mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/07/04 06:29:09
This commit is contained in:
parent
288986e063
commit
c8555fdff7
51 changed files with 421 additions and 198 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "Blueborne CVE-2017-1000251 PoC for linux machines",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-23T06:29:31Z",
|
||||
"updated_at": "2024-02-10T11:17:40Z",
|
||||
"updated_at": "2024-07-04T03:26:45Z",
|
||||
"pushed_at": "2023-03-10T03:04:17Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2024-06-20T07:54:10Z",
|
||||
"updated_at": "2024-07-04T02:44:10Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 788,
|
||||
"watchers_count": 788,
|
||||
"stargazers_count": 789,
|
||||
"watchers_count": 789,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 788,
|
||||
"watchers": 789,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-07-03T13:41:38Z",
|
||||
"updated_at": "2024-07-04T06:11:24Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4057,
|
||||
"watchers_count": 4057,
|
||||
"stargazers_count": 4059,
|
||||
"watchers_count": 4059,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1085,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1085,
|
||||
"watchers": 4057,
|
||||
"watchers": 4059,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -265,7 +265,7 @@
|
|||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -276,7 +276,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-07-04T00:17:09Z",
|
||||
"updated_at": "2024-07-04T06:11:24Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4058,
|
||||
"watchers_count": 4058,
|
||||
"stargazers_count": 4059,
|
||||
"watchers_count": 4059,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1085,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1085,
|
||||
"watchers": 4058,
|
||||
"watchers": 4059,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -79,10 +79,10 @@
|
|||
"description": "CVE-2020-5902 BIG-IP",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:32Z",
|
||||
"updated_at": "2024-06-03T21:30:12Z",
|
||||
"updated_at": "2024-07-04T03:00:49Z",
|
||||
"pushed_at": "2021-10-13T07:53:46Z",
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"stargazers_count": 373,
|
||||
"watchers_count": 373,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 372,
|
||||
"watchers": 373,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
"kubernetes-clusters"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -2211,5 +2211,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 823919078,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "Typical0day\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "Typical0day",
|
||||
"id": 174670608,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174670608?v=4",
|
||||
"html_url": "https:\/\/github.com\/Typical0day"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Typical0day\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-04T02:29:08Z",
|
||||
"updated_at": "2024-07-04T02:29:33Z",
|
||||
"pushed_at": "2024-07-04T02:29:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Python script for exploiting command injection in Open PLC Webserver v3",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-28T21:31:45Z",
|
||||
"updated_at": "2024-07-02T20:09:57Z",
|
||||
"updated_at": "2024-07-04T06:21:44Z",
|
||||
"pushed_at": "2024-03-28T22:14:23Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -66,6 +66,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -938,10 +938,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2024-07-02T11:56:44Z",
|
||||
"updated_at": "2024-07-04T02:01:47Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 1010,
|
||||
"watchers_count": 1010,
|
||||
"stargazers_count": 1011,
|
||||
"watchers_count": 1011,
|
||||
"has_discussions": false,
|
||||
"forks_count": 180,
|
||||
"allow_forking": true,
|
||||
|
@ -952,7 +952,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 180,
|
||||
"watchers": 1010,
|
||||
"watchers": 1011,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
@ -4960,5 +4960,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 823920292,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "Typical0day\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "Typical0day",
|
||||
"id": 174670608,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174670608?v=4",
|
||||
"html_url": "https:\/\/github.com\/Typical0day"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Typical0day\/CVE-2021-4034",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-04T02:33:57Z",
|
||||
"updated_at": "2024-07-04T02:34:26Z",
|
||||
"pushed_at": "2024-07-04T02:34:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -3516,10 +3516,10 @@
|
|||
"description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T01:55:51Z",
|
||||
"updated_at": "2024-06-26T04:23:19Z",
|
||||
"updated_at": "2024-07-04T03:51:32Z",
|
||||
"pushed_at": "2021-12-13T09:18:19Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -3528,7 +3528,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -108,13 +108,13 @@
|
|||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 666967366,
|
||||
"name": "CVE-2022-28171-POC",
|
||||
"full_name": "NyaMeeEain\/CVE-2022-28171-POC",
|
||||
"full_name": "Bibury1337\/CVE-2022-28171-POC",
|
||||
"owner": {
|
||||
"login": "NyaMeeEain",
|
||||
"login": "Bibury1337",
|
||||
"id": 28331671,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28331671?v=4",
|
||||
"html_url": "https:\/\/github.com\/NyaMeeEain"
|
||||
"html_url": "https:\/\/github.com\/Bibury1337"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NyaMeeEain\/CVE-2022-28171-POC",
|
||||
"html_url": "https:\/\/github.com\/Bibury1337\/CVE-2022-28171-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-07-16T07:30:22Z",
|
||||
|
|
|
@ -2130,10 +2130,10 @@
|
|||
"description": "Detection and Remediation of the Follina MSDT Vulnerability (CVE-2022-30190)",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-21T06:49:44Z",
|
||||
"updated_at": "2022-09-20T14:40:32Z",
|
||||
"updated_at": "2024-07-04T03:35:20Z",
|
||||
"pushed_at": "2022-07-22T15:00:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -2142,7 +2142,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -422,7 +422,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 589325446,
|
||||
|
|
|
@ -1274,7 +1274,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-04-21T08:15:19Z",
|
||||
"updated_at": "2023-05-05T13:36:18Z",
|
||||
"pushed_at": "2024-07-03T05:26:40Z",
|
||||
"pushed_at": "2024-07-04T05:24:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-22894",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-24T23:26:13Z",
|
||||
"updated_at": "2024-05-01T13:53:47Z",
|
||||
"updated_at": "2024-07-04T04:37:18Z",
|
||||
"pushed_at": "2023-04-24T23:38:15Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-24T21:59:23Z",
|
||||
"updated_at": "2024-06-21T00:11:33Z",
|
||||
"updated_at": "2024-07-04T04:48:05Z",
|
||||
"pushed_at": "2023-10-12T19:18:32Z",
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 129,
|
||||
"watchers": 130,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-18T15:42:00Z",
|
||||
"updated_at": "2024-06-30T12:58:30Z",
|
||||
"updated_at": "2024-07-04T04:42:14Z",
|
||||
"pushed_at": "2024-03-07T07:23:41Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:22:26Z",
|
||||
"updated_at": "2024-07-03T03:19:19Z",
|
||||
"updated_at": "2024-07-04T04:27:21Z",
|
||||
"pushed_at": "2023-07-28T13:20:45Z",
|
||||
"stargazers_count": 460,
|
||||
"watchers_count": 460,
|
||||
"stargazers_count": 461,
|
||||
"watchers_count": 461,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 460,
|
||||
"watchers": 461,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Perform with Massive Command Injection (Chamilo)",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-22T05:27:45Z",
|
||||
"updated_at": "2024-05-15T06:21:47Z",
|
||||
"updated_at": "2024-07-04T04:42:55Z",
|
||||
"pushed_at": "2023-07-31T20:39:37Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE exploit for CVE-2023-36802",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T17:32:15Z",
|
||||
"updated_at": "2024-06-18T12:18:59Z",
|
||||
"updated_at": "2024-07-04T04:33:40Z",
|
||||
"pushed_at": "2023-10-10T17:44:17Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 151,
|
||||
"watchers": 152,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-14T09:35:07Z",
|
||||
"updated_at": "2024-07-01T13:58:23Z",
|
||||
"updated_at": "2024-07-04T02:12:08Z",
|
||||
"pushed_at": "2024-05-16T07:42:00Z",
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 173,
|
||||
"watchers": 174,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 62,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -43,19 +43,19 @@
|
|||
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T12:30:53Z",
|
||||
"updated_at": "2024-07-03T11:52:08Z",
|
||||
"updated_at": "2024-07-04T04:21:17Z",
|
||||
"pushed_at": "2024-06-19T12:24:50Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 109,
|
||||
"forks": 23,
|
||||
"watchers": 111,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -87,6 +87,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-07-04T00:17:44Z",
|
||||
"updated_at": "2024-07-04T02:18:16Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2168,
|
||||
"watchers_count": 2168,
|
||||
"stargazers_count": 2169,
|
||||
"watchers_count": 2169,
|
||||
"has_discussions": false,
|
||||
"forks_count": 283,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 283,
|
||||
"watchers": 2168,
|
||||
"watchers": 2169,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -49,10 +49,10 @@
|
|||
"description": "CVE-2024-20666 vulnerability Solution patch failures in the Windows Recovery Environment (WinRE).",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T10:14:40Z",
|
||||
"updated_at": "2024-07-01T10:37:26Z",
|
||||
"updated_at": "2024-07-04T05:56:11Z",
|
||||
"pushed_at": "2024-07-01T10:35:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -447,6 +447,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 6,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T17:02:03Z",
|
||||
"updated_at": "2024-07-02T05:10:18Z",
|
||||
"updated_at": "2024-07-04T03:05:28Z",
|
||||
"pushed_at": "2024-06-17T19:46:27Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 265,
|
||||
"watchers": 266,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2024-07-02T18:44:18Z",
|
||||
"updated_at": "2024-07-04T06:13:20Z",
|
||||
"pushed_at": "2024-06-17T08:10:13Z",
|
||||
"stargazers_count": 297,
|
||||
"watchers_count": 297,
|
||||
"stargazers_count": 298,
|
||||
"watchers_count": 298,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 297,
|
||||
"watchers": 298,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A Pwn2Own SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-27T13:47:52Z",
|
||||
"updated_at": "2024-07-03T19:38:42Z",
|
||||
"updated_at": "2024-07-04T03:19:11Z",
|
||||
"pushed_at": "2024-06-29T04:05:12Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 69,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-24T10:37:26Z",
|
||||
"updated_at": "2024-07-03T04:43:06Z",
|
||||
"updated_at": "2024-07-04T03:13:47Z",
|
||||
"pushed_at": "2024-06-24T11:16:26Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 144,
|
||||
"watchers": 145,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -78,7 +78,7 @@
|
|||
"stargazers_count": 459,
|
||||
"watchers_count": 459,
|
||||
"has_discussions": false,
|
||||
"forks_count": 131,
|
||||
"forks_count": 132,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -89,7 +89,7 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 131,
|
||||
"forks": 132,
|
||||
"watchers": 459,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-32709 WP-Recall – Registration, Profile, Commerce & More <= 16.26.5 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-05T17:21:55Z",
|
||||
"updated_at": "2024-06-26T12:03:48Z",
|
||||
"updated_at": "2024-07-04T06:16:17Z",
|
||||
"pushed_at": "2024-05-06T16:17:51Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -318,13 +318,13 @@
|
|||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 73,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-34102: Unauthenticated Magento XXE",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-27T18:10:13Z",
|
||||
"updated_at": "2024-07-02T11:40:36Z",
|
||||
"updated_at": "2024-07-04T00:54:59Z",
|
||||
"pushed_at": "2024-07-02T11:40:33Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -327,6 +327,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,20 +13,20 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-03T07:26:07Z",
|
||||
"updated_at": "2024-07-03T17:01:07Z",
|
||||
"pushed_at": "2024-07-03T07:26:10Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"updated_at": "2024-07-04T05:43:44Z",
|
||||
"pushed_at": "2024-07-04T04:23:40Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2024/CVE-2024-39203.json
Normal file
32
2024/CVE-2024-39203.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 823919362,
|
||||
"name": "CVE-2024-39203",
|
||||
"full_name": "5r1an\/CVE-2024-39203",
|
||||
"owner": {
|
||||
"login": "5r1an",
|
||||
"id": 174668848,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174668848?v=4",
|
||||
"html_url": "https:\/\/github.com\/5r1an"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5r1an\/CVE-2024-39203",
|
||||
"description": "A cross-site scripting (XSS) vulnerability in the Backend Theme. Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-04T02:30:17Z",
|
||||
"updated_at": "2024-07-04T02:30:17Z",
|
||||
"pushed_at": "2024-07-04T02:30:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-39844 (ZNC < 1.9.1 modtcl RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-03T23:27:25Z",
|
||||
"updated_at": "2024-07-03T23:30:26Z",
|
||||
"updated_at": "2024-07-04T01:20:25Z",
|
||||
"pushed_at": "2024-07-03T23:30:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,8 +25,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 823986903,
|
||||
"name": "Digisol-DG--GR1321-s-Password-Storage-in-Plaintext--CVE-2024-4232",
|
||||
"full_name": "Redfox-Secuirty\/Digisol-DG--GR1321-s-Password-Storage-in-Plaintext--CVE-2024-4232",
|
||||
"owner": {
|
||||
"login": "Redfox-Secuirty",
|
||||
"id": 173128884,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173128884?v=4",
|
||||
"html_url": "https:\/\/github.com\/Redfox-Secuirty"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Redfox-Secuirty\/Digisol-DG--GR1321-s-Password-Storage-in-Plaintext--CVE-2024-4232",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-04T06:30:19Z",
|
||||
"updated_at": "2024-07-04T06:30:22Z",
|
||||
"pushed_at": "2024-07-04T06:30:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -498,7 +498,7 @@
|
|||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -511,7 +511,7 @@
|
|||
"redteam"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -1188,6 +1188,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -163,10 +163,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T03:09:36Z",
|
||||
"updated_at": "2024-05-27T03:14:25Z",
|
||||
"updated_at": "2024-07-04T01:22:44Z",
|
||||
"pushed_at": "2024-05-27T03:14:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -126,6 +126,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -56,21 +56,21 @@
|
|||
"description": "a signal handler race condition in OpenSSH's server (sshd)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T10:55:29Z",
|
||||
"updated_at": "2024-07-03T23:30:36Z",
|
||||
"updated_at": "2024-07-04T06:06:51Z",
|
||||
"pushed_at": "2024-07-01T10:54:02Z",
|
||||
"stargazers_count": 364,
|
||||
"watchers_count": 364,
|
||||
"stargazers_count": 377,
|
||||
"watchers_count": 377,
|
||||
"has_discussions": false,
|
||||
"forks_count": 174,
|
||||
"forks_count": 176,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 174,
|
||||
"watchers": 364,
|
||||
"forks": 176,
|
||||
"watchers": 377,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 822579775,
|
||||
|
@ -86,21 +86,21 @@
|
|||
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T12:16:21Z",
|
||||
"updated_at": "2024-07-04T00:31:35Z",
|
||||
"updated_at": "2024-07-04T06:32:51Z",
|
||||
"pushed_at": "2024-07-01T12:25:01Z",
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"stargazers_count": 307,
|
||||
"watchers_count": 307,
|
||||
"has_discussions": false,
|
||||
"forks_count": 61,
|
||||
"forks_count": 75,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 250,
|
||||
"forks": 75,
|
||||
"watchers": 307,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 6
|
||||
},
|
||||
{
|
||||
"id": 822584501,
|
||||
|
@ -116,10 +116,10 @@
|
|||
"description": "32-bit PoC for CVE-2024-6387 \"regreSSHion\" -- mirror of the original 7etsuo\/cve-2024-6387-poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T12:26:40Z",
|
||||
"updated_at": "2024-07-03T22:43:25Z",
|
||||
"updated_at": "2024-07-04T05:33:15Z",
|
||||
"pushed_at": "2024-07-01T14:16:36Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -135,9 +135,9 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 72,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 822593995,
|
||||
|
@ -303,12 +303,12 @@
|
|||
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T20:33:20Z",
|
||||
"updated_at": "2024-07-03T23:34:47Z",
|
||||
"updated_at": "2024-07-04T06:26:12Z",
|
||||
"pushed_at": "2024-07-03T18:21:03Z",
|
||||
"stargazers_count": 281,
|
||||
"watchers_count": 281,
|
||||
"stargazers_count": 288,
|
||||
"watchers_count": 288,
|
||||
"has_discussions": false,
|
||||
"forks_count": 62,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -320,10 +320,10 @@
|
|||
"redteam"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 281,
|
||||
"forks": 63,
|
||||
"watchers": 288,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 822792125,
|
||||
|
@ -404,13 +404,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 5,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -1232,8 +1232,8 @@
|
|||
"description": "CVE-2024-6387 with auto ip scanner and auto expliot ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T12:57:35Z",
|
||||
"updated_at": "2024-07-02T16:57:37Z",
|
||||
"pushed_at": "2024-07-02T15:39:33Z",
|
||||
"updated_at": "2024-07-04T01:55:29Z",
|
||||
"pushed_at": "2024-07-04T01:55:26Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
@ -1500,12 +1500,12 @@
|
|||
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T18:32:46Z",
|
||||
"updated_at": "2024-07-03T22:50:03Z",
|
||||
"updated_at": "2024-07-04T03:33:09Z",
|
||||
"pushed_at": "2024-07-03T13:33:01Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1520,8 +1520,8 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"forks": 8,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1741,7 +1741,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 823487291,
|
||||
|
@ -1773,7 +1773,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 823542110,
|
||||
|
@ -1789,10 +1789,10 @@
|
|||
"description": "SSH Exploit for CVE-2024-6387 : RCE in OpenSSH's server, on glibc-based Linux systems",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-03T08:22:57Z",
|
||||
"updated_at": "2024-07-03T21:33:12Z",
|
||||
"updated_at": "2024-07-04T04:16:10Z",
|
||||
"pushed_at": "2024-07-03T08:30:54Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -1808,9 +1808,9 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 823593765,
|
||||
|
@ -1846,7 +1846,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 823665546,
|
||||
|
@ -1876,7 +1876,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 823735743,
|
||||
|
@ -1906,6 +1906,98 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 823939765,
|
||||
"name": "ssh-CVE-2024-6387-poc",
|
||||
"full_name": "JackSparrowhk\/ssh-CVE-2024-6387-poc",
|
||||
"owner": {
|
||||
"login": "JackSparrowhk",
|
||||
"id": 108756180,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108756180?v=4",
|
||||
"html_url": "https:\/\/github.com\/JackSparrowhk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JackSparrowhk\/ssh-CVE-2024-6387-poc",
|
||||
"description": "CVE-2024-6387_Check 是一款轻量级、高效的工具,旨在识别运行易受攻击的 OpenSSH 版本的服务器,专门针对最近发现的regreSSHion漏洞 (CVE-2024-6387)。此脚本有助于快速扫描多个 IP 地址、域名和 CIDR 网络范围,以检测潜在漏洞并确保您的基础设施安全。",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-04T03:51:16Z",
|
||||
"updated_at": "2024-07-04T03:51:16Z",
|
||||
"pushed_at": "2024-07-04T03:51:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 823940931,
|
||||
"name": "CVE-2024-6387-OpenSSH-Vulnerability-Checker",
|
||||
"full_name": "turbobit\/CVE-2024-6387-OpenSSH-Vulnerability-Checker",
|
||||
"owner": {
|
||||
"login": "turbobit",
|
||||
"id": 11604783,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11604783?v=4",
|
||||
"html_url": "https:\/\/github.com\/turbobit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/turbobit\/CVE-2024-6387-OpenSSH-Vulnerability-Checker",
|
||||
"description": "Welcome to the CVE-2024-6387 OpenSSH Vulnerability Checker repository! This project offers multiple scripts to check the installed version of OpenSSH on your system and determine if it is vulnerable to CVE-2024-6387. It supports various environments, including Ubuntu, Mac, and Windows.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-04T03:56:08Z",
|
||||
"updated_at": "2024-07-04T05:22:25Z",
|
||||
"pushed_at": "2024-07-04T05:13:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2024-6387-checker"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 823979710,
|
||||
"name": "CVE-2024-6387",
|
||||
"full_name": "sms2056\/CVE-2024-6387",
|
||||
"owner": {
|
||||
"login": "sms2056",
|
||||
"id": 15358350,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15358350?v=4",
|
||||
"html_url": "https:\/\/github.com\/sms2056"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sms2056\/CVE-2024-6387",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-04T06:10:56Z",
|
||||
"updated_at": "2024-07-04T06:16:22Z",
|
||||
"pushed_at": "2024-07-04T06:16:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
11
README.md
11
README.md
|
@ -616,6 +616,7 @@
|
|||
</code>
|
||||
|
||||
- [Redfox-Secuirty/Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232](https://github.com/Redfox-Secuirty/Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232)
|
||||
- [Redfox-Secuirty/Digisol-DG--GR1321-s-Password-Storage-in-Plaintext--CVE-2024-4232](https://github.com/Redfox-Secuirty/Digisol-DG--GR1321-s-Password-Storage-in-Plaintext--CVE-2024-4232)
|
||||
|
||||
### CVE-2024-4295 (2024-06-05)
|
||||
|
||||
|
@ -935,6 +936,9 @@
|
|||
- [harshinsecurity/sentinelssh](https://github.com/harshinsecurity/sentinelssh)
|
||||
- [t3rry327/cve-2024-6387-poc](https://github.com/t3rry327/cve-2024-6387-poc)
|
||||
- [jocker2410/CVE-2024-6387_poc](https://github.com/jocker2410/CVE-2024-6387_poc)
|
||||
- [JackSparrowhk/ssh-CVE-2024-6387-poc](https://github.com/JackSparrowhk/ssh-CVE-2024-6387-poc)
|
||||
- [turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker](https://github.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker)
|
||||
- [sms2056/CVE-2024-6387](https://github.com/sms2056/CVE-2024-6387)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
@ -3246,6 +3250,9 @@
|
|||
|
||||
- [vin01/poc-cve-2024-38396](https://github.com/vin01/poc-cve-2024-38396)
|
||||
|
||||
### CVE-2024-39203
|
||||
- [5r1an/CVE-2024-39203](https://github.com/5r1an/CVE-2024-39203)
|
||||
|
||||
### CVE-2024-39248 (2024-07-03)
|
||||
|
||||
<code>A cross-site scripting (XSS) vulnerability in SimpCMS v0.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field at /admin.php.
|
||||
|
@ -14421,7 +14428,7 @@
|
|||
<code>The web module in some Hikvision Hybrid SAN/Cluster Storage products have the following security vulnerability. Due to the insufficient input validation, attacker can exploit the vulnerability to execute restricted commands by sending messages with malicious commands to the affected device.
|
||||
</code>
|
||||
|
||||
- [NyaMeeEain/CVE-2022-28171-POC](https://github.com/NyaMeeEain/CVE-2022-28171-POC)
|
||||
- [Bibury1337/CVE-2022-28171-POC](https://github.com/Bibury1337/CVE-2022-28171-POC)
|
||||
|
||||
### CVE-2022-28219 (2022-04-05)
|
||||
|
||||
|
@ -18641,6 +18648,7 @@
|
|||
- [wurwur/CVE-2021-3156](https://github.com/wurwur/CVE-2021-3156)
|
||||
- [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156)
|
||||
- [lypd0/CVE-2021-3156-checker](https://github.com/lypd0/CVE-2021-3156-checker)
|
||||
- [Typical0day/CVE-2021-3156](https://github.com/Typical0day/CVE-2021-3156)
|
||||
|
||||
### CVE-2021-3157
|
||||
- [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)
|
||||
|
@ -19069,6 +19077,7 @@
|
|||
- [ASG-CASTLE/CVE-2021-4034](https://github.com/ASG-CASTLE/CVE-2021-4034)
|
||||
- [X-Projetion/Exploiting-PwnKit-CVE-2021-4034-](https://github.com/X-Projetion/Exploiting-PwnKit-CVE-2021-4034-)
|
||||
- [evkl1d/CVE-2021-4034](https://github.com/evkl1d/CVE-2021-4034)
|
||||
- [Typical0day/CVE-2021-4034](https://github.com/Typical0day/CVE-2021-4034)
|
||||
|
||||
### CVE-2021-4043 (2022-02-04)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue