_url": "https:\/\/github.com\/CONDITIONBLACK"
},
"html_url": "https:\/\/github.com\/CONDITIONBLACK\/CVE-2024-3400-POC",
"description": null,
"fork": false,
"created_at": "2024-04-16T17:08:15Z",
"updated_at": "2024-04-16T17:12:56Z",
"pushed_at": "2024-04-16T17:18:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-3867.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 787533779,
"name": "CVE-2024-3867-POC",
"full_name": "RansomGroupCVE\/CVE-2024-3867-POC",
"owner": {
"login": "RansomGroupCVE",
"id": 166298400,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166298400?v=4",
"html_url": "https:\/\/github.com\/RansomGroupCVE"
},
"html_url": "https:\/\/github.com\/RansomGroupCVE\/CVE-2024-3867-POC",
"description": "Exploiting Reflected Cross-Site Scripting (XSS) in WordPress archive-tainacan-collection Theme",
"fork": false,
"created_at": "2024-04-16T17:52:19Z",
"updated_at": "2024-04-16T17:52:19Z",
"pushed_at": "2024-04-16T17:55:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -371,6 +371,16 @@
- [MurrayR0123/CVE-2024-3400-Compromise-Checker](https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker)
- [AdaniKamal/CVE-2024-3400](https://github.com/AdaniKamal/CVE-2024-3400)
- [LoanVitor/CVE-2024-3400-](https://github.com/LoanVitor/CVE-2024-3400-)
- [h4x0r-dz/CVE-2024-3400](https://github.com/h4x0r-dz/CVE-2024-3400)
- [W01fh4cker/CVE-2024-3400](https://github.com/W01fh4cker/CVE-2024-3400)
- [CONDITIONBLACK/CVE-2024-3400-POC](https://github.com/CONDITIONBLACK/CVE-2024-3400-POC)
### CVE-2024-3867 (2024-04-16)
<code>The archive-tainacan-collection theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in version 2.7.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
</code>
- [RansomGroupCVE/CVE-2024-3867-POC](https://github.com/RansomGroupCVE/CVE-2024-3867-POC)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -6192,11 +6202,7 @@
- [sahiloj/CVE-2023-37599](https://github.com/sahiloj/CVE-2023-37599)
### CVE-2023-37621 (2024-02-01)
<code>An issue in Fronius Datalogger Web v.2.0.5-4, allows remote attackers to obtain sensitive information via a crafted request.
</code>
### CVE-2023-37621
- [MY0723/CNVD-2022-27366__CVE-2023-37621](https://github.com/MY0723/CNVD-2022-27366__CVE-2023-37621)
### CVE-2023-37625 (2023-08-10)
@ -6631,7 +6637,11 @@
### CVE-2023-39725
- [anky-123/CVE-2023-39725](https://github.com/anky-123/CVE-2023-39725)
### CVE-2023-40000
### CVE-2023-40000 (2024-04-16)
<code>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Stored XSS.This issue affects LiteSpeed Cache: from n/a through 5.7.\n\n
</code>
- [rxerium/CVE-2023-40000](https://github.com/rxerium/CVE-2023-40000)
### CVE-2023-40028 (2023-08-15)
@ -8729,6 +8739,7 @@
- [aaronm-sysdig/cve-2023-50164](https://github.com/aaronm-sysdig/cve-2023-50164)
- [snyk-labs/CVE-2023-50164-POC](https://github.com/snyk-labs/CVE-2023-50164-POC)
- [sunnyvale-it/CVE-2023-50164-PoC](https://github.com/sunnyvale-it/CVE-2023-50164-PoC)
- [AsfandAliMemon25/CVE-2023-50164Analysis-](https://github.com/AsfandAliMemon25/CVE-2023-50164Analysis-)
### CVE-2023-50226
- [kn32/parallels-file-move-privesc](https://github.com/kn32/parallels-file-move-privesc)
@ -26779,6 +26790,7 @@
- [kiks7/CVE-2020-27786-Kernel-Exploit](https://github.com/kiks7/CVE-2020-27786-Kernel-Exploit)
- [elbiazo/CVE-2020-27786](https://github.com/elbiazo/CVE-2020-27786)
- [Trinadh465/linux-4.19.72_CVE-2020-27786](https://github.com/Trinadh465/linux-4.19.72_CVE-2020-27786)
- [ii4gsp/CVE-2020-27786](https://github.com/ii4gsp/CVE-2020-27786)
### CVE-2020-27815 (2021-05-26)