mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/04/16 18:31:42
This commit is contained in:
parent
3b5ddc2220
commit
b4f67055e9
40 changed files with 366 additions and 172 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "A proof of concept exploit for the CVE-2013-1965 vulnerability affecting Apache Struts 2",
|
||||
"fork": false,
|
||||
"created_at": "2015-06-04T18:47:35Z",
|
||||
"updated_at": "2016-09-22T09:01:38Z",
|
||||
"updated_at": "2024-04-16T13:56:07Z",
|
||||
"pushed_at": "2015-06-02T22:28:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -491,7 +491,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
"subscribers_count": 12
|
||||
},
|
||||
{
|
||||
"id": 155115549,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2019-0230 Exploit POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-13T15:18:32Z",
|
||||
"updated_at": "2022-11-09T18:09:00Z",
|
||||
"updated_at": "2024-04-16T13:54:52Z",
|
||||
"pushed_at": "2020-08-21T07:35:11Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -225,10 +225,10 @@
|
|||
"description": "Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-07T15:03:07Z",
|
||||
"updated_at": "2024-04-01T04:07:40Z",
|
||||
"updated_at": "2024-04-16T15:23:19Z",
|
||||
"pushed_at": "2022-09-04T14:16:50Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -242,7 +242,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-23T10:24:07Z",
|
||||
"updated_at": "2024-04-12T09:22:53Z",
|
||||
"updated_at": "2024-04-16T15:36:46Z",
|
||||
"pushed_at": "2021-03-16T13:53:37Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -31,8 +31,8 @@
|
|||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 111,
|
||||
"forks": 40,
|
||||
"watchers": 112,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -88,5 +88,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 787421344,
|
||||
"name": "CVE-2020-27786",
|
||||
"full_name": "ii4gsp\/CVE-2020-27786",
|
||||
"owner": {
|
||||
"login": "ii4gsp",
|
||||
"id": 150011478,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150011478?v=4",
|
||||
"html_url": "https:\/\/github.com\/ii4gsp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ii4gsp\/CVE-2020-27786",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T13:45:35Z",
|
||||
"updated_at": "2024-04-16T13:53:17Z",
|
||||
"pushed_at": "2024-04-16T16:11:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-21T07:57:50Z",
|
||||
"updated_at": "2023-08-28T13:45:27Z",
|
||||
"updated_at": "2024-04-16T14:55:40Z",
|
||||
"pushed_at": "2021-09-29T15:28:01Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
|
|
|
@ -14,11 +14,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-08-15T07:42:50Z",
|
||||
"updated_at": "2024-02-11T18:29:33Z",
|
||||
"pushed_at": "2023-08-15T17:57:06Z",
|
||||
"pushed_at": "2024-04-16T15:11:54Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -37,7 +37,7 @@
|
|||
"urls"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 16,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-15T17:32:24Z",
|
||||
"updated_at": "2024-02-18T16:19:55Z",
|
||||
"updated_at": "2024-04-16T12:34:59Z",
|
||||
"pushed_at": "2021-01-23T01:25:22Z",
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 139,
|
||||
"watchers": 140,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"forks": 17,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T16:30:02Z",
|
||||
"updated_at": "2024-04-03T12:02:29Z",
|
||||
"updated_at": "2024-04-16T15:49:10Z",
|
||||
"pushed_at": "2021-03-29T12:33:38Z",
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"has_discussions": true,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 122,
|
||||
"watchers": 123,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Gex is an iOS 14.7 jailbreak using CVE-2021-30807 IOMFB & CVE-2021-30860 exploit(s)",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-30T14:56:04Z",
|
||||
"updated_at": "2024-02-23T07:52:24Z",
|
||||
"updated_at": "2024-04-16T17:33:09Z",
|
||||
"pushed_at": "2022-02-12T14:53:09Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "远程代码执行S2-062 CVE-2021-31805验证POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T01:50:14Z",
|
||||
"updated_at": "2024-02-20T07:02:44Z",
|
||||
"updated_at": "2024-04-16T13:53:41Z",
|
||||
"pushed_at": "2022-04-17T08:19:59Z",
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 128,
|
||||
"watchers": 129,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "海康威视RCE漏洞 批量检测和利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-03T17:27:59Z",
|
||||
"updated_at": "2024-03-31T09:51:22Z",
|
||||
"updated_at": "2024-04-16T12:32:10Z",
|
||||
"pushed_at": "2022-08-05T19:57:30Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -148,7 +148,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 120,
|
||||
"watchers": 121,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -84,13 +84,13 @@
|
|||
"stargazers_count": 1913,
|
||||
"watchers_count": 1913,
|
||||
"has_discussions": false,
|
||||
"forks_count": 510,
|
||||
"forks_count": 509,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 510,
|
||||
"forks": 509,
|
||||
"watchers": 1913,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
|
@ -1952,10 +1952,10 @@
|
|||
"description": "Proof of concept for pwnkit vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T14:43:57Z",
|
||||
"updated_at": "2024-04-07T17:13:30Z",
|
||||
"updated_at": "2024-04-16T16:12:09Z",
|
||||
"pushed_at": "2023-01-12T19:23:29Z",
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"stargazers_count": 335,
|
||||
"watchers_count": 335,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
|
@ -1964,7 +1964,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 336,
|
||||
"watchers": 335,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -4489,10 +4489,10 @@
|
|||
"html_url": "https:\/\/github.com\/mutur4"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mutur4\/CVE-2021-4034",
|
||||
"description": null,
|
||||
"description": "A pwnkit N-Day exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T08:29:44Z",
|
||||
"updated_at": "2023-07-26T19:45:45Z",
|
||||
"updated_at": "2024-04-16T12:52:34Z",
|
||||
"pushed_at": "2024-04-10T14:48:27Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-16T16:17:44Z",
|
||||
"updated_at": "2024-04-11T13:44:04Z",
|
||||
"updated_at": "2024-04-16T16:10:43Z",
|
||||
"pushed_at": "2021-11-11T17:09:56Z",
|
||||
"stargazers_count": 459,
|
||||
"watchers_count": 459,
|
||||
"stargazers_count": 458,
|
||||
"watchers_count": 458,
|
||||
"has_discussions": false,
|
||||
"forks_count": 96,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 96,
|
||||
"watchers": 459,
|
||||
"watchers": 458,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -108,10 +108,10 @@
|
|||
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T23:15:05Z",
|
||||
"updated_at": "2024-04-01T21:10:50Z",
|
||||
"updated_at": "2024-04-16T16:10:51Z",
|
||||
"pushed_at": "2022-01-13T12:35:19Z",
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -122,7 +122,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 268,
|
||||
"watchers": 267,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -857,7 +857,7 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2024-04-12T22:42:33Z",
|
||||
"updated_at": "2024-04-16T16:37:24Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 924,
|
||||
"watchers_count": 924,
|
||||
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-04-16T04:49:02Z",
|
||||
"updated_at": "2024-04-16T14:58:19Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1745,
|
||||
"watchers_count": 1745,
|
||||
"stargazers_count": 1746,
|
||||
"watchers_count": 1746,
|
||||
"has_discussions": false,
|
||||
"forks_count": 514,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 514,
|
||||
"watchers": 1745,
|
||||
"watchers": 1746,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
@ -8790,10 +8790,10 @@
|
|||
"description": "Exploiting CVE-2021-44228 in vCenter for remote code execution and more. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-19T14:48:30Z",
|
||||
"updated_at": "2024-04-12T22:42:25Z",
|
||||
"updated_at": "2024-04-16T16:11:55Z",
|
||||
"pushed_at": "2021-12-22T15:56:21Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -8802,7 +8802,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 97,
|
||||
"watchers": 96,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -1185,10 +1185,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2024-04-14T16:15:20Z",
|
||||
"updated_at": "2024-04-16T17:24:26Z",
|
||||
"pushed_at": "2023-05-20T05:55:45Z",
|
||||
"stargazers_count": 508,
|
||||
"watchers_count": 508,
|
||||
"stargazers_count": 507,
|
||||
"watchers_count": 507,
|
||||
"has_discussions": false,
|
||||
"forks_count": 136,
|
||||
"allow_forking": true,
|
||||
|
@ -1197,7 +1197,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 136,
|
||||
"watchers": 508,
|
||||
"watchers": 507,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T10:25:59Z",
|
||||
"updated_at": "2024-04-06T23:35:01Z",
|
||||
"updated_at": "2024-04-16T16:55:30Z",
|
||||
"pushed_at": "2023-05-27T15:39:41Z",
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 212,
|
||||
"watchers": 213,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -48,10 +48,10 @@
|
|||
"description": "[PoC] Privilege escalation & code execution via LFI in PwnDoC ",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-11T15:26:14Z",
|
||||
"updated_at": "2024-03-29T19:00:28Z",
|
||||
"updated_at": "2024-04-16T17:40:38Z",
|
||||
"pushed_at": "2023-02-11T15:30:56Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -66,7 +66,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-20963 PoC (Android WorkSource parcel\/unparcel logic mismatch)",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-12T10:44:59Z",
|
||||
"updated_at": "2024-04-15T07:27:31Z",
|
||||
"updated_at": "2024-04-16T15:58:11Z",
|
||||
"pushed_at": "2024-04-12T18:23:49Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 30,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-2255 Libre Office ",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-10T20:54:56Z",
|
||||
"updated_at": "2024-04-05T10:53:58Z",
|
||||
"updated_at": "2024-04-16T14:57:48Z",
|
||||
"pushed_at": "2023-07-10T21:00:09Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Original PoC for CVE-2023-32784",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T17:08:55Z",
|
||||
"updated_at": "2024-04-16T01:44:47Z",
|
||||
"updated_at": "2024-04-16T13:48:56Z",
|
||||
"pushed_at": "2023-08-17T19:26:55Z",
|
||||
"stargazers_count": 619,
|
||||
"watchers_count": 619,
|
||||
"stargazers_count": 620,
|
||||
"watchers_count": 620,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 619,
|
||||
"watchers": 620,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pwn2Own Vancouver 2023 Ubuntu LPE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-01T07:41:23Z",
|
||||
"updated_at": "2024-04-15T03:35:19Z",
|
||||
"updated_at": "2024-04-16T12:56:01Z",
|
||||
"pushed_at": "2023-11-12T00:42:29Z",
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 150,
|
||||
"watchers": 151,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-21T21:39:24Z",
|
||||
"updated_at": "2024-04-13T04:47:00Z",
|
||||
"updated_at": "2024-04-16T13:50:00Z",
|
||||
"pushed_at": "2024-03-22T06:45:43Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "lazy way to create CVE-2023-38831 winrar file for testing",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-24T16:03:07Z",
|
||||
"updated_at": "2024-01-24T11:25:04Z",
|
||||
"updated_at": "2024-04-16T17:11:09Z",
|
||||
"pushed_at": "2023-08-24T16:13:02Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2024-04-13T14:41:34Z",
|
||||
"updated_at": "2024-04-16T17:11:15Z",
|
||||
"pushed_at": "2023-11-26T06:46:44Z",
|
||||
"stargazers_count": 768,
|
||||
"watchers_count": 768,
|
||||
"stargazers_count": 769,
|
||||
"watchers_count": 769,
|
||||
"has_discussions": false,
|
||||
"forks_count": 139,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 139,
|
||||
"watchers": 768,
|
||||
"watchers": 769,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-04-16T08:02:15Z",
|
||||
"updated_at": "2024-04-16T15:07:26Z",
|
||||
"pushed_at": "2024-04-08T13:43:21Z",
|
||||
"stargazers_count": 403,
|
||||
"watchers_count": 403,
|
||||
"stargazers_count": 404,
|
||||
"watchers_count": 404,
|
||||
"has_discussions": false,
|
||||
"forks_count": 61,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 403,
|
||||
"forks": 63,
|
||||
"watchers": 404,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -298,5 +298,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 787494467,
|
||||
"name": "CVE-2023-50164Analysis-",
|
||||
"full_name": "AsfandAliMemon25\/CVE-2023-50164Analysis-",
|
||||
"owner": {
|
||||
"login": "AsfandAliMemon25",
|
||||
"id": 154571318,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154571318?v=4",
|
||||
"html_url": "https:\/\/github.com\/AsfandAliMemon25"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AsfandAliMemon25\/CVE-2023-50164Analysis-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T16:20:04Z",
|
||||
"updated_at": "2024-04-16T17:36:32Z",
|
||||
"pushed_at": "2024-04-16T17:09:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-6319 proof of concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-11T18:58:17Z",
|
||||
"updated_at": "2024-04-16T08:27:50Z",
|
||||
"updated_at": "2024-04-16T13:58:09Z",
|
||||
"pushed_at": "2024-04-13T10:31:33Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-04-16T09:14:48Z",
|
||||
"updated_at": "2024-04-16T17:26:02Z",
|
||||
"pushed_at": "2024-04-10T23:22:55Z",
|
||||
"stargazers_count": 1839,
|
||||
"watchers_count": 1839,
|
||||
"stargazers_count": 1841,
|
||||
"watchers_count": 1841,
|
||||
"has_discussions": false,
|
||||
"forks_count": 227,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 227,
|
||||
"watchers": 1839,
|
||||
"watchers": 1841,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-04-16T07:14:33Z",
|
||||
"updated_at": "2024-04-16T07:14:33Z",
|
||||
"pushed_at": "2024-04-16T08:24:49Z",
|
||||
"pushed_at": "2024-04-16T15:03:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T05:53:02Z",
|
||||
"updated_at": "2024-04-16T12:29:33Z",
|
||||
"updated_at": "2024-04-16T18:26:02Z",
|
||||
"pushed_at": "2024-04-13T06:03:18Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 28,
|
||||
"forks": 12,
|
||||
"watchers": 59,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-13T22:57:00Z",
|
||||
"updated_at": "2024-03-27T23:12:59Z",
|
||||
"updated_at": "2024-04-16T17:32:59Z",
|
||||
"pushed_at": "2024-03-24T22:01:21Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T15:43:07Z",
|
||||
"updated_at": "2024-04-01T15:43:07Z",
|
||||
"updated_at": "2024-04-16T17:19:46Z",
|
||||
"pushed_at": "2024-04-01T16:23:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -1012,19 +1012,19 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-04-16T11:53:45Z",
|
||||
"updated_at": "2024-04-16T15:24:48Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3371,
|
||||
"watchers_count": 3371,
|
||||
"stargazers_count": 3372,
|
||||
"watchers_count": 3372,
|
||||
"has_discussions": false,
|
||||
"forks_count": 227,
|
||||
"forks_count": 226,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 227,
|
||||
"watchers": 3371,
|
||||
"forks": 226,
|
||||
"watchers": 3372,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
@ -1107,7 +1107,7 @@
|
|||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1118,7 +1118,7 @@
|
|||
"xz-utils"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
@ -1446,10 +1446,10 @@
|
|||
"description": "Verify if your installed version of xz-utils is vulnerable to CVE-2024-3094 backdoor",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-03T13:09:32Z",
|
||||
"updated_at": "2024-04-03T14:39:09Z",
|
||||
"updated_at": "2024-04-16T17:57:55Z",
|
||||
"pushed_at": "2024-04-03T14:02:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1458,7 +1458,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1633,10 +1633,10 @@
|
|||
"description": "A small repo with a single playbook.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-04T14:52:09Z",
|
||||
"updated_at": "2024-04-04T14:52:09Z",
|
||||
"updated_at": "2024-04-16T16:04:25Z",
|
||||
"pushed_at": "2024-04-05T11:12:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1645,7 +1645,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T14:00:31Z",
|
||||
"updated_at": "2024-04-16T12:21:39Z",
|
||||
"updated_at": "2024-04-16T17:52:44Z",
|
||||
"pushed_at": "2024-04-13T14:03:19Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -103,8 +103,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T18:14:47Z",
|
||||
"updated_at": "2024-04-13T18:15:16Z",
|
||||
"pushed_at": "2024-04-13T18:15:42Z",
|
||||
"updated_at": "2024-04-16T13:04:58Z",
|
||||
"pushed_at": "2024-04-16T13:04:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -223,19 +223,19 @@
|
|||
"description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T01:43:24Z",
|
||||
"updated_at": "2024-04-16T09:00:02Z",
|
||||
"updated_at": "2024-04-16T18:34:07Z",
|
||||
"pushed_at": "2024-04-16T02:08:47Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -253,7 +253,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T07:31:22Z",
|
||||
"updated_at": "2024-04-16T07:34:57Z",
|
||||
"updated_at": "2024-04-16T17:18:12Z",
|
||||
"pushed_at": "2024-04-16T07:41:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -268,5 +268,95 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 787437309,
|
||||
"name": "CVE-2024-3400",
|
||||
"full_name": "h4x0r-dz\/CVE-2024-3400",
|
||||
"owner": {
|
||||
"login": "h4x0r-dz",
|
||||
"id": 26070859,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
|
||||
"html_url": "https:\/\/github.com\/h4x0r-dz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-3400",
|
||||
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T14:18:08Z",
|
||||
"updated_at": "2024-04-16T18:34:21Z",
|
||||
"pushed_at": "2024-04-16T16:33:08Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 787493956,
|
||||
"name": "CVE-2024-3400",
|
||||
"full_name": "W01fh4cker\/CVE-2024-3400",
|
||||
"owner": {
|
||||
"login": "W01fh4cker",
|
||||
"id": 101872898,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4",
|
||||
"html_url": "https:\/\/github.com\/W01fh4cker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/W01fh4cker\/CVE-2024-3400",
|
||||
"description": "CVE-2024-3400",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T16:18:56Z",
|
||||
"updated_at": "2024-04-16T16:18:57Z",
|
||||
"pushed_at": "2024-04-16T16:18:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 787515205,
|
||||
"name": "CVE-2024-3400-POC",
|
||||
"full_name": "CONDITIONBLACK\/CVE-2024-3400-POC",
|
||||
"owner": {
|
||||
"login": "CONDITIONBLACK",
|
||||
"id": 6516181,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6516181?v=4",
|
||||
"html_url": "https:\/\/github.com\/CONDITIONBLACK"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CONDITIONBLACK\/CVE-2024-3400-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T17:08:15Z",
|
||||
"updated_at": "2024-04-16T17:12:56Z",
|
||||
"pushed_at": "2024-04-16T17:18:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-3867.json
Normal file
32
2024/CVE-2024-3867.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 787533779,
|
||||
"name": "CVE-2024-3867-POC",
|
||||
"full_name": "RansomGroupCVE\/CVE-2024-3867-POC",
|
||||
"owner": {
|
||||
"login": "RansomGroupCVE",
|
||||
"id": 166298400,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166298400?v=4",
|
||||
"html_url": "https:\/\/github.com\/RansomGroupCVE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RansomGroupCVE\/CVE-2024-3867-POC",
|
||||
"description": "Exploiting Reflected Cross-Site Scripting (XSS) in WordPress archive-tainacan-collection Theme",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T17:52:19Z",
|
||||
"updated_at": "2024-04-16T17:52:19Z",
|
||||
"pushed_at": "2024-04-16T17:55:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
24
README.md
24
README.md
|
@ -371,6 +371,16 @@
|
|||
- [MurrayR0123/CVE-2024-3400-Compromise-Checker](https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker)
|
||||
- [AdaniKamal/CVE-2024-3400](https://github.com/AdaniKamal/CVE-2024-3400)
|
||||
- [LoanVitor/CVE-2024-3400-](https://github.com/LoanVitor/CVE-2024-3400-)
|
||||
- [h4x0r-dz/CVE-2024-3400](https://github.com/h4x0r-dz/CVE-2024-3400)
|
||||
- [W01fh4cker/CVE-2024-3400](https://github.com/W01fh4cker/CVE-2024-3400)
|
||||
- [CONDITIONBLACK/CVE-2024-3400-POC](https://github.com/CONDITIONBLACK/CVE-2024-3400-POC)
|
||||
|
||||
### CVE-2024-3867 (2024-04-16)
|
||||
|
||||
<code>The archive-tainacan-collection theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in version 2.7.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
||||
</code>
|
||||
|
||||
- [RansomGroupCVE/CVE-2024-3867-POC](https://github.com/RansomGroupCVE/CVE-2024-3867-POC)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
@ -6192,11 +6202,7 @@
|
|||
|
||||
- [sahiloj/CVE-2023-37599](https://github.com/sahiloj/CVE-2023-37599)
|
||||
|
||||
### CVE-2023-37621 (2024-02-01)
|
||||
|
||||
<code>An issue in Fronius Datalogger Web v.2.0.5-4, allows remote attackers to obtain sensitive information via a crafted request.
|
||||
</code>
|
||||
|
||||
### CVE-2023-37621
|
||||
- [MY0723/CNVD-2022-27366__CVE-2023-37621](https://github.com/MY0723/CNVD-2022-27366__CVE-2023-37621)
|
||||
|
||||
### CVE-2023-37625 (2023-08-10)
|
||||
|
@ -6631,7 +6637,11 @@
|
|||
### CVE-2023-39725
|
||||
- [anky-123/CVE-2023-39725](https://github.com/anky-123/CVE-2023-39725)
|
||||
|
||||
### CVE-2023-40000
|
||||
### CVE-2023-40000 (2024-04-16)
|
||||
|
||||
<code>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Stored XSS.This issue affects LiteSpeed Cache: from n/a through 5.7.\n\n
|
||||
</code>
|
||||
|
||||
- [rxerium/CVE-2023-40000](https://github.com/rxerium/CVE-2023-40000)
|
||||
|
||||
### CVE-2023-40028 (2023-08-15)
|
||||
|
@ -8729,6 +8739,7 @@
|
|||
- [aaronm-sysdig/cve-2023-50164](https://github.com/aaronm-sysdig/cve-2023-50164)
|
||||
- [snyk-labs/CVE-2023-50164-POC](https://github.com/snyk-labs/CVE-2023-50164-POC)
|
||||
- [sunnyvale-it/CVE-2023-50164-PoC](https://github.com/sunnyvale-it/CVE-2023-50164-PoC)
|
||||
- [AsfandAliMemon25/CVE-2023-50164Analysis-](https://github.com/AsfandAliMemon25/CVE-2023-50164Analysis-)
|
||||
|
||||
### CVE-2023-50226
|
||||
- [kn32/parallels-file-move-privesc](https://github.com/kn32/parallels-file-move-privesc)
|
||||
|
@ -26779,6 +26790,7 @@
|
|||
- [kiks7/CVE-2020-27786-Kernel-Exploit](https://github.com/kiks7/CVE-2020-27786-Kernel-Exploit)
|
||||
- [elbiazo/CVE-2020-27786](https://github.com/elbiazo/CVE-2020-27786)
|
||||
- [Trinadh465/linux-4.19.72_CVE-2020-27786](https://github.com/Trinadh465/linux-4.19.72_CVE-2020-27786)
|
||||
- [ii4gsp/CVE-2020-27786](https://github.com/ii4gsp/CVE-2020-27786)
|
||||
|
||||
### CVE-2020-27815 (2021-05-26)
|
||||
|
||||
|
|
Loading…
Reference in a new issue