Auto Update 2024/05/29 18:29:23

This commit is contained in:
motikan2010-bot 2024-05-30 03:29:23 +09:00
parent a494929755
commit be36746863
45 changed files with 266 additions and 293 deletions

View file

@ -18,13 +18,13 @@
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 13,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 12,
"watchers": 28,
"score": 0,
"subscribers_count": 2

View file

@ -177,6 +177,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,8 +43,8 @@
"description": "A tool for retrieving login credentials from Netwave IP cameras using a memory dump vulnerability (CVE-2018-17240)",
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-05-28T13:53:51Z",
"pushed_at": "2024-05-29T08:32:02Z",
"updated_at": "2024-05-29T12:18:35Z",
"pushed_at": "2024-05-29T12:18:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -13,7 +13,7 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2024-05-05T06:05:09Z",
"updated_at": "2024-05-29T14:17:34Z",
"pushed_at": "2022-12-11T10:44:39Z",
"stargazers_count": 514,
"watchers_count": 514,

View file

@ -2565,8 +2565,8 @@
"description": "CVE-2018-6574-go-get-RCE",
"fork": false,
"created_at": "2024-05-17T17:30:06Z",
"updated_at": "2024-05-20T16:29:28Z",
"pushed_at": "2024-05-20T16:29:25Z",
"updated_at": "2024-05-29T17:55:04Z",
"pushed_at": "2024-05-29T17:55:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "simple Python exploit using CVE-2018-7449 on embOS\/IP FTP Server v3.22",
"fork": false,
"created_at": "2023-05-05T10:38:23Z",
"updated_at": "2024-05-28T14:43:57Z",
"updated_at": "2024-05-29T14:45:09Z",
"pushed_at": "2023-05-08T08:18:48Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -1566,10 +1566,10 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2024-05-29T09:10:13Z",
"updated_at": "2024-05-29T16:21:33Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 889,
"watchers_count": 889,
"stargazers_count": 890,
"watchers_count": 890,
"has_discussions": false,
"forks_count": 240,
"allow_forking": true,
@ -1578,7 +1578,7 @@
"topics": [],
"visibility": "public",
"forks": 240,
"watchers": 889,
"watchers": 890,
"score": 0,
"subscribers_count": 55
},

File diff suppressed because one or more lines are too long

View file

@ -43,10 +43,10 @@
"description": "Proof of Concept for CVE-2019-18634",
"fork": false,
"created_at": "2020-02-07T18:07:03Z",
"updated_at": "2024-05-28T09:32:45Z",
"updated_at": "2024-05-29T12:17:30Z",
"pushed_at": "2021-09-12T02:55:24Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 201,
"watchers": 202,
"score": 0,
"subscribers_count": 3
},

View file

@ -109,10 +109,10 @@
"description": "RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420)",
"fork": false,
"created_at": "2019-03-23T02:52:31Z",
"updated_at": "2024-05-25T09:46:29Z",
"updated_at": "2024-05-29T17:01:39Z",
"pushed_at": "2023-01-19T12:13:40Z",
"stargazers_count": 133,
"watchers_count": 133,
"stargazers_count": 134,
"watchers_count": 134,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -123,7 +123,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 133,
"watchers": 134,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)",
"fork": false,
"created_at": "2021-01-23T19:07:18Z",
"updated_at": "2024-05-13T02:02:12Z",
"updated_at": "2024-05-29T13:16:45Z",
"pushed_at": "2021-01-24T09:05:40Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 7
}

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2020-28032 (It's just a POP chain in WordPress < 5.5.2 for exploiting PHP Object Injection)",
"fork": false,
"created_at": "2021-11-17T07:09:47Z",
"updated_at": "2022-11-16T05:43:01Z",
"updated_at": "2024-05-29T18:15:46Z",
"pushed_at": "2021-11-17T07:43:54Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -28,5 +28,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 3
},
{
"id": 807731524,
"name": "CVE-2020-5377",
"full_name": "c0d3cr4f73r\/CVE-2020-5377",
"owner": {
"login": "c0d3cr4f73r",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
},
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2020-5377",
"description": "CVE-2020-5377: Dell OpenManage Server Administrator File Read",
"fork": false,
"created_at": "2024-05-29T17:01:16Z",
"updated_at": "2024-05-29T17:21:00Z",
"pushed_at": "2024-05-29T17:20:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -71,35 +71,5 @@
"watchers": 5,
"score": 0,
"subscribers_count": 0
},
{
"id": 693348964,
"name": "CVE-2020-5844-exploit",
"full_name": "1Gould\/CVE-2020-5844-exploit",
"owner": {
"login": "1Gould",
"id": 7574362,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7574362?v=4",
"html_url": "https:\/\/github.com\/1Gould"
},
"html_url": "https:\/\/github.com\/1Gould\/CVE-2020-5844-exploit",
"description": null,
"fork": false,
"created_at": "2023-09-18T21:14:30Z",
"updated_at": "2023-09-18T21:20:08Z",
"pushed_at": "2023-09-18T21:34:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 692936858,
"name": "CVE-2020-5847-exploit",
"full_name": "1Gould\/CVE-2020-5847-exploit",
"owner": {
"login": "1Gould",
"id": 7574362,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7574362?v=4",
"html_url": "https:\/\/github.com\/1Gould"
},
"html_url": "https:\/\/github.com\/1Gould\/CVE-2020-5847-exploit",
"description": "CVE-2020-5847 exploit written in python",
"fork": false,
"created_at": "2023-09-18T02:19:38Z",
"updated_at": "2023-09-18T02:34:10Z",
"pushed_at": "2023-10-16T19:34:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -301,10 +301,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2024-05-21T11:16:14Z",
"updated_at": "2024-05-29T16:15:53Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 973,
"watchers_count": 973,
"stargazers_count": 972,
"watchers_count": 972,
"has_discussions": false,
"forks_count": 231,
"allow_forking": true,
@ -313,7 +313,7 @@
"topics": [],
"visibility": "public",
"forks": 231,
"watchers": 973,
"watchers": 972,
"score": 0,
"subscribers_count": 27
},

View file

@ -13,10 +13,10 @@
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
"fork": false,
"created_at": "2021-07-20T22:16:49Z",
"updated_at": "2024-05-21T17:02:49Z",
"updated_at": "2024-05-29T17:01:46Z",
"pushed_at": "2022-01-16T02:09:46Z",
"stargazers_count": 202,
"watchers_count": 202,
"stargazers_count": 203,
"watchers_count": 203,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 202,
"watchers": 203,
"score": 0,
"subscribers_count": 5
},

View file

@ -242,35 +242,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 805918438,
"name": "SamuelTulach_voidmap",
"full_name": "SultanPLX\/SamuelTulach_voidmap",
"owner": {
"login": "SultanPLX",
"id": 170830154,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170830154?v=4",
"html_url": "https:\/\/github.com\/SultanPLX"
},
"html_url": "https:\/\/github.com\/SultanPLX\/SamuelTulach_voidmap",
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
"fork": false,
"created_at": "2024-05-25T20:58:26Z",
"updated_at": "2024-05-25T20:58:31Z",
"pushed_at": "2024-05-25T20:58:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -4980,7 +4980,7 @@
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -4993,7 +4993,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 74,
"score": 0,
"subscribers_count": 6

View file

@ -583,10 +583,10 @@
"description": "Bash script to check for CVE-2022-0847 \"Dirty Pipe\"",
"fork": false,
"created_at": "2022-03-08T17:13:24Z",
"updated_at": "2024-04-24T21:24:05Z",
"updated_at": "2024-05-29T12:39:24Z",
"pushed_at": "2023-06-14T23:25:46Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -595,7 +595,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 62,
"watchers": 63,
"score": 0,
"subscribers_count": 1
},
@ -1190,13 +1190,13 @@
"stargazers_count": 514,
"watchers_count": 514,
"has_discussions": false,
"forks_count": 137,
"forks_count": 138,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 137,
"forks": 138,
"watchers": 514,
"score": 0,
"subscribers_count": 15

View file

@ -913,10 +913,10 @@
"description": "CVE-2022-22947 memshell",
"fork": false,
"created_at": "2022-03-18T07:17:17Z",
"updated_at": "2024-05-04T12:03:26Z",
"updated_at": "2024-05-29T12:46:10Z",
"pushed_at": "2022-03-18T07:17:45Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -929,7 +929,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 2
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 15,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"forks": 14,
"watchers": 40,
"score": 0,
"subscribers_count": 4

View file

@ -13,10 +13,10 @@
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2024-05-20T07:13:23Z",
"updated_at": "2024-05-29T16:36:38Z",
"pushed_at": "2022-11-18T15:47:17Z",
"stargazers_count": 527,
"watchers_count": 527,
"stargazers_count": 528,
"watchers_count": 528,
"has_discussions": false,
"forks_count": 114,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 114,
"watchers": 527,
"watchers": 528,
"score": 0,
"subscribers_count": 47
},

View file

@ -336,35 +336,5 @@
"watchers": 9,
"score": 0,
"subscribers_count": 2
},
{
"id": 805918361,
"name": "SamuelTulach_nullmap",
"full_name": "SultanPLX\/SamuelTulach_nullmap",
"owner": {
"login": "SultanPLX",
"id": 170830154,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170830154?v=4",
"html_url": "https:\/\/github.com\/SultanPLX"
},
"html_url": "https:\/\/github.com\/SultanPLX\/SamuelTulach_nullmap",
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2024-05-25T20:58:11Z",
"updated_at": "2024-05-25T20:58:16Z",
"pushed_at": "2024-05-25T20:58:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -343,10 +343,10 @@
"description": "Atlassian Confluence - Remote Code Execution",
"fork": false,
"created_at": "2024-01-23T10:55:28Z",
"updated_at": "2024-03-19T20:19:21Z",
"updated_at": "2024-05-29T16:58:07Z",
"pushed_at": "2024-01-23T11:30:10Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},
@ -586,10 +586,10 @@
"description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理",
"fork": false,
"created_at": "2024-02-26T02:34:44Z",
"updated_at": "2024-05-29T09:12:03Z",
"updated_at": "2024-05-29T13:30:08Z",
"pushed_at": "2024-04-24T02:34:16Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -598,7 +598,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},

View file

@ -253,8 +253,8 @@
"description": "CVE-2023-29489-XSS",
"fork": false,
"created_at": "2023-06-01T18:13:17Z",
"updated_at": "2024-05-28T08:41:07Z",
"pushed_at": "2024-05-28T08:41:04Z",
"updated_at": "2024-05-29T14:16:23Z",
"pushed_at": "2024-05-29T14:16:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -73,19 +73,19 @@
"description": "Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection",
"fork": false,
"created_at": "2024-05-27T15:10:12Z",
"updated_at": "2024-05-29T10:13:02Z",
"updated_at": "2024-05-29T18:28:22Z",
"pushed_at": "2024-05-28T15:10:20Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": "Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit",
"fork": false,
"created_at": "2023-06-01T02:17:20Z",
"updated_at": "2024-05-28T16:29:28Z",
"updated_at": "2024-05-29T14:37:41Z",
"pushed_at": "2023-06-04T12:19:12Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 74,
"watchers": 75,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)",
"fork": false,
"created_at": "2023-11-05T16:33:32Z",
"updated_at": "2024-05-14T23:44:40Z",
"updated_at": "2024-05-29T17:03:20Z",
"pushed_at": "2023-11-24T12:55:00Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
"fork": false,
"created_at": "2023-11-17T10:32:31Z",
"updated_at": "2024-05-27T18:11:07Z",
"updated_at": "2024-05-29T16:29:28Z",
"pushed_at": "2023-11-21T10:45:58Z",
"stargazers_count": 186,
"watchers_count": 186,
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 186,
"watchers": 187,
"score": 0,
"subscribers_count": 3
},

32
2023/CVE-2023-43622.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 807622468,
"name": "CVE-2023-43622",
"full_name": "visudade\/CVE-2023-43622",
"owner": {
"login": "visudade",
"id": 49928261,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49928261?v=4",
"html_url": "https:\/\/github.com\/visudade"
},
"html_url": "https:\/\/github.com\/visudade\/CVE-2023-43622",
"description": "CVE-202343622",
"fork": false,
"created_at": "2024-05-29T13:04:29Z",
"updated_at": "2024-05-29T13:19:21Z",
"pushed_at": "2024-05-29T13:19:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-05-29T12:13:29Z",
"pushed_at": "2024-05-27T04:30:54Z",
"stargazers_count": 746,
"watchers_count": 746,
"updated_at": "2024-05-29T18:14:28Z",
"pushed_at": "2024-05-29T14:55:57Z",
"stargazers_count": 748,
"watchers_count": 748,
"has_discussions": false,
"forks_count": 129,
"forks_count": 132,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 129,
"watchers": 746,
"forks": 132,
"watchers": 748,
"score": 0,
"subscribers_count": 12
},

View file

@ -723,5 +723,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 807674683,
"name": "honeypot.rs",
"full_name": "mranv\/honeypot.rs",
"owner": {
"login": "mranv",
"id": 61981861,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61981861?v=4",
"html_url": "https:\/\/github.com\/mranv"
},
"html_url": "https:\/\/github.com\/mranv\/honeypot.rs",
"description": " CVE-2023-46604 (Apache ActiveMQ RCE Vulnerability) and focused on getting Indicators of Compromise.",
"fork": false,
"created_at": "2024-05-29T14:56:41Z",
"updated_at": "2024-05-29T18:18:22Z",
"pushed_at": "2024-05-29T18:18:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)",
"fork": false,
"created_at": "2023-11-16T17:41:59Z",
"updated_at": "2024-05-09T03:08:28Z",
"updated_at": "2024-05-29T16:36:38Z",
"pushed_at": "2023-11-16T17:44:39Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
"fork": false,
"created_at": "2023-12-13T20:26:59Z",
"updated_at": "2024-05-15T06:21:59Z",
"updated_at": "2024-05-29T16:58:18Z",
"pushed_at": "2024-02-06T23:22:31Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -39,7 +39,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 65,
"watchers": 66,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept for CVE-2024-21345",
"fork": false,
"created_at": "2024-04-26T16:38:17Z",
"updated_at": "2024-05-23T06:50:44Z",
"updated_at": "2024-05-29T16:21:56Z",
"pushed_at": "2024-04-26T16:39:48Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 63,
"watchers": 64,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,19 +13,19 @@
"description": "CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection",
"fork": false,
"created_at": "2024-05-20T14:34:09Z",
"updated_at": "2024-05-29T10:35:01Z",
"updated_at": "2024-05-29T14:28:38Z",
"pushed_at": "2024-05-21T11:56:19Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 4
},
@ -48,13 +48,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -103,10 +103,10 @@
"description": "CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. ",
"fork": false,
"created_at": "2024-01-26T19:00:03Z",
"updated_at": "2024-05-22T22:03:20Z",
"updated_at": "2024-05-29T16:57:52Z",
"pushed_at": "2024-02-29T12:13:21Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 49,
"watchers": 50,
"score": 0,
"subscribers_count": 3
},

View file

@ -73,10 +73,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-05-29T11:53:34Z",
"updated_at": "2024-05-29T17:15:04Z",
"pushed_at": "2024-05-28T03:19:34Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 149,
"watchers_count": 149,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 139,
"watchers": 149,
"score": 0,
"subscribers_count": 2
}

View file

@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-05-29T11:30:35Z",
"updated_at": "2024-05-29T14:58:48Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3470,
"watchers_count": 3470,
"stargazers_count": 3471,
"watchers_count": 3471,
"has_discussions": false,
"forks_count": 232,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 232,
"watchers": 3470,
"watchers": 3471,
"score": 0,
"subscribers_count": 38
},

View file

@ -73,12 +73,12 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-05-29T02:35:37Z",
"updated_at": "2024-05-29T18:14:16Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 277,
"watchers_count": 277,
"stargazers_count": 289,
"watchers_count": 289,
"has_discussions": false,
"forks_count": 81,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -89,8 +89,8 @@
"rce"
],
"visibility": "public",
"forks": 81,
"watchers": 277,
"forks": 83,
"watchers": 289,
"score": 0,
"subscribers_count": 3
},
@ -108,19 +108,19 @@
"description": "Hook for the PoC for exploiting CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:35:44Z",
"updated_at": "2024-05-28T12:52:10Z",
"updated_at": "2024-05-29T13:47:51Z",
"pushed_at": "2024-05-19T06:30:05Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 7,
"forks": 13,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-05-29T11:15:20Z",
"updated_at": "2024-05-29T14:51:53Z",
"pushed_at": "2024-05-23T10:07:41Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 1
},

View file

@ -193,10 +193,10 @@
"description": "CVE-2024-4956 : Nexus Repository Manager 3 poc exploit",
"fork": false,
"created_at": "2024-05-28T15:05:31Z",
"updated_at": "2024-05-29T11:54:29Z",
"updated_at": "2024-05-29T15:04:38Z",
"pushed_at": "2024-05-29T11:54:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -223,10 +223,10 @@
"description": "Proof-Of-Concept (POC) for CVE-2024-4956",
"fork": false,
"created_at": "2024-05-28T21:20:53Z",
"updated_at": "2024-05-29T07:38:55Z",
"updated_at": "2024-05-29T15:04:40Z",
"pushed_at": "2024-05-29T07:37:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -243,7 +243,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -43,10 +43,10 @@
"description": "Hash Form Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution",
"fork": false,
"created_at": "2024-05-27T20:04:10Z",
"updated_at": "2024-05-28T12:30:54Z",
"updated_at": "2024-05-29T15:05:52Z",
"pushed_at": "2024-05-28T12:30:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -2308,7 +2308,11 @@
- [Gr-1m/CVE-2024-34958-1](https://github.com/Gr-1m/CVE-2024-34958-1)
### CVE-2024-35333
### CVE-2024-35333 (-)
<code>A stack-buffer-overflow vulnerability exists in the read_charset_decl function of html2xhtml 1.3. This vulnerability occurs due to improper bounds checking when copying data into a fixed-size stack buffer. An attacker can exploit this vulnerability by providing a specially crafted input to the vulnerable function, causing a buffer overflow and potentially leading to arbitrary code execution, denial of service, or data corruption.
</code>
- [momo1239/CVE-2024-35333](https://github.com/momo1239/CVE-2024-35333)
### CVE-2024-35475 (-)
@ -4119,7 +4123,6 @@
- [Rosayxy/Recreate-cve-2023-21768](https://github.com/Rosayxy/Recreate-cve-2023-21768)
- [Ha0-Y/CVE-2023-21768](https://github.com/Ha0-Y/CVE-2023-21768)
- [xboxoneresearch/CVE-2023-21768-dotnet](https://github.com/xboxoneresearch/CVE-2023-21768-dotnet)
- [SultanPLX/SamuelTulach_nullmap](https://github.com/SultanPLX/SamuelTulach_nullmap)
### CVE-2023-21823 (2023-02-14)
@ -8423,6 +8426,13 @@
- [Mr-xn/CVE-2023-43482](https://github.com/Mr-xn/CVE-2023-43482)
### CVE-2023-43622 (2023-10-23)
<code>An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known &quot;slow loris&quot; attack pattern.\nThis has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout.\n\nThis issue affects Apache HTTP Server: from 2.4.55 through 2.4.57.\n\nUsers are recommended to upgrade to version 2.4.58, which fixes the issue.\n\n
</code>
- [visudade/CVE-2023-43622](https://github.com/visudade/CVE-2023-43622)
### CVE-2023-43654 (2023-09-28)
<code>TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper input validation, enabling third parties to invoke remote HTTP download requests and write files to the disk. This issue could be taken advantage of to compromise the integrity of the system and sensitive data. This issue is present in versions 0.1.0 to 0.8.1. A user is able to load the model of their choice from any URL that they would like to use. The user of TorchServe is responsible for configuring both the allowed_urls and specifying the model URL to be used. A pull request to warn the user when the default value for allowed_urls is used has been merged in PR #2534. TorchServe release 0.8.2 includes this change. Users are advised to upgrade. There are no known workarounds for this issue.
@ -9053,6 +9063,7 @@
- [Arlenhiack/ActiveMQ-RCE-Exploit](https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit)
- [vulncheck-oss/cve-2023-46604](https://github.com/vulncheck-oss/cve-2023-46604)
- [thinkycx/activemq-rce-cve-2023-46604](https://github.com/thinkycx/activemq-rce-cve-2023-46604)
- [mranv/honeypot.rs](https://github.com/mranv/honeypot.rs)
### CVE-2023-46615 (2024-02-12)
@ -21194,7 +21205,6 @@
- [BL0odz/CVE-2021-40449-NtGdiResetDC-UAF](https://github.com/BL0odz/CVE-2021-40449-NtGdiResetDC-UAF)
- [SamuelTulach/voidmap](https://github.com/SamuelTulach/voidmap)
- [toanthang1842002/CVE-2021-40449](https://github.com/toanthang1842002/CVE-2021-40449)
- [SultanPLX/SamuelTulach_voidmap](https://github.com/SultanPLX/SamuelTulach_voidmap)
### CVE-2021-40492 (2021-09-03)
@ -24656,6 +24666,7 @@
</code>
- [und3sc0n0c1d0/AFR-in-OMSA](https://github.com/und3sc0n0c1d0/AFR-in-OMSA)
- [c0d3cr4f73r/CVE-2020-5377](https://github.com/c0d3cr4f73r/CVE-2020-5377)
### CVE-2020-5398 (2020-01-16)
@ -24735,14 +24746,6 @@
- [TheCyberGeek/CVE-2020-5844](https://github.com/TheCyberGeek/CVE-2020-5844)
- [UNICORDev/exploit-CVE-2020-5844](https://github.com/UNICORDev/exploit-CVE-2020-5844)
- [1Gould/CVE-2020-5844-exploit](https://github.com/1Gould/CVE-2020-5844-exploit)
### CVE-2020-5847 (2020-03-16)
<code>Unraid through 6.8.0 allows Remote Code Execution.
</code>
- [1Gould/CVE-2020-5847-exploit](https://github.com/1Gould/CVE-2020-5847-exploit)
### CVE-2020-5902 (2020-07-01)
@ -28954,7 +28957,7 @@
### CVE-2019-1125 (2019-09-03)
<code>An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.
<code>An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries.\nTo exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further.\nOn January 3, 2018, Microsoft released an advisory and security updatesrelated to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125.\nMicrosoft released a security update on July 9, 2019 that addresses the vulnerability through a software change that mitigates how the CPU speculatively accesses memory. Note that this vulnerability does not require a microcode update from your device OEM.\n
</code>
- [bitdefender/swapgs-attack-poc](https://github.com/bitdefender/swapgs-attack-poc)
@ -28969,7 +28972,7 @@
### CVE-2019-1181 (2019-08-14)
<code>A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1182, CVE-2019-1222, CVE-2019-1226.
<code>A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\nTo exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP.\nThe update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.\n
</code>
- [major203/cve-2019-1181](https://github.com/major203/cve-2019-1181)
@ -28983,7 +28986,7 @@
### CVE-2019-1218 (2019-08-14)
<code>A spoofing vulnerability exists in the way Microsoft Outlook iOS software parses specifically crafted email messages, aka 'Outlook iOS Spoofing Vulnerability'.
<code>A spoofing vulnerability exists in the way Microsoft Outlook iOS software parses specifically crafted email messages. An authenticated attacker could exploit the vulnerability by sending a specially crafted email message to a victim.\nThe attacker who successfully exploited this vulnerability could then perform cross-site scripting attacks on the affected systems and run scripts in the security context of the current user.\nThe security update addresses the vulnerability by correcting how Outlook iOS parses specially crafted email messages.\n
</code>
- [d0gukank/CVE-2019-1218](https://github.com/d0gukank/CVE-2019-1218)