Auto Update 2024/03/28 12:27:19

This commit is contained in:
motikan2010-bot 2024-03-28 21:27:19 +09:00
parent 215388cead
commit bd9c8606fc
34 changed files with 259 additions and 150 deletions

View file

@ -253,10 +253,10 @@
"description": "OpenSSL TLS heartbeat read overrun (CVE-2014-0160)",
"fork": false,
"created_at": "2014-04-08T20:58:26Z",
"updated_at": "2022-03-23T08:58:41Z",
"updated_at": "2024-03-28T09:37:17Z",
"pushed_at": "2014-04-11T02:40:46Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -265,7 +265,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Cisco SmartInstall Exploit [CVE-2018-0171]",
"fork": false,
"created_at": "2023-02-01T03:51:56Z",
"updated_at": "2024-03-21T22:18:17Z",
"updated_at": "2024-03-28T11:57:23Z",
"pushed_at": "2023-02-06T17:17:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,12 +43,12 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-03-27T08:44:55Z",
"updated_at": "2024-03-28T07:47:24Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4013,
"watchers_count": 4013,
"stargazers_count": 4014,
"watchers_count": 4014,
"has_discussions": false,
"forks_count": 1081,
"forks_count": 1080,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -74,8 +74,8 @@
"webshell"
],
"visibility": "public",
"forks": 1081,
"watchers": 4013,
"forks": 1080,
"watchers": 4014,
"score": 0,
"subscribers_count": 151
},

View file

@ -170,10 +170,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-03-25T06:10:46Z",
"updated_at": "2024-03-28T06:43:41Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 590,
"watchers_count": 590,
"stargazers_count": 591,
"watchers_count": 591,
"has_discussions": false,
"forks_count": 143,
"allow_forking": true,
@ -182,7 +182,7 @@
"topics": [],
"visibility": "public",
"forks": 143,
"watchers": 590,
"watchers": 591,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,12 +13,12 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-03-27T08:44:55Z",
"updated_at": "2024-03-28T07:47:24Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4013,
"watchers_count": 4013,
"stargazers_count": 4014,
"watchers_count": 4014,
"has_discussions": false,
"forks_count": 1081,
"forks_count": 1080,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -44,8 +44,8 @@
"webshell"
],
"visibility": "public",
"forks": 1081,
"watchers": 4013,
"forks": 1080,
"watchers": 4014,
"score": 0,
"subscribers_count": 151
},

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-03-27T12:27:01Z",
"updated_at": "2024-03-28T09:51:49Z",
"pushed_at": "2024-02-01T06:53:03Z",
"stargazers_count": 1227,
"watchers_count": 1227,
"stargazers_count": 1228,
"watchers_count": 1228,
"has_discussions": false,
"forks_count": 154,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 154,
"watchers": 1227,
"watchers": 1228,
"score": 0,
"subscribers_count": 12
}

View file

@ -109,10 +109,10 @@
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
"fork": false,
"created_at": "2021-07-03T15:15:12Z",
"updated_at": "2024-03-26T19:20:00Z",
"updated_at": "2024-03-28T06:23:40Z",
"pushed_at": "2021-09-13T12:12:17Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -128,7 +128,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 105,
"watchers": 104,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2024-03-27T00:13:33Z",
"updated_at": "2024-03-28T09:36:08Z",
"pushed_at": "2023-07-10T16:41:49Z",
"stargazers_count": 285,
"watchers_count": 285,
"stargazers_count": 286,
"watchers_count": 286,
"has_discussions": false,
"forks_count": 51,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 285,
"forks": 52,
"watchers": 286,
"score": 0,
"subscribers_count": 8
},

View file

@ -2466,19 +2466,19 @@
"description": "pkexec (Polkit) exploit of Privilege Escalation vulnerability CVE-2021-4034",
"fork": false,
"created_at": "2022-01-28T15:16:44Z",
"updated_at": "2024-02-24T11:42:38Z",
"updated_at": "2024-03-28T09:35:58Z",
"pushed_at": "2022-01-28T15:17:47Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-03-25T18:09:09Z",
"updated_at": "2024-03-28T06:23:50Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1531,
"watchers_count": 1531,
"stargazers_count": 1530,
"watchers_count": 1530,
"has_discussions": false,
"forks_count": 480,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 480,
"watchers": 1531,
"watchers": 1530,
"score": 0,
"subscribers_count": 28
},

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2024-03-19T07:30:38Z",
"updated_at": "2024-03-28T07:27:11Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 954,
"watchers_count": 954,
"stargazers_count": 955,
"watchers_count": 955,
"has_discussions": false,
"forks_count": 191,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 191,
"watchers": 954,
"watchers": 955,
"score": 0,
"subscribers_count": 26
},

View file

@ -201,10 +201,10 @@
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
"updated_at": "2024-03-26T13:58:11Z",
"pushed_at": "2023-11-07T02:48:51Z",
"stargazers_count": 236,
"watchers_count": 236,
"updated_at": "2024-03-28T09:50:02Z",
"pushed_at": "2024-03-28T08:46:27Z",
"stargazers_count": 238,
"watchers_count": 238,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -217,7 +217,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 236,
"watchers": 238,
"score": 0,
"subscribers_count": 5
},

View file

@ -6721,36 +6721,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 438650245,
"name": "log4j_temp_CVE-2021-44228",
"full_name": "111coding\/log4j_temp_CVE-2021-44228",
"owner": {
"login": "111coding",
"id": 49793527,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49793527?v=4",
"html_url": "https:\/\/github.com\/111coding"
},
"html_url": "https:\/\/github.com\/111coding\/log4j_temp_CVE-2021-44228",
"description": null,
"fork": false,
"created_at": "2021-12-15T14:01:23Z",
"updated_at": "2021-12-18T17:13:29Z",
"pushed_at": "2021-12-18T17:13:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 438664340,
"name": "log4j-vuln-coverage-check",

View file

@ -13,10 +13,10 @@
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
"fork": false,
"created_at": "2022-03-19T08:10:46Z",
"updated_at": "2024-03-24T02:53:53Z",
"updated_at": "2024-03-28T10:13:18Z",
"pushed_at": "2022-09-04T17:28:56Z",
"stargazers_count": 323,
"watchers_count": 323,
"stargazers_count": 324,
"watchers_count": 324,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 323,
"watchers": 324,
"score": 0,
"subscribers_count": 6
},

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-03-27T12:27:01Z",
"updated_at": "2024-03-28T09:51:49Z",
"pushed_at": "2024-02-01T06:53:03Z",
"stargazers_count": 1227,
"watchers_count": 1227,
"stargazers_count": 1228,
"watchers_count": 1228,
"has_discussions": false,
"forks_count": 154,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 154,
"watchers": 1227,
"watchers": 1228,
"score": 0,
"subscribers_count": 12
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 3,
"score": 0,
"subscribers_count": 1

View file

@ -690,13 +690,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Exploit for Microsoft SharePoint 2019",
"fork": false,
"created_at": "2023-12-28T09:08:47Z",
"updated_at": "2024-03-27T00:23:14Z",
"updated_at": "2024-03-28T10:46:11Z",
"pushed_at": "2023-12-28T10:02:02Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -138,7 +138,7 @@
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -148,7 +148,7 @@
"rocketmq"
],
"visibility": "public",
"forks": 20,
"forks": 21,
"watchers": 96,
"score": 0,
"subscribers_count": 3

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-36874 PoC",
"fork": false,
"created_at": "2023-08-20T13:50:42Z",
"updated_at": "2024-03-19T07:31:07Z",
"updated_at": "2024-03-28T11:44:33Z",
"pushed_at": "2024-03-13T18:33:17Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 80,
"watchers": 79,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2024-03-27T15:06:59Z",
"updated_at": "2024-03-28T07:17:02Z",
"pushed_at": "2024-02-20T09:03:22Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 140,
"watchers_count": 140,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 139,
"watchers": 140,
"score": 0,
"subscribers_count": 1
},

32
2023/CVE-2023-42789.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 778714358,
"name": "CVE-2023-42789",
"full_name": "jhonnybonny\/CVE-2023-42789",
"owner": {
"login": "jhonnybonny",
"id": 87495218,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87495218?v=4",
"html_url": "https:\/\/github.com\/jhonnybonny"
},
"html_url": "https:\/\/github.com\/jhonnybonny\/CVE-2023-42789",
"description": "Check CVE-2023-42789 ",
"fork": false,
"created_at": "2024-03-28T08:59:12Z",
"updated_at": "2024-03-28T09:03:10Z",
"pushed_at": "2024-03-28T09:10:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-03-28T06:09:54Z",
"updated_at": "2024-03-28T12:05:22Z",
"pushed_at": "2024-03-27T18:25:56Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
"forks_count": 30,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 158,
"forks": 33,
"watchers": 187,
"score": 0,
"subscribers_count": 3
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"sysaid"
],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 49,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-48022 exploit modified from Bishop Fox work",
"fork": false,
"created_at": "2024-01-10T06:26:01Z",
"updated_at": "2024-01-10T06:33:09Z",
"updated_at": "2024-03-28T06:53:18Z",
"pushed_at": "2024-01-10T06:33:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Fortinet FortiClient EMS SQL Injection",
"fork": false,
"created_at": "2024-03-18T20:50:48Z",
"updated_at": "2024-03-28T02:08:42Z",
"updated_at": "2024-03-28T12:02:44Z",
"pushed_at": "2024-03-20T20:42:41Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-03-28T06:25:09Z",
"updated_at": "2024-03-28T12:30:02Z",
"pushed_at": "2024-03-27T09:22:28Z",
"stargazers_count": 392,
"watchers_count": 392,
"stargazers_count": 420,
"watchers_count": 420,
"has_discussions": false,
"forks_count": 39,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc"
],
"visibility": "public",
"forks": 39,
"watchers": 392,
"forks": 43,
"watchers": 420,
"score": 0,
"subscribers_count": 1
}

View file

@ -82,6 +82,36 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 778686568,
"name": "cve-2024-20767",
"full_name": "huyqa\/cve-2024-20767",
"owner": {
"login": "huyqa",
"id": 56718313,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56718313?v=4",
"html_url": "https:\/\/github.com\/huyqa"
},
"html_url": "https:\/\/github.com\/huyqa\/cve-2024-20767",
"description": null,
"fork": false,
"created_at": "2024-03-28T07:46:31Z",
"updated_at": "2024-03-28T07:47:00Z",
"pushed_at": "2024-03-28T07:46:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -89,8 +119,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

32
2024/CVE-2024-21388.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 778727781,
"name": "CVE-2024-21388",
"full_name": "d0rb\/CVE-2024-21388",
"owner": {
"login": "d0rb",
"id": 10403781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
"html_url": "https:\/\/github.com\/d0rb"
},
"html_url": "https:\/\/github.com\/d0rb\/CVE-2024-21388",
"description": "This Python script exploits a vulnerability (CVE-2024-21388) in Microsoft Edge, allowing silent installation of browser extensions with elevated privileges via a private API.",
"fork": false,
"created_at": "2024-03-28T09:31:31Z",
"updated_at": "2024-03-28T09:33:26Z",
"pushed_at": "2024-03-28T09:33:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-03-27T07:19:06Z",
"updated_at": "2024-03-28T09:14:01Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 547,
"watchers_count": 547,
"stargazers_count": 548,
"watchers_count": 548,
"has_discussions": false,
"forks_count": 123,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 123,
"watchers": 547,
"watchers": 548,
"score": 0,
"subscribers_count": 7
},

View file

@ -43,10 +43,10 @@
"description": "PoC and Detection for CVE-2024-21626",
"fork": false,
"created_at": "2024-02-01T15:28:37Z",
"updated_at": "2024-03-15T14:51:58Z",
"updated_at": "2024-03-28T08:09:37Z",
"pushed_at": "2024-02-06T16:09:05Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 51,
"watchers": 52,
"score": 0,
"subscribers_count": 3
},

32
2024/CVE-2024-2193.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 778680882,
"name": "CVE-2024-2193",
"full_name": "uthrasri\/CVE-2024-2193",
"owner": {
"login": "uthrasri",
"id": 145666390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
"html_url": "https:\/\/github.com\/uthrasri"
},
"html_url": "https:\/\/github.com\/uthrasri\/CVE-2024-2193",
"description": null,
"fork": false,
"created_at": "2024-03-28T07:30:04Z",
"updated_at": "2024-03-28T07:31:14Z",
"pushed_at": "2024-03-28T07:31:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "WallEscape vulnerability in util-linux",
"fork": false,
"created_at": "2024-03-11T00:15:03Z",
"updated_at": "2024-03-28T03:01:18Z",
"updated_at": "2024-03-28T09:55:38Z",
"pushed_at": "2024-03-12T00:28:14Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -175,6 +175,9 @@
### CVE-2024-2169
- [douglasbuzatto/G3-Loop-DoS](https://github.com/douglasbuzatto/G3-Loop-DoS)
### CVE-2024-2193
- [uthrasri/CVE-2024-2193](https://github.com/uthrasri/CVE-2024-2193)
### CVE-2024-2432
- [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP)
@ -220,6 +223,7 @@
- [yoryio/CVE-2024-20767](https://github.com/yoryio/CVE-2024-20767)
- [m-cetin/CVE-2024-20767](https://github.com/m-cetin/CVE-2024-20767)
- [Chocapikk/CVE-2024-20767](https://github.com/Chocapikk/CVE-2024-20767)
- [huyqa/cve-2024-20767](https://github.com/huyqa/cve-2024-20767)
### CVE-2024-20931 (2024-02-16)
@ -245,6 +249,13 @@
- [d0rb/CVE-2024-21378](https://github.com/d0rb/CVE-2024-21378)
### CVE-2024-21388 (2024-01-30)
<code>Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
</code>
- [d0rb/CVE-2024-21388](https://github.com/d0rb/CVE-2024-21388)
### CVE-2024-21412 (2024-02-13)
<code>Internet Shortcut Files Security Feature Bypass Vulnerability
@ -6340,6 +6351,9 @@
- [actuator/wave.ai.browser](https://github.com/actuator/wave.ai.browser)
### CVE-2023-42789
- [jhonnybonny/CVE-2023-42789](https://github.com/jhonnybonny/CVE-2023-42789)
### CVE-2023-42793 (2023-09-19)
<code>In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
@ -20464,7 +20478,6 @@
- [gitlab-de/log4j-resources](https://github.com/gitlab-de/log4j-resources)
- [redhuntlabs/Log4JHunt](https://github.com/redhuntlabs/Log4JHunt)
- [mss/log4shell-hotfix-side-effect](https://github.com/mss/log4shell-hotfix-side-effect)
- [111coding/log4j_temp_CVE-2021-44228](https://github.com/111coding/log4j_temp_CVE-2021-44228)
- [MeterianHQ/log4j-vuln-coverage-check](https://github.com/MeterianHQ/log4j-vuln-coverage-check)
- [sebiboga/jmeter-fix-cve-2021-44228-windows](https://github.com/sebiboga/jmeter-fix-cve-2021-44228-windows)
- [mitiga/log4shell-cloud-scanner](https://github.com/mitiga/log4shell-cloud-scanner)