Auto Update 2024/04/29 12:30:40

This commit is contained in:
motikan2010-bot 2024-04-29 21:30:40 +09:00
parent b4f81ab0f9
commit d590e583a5
41 changed files with 276 additions and 206 deletions

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-28T09:09:02Z",
"updated_at": "2024-04-29T07:51:31Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1927,
"watchers_count": 1927,
"stargazers_count": 1928,
"watchers_count": 1928,
"has_discussions": true,
"forks_count": 334,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 334,
"watchers": 1927,
"watchers": 1928,
"score": 0,
"subscribers_count": 35
},

View file

@ -163,10 +163,10 @@
"description": "CVE-2014-6287",
"fork": false,
"created_at": "2023-04-04T18:39:30Z",
"updated_at": "2023-04-04T19:28:29Z",
"updated_at": "2024-04-29T09:29:40Z",
"pushed_at": "2023-04-04T19:33:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-28T09:09:02Z",
"updated_at": "2024-04-29T07:51:31Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1927,
"watchers_count": 1927,
"stargazers_count": 1928,
"watchers_count": 1928,
"has_discussions": true,
"forks_count": 334,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 334,
"watchers": 1927,
"watchers": 1928,
"score": 0,
"subscribers_count": 35
},

View file

@ -380,10 +380,10 @@
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
"fork": false,
"created_at": "2018-01-11T09:43:46Z",
"updated_at": "2024-04-10T15:10:45Z",
"updated_at": "2024-04-29T10:20:59Z",
"pushed_at": "2018-02-28T12:32:54Z",
"stargazers_count": 272,
"watchers_count": 272,
"stargazers_count": 273,
"watchers_count": 273,
"has_discussions": false,
"forks_count": 133,
"allow_forking": true,
@ -392,7 +392,7 @@
"topics": [],
"visibility": "public",
"forks": 133,
"watchers": 272,
"watchers": 273,
"score": 0,
"subscribers_count": 19
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-28T09:09:02Z",
"updated_at": "2024-04-29T07:51:31Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1927,
"watchers_count": 1927,
"stargazers_count": 1928,
"watchers_count": 1928,
"has_discussions": true,
"forks_count": 334,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 334,
"watchers": 1927,
"watchers": 1928,
"score": 0,
"subscribers_count": 35
},

View file

@ -43,10 +43,10 @@
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
"fork": false,
"created_at": "2018-01-11T09:43:46Z",
"updated_at": "2024-04-10T15:10:45Z",
"updated_at": "2024-04-29T10:20:59Z",
"pushed_at": "2018-02-28T12:32:54Z",
"stargazers_count": 272,
"watchers_count": 272,
"stargazers_count": 273,
"watchers_count": 273,
"has_discussions": false,
"forks_count": 133,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 133,
"watchers": 272,
"watchers": 273,
"score": 0,
"subscribers_count": 19
},

View file

@ -557,10 +557,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-28T09:09:02Z",
"updated_at": "2024-04-29T07:51:31Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1927,
"watchers_count": 1927,
"stargazers_count": 1928,
"watchers_count": 1928,
"has_discussions": true,
"forks_count": 334,
"allow_forking": true,
@ -590,7 +590,7 @@
],
"visibility": "public",
"forks": 334,
"watchers": 1927,
"watchers": 1928,
"score": 0,
"subscribers_count": 35
},

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-28T09:09:02Z",
"updated_at": "2024-04-29T07:51:31Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1927,
"watchers_count": 1927,
"stargazers_count": 1928,
"watchers_count": 1928,
"has_discussions": true,
"forks_count": 334,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 334,
"watchers": 1927,
"watchers": 1928,
"score": 0,
"subscribers_count": 35
}

62
2020/CVE-2020-24490.json Normal file
View file

@ -0,0 +1,62 @@
[
{
"id": 793402660,
"name": "linux_CVE-2020-24490-beforePatch",
"full_name": "AbrarKhan\/linux_CVE-2020-24490-beforePatch",
"owner": {
"login": "AbrarKhan",
"id": 3054615,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3054615?v=4",
"html_url": "https:\/\/github.com\/AbrarKhan"
},
"html_url": "https:\/\/github.com\/AbrarKhan\/linux_CVE-2020-24490-beforePatch",
"description": null,
"fork": false,
"created_at": "2024-04-29T06:47:40Z",
"updated_at": "2024-04-29T06:53:24Z",
"pushed_at": "2024-04-29T06:53:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 793474421,
"name": "Linux-4.19.72_CVE-2020-24490",
"full_name": "AbrarKhan\/Linux-4.19.72_CVE-2020-24490",
"owner": {
"login": "AbrarKhan",
"id": 3054615,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3054615?v=4",
"html_url": "https:\/\/github.com\/AbrarKhan"
},
"html_url": "https:\/\/github.com\/AbrarKhan\/Linux-4.19.72_CVE-2020-24490",
"description": null,
"fork": false,
"created_at": "2024-04-29T09:39:42Z",
"updated_at": "2024-04-29T09:57:30Z",
"pushed_at": "2024-04-29T09:55:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-28T09:09:02Z",
"updated_at": "2024-04-29T07:51:31Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1927,
"watchers_count": 1927,
"stargazers_count": 1928,
"watchers_count": 1928,
"has_discussions": true,
"forks_count": 334,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 334,
"watchers": 1927,
"watchers": 1928,
"score": 0,
"subscribers_count": 35
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2020-5410 Spring Cloud Config directory traversal vulnerability",
"fork": false,
"created_at": "2020-06-16T20:15:58Z",
"updated_at": "2024-03-08T06:18:30Z",
"updated_at": "2024-04-29T06:28:14Z",
"pushed_at": "2020-06-16T20:38:41Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 4
}

View file

@ -972,10 +972,10 @@
"description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)",
"fork": false,
"created_at": "2021-09-26T13:53:10Z",
"updated_at": "2024-04-27T11:25:17Z",
"updated_at": "2024-04-29T06:29:42Z",
"pushed_at": "2021-10-17T13:29:56Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 172,
"watchers_count": 172,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -987,7 +987,7 @@
],
"visibility": "public",
"forks": 29,
"watchers": 171,
"watchers": 172,
"score": 0,
"subscribers_count": 6
},

View file

@ -43,8 +43,8 @@
"description": "Tool for finding CVE-2021-20323",
"fork": false,
"created_at": "2024-01-11T16:02:07Z",
"updated_at": "2024-01-12T17:46:12Z",
"pushed_at": "2024-04-11T10:19:19Z",
"updated_at": "2024-04-29T07:55:09Z",
"pushed_at": "2024-04-29T07:55:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -90,10 +90,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2024-04-19T08:31:33Z",
"updated_at": "2024-04-29T08:11:53Z",
"pushed_at": "2023-06-08T04:01:33Z",
"stargazers_count": 474,
"watchers_count": 474,
"stargazers_count": 475,
"watchers_count": 475,
"has_discussions": false,
"forks_count": 152,
"allow_forking": true,
@ -104,7 +104,7 @@
],
"visibility": "public",
"forks": 152,
"watchers": 474,
"watchers": 475,
"score": 0,
"subscribers_count": 8
},
@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-04-29T00:02:06Z",
"updated_at": "2024-04-29T11:23:51Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1249,
"watchers_count": 1249,
"stargazers_count": 1251,
"watchers_count": 1251,
"has_discussions": false,
"forks_count": 158,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 158,
"watchers": 1249,
"watchers": 1251,
"score": 0,
"subscribers_count": 13
}

View file

@ -13,10 +13,10 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
"updated_at": "2024-04-28T03:25:27Z",
"updated_at": "2024-04-29T08:21:34Z",
"pushed_at": "2021-10-13T22:32:36Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 104,
"watchers": 105,
"score": 0,
"subscribers_count": 7
},

View file

@ -618,10 +618,10 @@
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
"fork": false,
"created_at": "2022-08-23T20:20:45Z",
"updated_at": "2024-04-26T12:11:11Z",
"updated_at": "2024-04-29T07:55:03Z",
"pushed_at": "2022-12-17T16:10:46Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -630,7 +630,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 97,
"watchers": 98,
"score": 0,
"subscribers_count": 3
},

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-04-28T06:14:10Z",
"updated_at": "2024-04-29T09:38:34Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1750,
"watchers_count": 1750,
"stargazers_count": 1751,
"watchers_count": 1751,
"has_discussions": false,
"forks_count": 517,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 517,
"watchers": 1750,
"watchers": 1751,
"score": 0,
"subscribers_count": 28
},
@ -1527,7 +1527,7 @@
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2024-04-26T10:47:50Z",
"pushed_at": "2024-04-29T01:36:19Z",
"pushed_at": "2024-04-29T06:37:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
"updated_at": "2024-04-24T17:28:49Z",
"updated_at": "2024-04-29T10:29:30Z",
"pushed_at": "2022-02-26T20:45:19Z",
"stargazers_count": 302,
"watchers_count": 302,
"stargazers_count": 303,
"watchers_count": 303,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 63,
"watchers": 302,
"watchers": 303,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-21974 \"Roaming Security Rights Management Services Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T18:53:56Z",
"updated_at": "2024-03-21T09:38:54Z",
"updated_at": "2024-04-29T10:30:17Z",
"pushed_at": "2022-02-26T19:12:12Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 59,
"watchers": 60,
"score": 0,
"subscribers_count": 4
}

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-04-29T00:02:06Z",
"updated_at": "2024-04-29T11:23:51Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1249,
"watchers_count": 1249,
"stargazers_count": 1251,
"watchers_count": 1251,
"has_discussions": false,
"forks_count": 158,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 158,
"watchers": 1249,
"watchers": 1251,
"score": 0,
"subscribers_count": 13
},

View file

@ -43,10 +43,10 @@
"description": "Apache Tomcat DoS (CVE-2022-29885) Exploit",
"fork": false,
"created_at": "2022-07-01T09:02:10Z",
"updated_at": "2023-04-01T01:16:22Z",
"updated_at": "2024-04-29T08:54:03Z",
"pushed_at": "2022-07-05T06:23:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -682,10 +682,10 @@
"description": "CVE-2023-20198-RCE, support adding\/deleting users and executing cli commands\/system commands.",
"fork": false,
"created_at": "2024-04-25T06:59:53Z",
"updated_at": "2024-04-29T03:33:46Z",
"updated_at": "2024-04-29T08:36:47Z",
"pushed_at": "2024-04-25T07:32:57Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -694,7 +694,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
}

View file

@ -227,10 +227,10 @@
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
"fork": false,
"created_at": "2024-02-06T15:09:33Z",
"updated_at": "2024-04-28T14:11:24Z",
"updated_at": "2024-04-29T08:55:43Z",
"pushed_at": "2024-02-06T15:56:12Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -239,7 +239,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 2
}

View file

@ -563,8 +563,8 @@
"description": "An issue was discovered in cPanel before 11.109.9999.116. Cross-Site Scripting can occur on the cpsrvd error page via an invalid webcall ID.",
"fork": false,
"created_at": "2024-04-21T12:26:22Z",
"updated_at": "2024-04-23T10:45:19Z",
"pushed_at": "2024-04-23T10:45:15Z",
"updated_at": "2024-04-29T07:55:51Z",
"pushed_at": "2024-04-29T07:55:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept code for the Android APEX key reuse vulnerability described in https:\/\/rtx.meta.security\/exploitation\/2024\/01\/30\/Android-vendors-APEX-test-keys.html",
"fork": false,
"created_at": "2024-01-26T21:17:38Z",
"updated_at": "2024-04-22T08:11:20Z",
"updated_at": "2024-04-29T09:31:02Z",
"pushed_at": "2024-01-31T19:33:59Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 65,
"watchers": 66,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-04-28T18:06:01Z",
"updated_at": "2024-04-29T11:16:26Z",
"pushed_at": "2024-04-08T13:43:21Z",
"stargazers_count": 426,
"watchers_count": 426,
"stargazers_count": 427,
"watchers_count": 427,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 67,
"watchers": 426,
"watchers": 427,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-27T09:43:20Z",
"updated_at": "2024-03-11T08:53:10Z",
"updated_at": "2024-04-29T09:11:27Z",
"pushed_at": "2023-09-27T10:39:47Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Fortinet FortiClient EMS SQL Injection",
"fork": false,
"created_at": "2024-03-18T20:50:48Z",
"updated_at": "2024-04-26T03:16:01Z",
"updated_at": "2024-04-29T11:28:00Z",
"pushed_at": "2024-03-20T20:42:41Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 5
}

View file

@ -144,10 +144,10 @@
"description": "CVE-2023-49070 exploit and CVE-2023-49070 & CVE-2023-51467 vulnerability scanner",
"fork": false,
"created_at": "2024-01-11T22:35:57Z",
"updated_at": "2024-02-16T11:40:00Z",
"updated_at": "2024-04-29T11:54:01Z",
"pushed_at": "2024-01-12T10:37:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -156,7 +156,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "cve-2024-0305可用的exp",
"fork": false,
"created_at": "2024-04-18T03:13:43Z",
"updated_at": "2024-04-19T04:22:37Z",
"updated_at": "2024-04-29T11:55:59Z",
"pushed_at": "2024-04-19T04:23:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-29T03:31:05Z",
"updated_at": "2024-04-29T10:40:36Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 1893,
"watchers_count": 1893,
"stargazers_count": 1895,
"watchers_count": 1895,
"has_discussions": false,
"forks_count": 234,
"forks_count": 235,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc"
],
"visibility": "public",
"forks": 234,
"watchers": 1893,
"forks": 235,
"watchers": 1895,
"score": 0,
"subscribers_count": 19
},

View file

@ -103,10 +103,10 @@
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
"fork": false,
"created_at": "2024-02-06T15:09:33Z",
"updated_at": "2024-04-28T14:11:24Z",
"updated_at": "2024-04-29T08:55:43Z",
"pushed_at": "2024-02-06T15:56:12Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
"fork": false,
"created_at": "2024-04-22T07:05:04Z",
"updated_at": "2024-04-29T06:22:37Z",
"updated_at": "2024-04-29T10:56:49Z",
"pushed_at": "2024-04-27T20:04:01Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 181,
"watchers_count": 181,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 177,
"watchers": 181,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept for CVE-2024-21345",
"fork": false,
"created_at": "2024-04-26T16:38:17Z",
"updated_at": "2024-04-29T06:32:55Z",
"updated_at": "2024-04-29T11:36:45Z",
"pushed_at": "2024-04-26T16:39:48Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 41,
"watchers": 43,
"score": 0,
"subscribers_count": 2
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2024-24576 Proof of Concept",
"fork": false,
"created_at": "2024-04-10T14:06:09Z",
"updated_at": "2024-04-20T16:07:16Z",
"updated_at": "2024-04-29T08:53:38Z",
"pushed_at": "2024-04-10T14:42:34Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,19 +13,19 @@
"description": "Proof-of-Concept for CVE-2024-26218",
"fork": false,
"created_at": "2024-04-26T16:41:04Z",
"updated_at": "2024-04-29T04:52:25Z",
"updated_at": "2024-04-29T11:10:02Z",
"pushed_at": "2024-04-26T16:46:15Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 20,
"forks": 8,
"watchers": 24,
"score": 0,
"subscribers_count": 1
}

View file

@ -279,10 +279,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information",
"fork": false,
"created_at": "2024-04-22T22:14:24Z",
"updated_at": "2024-04-28T22:39:59Z",
"updated_at": "2024-04-29T11:30:26Z",
"pushed_at": "2024-04-25T17:55:35Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -302,7 +302,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Information for CVE-2024-3094",
"fork": false,
"created_at": "2024-03-29T17:03:01Z",
"updated_at": "2024-04-25T13:09:17Z",
"updated_at": "2024-04-29T11:36:42Z",
"pushed_at": "2024-04-01T16:01:34Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 50,
"watchers": 49,
"score": 0,
"subscribers_count": 3
},
@ -43,10 +43,10 @@
"description": "Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)",
"fork": false,
"created_at": "2024-03-29T20:28:17Z",
"updated_at": "2024-04-25T17:19:02Z",
"updated_at": "2024-04-29T11:38:27Z",
"pushed_at": "2024-03-31T00:13:39Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 73,
"watchers": 71,
"score": 0,
"subscribers_count": 3
},
@ -493,10 +493,10 @@
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
"fork": false,
"created_at": "2024-03-30T22:07:24Z",
"updated_at": "2024-04-29T01:31:07Z",
"updated_at": "2024-04-29T11:36:44Z",
"pushed_at": "2024-04-02T03:38:32Z",
"stargazers_count": 136,
"watchers_count": 136,
"stargazers_count": 135,
"watchers_count": 135,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -510,7 +510,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 136,
"watchers": 135,
"score": 0,
"subscribers_count": 8
},
@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-04-28T23:48:08Z",
"updated_at": "2024-04-29T11:36:56Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3436,
"watchers_count": 3436,
"stargazers_count": 3435,
"watchers_count": 3435,
"has_discussions": false,
"forks_count": 232,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 232,
"watchers": 3436,
"watchers": 3435,
"score": 0,
"subscribers_count": 36
},

View file

@ -283,10 +283,10 @@
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
"fork": false,
"created_at": "2024-04-16T14:18:08Z",
"updated_at": "2024-04-29T03:12:04Z",
"updated_at": "2024-04-29T06:43:48Z",
"pushed_at": "2024-04-16T22:35:43Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -295,7 +295,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 123,
"watchers": 124,
"score": 0,
"subscribers_count": 1
},
@ -896,7 +896,7 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -909,7 +909,7 @@
"python3"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1

View file

@ -29,36 +29,6 @@
"score": 0,
"subscribers_count": 7
},
{
"id": 791002416,
"name": "CVE-2024-4040-RCE-POC",
"full_name": "tr4c3rs\/CVE-2024-4040-RCE-POC",
"owner": {
"login": "tr4c3rs",
"id": 167206794,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167206794?v=4",
"html_url": "https:\/\/github.com\/tr4c3rs"
},
"html_url": "https:\/\/github.com\/tr4c3rs\/CVE-2024-4040-RCE-POC",
"description": "CVE-2024-4040 (CrushFTP VFS escape) or (CrushFTP unauthenticated RCE)",
"fork": false,
"created_at": "2024-04-23T23:16:36Z",
"updated_at": "2024-04-28T02:17:32Z",
"pushed_at": "2024-04-23T23:26:34Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 791624022,
"name": "CVE-2024-4040-Scanner",
@ -163,10 +133,10 @@
"description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support",
"fork": false,
"created_at": "2024-04-25T19:51:38Z",
"updated_at": "2024-04-29T00:59:43Z",
"updated_at": "2024-04-29T07:09:57Z",
"pushed_at": "2024-04-29T00:59:40Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -190,8 +160,38 @@
],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 793492567,
"name": "CVE-2024-4040-CrushFTP-server",
"full_name": "Praison001\/CVE-2024-4040-CrushFTP-server",
"owner": {
"login": "Praison001",
"id": 60835238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
"html_url": "https:\/\/github.com\/Praison001"
},
"html_url": "https:\/\/github.com\/Praison001\/CVE-2024-4040-CrushFTP-server",
"description": "Exploit for CVE-2024-4040 affecting CrushFTP server in all versions before 10.7.1 and 11.1.0 on all platforms",
"fork": false,
"created_at": "2024-04-29T10:21:53Z",
"updated_at": "2024-04-29T10:27:07Z",
"pushed_at": "2024-04-29T10:27:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -434,11 +434,11 @@
</code>
- [airbus-cert/CVE-2024-4040](https://github.com/airbus-cert/CVE-2024-4040)
- [tr4c3rs/CVE-2024-4040-RCE-POC](https://github.com/tr4c3rs/CVE-2024-4040-RCE-POC)
- [tucommenceapousser/CVE-2024-4040-Scanner](https://github.com/tucommenceapousser/CVE-2024-4040-Scanner)
- [rbih-boulanouar/CVE-2024-4040](https://github.com/rbih-boulanouar/CVE-2024-4040)
- [Mufti22/CVE-2024-4040](https://github.com/Mufti22/CVE-2024-4040)
- [Stuub/CVE-2024-4040-SSTI-LFI-PoC](https://github.com/Stuub/CVE-2024-4040-SSTI-LFI-PoC)
- [Praison001/CVE-2024-4040-CrushFTP-server](https://github.com/Praison001/CVE-2024-4040-CrushFTP-server)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -26476,6 +26476,14 @@
- [nathunandwani/CVE-2020-24227](https://github.com/nathunandwani/CVE-2020-24227)
### CVE-2020-24490 (2021-02-02)
<code>Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.
</code>
- [AbrarKhan/linux_CVE-2020-24490-beforePatch](https://github.com/AbrarKhan/linux_CVE-2020-24490-beforePatch)
- [AbrarKhan/Linux-4.19.72_CVE-2020-24490](https://github.com/AbrarKhan/Linux-4.19.72_CVE-2020-24490)
### CVE-2020-24572 (2020-08-24)
<code>An issue was discovered in includes/webconsole.php in RaspAP 2.5. With authenticated access, an attacker can use a misconfigured (and virtually unrestricted) web console to attack the underlying OS (Raspberry Pi) running this software, and execute commands on the system (including ones for uploading of files and execution of code).