mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/04/03 18:27:50
This commit is contained in:
parent
ad1c6312ae
commit
db5300662b
36 changed files with 471 additions and 152 deletions
|
@ -2051,7 +2051,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-07-01T03:50:02Z",
|
||||
"updated_at": "2023-11-07T21:57:34Z",
|
||||
"pushed_at": "2024-03-26T11:44:52Z",
|
||||
"pushed_at": "2024-04-03T15:24:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -147,6 +147,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2017-5693 Denial of service vulnerability in Puma 6 modems",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-25T21:25:43Z",
|
||||
"updated_at": "2023-02-16T19:26:39Z",
|
||||
"updated_at": "2024-04-03T18:00:02Z",
|
||||
"pushed_at": "2024-01-17T01:51:03Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 16,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesigning bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-23T00:19:05Z",
|
||||
"updated_at": "2024-03-19T10:00:06Z",
|
||||
"updated_at": "2024-04-03T16:29:19Z",
|
||||
"pushed_at": "2018-11-13T00:26:18Z",
|
||||
"stargazers_count": 241,
|
||||
"watchers_count": 241,
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 241,
|
||||
"watchers": 242,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -3601,6 +3601,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2024-04-01T12:02:59Z",
|
||||
"updated_at": "2024-04-03T17:53:24Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 782,
|
||||
"watchers_count": 782,
|
||||
"stargazers_count": 783,
|
||||
"watchers_count": 783,
|
||||
"has_discussions": false,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 782,
|
||||
"watchers": 783,
|
||||
"score": 0,
|
||||
"subscribers_count": 33
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-03-15T15:13:27Z",
|
||||
"updated_at": "2024-03-19T02:48:57Z",
|
||||
"pushed_at": "2023-03-16T01:20:58Z",
|
||||
"pushed_at": "2024-04-03T16:28:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -78,10 +78,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T08:01:37Z",
|
||||
"updated_at": "2024-02-12T15:47:44Z",
|
||||
"updated_at": "2024-04-03T12:48:12Z",
|
||||
"pushed_at": "2020-05-04T08:11:21Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "This is a fix POC CVE-2020-11651 & CVE-2020-11651",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-17T04:15:16Z",
|
||||
"updated_at": "2024-03-21T11:25:46Z",
|
||||
"updated_at": "2024-04-03T14:40:38Z",
|
||||
"pushed_at": "2024-01-17T04:26:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2024-04-02T17:40:54Z",
|
||||
"updated_at": "2024-04-03T13:54:38Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1788,
|
||||
"watchers_count": 1788,
|
||||
"stargazers_count": 1787,
|
||||
"watchers_count": 1787,
|
||||
"has_discussions": false,
|
||||
"forks_count": 581,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 581,
|
||||
"watchers": 1788,
|
||||
"watchers": 1787,
|
||||
"score": 0,
|
||||
"subscribers_count": 44
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-15T06:40:49Z",
|
||||
"updated_at": "2023-11-17T08:47:56Z",
|
||||
"updated_at": "2024-04-03T15:33:35Z",
|
||||
"pushed_at": "2023-06-29T15:57:12Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Collection of materials relating to FORCEDENTRY",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-25T03:00:01Z",
|
||||
"updated_at": "2024-04-01T22:53:11Z",
|
||||
"updated_at": "2024-04-03T15:23:00Z",
|
||||
"pushed_at": "2024-03-30T22:17:05Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 84,
|
||||
"watchers": 86,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Recursive MMIO VM Escape PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-13T05:33:28Z",
|
||||
"updated_at": "2024-01-24T11:19:48Z",
|
||||
"updated_at": "2024-04-03T15:19:39Z",
|
||||
"pushed_at": "2022-05-13T05:37:41Z",
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 161,
|
||||
"watchers": 162,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -369,10 +369,10 @@
|
|||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2024-03-31T14:25:26Z",
|
||||
"updated_at": "2024-04-03T13:54:38Z",
|
||||
"pushed_at": "2023-05-11T11:29:46Z",
|
||||
"stargazers_count": 1086,
|
||||
"watchers_count": 1086,
|
||||
"stargazers_count": 1085,
|
||||
"watchers_count": 1085,
|
||||
"has_discussions": false,
|
||||
"forks_count": 524,
|
||||
"allow_forking": true,
|
||||
|
@ -383,7 +383,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 524,
|
||||
"watchers": 1086,
|
||||
"watchers": 1085,
|
||||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
},
|
||||
|
@ -857,10 +857,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2024-03-31T14:25:26Z",
|
||||
"updated_at": "2024-04-03T13:57:37Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 922,
|
||||
"watchers_count": 922,
|
||||
"stargazers_count": 923,
|
||||
"watchers_count": 923,
|
||||
"has_discussions": false,
|
||||
"forks_count": 140,
|
||||
"allow_forking": true,
|
||||
|
@ -889,7 +889,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 140,
|
||||
"watchers": 922,
|
||||
"watchers": 923,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-04-01T13:27:40Z",
|
||||
"updated_at": "2024-04-03T13:43:21Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1738,
|
||||
"watchers_count": 1738,
|
||||
"stargazers_count": 1739,
|
||||
"watchers_count": 1739,
|
||||
"has_discussions": false,
|
||||
"forks_count": 514,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 514,
|
||||
"watchers": 1738,
|
||||
"watchers": 1739,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
@ -3636,10 +3636,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2024-03-31T10:57:04Z",
|
||||
"updated_at": "2024-04-03T13:54:38Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3344,
|
||||
"watchers_count": 3344,
|
||||
"stargazers_count": 3343,
|
||||
"watchers_count": 3343,
|
||||
"has_discussions": true,
|
||||
"forks_count": 740,
|
||||
"allow_forking": true,
|
||||
|
@ -3648,7 +3648,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 740,
|
||||
"watchers": 3344,
|
||||
"watchers": 3343,
|
||||
"score": 0,
|
||||
"subscribers_count": 57
|
||||
},
|
||||
|
@ -4312,10 +4312,10 @@
|
|||
"description": "Log4j CVE-2021-44228 examples: Remote Code Execution (through LDAP, RMI, ...), Forced DNS queries, ...",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T13:08:03Z",
|
||||
"updated_at": "2022-02-07T01:16:44Z",
|
||||
"updated_at": "2024-04-03T13:54:38Z",
|
||||
"pushed_at": "2021-12-21T11:12:40Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -4324,7 +4324,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -5493,10 +5493,10 @@
|
|||
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T06:37:59Z",
|
||||
"updated_at": "2024-03-25T16:39:03Z",
|
||||
"updated_at": "2024-04-03T13:54:38Z",
|
||||
"pushed_at": "2023-12-18T23:02:26Z",
|
||||
"stargazers_count": 379,
|
||||
"watchers_count": 379,
|
||||
"stargazers_count": 378,
|
||||
"watchers_count": 378,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -5511,7 +5511,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 379,
|
||||
"watchers": 378,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-20963 PoC (Android WorkSource parcel\/unparcel logic mismatch)",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-12T10:44:59Z",
|
||||
"updated_at": "2024-03-31T06:59:43Z",
|
||||
"updated_at": "2024-04-03T12:47:44Z",
|
||||
"pushed_at": "2023-07-27T08:58:10Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE exploit for CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T23:00:27Z",
|
||||
"updated_at": "2024-04-02T17:40:44Z",
|
||||
"updated_at": "2024-04-03T18:10:29Z",
|
||||
"pushed_at": "2023-07-10T16:35:49Z",
|
||||
"stargazers_count": 468,
|
||||
"watchers_count": 468,
|
||||
"stargazers_count": 469,
|
||||
"watchers_count": 469,
|
||||
"has_discussions": false,
|
||||
"forks_count": 162,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 162,
|
||||
"watchers": 468,
|
||||
"watchers": 469,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-01T20:16:28Z",
|
||||
"updated_at": "2024-03-26T13:28:00Z",
|
||||
"updated_at": "2024-04-03T13:14:56Z",
|
||||
"pushed_at": "2024-02-12T03:18:54Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-04-03T12:09:30Z",
|
||||
"updated_at": "2024-04-03T16:11:23Z",
|
||||
"pushed_at": "2024-03-31T22:00:43Z",
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 327,
|
||||
"watchers": 333,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
32
2023/CVE-2023-46304.json
Normal file
32
2023/CVE-2023-46304.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 781611038,
|
||||
"name": "CVE-2023-46304",
|
||||
"full_name": "jselliott\/CVE-2023-46304",
|
||||
"owner": {
|
||||
"login": "jselliott",
|
||||
"id": 13350778,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13350778?v=4",
|
||||
"html_url": "https:\/\/github.com\/jselliott"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jselliott\/CVE-2023-46304",
|
||||
"description": "Authenticated Remote Code Execution in in VTiger Open Source CRM v7.5",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-03T17:57:23Z",
|
||||
"updated_at": "2024-04-03T18:15:17Z",
|
||||
"pushed_at": "2024-04-03T18:14:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-4911 proof of concept",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-04T14:32:49Z",
|
||||
"updated_at": "2024-03-16T15:39:55Z",
|
||||
"updated_at": "2024-04-03T15:26:02Z",
|
||||
"pushed_at": "2023-10-08T23:24:24Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 162,
|
||||
"watchers": 163,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Proof of concept for Local Privilege Escalation in Thales Sentinel HASP LDK.",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-27T15:25:58Z",
|
||||
"updated_at": "2024-02-27T15:30:05Z",
|
||||
"updated_at": "2024-04-03T16:18:00Z",
|
||||
"pushed_at": "2024-02-27T15:30:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-04-03T11:53:02Z",
|
||||
"updated_at": "2024-04-03T17:57:57Z",
|
||||
"pushed_at": "2024-04-02T21:18:42Z",
|
||||
"stargazers_count": 1287,
|
||||
"watchers_count": 1287,
|
||||
"stargazers_count": 1303,
|
||||
"watchers_count": 1303,
|
||||
"has_discussions": false,
|
||||
"forks_count": 127,
|
||||
"forks_count": 129,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,9 +30,39 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 127,
|
||||
"watchers": 1287,
|
||||
"forks": 129,
|
||||
"watchers": 1303,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
{
|
||||
"id": 781477717,
|
||||
"name": "docker-POC_CVE-2024-1086",
|
||||
"full_name": "Alicey0719\/docker-POC_CVE-2024-1086",
|
||||
"owner": {
|
||||
"login": "Alicey0719",
|
||||
"id": 54524362,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54524362?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alicey0719"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alicey0719\/docker-POC_CVE-2024-1086",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-03T13:09:22Z",
|
||||
"updated_at": "2024-04-03T13:11:47Z",
|
||||
"pushed_at": "2024-04-03T14:08:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -284,7 +284,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-04-03T11:45:19Z",
|
||||
"updated_at": "2024-04-03T11:45:20Z",
|
||||
"pushed_at": "2024-04-03T12:21:39Z",
|
||||
"pushed_at": "2024-04-03T12:32:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -148,5 +148,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 781571050,
|
||||
"name": "multicheck_CVE-2024-21762",
|
||||
"full_name": "lore-is-already-taken\/multicheck_CVE-2024-21762",
|
||||
"owner": {
|
||||
"login": "lore-is-already-taken",
|
||||
"id": 40778253,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40778253?v=4",
|
||||
"html_url": "https:\/\/github.com\/lore-is-already-taken"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lore-is-already-taken\/multicheck_CVE-2024-21762",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-03T16:26:02Z",
|
||||
"updated_at": "2024-04-03T16:48:52Z",
|
||||
"pushed_at": "2024-04-03T18:14:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -103,10 +103,10 @@
|
|||
"description": "aiohttp LFI (CVE-2024-23334)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-19T16:28:56Z",
|
||||
"updated_at": "2024-03-27T02:17:05Z",
|
||||
"updated_at": "2024-04-03T14:30:21Z",
|
||||
"pushed_at": "2024-03-19T17:06:26Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -590,10 +590,10 @@
|
|||
"description": "POC for CVE-2024-23897 Jenkins File-Read ",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T07:16:04Z",
|
||||
"updated_at": "2024-03-05T05:28:09Z",
|
||||
"updated_at": "2024-04-03T14:30:02Z",
|
||||
"pushed_at": "2024-02-17T16:39:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -602,7 +602,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Unauthenticated Remote Code Execution – Bricks <= 1.9.6",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-20T20:16:09Z",
|
||||
"updated_at": "2024-04-02T00:55:16Z",
|
||||
"updated_at": "2024-04-03T15:55:41Z",
|
||||
"pushed_at": "2024-02-25T21:50:09Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 113,
|
||||
"watchers": 114,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
32
2024/CVE-2024-26198.json
Normal file
32
2024/CVE-2024-26198.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 781585194,
|
||||
"name": "CVE-2024-26198-POC",
|
||||
"full_name": "babywalkerenc\/CVE-2024-26198-POC",
|
||||
"owner": {
|
||||
"login": "babywalkerenc",
|
||||
"id": 165937444,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165937444?v=4",
|
||||
"html_url": "https:\/\/github.com\/babywalkerenc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/babywalkerenc\/CVE-2024-26198-POC",
|
||||
"description": "CVE-2024-26198 POC RCE Microsoft Exchange Server",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-03T16:57:49Z",
|
||||
"updated_at": "2024-04-03T18:03:53Z",
|
||||
"pushed_at": "2024-04-03T17:36:53Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-27518.json
Normal file
32
2024/CVE-2024-27518.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 781492709,
|
||||
"name": "CVE-2024-27518",
|
||||
"full_name": "secunnix\/CVE-2024-27518",
|
||||
"owner": {
|
||||
"login": "secunnix",
|
||||
"id": 104568161,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104568161?v=4",
|
||||
"html_url": "https:\/\/github.com\/secunnix"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/secunnix\/CVE-2024-27518",
|
||||
"description": "SUPERAntiSpyware Professional X <=10.0.1264 LPE Vulnerability PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-03T13:41:18Z",
|
||||
"updated_at": "2024-04-03T13:42:31Z",
|
||||
"pushed_at": "2024-04-03T14:14:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-27673.json
Normal file
32
2024/CVE-2024-27673.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 781524986,
|
||||
"name": "CVE-2024-27673",
|
||||
"full_name": "Alaatk\/CVE-2024-27673",
|
||||
"owner": {
|
||||
"login": "Alaatk",
|
||||
"id": 21007805,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21007805?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alaatk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alaatk\/CVE-2024-27673",
|
||||
"description": "ASUS Control Center Express =< 01.06.15 - Unquoted Service Path",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-03T14:47:20Z",
|
||||
"updated_at": "2024-04-03T14:47:20Z",
|
||||
"pushed_at": "2024-04-03T15:00:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-27674.json
Normal file
32
2024/CVE-2024-27674.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 781539000,
|
||||
"name": "CVE-2024-27674",
|
||||
"full_name": "Alaatk\/CVE-2024-27674",
|
||||
"owner": {
|
||||
"login": "Alaatk",
|
||||
"id": 21007805,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21007805?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alaatk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alaatk\/CVE-2024-27674",
|
||||
"description": "Macro Expert <= 4.9.4 - Insecure Permissions Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-03T15:16:09Z",
|
||||
"updated_at": "2024-04-03T15:16:10Z",
|
||||
"pushed_at": "2024-04-03T15:20:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,12 +13,12 @@
|
|||
"description": "WallEscape vulnerability in util-linux",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-11T00:15:03Z",
|
||||
"updated_at": "2024-04-02T18:32:27Z",
|
||||
"updated_at": "2024-04-03T15:17:05Z",
|
||||
"pushed_at": "2024-03-30T01:32:02Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -31,8 +31,8 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 37,
|
||||
"forks": 7,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
32
2024/CVE-2024-28589.json
Normal file
32
2024/CVE-2024-28589.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 781546021,
|
||||
"name": "CVE-2024-28589",
|
||||
"full_name": "Alaatk\/CVE-2024-28589",
|
||||
"owner": {
|
||||
"login": "Alaatk",
|
||||
"id": 21007805,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21007805?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alaatk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alaatk\/CVE-2024-28589",
|
||||
"description": "Local Privilege Escalation Vulnerability on Axigen for Windows",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-03T15:31:02Z",
|
||||
"updated_at": "2024-04-03T15:31:03Z",
|
||||
"pushed_at": "2024-04-03T15:38:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-11T10:14:39Z",
|
||||
"updated_at": "2024-04-03T12:17:07Z",
|
||||
"updated_at": "2024-04-03T18:22:00Z",
|
||||
"pushed_at": "2024-03-25T12:56:16Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 57,
|
||||
"watchers": 61,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Information for CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T17:03:01Z",
|
||||
"updated_at": "2024-04-03T06:18:43Z",
|
||||
"updated_at": "2024-04-03T18:20:39Z",
|
||||
"pushed_at": "2024-04-01T16:01:34Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 40,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -387,10 +387,10 @@
|
|||
"description": "A shell script designed to help users identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6) or upgrading to latest version.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-30T19:23:30Z",
|
||||
"updated_at": "2024-04-02T14:13:24Z",
|
||||
"updated_at": "2024-04-03T16:50:40Z",
|
||||
"pushed_at": "2024-04-03T07:56:31Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -409,7 +409,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -646,19 +646,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-31T10:46:33Z",
|
||||
"updated_at": "2024-04-03T10:51:38Z",
|
||||
"pushed_at": "2024-04-02T16:10:59Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"updated_at": "2024-04-03T16:13:17Z",
|
||||
"pushed_at": "2024-04-03T15:46:41Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 15,
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -1006,19 +1006,19 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-04-03T12:29:38Z",
|
||||
"updated_at": "2024-04-03T18:29:40Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 1799,
|
||||
"watchers_count": 1799,
|
||||
"stargazers_count": 2214,
|
||||
"watchers_count": 2214,
|
||||
"has_discussions": false,
|
||||
"forks_count": 106,
|
||||
"forks_count": 127,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 106,
|
||||
"watchers": 1799,
|
||||
"forks": 127,
|
||||
"watchers": 2214,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
@ -1096,10 +1096,10 @@
|
|||
"description": "XZ Backdoor Extract(Test on Ubuntu 23.10)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T16:08:50Z",
|
||||
"updated_at": "2024-04-03T11:45:12Z",
|
||||
"updated_at": "2024-04-03T18:29:05Z",
|
||||
"pushed_at": "2024-04-02T07:12:53Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -1113,7 +1113,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1281,10 +1281,10 @@
|
|||
"description": "Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-02T20:07:14Z",
|
||||
"updated_at": "2024-04-03T08:16:40Z",
|
||||
"updated_at": "2024-04-03T16:40:17Z",
|
||||
"pushed_at": "2024-04-02T20:34:30Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1293,7 +1293,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1311,8 +1311,8 @@
|
|||
"description": "apocalypxze: xz backdoor (2024) AKA CVE-2024-3094 related links",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-02T20:17:07Z",
|
||||
"updated_at": "2024-04-03T00:52:23Z",
|
||||
"pushed_at": "2024-04-03T12:15:14Z",
|
||||
"updated_at": "2024-04-03T15:52:48Z",
|
||||
"pushed_at": "2024-04-03T17:47:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -1320,7 +1320,11 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"apocalypxze",
|
||||
"cve-2024-3094",
|
||||
"xz-utils-backdoor"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
|
@ -1402,7 +1406,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-04-03T10:50:47Z",
|
||||
"updated_at": "2024-04-03T11:59:50Z",
|
||||
"pushed_at": "2024-04-03T11:33:03Z",
|
||||
"pushed_at": "2024-04-03T13:05:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -1416,5 +1420,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 781477807,
|
||||
"name": "xz-backdoor-CVE-2024-3094-Check",
|
||||
"full_name": "Bella-Bc\/xz-backdoor-CVE-2024-3094-Check",
|
||||
"owner": {
|
||||
"login": "Bella-Bc",
|
||||
"id": 10534659,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10534659?v=4",
|
||||
"html_url": "https:\/\/github.com\/Bella-Bc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Bella-Bc\/xz-backdoor-CVE-2024-3094-Check",
|
||||
"description": "Verify if your installed version of xz-utils is vulnerable to CVE-2024-3094 backdoor",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-03T13:09:32Z",
|
||||
"updated_at": "2024-04-03T14:39:09Z",
|
||||
"pushed_at": "2024-04-03T14:02:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
README.md
33
README.md
|
@ -83,6 +83,7 @@
|
|||
</code>
|
||||
|
||||
- [Notselwyn/CVE-2024-1086](https://github.com/Notselwyn/CVE-2024-1086)
|
||||
- [Alicey0719/docker-POC_CVE-2024-1086](https://github.com/Alicey0719/docker-POC_CVE-2024-1086)
|
||||
|
||||
### CVE-2024-1208 (2024-02-05)
|
||||
|
||||
|
@ -279,6 +280,7 @@
|
|||
- [CyberGuard-Foundation/CVE-2024-3094](https://github.com/CyberGuard-Foundation/CVE-2024-3094)
|
||||
- [Security-Phoenix-demo/CVE-2024-3094-fix-exploits](https://github.com/Security-Phoenix-demo/CVE-2024-3094-fix-exploits)
|
||||
- [MagpieRYL/CVE-2024-3094-backdoor-env-container](https://github.com/MagpieRYL/CVE-2024-3094-backdoor-env-container)
|
||||
- [Bella-Bc/xz-backdoor-CVE-2024-3094-Check](https://github.com/Bella-Bc/xz-backdoor-CVE-2024-3094-Check)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
@ -422,6 +424,7 @@
|
|||
- [h4x0r-dz/CVE-2024-21762](https://github.com/h4x0r-dz/CVE-2024-21762)
|
||||
- [r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check](https://github.com/r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check)
|
||||
- [d0rb/CVE-2024-21762](https://github.com/d0rb/CVE-2024-21762)
|
||||
- [lore-is-already-taken/multicheck_CVE-2024-21762](https://github.com/lore-is-already-taken/multicheck_CVE-2024-21762)
|
||||
|
||||
### CVE-2024-21887 (2024-01-12)
|
||||
|
||||
|
@ -996,6 +999,13 @@
|
|||
|
||||
- [0xNslabs/CVE-2024-25832-PoC](https://github.com/0xNslabs/CVE-2024-25832-PoC)
|
||||
|
||||
### CVE-2024-26198 (2024-03-12)
|
||||
|
||||
<code>Microsoft Exchange Server Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [babywalkerenc/CVE-2024-26198-POC](https://github.com/babywalkerenc/CVE-2024-26198-POC)
|
||||
|
||||
### CVE-2024-26475 (2024-03-14)
|
||||
|
||||
<code>An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function.
|
||||
|
@ -1040,6 +1050,9 @@
|
|||
- [K3ysTr0K3R/CVE-2024-27198-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-27198-EXPLOIT)
|
||||
- [Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-](https://github.com/Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-)
|
||||
|
||||
### CVE-2024-27518
|
||||
- [secunnix/CVE-2024-27518](https://github.com/secunnix/CVE-2024-27518)
|
||||
|
||||
### CVE-2024-27619 (-)
|
||||
|
||||
<code>Dlink Dir-3040us A1 1.20b03a hotfix is vulnerable to Buffer Overflow. Any user having read/write access to ftp server can write directly to ram causing buffer overflow if file or files uploaded are greater than available ram. Ftp server allows change of directory to root which is one level up than root of usb flash directory. During upload ram is getting filled and causing system resource exhaustion (no free memory) which causes system to crash and reboot.
|
||||
|
@ -1050,6 +1063,16 @@
|
|||
### CVE-2024-27665
|
||||
- [Thirukrishnan/CVE-2024-27665](https://github.com/Thirukrishnan/CVE-2024-27665)
|
||||
|
||||
### CVE-2024-27673
|
||||
- [Alaatk/CVE-2024-27673](https://github.com/Alaatk/CVE-2024-27673)
|
||||
|
||||
### CVE-2024-27674 (-)
|
||||
|
||||
<code>Macro Expert through 4.9.4 allows BUILTIN\Users:(OI)(CI)(M) access to the "%PROGRAMFILES(X86)%\GrassSoft\Macro Expert" folder and thus an unprivileged user can escalate to SYSTEM by replacing the MacroService.exe binary.
|
||||
</code>
|
||||
|
||||
- [Alaatk/CVE-2024-27674](https://github.com/Alaatk/CVE-2024-27674)
|
||||
|
||||
### CVE-2024-27697
|
||||
- [SanjinDedic/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697](https://github.com/SanjinDedic/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697)
|
||||
|
||||
|
@ -1098,6 +1121,13 @@
|
|||
|
||||
- [heshi906/CVE-2024-28515](https://github.com/heshi906/CVE-2024-28515)
|
||||
|
||||
### CVE-2024-28589 (-)
|
||||
|
||||
<code>An issue was discovered in Axigen Mail Server for Windows versions 10.5.18 and before, allows local low-privileged attackers to execute arbitrary code and escalate privileges via insecure DLL loading from a world-writable directory during service initialization.
|
||||
</code>
|
||||
|
||||
- [Alaatk/CVE-2024-28589](https://github.com/Alaatk/CVE-2024-28589)
|
||||
|
||||
### CVE-2024-28715 (2024-03-19)
|
||||
|
||||
<code>Cross Site Scripting vulnerability in DOraCMS v.2.18 and before allows a remote attacker to execute arbitrary code via the markdown0 function in the /app/public/apidoc/oas3/wrap-components/markdown.jsx endpoint.
|
||||
|
@ -7366,6 +7396,9 @@
|
|||
|
||||
- [0x1717/ssrf-via-img](https://github.com/0x1717/ssrf-via-img)
|
||||
|
||||
### CVE-2023-46304
|
||||
- [jselliott/CVE-2023-46304](https://github.com/jselliott/CVE-2023-46304)
|
||||
|
||||
### CVE-2023-46344 (2024-02-01)
|
||||
|
||||
<code>A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks.
|
||||
|
|
Loading…
Reference in a new issue