Auto Update 2024/04/18 06:27:57

This commit is contained in:
motikan2010-bot 2024-04-18 15:27:57 +09:00
parent 01aab7419d
commit d5ce87882c
39 changed files with 217 additions and 287 deletions

View file

@ -13,10 +13,10 @@
"description": "Simple exploit for Easy RM to MP3 Converter 2.7.3.700 on Windows 7 32b.",
"fork": false,
"created_at": "2018-12-30T12:17:08Z",
"updated_at": "2018-12-31T10:09:34Z",
"updated_at": "2024-04-18T05:04:48Z",
"pushed_at": "2018-12-31T09:59:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-17T10:12:13Z",
"updated_at": "2024-04-18T01:00:22Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1920,
"watchers_count": 1920,
"stargazers_count": 1921,
"watchers_count": 1921,
"has_discussions": true,
"forks_count": 332,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 332,
"watchers": 1920,
"watchers": 1921,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-17T10:12:13Z",
"updated_at": "2024-04-18T01:00:22Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1920,
"watchers_count": 1920,
"stargazers_count": 1921,
"watchers_count": 1921,
"has_discussions": true,
"forks_count": 332,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 332,
"watchers": 1920,
"watchers": 1921,
"score": 0,
"subscribers_count": 35
},

View file

@ -373,10 +373,10 @@
"description": "Tomcat PUT方法任意文件写入CVE-2017-12615exp",
"fork": false,
"created_at": "2023-03-10T16:26:45Z",
"updated_at": "2024-03-19T10:34:28Z",
"updated_at": "2024-04-18T01:26:02Z",
"pushed_at": "2023-03-14T07:39:41Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": true,
"forks_count": 1,
"allow_forking": true,
@ -385,7 +385,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-17T10:12:13Z",
"updated_at": "2024-04-18T01:00:22Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1920,
"watchers_count": 1920,
"stargazers_count": 1921,
"watchers_count": 1921,
"has_discussions": true,
"forks_count": 332,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 332,
"watchers": 1920,
"watchers": 1921,
"score": 0,
"subscribers_count": 35
},

View file

@ -557,10 +557,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-17T10:12:13Z",
"updated_at": "2024-04-18T01:00:22Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1920,
"watchers_count": 1920,
"stargazers_count": 1921,
"watchers_count": 1921,
"has_discussions": true,
"forks_count": 332,
"allow_forking": true,
@ -590,7 +590,7 @@
],
"visibility": "public",
"forks": 332,
"watchers": 1920,
"watchers": 1921,
"score": 0,
"subscribers_count": 35
},

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-17T10:12:13Z",
"updated_at": "2024-04-18T01:00:22Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1920,
"watchers_count": 1920,
"stargazers_count": 1921,
"watchers_count": 1921,
"has_discussions": true,
"forks_count": 332,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 332,
"watchers": 1920,
"watchers": 1921,
"score": 0,
"subscribers_count": 35
}

View file

@ -73,10 +73,10 @@
"description": "This is a RCE bluetooth vulnerability on Android 8.0 and 9.0",
"fork": false,
"created_at": "2020-07-01T00:23:33Z",
"updated_at": "2024-02-23T06:01:02Z",
"updated_at": "2024-04-18T04:15:02Z",
"pushed_at": "2023-05-23T04:46:45Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-04-12T13:58:51Z",
"updated_at": "2024-04-18T00:30:04Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1690,
"watchers_count": 1690,
"stargazers_count": 1691,
"watchers_count": 1691,
"has_discussions": false,
"forks_count": 361,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 361,
"watchers": 1690,
"watchers": 1691,
"score": 0,
"subscribers_count": 87
},
@ -103,10 +103,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2024-04-14T17:16:33Z",
"updated_at": "2024-04-18T00:30:54Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1139,
"watchers_count": 1139,
"stargazers_count": 1140,
"watchers_count": 1140,
"has_discussions": false,
"forks_count": 286,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 286,
"watchers": 1139,
"watchers": 1140,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-17T10:12:13Z",
"updated_at": "2024-04-18T01:00:22Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1920,
"watchers_count": 1920,
"stargazers_count": 1921,
"watchers_count": 1921,
"has_discussions": true,
"forks_count": 332,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 332,
"watchers": 1920,
"watchers": 1921,
"score": 0,
"subscribers_count": 35
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 140,
"watchers_count": 140,
"has_discussions": false,
"forks_count": 23,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"forks": 21,
"watchers": 140,
"score": 0,
"subscribers_count": 10

View file

@ -1527,7 +1527,7 @@
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2023-05-28T11:06:10Z",
"pushed_at": "2024-04-14T21:55:08Z",
"pushed_at": "2024-04-18T05:10:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
@ -4127,10 +4127,10 @@
"description": "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.",
"fork": false,
"created_at": "2021-12-13T11:06:46Z",
"updated_at": "2024-04-11T11:36:52Z",
"updated_at": "2024-04-18T01:25:02Z",
"pushed_at": "2021-12-26T09:58:06Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -4139,7 +4139,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 98,
"watchers": 99,
"score": 0,
"subscribers_count": 7
},

View file

@ -193,10 +193,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-15T02:42:43Z",
"updated_at": "2024-04-17T19:09:59Z",
"pushed_at": "2024-04-17T22:58:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-04-18T05:15:03Z",
"pushed_at": "2024-04-18T05:14:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -133,10 +133,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2024-04-14T08:22:50Z",
"updated_at": "2024-04-18T03:46:37Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1072,
"watchers_count": 1072,
"stargazers_count": 1073,
"watchers_count": 1073,
"has_discussions": false,
"forks_count": 219,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 219,
"watchers": 1072,
"watchers": 1073,
"score": 0,
"subscribers_count": 17
},

View file

@ -13,10 +13,10 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
"updated_at": "2024-04-16T16:55:30Z",
"updated_at": "2024-04-18T02:44:36Z",
"pushed_at": "2023-05-27T15:39:41Z",
"stargazers_count": 213,
"watchers_count": 213,
"stargazers_count": 214,
"watchers_count": 214,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 213,
"watchers": 214,
"score": 0,
"subscribers_count": 7
}

View file

@ -93,10 +93,10 @@
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2024-04-08T16:54:25Z",
"updated_at": "2024-04-18T05:08:02Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 362,
"watchers_count": 362,
"stargazers_count": 361,
"watchers_count": 361,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
@ -105,7 +105,7 @@
"topics": [],
"visibility": "public",
"forks": 98,
"watchers": 362,
"watchers": 361,
"score": 0,
"subscribers_count": 10
},

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2022-12-23T12:33:21Z",
"updated_at": "2023-03-10T01:15:25Z",
"pushed_at": "2024-04-16T23:38:54Z",
"pushed_at": "2024-04-18T02:47:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.",
"fork": false,
"created_at": "2023-02-10T13:02:55Z",
"updated_at": "2024-02-21T16:04:41Z",
"updated_at": "2024-04-18T02:18:05Z",
"pushed_at": "2024-04-16T09:20:45Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 101,
"watchers": 102,
"score": 0,
"subscribers_count": 1
},

View file

@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -48,7 +48,7 @@
"stargazers_count": 769,
"watchers_count": 769,
"has_discussions": false,
"forks_count": 139,
"forks_count": 140,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -58,7 +58,7 @@
"exploit"
],
"visibility": "public",
"forks": 139,
"forks": 140,
"watchers": 769,
"score": 0,
"subscribers_count": 9
@ -107,10 +107,10 @@
"description": "一款用于生成winrar程序RCE即cve-2023-38831的POC的工具。",
"fork": false,
"created_at": "2023-08-27T14:08:36Z",
"updated_at": "2024-04-03T02:11:07Z",
"updated_at": "2024-04-18T02:54:46Z",
"pushed_at": "2023-08-27T14:35:00Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 104,
"watchers": 105,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2024-04-15T06:45:56Z",
"updated_at": "2024-04-18T02:51:30Z",
"pushed_at": "2024-01-29T02:28:11Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 201,
"watchers": 202,
"score": 0,
"subscribers_count": 4
},
@ -722,6 +722,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

32
2024/CVE-2024-0305.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 788238757,
"name": "cve-2024-0305exp",
"full_name": "jidle123\/cve-2024-0305exp",
"owner": {
"login": "jidle123",
"id": 123531867,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123531867?v=4",
"html_url": "https:\/\/github.com\/jidle123"
},
"html_url": "https:\/\/github.com\/jidle123\/cve-2024-0305exp",
"description": "cve-2024-0305可用的exp",
"fork": false,
"created_at": "2024-04-18T03:13:43Z",
"updated_at": "2024-04-18T03:25:54Z",
"pushed_at": "2024-04-18T03:30:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-17T15:12:06Z",
"updated_at": "2024-04-18T02:54:18Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 1853,
"watchers_count": 1853,
"stargazers_count": 1854,
"watchers_count": 1854,
"has_discussions": false,
"forks_count": 228,
"forks_count": 230,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc"
],
"visibility": "public",
"forks": 228,
"watchers": 1853,
"forks": 230,
"watchers": 1854,
"score": 0,
"subscribers_count": 19
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,19 +13,19 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-04-17T20:40:02Z",
"updated_at": "2024-04-18T05:14:22Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 138,
"watchers_count": 138,
"has_discussions": false,
"forks_count": 28,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 126,
"forks": 29,
"watchers": 138,
"score": 0,
"subscribers_count": 2
},
@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
"fork": false,
"created_at": "2024-02-28T21:16:10Z",
"updated_at": "2024-04-17T16:45:52Z",
"updated_at": "2024-04-18T03:49:26Z",
"pushed_at": "2024-03-01T20:02:52Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 82,
"watchers": 83,
"score": 0,
"subscribers_count": 6
},
@ -208,35 +208,5 @@
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 787627670,
"name": "Cve-2024-21762-",
"full_name": "Codeb3af\/Cve-2024-21762-",
"owner": {
"login": "Codeb3af",
"id": 167255943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167255943?v=4",
"html_url": "https:\/\/github.com\/Codeb3af"
},
"html_url": "https:\/\/github.com\/Codeb3af\/Cve-2024-21762-",
"description": "Full exploit of Cve-2024-21762!",
"fork": false,
"created_at": "2024-04-16T22:06:52Z",
"updated_at": "2024-04-16T22:10:40Z",
"pushed_at": "2024-04-16T22:15:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,34 +1,4 @@
[
{
"id": 783829842,
"name": "CVE-2024-21894-POC",
"full_name": "RansomGroupCVE\/CVE-2024-21894-POC",
"owner": {
"login": "RansomGroupCVE",
"id": 166298400,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166298400?v=4",
"html_url": "https:\/\/github.com\/RansomGroupCVE"
},
"html_url": "https:\/\/github.com\/RansomGroupCVE\/CVE-2024-21894-POC",
"description": " Exploit CVE-2024-21894 for Vulnerable Ivanti Connect Secure and Policy Secure Gateways POC",
"fork": false,
"created_at": "2024-04-08T16:50:32Z",
"updated_at": "2024-04-10T17:39:32Z",
"pushed_at": "2024-04-11T15:53:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 785615377,
"name": "CVE-2024-21894-Proof-of-concept",

View file

@ -13,7 +13,7 @@
"description": " env of CVE-2024-22243&CVE-2024-22234",
"fork": false,
"created_at": "2024-02-23T10:09:51Z",
"updated_at": "2024-03-21T07:11:41Z",
"updated_at": "2024-04-18T01:29:27Z",
"pushed_at": "2024-02-28T06:55:26Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -1,32 +0,0 @@
[
{
"id": 783282598,
"name": "CVE-2024-22328-POC",
"full_name": "RansomGroupCVE\/CVE-2024-22328-POC",
"owner": {
"login": "RansomGroupCVE",
"id": 166298400,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166298400?v=4",
"html_url": "https:\/\/github.com\/RansomGroupCVE"
},
"html_url": "https:\/\/github.com\/RansomGroupCVE\/CVE-2024-22328-POC",
"description": "About POC CVE-2024-22328 Exploit ",
"fork": false,
"created_at": "2024-04-07T13:09:17Z",
"updated_at": "2024-04-07T13:09:18Z",
"pushed_at": "2024-04-13T16:09:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -73,10 +73,10 @@
"description": "CVE-2024-24576 Proof of Concept",
"fork": false,
"created_at": "2024-04-10T14:06:09Z",
"updated_at": "2024-04-17T21:05:24Z",
"updated_at": "2024-04-18T05:04:34Z",
"pushed_at": "2024-04-10T14:42:34Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 2
},
@ -138,8 +138,8 @@
"description": "This is a simple demo for the BadBatBut vulnerability CVE-2024-24576",
"fork": false,
"created_at": "2024-04-12T23:36:05Z",
"updated_at": "2024-04-17T21:05:33Z",
"pushed_at": "2024-04-13T00:19:45Z",
"updated_at": "2024-04-18T04:31:18Z",
"pushed_at": "2024-04-18T04:24:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -195,6 +195,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -35,5 +35,35 @@
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
{
"id": 788117590,
"name": "CVE-2024-27316_poc",
"full_name": "aeyesec\/CVE-2024-27316_poc",
"owner": {
"login": "aeyesec",
"id": 61375985,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61375985?v=4",
"html_url": "https:\/\/github.com\/aeyesec"
},
"html_url": "https:\/\/github.com\/aeyesec\/CVE-2024-27316_poc",
"description": null,
"fork": false,
"created_at": "2024-04-17T20:08:05Z",
"updated_at": "2024-04-18T01:27:19Z",
"pushed_at": "2024-04-17T21:31:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-04-17T15:30:23Z",
"updated_at": "2024-04-18T01:34:10Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3379,
"watchers_count": 3379,
"stargazers_count": 3380,
"watchers_count": 3380,
"has_discussions": false,
"forks_count": 227,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 227,
"watchers": 3379,
"watchers": 3380,
"score": 0,
"subscribers_count": 34
},

View file

@ -27,7 +27,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 787871319,
@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-17T13:43:57Z",
"updated_at": "2024-04-17T15:38:44Z",
"updated_at": "2024-04-18T06:20:00Z",
"pushed_at": "2024-04-17T14:15:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,8 +25,8 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-13T05:16:21Z",
"updated_at": "2024-04-17T14:35:35Z",
"updated_at": "2024-04-18T03:40:33Z",
"pushed_at": "2024-04-13T05:20:15Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
@ -73,10 +73,10 @@
"description": "CVE-2024-3400",
"fork": false,
"created_at": "2024-04-13T14:00:31Z",
"updated_at": "2024-04-17T19:08:06Z",
"pushed_at": "2024-04-17T19:05:41Z",
"stargazers_count": 26,
"watchers_count": 26,
"updated_at": "2024-04-18T03:38:21Z",
"pushed_at": "2024-04-18T05:49:19Z",
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 26,
"watchers": 30,
"score": 0,
"subscribers_count": 2
},
@ -283,10 +283,10 @@
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
"fork": false,
"created_at": "2024-04-16T14:18:08Z",
"updated_at": "2024-04-17T21:46:51Z",
"updated_at": "2024-04-18T06:17:23Z",
"pushed_at": "2024-04-16T22:35:43Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -295,7 +295,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 58,
"watchers": 68,
"score": 0,
"subscribers_count": 1
},
@ -313,10 +313,10 @@
"description": "CVE-2024-3400-RCE",
"fork": false,
"created_at": "2024-04-16T16:18:56Z",
"updated_at": "2024-04-17T13:05:58Z",
"updated_at": "2024-04-18T02:03:38Z",
"pushed_at": "2024-04-17T01:11:01Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -325,7 +325,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},
@ -387,7 +387,7 @@
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 787614808,
@ -447,7 +447,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 787813638,
@ -477,7 +477,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 787894337,
@ -507,7 +507,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 788013743,
@ -537,7 +537,7 @@
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 788136951,
@ -567,7 +567,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 788161583,
@ -597,6 +597,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 787533779,
"name": "CVE-2024-3867-POC",
"full_name": "RansomGroupCVE\/CVE-2024-3867-POC",
"owner": {
"login": "RansomGroupCVE",
"id": 166298400,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166298400?v=4",
"html_url": "https:\/\/github.com\/RansomGroupCVE"
},
"html_url": "https:\/\/github.com\/RansomGroupCVE\/CVE-2024-3867-POC",
"description": "Exploiting Reflected Cross-Site Scripting (XSS) in WordPress archive-tainacan-collection Theme",
"fork": false,
"created_at": "2024-04-16T17:52:19Z",
"updated_at": "2024-04-16T17:52:19Z",
"pushed_at": "2024-04-16T17:55:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -25,6 +25,13 @@
- [m-cetin/CVE-2024-0204](https://github.com/m-cetin/CVE-2024-0204)
- [adminlove520/CVE-2024-0204](https://github.com/adminlove520/CVE-2024-0204)
### CVE-2024-0305 (2024-01-08)
<code>Eine Schwachstelle wurde in Guangzhou Yingke Electronic Technology Ncast bis 2017 gefunden. Sie wurde als problematisch eingestuft. Dies betrifft einen unbekannten Teil der Datei /manage/IPSetup.php der Komponente Guest Login. Durch das Manipulieren mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
</code>
- [jidle123/cve-2024-0305exp](https://github.com/jidle123/cve-2024-0305exp)
### CVE-2024-0582 (2024-01-16)
<code>A memory leak flaw was found in the Linux kernels io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it. This flaw allows a local user to crash or potentially escalate their privileges on the system.
@ -393,13 +400,6 @@
- [phantomradar/cve-2024-3400-poc](https://github.com/phantomradar/cve-2024-3400-poc)
- [retkoussa/CVE-2024-3400](https://github.com/retkoussa/CVE-2024-3400)
### CVE-2024-3867 (2024-04-16)
<code>The archive-tainacan-collection theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in version 2.7.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
</code>
- [RansomGroupCVE/CVE-2024-3867-POC](https://github.com/RansomGroupCVE/CVE-2024-3867-POC)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -581,7 +581,6 @@
- [d0rb/CVE-2024-21762](https://github.com/d0rb/CVE-2024-21762)
- [lolminerxmrig/multicheck_CVE-2024-21762](https://github.com/lolminerxmrig/multicheck_CVE-2024-21762)
- [AlexLondan/CVE-2024-21762-Fortinet-RCE-ALLWORK](https://github.com/AlexLondan/CVE-2024-21762-Fortinet-RCE-ALLWORK)
- [Codeb3af/Cve-2024-21762-](https://github.com/Codeb3af/Cve-2024-21762-)
### CVE-2024-21887 (2024-01-12)
@ -610,7 +609,6 @@
<code>A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack. In certain conditions this may lead to execution of arbitrary code
</code>
- [RansomGroupCVE/CVE-2024-21894-POC](https://github.com/RansomGroupCVE/CVE-2024-21894-POC)
- [AlexLondan/CVE-2024-21894-Proof-of-concept](https://github.com/AlexLondan/CVE-2024-21894-Proof-of-concept)
### CVE-2024-22024 (2024-02-13)
@ -630,13 +628,6 @@
- [shellfeel/CVE-2024-22243-CVE-2024-22234](https://github.com/shellfeel/CVE-2024-22243-CVE-2024-22234)
### CVE-2024-22328 (2024-04-06)
<code>IBM Maximo Application Suite 8.10 and 8.11 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing &quot;dot dot&quot; sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 279950.
</code>
- [RansomGroupCVE/CVE-2024-22328-POC](https://github.com/RansomGroupCVE/CVE-2024-22328-POC)
### CVE-2024-22369 (2024-02-20)
<code>Deserialization of Untrusted Data vulnerability in Apache Camel SQL ComponentThis issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0.\n\nUsers are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1\n\n
@ -1270,6 +1261,7 @@
</code>
- [lockness-Ko/CVE-2024-27316](https://github.com/lockness-Ko/CVE-2024-27316)
- [aeyesec/CVE-2024-27316_poc](https://github.com/aeyesec/CVE-2024-27316_poc)
### CVE-2024-27462
- [Alaatk/CVE-2024-27462](https://github.com/Alaatk/CVE-2024-27462)