From cf3e598e4e0cda3f90f677a0f1ac1142a91aa6b1 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 13 Apr 2024 21:27:35 +0900 Subject: [PATCH] Auto Update 2024/04/13 12:27:35 --- 2020/CVE-2020-11023.json | 30 +++++++++++++++ 2021/CVE-2021-44228.json | 16 ++++---- 2022/CVE-2022-21894.json | 8 ++-- 2022/CVE-2022-22965.json | 8 ++-- 2022/CVE-2022-25636.json | 8 ++-- 2022/CVE-2022-30781.json | 8 ++-- 2022/CVE-2022-32250.json | 4 +- 2023/CVE-2023-22515.json | 8 ++-- 2023/CVE-2023-23752.json | 8 ++-- 2023/CVE-2023-27566.json | 8 ++-- 2023/CVE-2023-30212.json | 8 ++-- 2023/CVE-2023-36845.json | 2 +- 2023/CVE-2023-38831.json | 8 ++-- 2023/CVE-2023-42442.json | 8 ++-- 2023/CVE-2023-45866.json | 8 ++-- 2023/CVE-2023-6319.json | 10 ++--- 2024/CVE-2024-20656.json | 8 ++-- 2024/CVE-2024-24576.json | 8 ++-- 2024/CVE-2024-25600.json | 4 +- 2024/CVE-2024-27316.json | 2 +- 2024/CVE-2024-27462.json | 2 +- 2024/CVE-2024-3094.json | 8 ++-- 2024/CVE-2024-31777.json | 4 +- 2024/CVE-2024-3400.json | 81 +++++++++++++++++++++++++++++++++++++--- README.md | 3 ++ 25 files changed, 186 insertions(+), 84 deletions(-) diff --git a/2020/CVE-2020-11023.json b/2020/CVE-2020-11023.json index 1ad189bdd8..adfd72318b 100644 --- a/2020/CVE-2020-11023.json +++ b/2020/CVE-2020-11023.json @@ -58,5 +58,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 786060686, + "name": "cve-2020-11023-demonstration", + "full_name": "andreassundstrom\/cve-2020-11023-demonstration", + "owner": { + "login": "andreassundstrom", + "id": 22585545, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22585545?v=4", + "html_url": "https:\/\/github.com\/andreassundstrom" + }, + "html_url": "https:\/\/github.com\/andreassundstrom\/cve-2020-11023-demonstration", + "description": "Demonstration of CVE-2020-11023", + "fork": false, + "created_at": "2024-04-13T09:57:53Z", + "updated_at": "2024-04-13T09:58:10Z", + "pushed_at": "2024-04-13T09:58:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index e1b53aec3a..c945686363 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,12 +907,12 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2024-04-12T15:13:14Z", + "updated_at": "2024-04-13T12:10:20Z", "pushed_at": "2024-02-12T22:37:25Z", - "stargazers_count": 1741, - "watchers_count": 1741, + "stargazers_count": 1742, + "watchers_count": 1742, "has_discussions": false, - "forks_count": 514, + "forks_count": 515, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -923,8 +923,8 @@ "security" ], "visibility": "public", - "forks": 514, - "watchers": 1741, + "forks": 515, + "watchers": 1742, "score": 0, "subscribers_count": 28 }, @@ -1428,7 +1428,7 @@ "stargazers_count": 853, "watchers_count": 853, "has_discussions": false, - "forks_count": 174, + "forks_count": 175, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -1447,7 +1447,7 @@ "scanner" ], "visibility": "public", - "forks": 174, + "forks": 175, "watchers": 853, "score": 0, "subscribers_count": 33 diff --git a/2022/CVE-2022-21894.json b/2022/CVE-2022-21894.json index 4f12fb0c9c..53b29d4f7d 100644 --- a/2022/CVE-2022-21894.json +++ b/2022/CVE-2022-21894.json @@ -13,10 +13,10 @@ "description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability", "fork": false, "created_at": "2022-08-09T15:53:48Z", - "updated_at": "2024-04-10T20:54:00Z", + "updated_at": "2024-04-13T06:49:56Z", "pushed_at": "2023-09-27T06:44:27Z", - "stargazers_count": 274, - "watchers_count": 274, + "stargazers_count": 275, + "watchers_count": 275, "has_discussions": false, "forks_count": 59, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 59, - "watchers": 274, + "watchers": 275, "score": 0, "subscribers_count": 10 }, diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 5658b18eb0..c2b3ffcc85 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -2033,10 +2033,10 @@ "description": "CVE-2022-22965\\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具,基于JavaFx开发,图形化操作更简单,提高效率。", "fork": false, "created_at": "2022-12-28T04:50:16Z", - "updated_at": "2024-04-01T01:24:46Z", + "updated_at": "2024-04-13T08:25:49Z", "pushed_at": "2023-11-14T03:08:10Z", - "stargazers_count": 93, - "watchers_count": 93, + "stargazers_count": 94, + "watchers_count": 94, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -2045,7 +2045,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 93, + "watchers": 94, "score": 0, "subscribers_count": 3 }, diff --git a/2022/CVE-2022-25636.json b/2022/CVE-2022-25636.json index 1485ddb01f..330ab4c87c 100644 --- a/2022/CVE-2022-25636.json +++ b/2022/CVE-2022-25636.json @@ -13,10 +13,10 @@ "description": "CVE-2022-25636", "fork": false, "created_at": "2022-03-07T13:38:41Z", - "updated_at": "2024-04-04T12:52:34Z", + "updated_at": "2024-04-13T10:06:28Z", "pushed_at": "2022-03-07T17:18:19Z", - "stargazers_count": 428, - "watchers_count": 428, + "stargazers_count": 427, + "watchers_count": 427, "has_discussions": false, "forks_count": 83, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 83, - "watchers": 428, + "watchers": 427, "score": 0, "subscribers_count": 6 }, diff --git a/2022/CVE-2022-30781.json b/2022/CVE-2022-30781.json index 24d5a29e35..08414d4ba3 100644 --- a/2022/CVE-2022-30781.json +++ b/2022/CVE-2022-30781.json @@ -13,10 +13,10 @@ "description": "🍵 Gitea repository migration remote command execution exploit.", "fork": false, "created_at": "2022-05-22T05:15:58Z", - "updated_at": "2024-01-01T03:52:28Z", + "updated_at": "2024-04-13T08:29:27Z", "pushed_at": "2022-05-26T11:32:21Z", - "stargazers_count": 85, - "watchers_count": 85, + "stargazers_count": 86, + "watchers_count": 86, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 85, + "watchers": 86, "score": 0, "subscribers_count": 4 } diff --git a/2022/CVE-2022-32250.json b/2022/CVE-2022-32250.json index ca8d1d1c4e..5d535f4d46 100644 --- a/2022/CVE-2022-32250.json +++ b/2022/CVE-2022-32250.json @@ -18,13 +18,13 @@ "stargazers_count": 160, "watchers_count": 160, "has_discussions": false, - "forks_count": 44, + "forks_count": 45, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 44, + "forks": 45, "watchers": 160, "score": 0, "subscribers_count": 6 diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index 42637a4118..b456c632c8 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -424,10 +424,10 @@ "description": "CVE-2023-22515", "fork": false, "created_at": "2023-10-30T00:17:45Z", - "updated_at": "2024-04-03T01:48:51Z", + "updated_at": "2024-04-13T10:05:07Z", "pushed_at": "2023-11-10T17:43:40Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -446,7 +446,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 44, + "watchers": 45, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-23752.json b/2023/CVE-2023-23752.json index f35e65cd03..3ac6ad5353 100644 --- a/2023/CVE-2023-23752.json +++ b/2023/CVE-2023-23752.json @@ -662,10 +662,10 @@ "description": "Perform With Mass Exploiter In Joomla 4.2.8.", "fork": false, "created_at": "2023-04-09T13:20:48Z", - "updated_at": "2024-03-26T06:35:13Z", + "updated_at": "2024-04-13T07:50:24Z", "pushed_at": "2023-07-24T22:22:00Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 34, + "watchers_count": 34, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -678,7 +678,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 33, + "watchers": 34, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-27566.json b/2023/CVE-2023-27566.json index 40892f0b54..3b5b4bd04e 100644 --- a/2023/CVE-2023-27566.json +++ b/2023/CVE-2023-27566.json @@ -13,10 +13,10 @@ "description": "MOC3ingbird Exploit for Live2D (CVE-2023-27566)", "fork": false, "created_at": "2023-03-03T01:57:28Z", - "updated_at": "2024-04-09T15:48:22Z", + "updated_at": "2024-04-13T12:21:36Z", "pushed_at": "2023-09-19T01:12:41Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 75, + "watchers_count": 75, "has_discussions": true, "forks_count": 5, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 74, + "watchers": 75, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-30212.json b/2023/CVE-2023-30212.json index e99187582e..4059513d21 100644 --- a/2023/CVE-2023-30212.json +++ b/2023/CVE-2023-30212.json @@ -433,10 +433,10 @@ "description": "This contains the necessary files and Docker to replicate A vulnerability in OURPHP that has a XSS Vulnerability (CVE-2023-30212)", "fork": false, "created_at": "2023-06-20T09:08:38Z", - "updated_at": "2023-06-20T13:33:54Z", + "updated_at": "2024-04-13T07:20:35Z", "pushed_at": "2023-06-21T06:16:18Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -445,7 +445,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-36845.json b/2023/CVE-2023-36845.json index df66612bfe..51a63d91ac 100644 --- a/2023/CVE-2023-36845.json +++ b/2023/CVE-2023-36845.json @@ -13,7 +13,7 @@ "description": "A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845", "fork": false, "created_at": "2023-09-16T09:11:21Z", - "updated_at": "2024-03-21T14:57:31Z", + "updated_at": "2024-04-13T08:27:14Z", "pushed_at": "2024-04-10T09:21:21Z", "stargazers_count": 59, "watchers_count": 59, diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 4cf725494d..dfe1d258b5 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -43,10 +43,10 @@ "description": "CVE-2023-38831 winrar exploit generator", "fork": false, "created_at": "2023-08-25T09:44:08Z", - "updated_at": "2024-04-13T04:49:36Z", + "updated_at": "2024-04-13T09:32:38Z", "pushed_at": "2023-11-26T06:46:44Z", - "stargazers_count": 767, - "watchers_count": 767, + "stargazers_count": 769, + "watchers_count": 769, "has_discussions": false, "forks_count": 139, "allow_forking": true, @@ -59,7 +59,7 @@ ], "visibility": "public", "forks": 139, - "watchers": 767, + "watchers": 769, "score": 0, "subscribers_count": 9 }, diff --git a/2023/CVE-2023-42442.json b/2023/CVE-2023-42442.json index 1dcbdadd0b..cef105de89 100644 --- a/2023/CVE-2023-42442.json +++ b/2023/CVE-2023-42442.json @@ -43,10 +43,10 @@ "description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021", "fork": false, "created_at": "2023-10-14T09:35:07Z", - "updated_at": "2024-04-13T05:48:41Z", + "updated_at": "2024-04-13T09:23:56Z", "pushed_at": "2024-02-20T09:03:22Z", - "stargazers_count": 146, - "watchers_count": 146, + "stargazers_count": 147, + "watchers_count": 147, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -59,7 +59,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 146, + "watchers": 147, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 38f01f2aa9..31aaf5cb57 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -13,10 +13,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-04-13T06:08:41Z", + "updated_at": "2024-04-13T08:03:48Z", "pushed_at": "2024-04-08T13:43:21Z", - "stargazers_count": 387, - "watchers_count": 387, + "stargazers_count": 388, + "watchers_count": 388, "has_discussions": false, "forks_count": 61, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 61, - "watchers": 387, + "watchers": 388, "score": 0, "subscribers_count": 7 }, diff --git a/2023/CVE-2023-6319.json b/2023/CVE-2023-6319.json index 07c6e856d8..5417ee6d2b 100644 --- a/2023/CVE-2023-6319.json +++ b/2023/CVE-2023-6319.json @@ -13,10 +13,10 @@ "description": "CVE-2023-6319 proof of concept", "fork": false, "created_at": "2024-04-11T18:58:17Z", - "updated_at": "2024-04-12T20:34:22Z", - "pushed_at": "2024-04-12T18:21:11Z", - "stargazers_count": 5, - "watchers_count": 5, + "updated_at": "2024-04-13T11:38:58Z", + "pushed_at": "2024-04-13T10:31:33Z", + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-20656.json b/2024/CVE-2024-20656.json index 22faf4e51b..5a8368f7e3 100644 --- a/2024/CVE-2024-20656.json +++ b/2024/CVE-2024-20656.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-01-12T15:08:01Z", - "updated_at": "2024-04-02T17:41:19Z", + "updated_at": "2024-04-13T09:43:10Z", "pushed_at": "2024-01-14T07:14:33Z", - "stargazers_count": 111, - "watchers_count": 111, + "stargazers_count": 110, + "watchers_count": 110, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 111, + "watchers": 110, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-24576.json b/2024/CVE-2024-24576.json index 40877c0cd5..360c6fee19 100644 --- a/2024/CVE-2024-24576.json +++ b/2024/CVE-2024-24576.json @@ -13,10 +13,10 @@ "description": "Example of CVE-2024-24576 use case.", "fork": false, "created_at": "2024-04-09T21:17:15Z", - "updated_at": "2024-04-12T20:15:01Z", + "updated_at": "2024-04-13T09:00:16Z", "pushed_at": "2024-04-10T14:46:42Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 37, + "watchers_count": 37, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 36, + "watchers": 37, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json index fede128e59..b744da11f3 100644 --- a/2024/CVE-2024-25600.json +++ b/2024/CVE-2024-25600.json @@ -18,13 +18,13 @@ "stargazers_count": 118, "watchers_count": 118, "has_discussions": false, - "forks_count": 26, + "forks_count": 27, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 26, + "forks": 27, "watchers": 118, "score": 0, "subscribers_count": 3 diff --git a/2024/CVE-2024-27316.json b/2024/CVE-2024-27316.json index 7fb7bd3941..69a8ca0e4d 100644 --- a/2024/CVE-2024-27316.json +++ b/2024/CVE-2024-27316.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2024-04-09T08:08:07Z", "updated_at": "2024-04-12T22:18:35Z", - "pushed_at": "2024-04-12T15:40:02Z", + "pushed_at": "2024-04-13T09:02:39Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, diff --git a/2024/CVE-2024-27462.json b/2024/CVE-2024-27462.json index a51e32808e..2cf166a01d 100644 --- a/2024/CVE-2024-27462.json +++ b/2024/CVE-2024-27462.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2024-04-13T06:27:28Z", "updated_at": "2024-04-13T06:27:29Z", - "pushed_at": "2024-04-13T06:27:29Z", + "pushed_at": "2024-04-13T06:34:00Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 7943ce756d..d63cc9d7fd 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1012,10 +1012,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-04-13T06:04:07Z", + "updated_at": "2024-04-13T07:19:04Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3333, - "watchers_count": 3333, + "stargazers_count": 3334, + "watchers_count": 3334, "has_discussions": false, "forks_count": 218, "allow_forking": true, @@ -1024,7 +1024,7 @@ "topics": [], "visibility": "public", "forks": 218, - "watchers": 3333, + "watchers": 3334, "score": 0, "subscribers_count": 34 }, diff --git a/2024/CVE-2024-31777.json b/2024/CVE-2024-31777.json index ec3e99562b..a11513bab6 100644 --- a/2024/CVE-2024-31777.json +++ b/2024/CVE-2024-31777.json @@ -13,8 +13,8 @@ "description": "Public exploit for CVE-2024-31777", "fork": false, "created_at": "2024-04-11T13:48:19Z", - "updated_at": "2024-04-12T08:35:01Z", - "pushed_at": "2024-04-12T08:40:30Z", + "updated_at": "2024-04-13T08:08:13Z", + "pushed_at": "2024-04-13T08:08:10Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json index 6f260e9df5..02dbba22e4 100644 --- a/2024/CVE-2024-3400.json +++ b/2024/CVE-2024-3400.json @@ -13,19 +13,19 @@ "description": "This script is designed to demonstrate the exploitation of vulnerabilities in PAN-OS firewalls. It sends a specially crafted payload to the firewall's API endpoint to execute arbitrary commands.", "fork": false, "created_at": "2024-04-12T17:39:59Z", - "updated_at": "2024-04-13T02:51:58Z", + "updated_at": "2024-04-13T12:28:53Z", "pushed_at": "2024-04-12T21:05:33Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 20, + "watchers_count": 20, "has_discussions": false, - "forks_count": 8, + "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, - "watchers": 6, + "forks": 11, + "watchers": 20, "score": 0, "subscribers_count": 1 }, @@ -58,5 +58,74 @@ "watchers": 0, "score": 0, "subscribers_count": 0 + }, + { + "id": 786077824, + "name": "CVE-2024-3400", + "full_name": "shamo0\/CVE-2024-3400", + "owner": { + "login": "shamo0", + "id": 48299520, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4", + "html_url": "https:\/\/github.com\/shamo0" + }, + "html_url": "https:\/\/github.com\/shamo0\/CVE-2024-3400", + "description": "CVE-2024-3400 Checker", + "fork": false, + "created_at": "2024-04-13T11:06:09Z", + "updated_at": "2024-04-13T11:09:09Z", + "pushed_at": "2024-04-13T11:12:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "checker", + "cve-2024-3400", + "firewall", + "globalprotect", + "paloalto", + "pan-os", + "poc", + "rce" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 786090468, + "name": "CVE-2024-3400-PoC", + "full_name": "CerTusHack\/CVE-2024-3400-PoC", + "owner": { + "login": "CerTusHack", + "id": 92284780, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92284780?v=4", + "html_url": "https:\/\/github.com\/CerTusHack" + }, + "html_url": "https:\/\/github.com\/CerTusHack\/CVE-2024-3400-PoC", + "description": null, + "fork": false, + "created_at": "2024-04-13T11:55:53Z", + "updated_at": "2024-04-13T12:18:23Z", + "pushed_at": "2024-04-13T12:02:12Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 55b6a47a10..3b50e12415 100644 --- a/README.md +++ b/README.md @@ -349,6 +349,8 @@ - [DrewskyDev/CVE-2024-3400](https://github.com/DrewskyDev/CVE-2024-3400) - [Yuvvi01/CVE-2024-3400](https://github.com/Yuvvi01/CVE-2024-3400) +- [shamo0/CVE-2024-3400](https://github.com/shamo0/CVE-2024-3400) +- [CerTusHack/CVE-2024-3400-PoC](https://github.com/CerTusHack/CVE-2024-3400-PoC) ### CVE-2024-12883 - [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883) @@ -24455,6 +24457,7 @@ - [Snorlyd/https-nj.gov---CVE-2020-11023](https://github.com/Snorlyd/https-nj.gov---CVE-2020-11023) - [Cybernegro/CVE-2020-11023](https://github.com/Cybernegro/CVE-2020-11023) +- [andreassundstrom/cve-2020-11023-demonstration](https://github.com/andreassundstrom/cve-2020-11023-demonstration) ### CVE-2020-11060 (2020-05-12)