Auto Update 2024/04/03 18:27:50

This commit is contained in:
motikan2010-bot 2024-04-04 03:27:50 +09:00
parent ad1c6312ae
commit db5300662b
36 changed files with 471 additions and 152 deletions

View file

@ -2051,7 +2051,7 @@
"fork": false,
"created_at": "2023-07-01T03:50:02Z",
"updated_at": "2023-11-07T21:57:34Z",
"pushed_at": "2024-03-26T11:44:52Z",
"pushed_at": "2024-04-03T15:24:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -147,6 +147,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2017-5693 Denial of service vulnerability in Puma 6 modems",
"fork": false,
"created_at": "2017-04-25T21:25:43Z",
"updated_at": "2023-02-16T19:26:39Z",
"updated_at": "2024-04-03T18:00:02Z",
"pushed_at": "2024-01-17T01:51:03Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 16,
"watchers": 15,
"score": 0,
"subscribers_count": 4
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesigning bypass.",
"fork": false,
"created_at": "2018-02-23T00:19:05Z",
"updated_at": "2024-03-19T10:00:06Z",
"updated_at": "2024-04-03T16:29:19Z",
"pushed_at": "2018-11-13T00:26:18Z",
"stargazers_count": 241,
"watchers_count": 241,
"stargazers_count": 242,
"watchers_count": 242,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 241,
"watchers": 242,
"score": 0,
"subscribers_count": 15
}

View file

@ -3601,6 +3601,6 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2024-04-01T12:02:59Z",
"updated_at": "2024-04-03T17:53:24Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 782,
"watchers_count": 782,
"stargazers_count": 783,
"watchers_count": 783,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 67,
"watchers": 782,
"watchers": 783,
"score": 0,
"subscribers_count": 33
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-03-15T15:13:27Z",
"updated_at": "2024-03-19T02:48:57Z",
"pushed_at": "2023-03-16T01:20:58Z",
"pushed_at": "2024-04-03T16:28:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -78,10 +78,10 @@
"description": null,
"fork": false,
"created_at": "2020-05-04T08:01:37Z",
"updated_at": "2024-02-12T15:47:44Z",
"updated_at": "2024-04-03T12:48:12Z",
"pushed_at": "2020-05-04T08:11:21Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -90,7 +90,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 103,
"watchers": 104,
"score": 0,
"subscribers_count": 4
},

View file

@ -73,10 +73,10 @@
"description": "This is a fix POC CVE-2020-11651 & CVE-2020-11651",
"fork": false,
"created_at": "2024-01-17T04:15:16Z",
"updated_at": "2024-03-21T11:25:46Z",
"updated_at": "2024-04-03T14:40:38Z",
"pushed_at": "2024-01-17T04:26:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2024-04-02T17:40:54Z",
"updated_at": "2024-04-03T13:54:38Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1788,
"watchers_count": 1788,
"stargazers_count": 1787,
"watchers_count": 1787,
"has_discussions": false,
"forks_count": 581,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 581,
"watchers": 1788,
"watchers": 1787,
"score": 0,
"subscribers_count": 44
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
"fork": false,
"created_at": "2021-04-15T06:40:49Z",
"updated_at": "2023-11-17T08:47:56Z",
"updated_at": "2024-04-03T15:33:35Z",
"pushed_at": "2023-06-29T15:57:12Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "Collection of materials relating to FORCEDENTRY",
"fork": false,
"created_at": "2021-12-25T03:00:01Z",
"updated_at": "2024-04-01T22:53:11Z",
"updated_at": "2024-04-03T15:23:00Z",
"pushed_at": "2024-03-30T22:17:05Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 84,
"watchers": 86,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "Recursive MMIO VM Escape PoC",
"fork": false,
"created_at": "2022-05-13T05:33:28Z",
"updated_at": "2024-01-24T11:19:48Z",
"updated_at": "2024-04-03T15:19:39Z",
"pushed_at": "2022-05-13T05:37:41Z",
"stargazers_count": 161,
"watchers_count": 161,
"stargazers_count": 162,
"watchers_count": 162,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 161,
"watchers": 162,
"score": 0,
"subscribers_count": 7
}

View file

@ -369,10 +369,10 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2024-03-31T14:25:26Z",
"updated_at": "2024-04-03T13:54:38Z",
"pushed_at": "2023-05-11T11:29:46Z",
"stargazers_count": 1086,
"watchers_count": 1086,
"stargazers_count": 1085,
"watchers_count": 1085,
"has_discussions": false,
"forks_count": 524,
"allow_forking": true,
@ -383,7 +383,7 @@
],
"visibility": "public",
"forks": 524,
"watchers": 1086,
"watchers": 1085,
"score": 0,
"subscribers_count": 22
},
@ -857,10 +857,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2024-03-31T14:25:26Z",
"updated_at": "2024-04-03T13:57:37Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 922,
"watchers_count": 922,
"stargazers_count": 923,
"watchers_count": 923,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@ -889,7 +889,7 @@
],
"visibility": "public",
"forks": 140,
"watchers": 922,
"watchers": 923,
"score": 0,
"subscribers_count": 25
},
@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-04-01T13:27:40Z",
"updated_at": "2024-04-03T13:43:21Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1738,
"watchers_count": 1738,
"stargazers_count": 1739,
"watchers_count": 1739,
"has_discussions": false,
"forks_count": 514,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 514,
"watchers": 1738,
"watchers": 1739,
"score": 0,
"subscribers_count": 28
},
@ -3636,10 +3636,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2024-03-31T10:57:04Z",
"updated_at": "2024-04-03T13:54:38Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3344,
"watchers_count": 3344,
"stargazers_count": 3343,
"watchers_count": 3343,
"has_discussions": true,
"forks_count": 740,
"allow_forking": true,
@ -3648,7 +3648,7 @@
"topics": [],
"visibility": "public",
"forks": 740,
"watchers": 3344,
"watchers": 3343,
"score": 0,
"subscribers_count": 57
},
@ -4312,10 +4312,10 @@
"description": "Log4j CVE-2021-44228 examples: Remote Code Execution (through LDAP, RMI, ...), Forced DNS queries, ...",
"fork": false,
"created_at": "2021-12-13T13:08:03Z",
"updated_at": "2022-02-07T01:16:44Z",
"updated_at": "2024-04-03T13:54:38Z",
"pushed_at": "2021-12-21T11:12:40Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -4324,7 +4324,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -5493,10 +5493,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2024-03-25T16:39:03Z",
"updated_at": "2024-04-03T13:54:38Z",
"pushed_at": "2023-12-18T23:02:26Z",
"stargazers_count": 379,
"watchers_count": 379,
"stargazers_count": 378,
"watchers_count": 378,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -5511,7 +5511,7 @@
],
"visibility": "public",
"forks": 53,
"watchers": 379,
"watchers": 378,
"score": 0,
"subscribers_count": 12
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-20963 PoC (Android WorkSource parcel\/unparcel logic mismatch)",
"fork": false,
"created_at": "2023-06-12T10:44:59Z",
"updated_at": "2024-03-31T06:59:43Z",
"updated_at": "2024-04-03T12:47:44Z",
"pushed_at": "2023-07-27T08:58:10Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2024-04-02T17:40:44Z",
"updated_at": "2024-04-03T18:10:29Z",
"pushed_at": "2023-07-10T16:35:49Z",
"stargazers_count": 468,
"watchers_count": 468,
"stargazers_count": 469,
"watchers_count": 469,
"has_discussions": false,
"forks_count": 162,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 468,
"watchers": 469,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": "Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet",
"fork": false,
"created_at": "2023-09-01T20:16:28Z",
"updated_at": "2024-03-26T13:28:00Z",
"updated_at": "2024-04-03T13:14:56Z",
"pushed_at": "2024-02-12T03:18:54Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 72,
"watchers": 73,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-04-03T12:09:30Z",
"updated_at": "2024-04-03T16:11:23Z",
"pushed_at": "2024-03-31T22:00:43Z",
"stargazers_count": 327,
"watchers_count": 327,
"stargazers_count": 333,
"watchers_count": 333,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 327,
"watchers": 333,
"score": 0,
"subscribers_count": 5
},

32
2023/CVE-2023-46304.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 781611038,
"name": "CVE-2023-46304",
"full_name": "jselliott\/CVE-2023-46304",
"owner": {
"login": "jselliott",
"id": 13350778,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13350778?v=4",
"html_url": "https:\/\/github.com\/jselliott"
},
"html_url": "https:\/\/github.com\/jselliott\/CVE-2023-46304",
"description": "Authenticated Remote Code Execution in in VTiger Open Source CRM v7.5",
"fork": false,
"created_at": "2024-04-03T17:57:23Z",
"updated_at": "2024-04-03T18:15:17Z",
"pushed_at": "2024-04-03T18:14:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-4911 proof of concept",
"fork": false,
"created_at": "2023-10-04T14:32:49Z",
"updated_at": "2024-03-16T15:39:55Z",
"updated_at": "2024-04-03T15:26:02Z",
"pushed_at": "2023-10-08T23:24:24Z",
"stargazers_count": 162,
"watchers_count": 162,
"stargazers_count": 163,
"watchers_count": 163,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 162,
"watchers": 163,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,19 +13,19 @@
"description": "Proof of concept for Local Privilege Escalation in Thales Sentinel HASP LDK.",
"fork": false,
"created_at": "2024-02-27T15:25:58Z",
"updated_at": "2024-02-27T15:30:05Z",
"updated_at": "2024-04-03T16:18:00Z",
"pushed_at": "2024-02-27T15:30:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-03T11:53:02Z",
"updated_at": "2024-04-03T17:57:57Z",
"pushed_at": "2024-04-02T21:18:42Z",
"stargazers_count": 1287,
"watchers_count": 1287,
"stargazers_count": 1303,
"watchers_count": 1303,
"has_discussions": false,
"forks_count": 127,
"forks_count": 129,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,9 +30,39 @@
"poc"
],
"visibility": "public",
"forks": 127,
"watchers": 1287,
"forks": 129,
"watchers": 1303,
"score": 0,
"subscribers_count": 10
},
{
"id": 781477717,
"name": "docker-POC_CVE-2024-1086",
"full_name": "Alicey0719\/docker-POC_CVE-2024-1086",
"owner": {
"login": "Alicey0719",
"id": 54524362,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54524362?v=4",
"html_url": "https:\/\/github.com\/Alicey0719"
},
"html_url": "https:\/\/github.com\/Alicey0719\/docker-POC_CVE-2024-1086",
"description": null,
"fork": false,
"created_at": "2024-04-03T13:09:22Z",
"updated_at": "2024-04-03T13:11:47Z",
"pushed_at": "2024-04-03T14:08:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -284,7 +284,7 @@
"fork": false,
"created_at": "2024-04-03T11:45:19Z",
"updated_at": "2024-04-03T11:45:20Z",
"pushed_at": "2024-04-03T12:21:39Z",
"pushed_at": "2024-04-03T12:32:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -148,5 +148,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 781571050,
"name": "multicheck_CVE-2024-21762",
"full_name": "lore-is-already-taken\/multicheck_CVE-2024-21762",
"owner": {
"login": "lore-is-already-taken",
"id": 40778253,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40778253?v=4",
"html_url": "https:\/\/github.com\/lore-is-already-taken"
},
"html_url": "https:\/\/github.com\/lore-is-already-taken\/multicheck_CVE-2024-21762",
"description": null,
"fork": false,
"created_at": "2024-04-03T16:26:02Z",
"updated_at": "2024-04-03T16:48:52Z",
"pushed_at": "2024-04-03T18:14:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -103,10 +103,10 @@
"description": "aiohttp LFI (CVE-2024-23334)",
"fork": false,
"created_at": "2024-03-19T16:28:56Z",
"updated_at": "2024-03-27T02:17:05Z",
"updated_at": "2024-04-03T14:30:21Z",
"pushed_at": "2024-03-19T17:06:26Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
}

View file

@ -590,10 +590,10 @@
"description": "POC for CVE-2024-23897 Jenkins File-Read ",
"fork": false,
"created_at": "2024-02-16T07:16:04Z",
"updated_at": "2024-03-05T05:28:09Z",
"updated_at": "2024-04-03T14:30:02Z",
"pushed_at": "2024-02-17T16:39:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -602,7 +602,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Unauthenticated Remote Code Execution Bricks <= 1.9.6",
"fork": false,
"created_at": "2024-02-20T20:16:09Z",
"updated_at": "2024-04-02T00:55:16Z",
"updated_at": "2024-04-03T15:55:41Z",
"pushed_at": "2024-02-25T21:50:09Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 113,
"watchers": 114,
"score": 0,
"subscribers_count": 1
},

32
2024/CVE-2024-26198.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 781585194,
"name": "CVE-2024-26198-POC",
"full_name": "babywalkerenc\/CVE-2024-26198-POC",
"owner": {
"login": "babywalkerenc",
"id": 165937444,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165937444?v=4",
"html_url": "https:\/\/github.com\/babywalkerenc"
},
"html_url": "https:\/\/github.com\/babywalkerenc\/CVE-2024-26198-POC",
"description": "CVE-2024-26198 POC RCE Microsoft Exchange Server",
"fork": false,
"created_at": "2024-04-03T16:57:49Z",
"updated_at": "2024-04-03T18:03:53Z",
"pushed_at": "2024-04-03T17:36:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-27518.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 781492709,
"name": "CVE-2024-27518",
"full_name": "secunnix\/CVE-2024-27518",
"owner": {
"login": "secunnix",
"id": 104568161,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104568161?v=4",
"html_url": "https:\/\/github.com\/secunnix"
},
"html_url": "https:\/\/github.com\/secunnix\/CVE-2024-27518",
"description": "SUPERAntiSpyware Professional X <=10.0.1264 LPE Vulnerability PoC",
"fork": false,
"created_at": "2024-04-03T13:41:18Z",
"updated_at": "2024-04-03T13:42:31Z",
"pushed_at": "2024-04-03T14:14:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-27673.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 781524986,
"name": "CVE-2024-27673",
"full_name": "Alaatk\/CVE-2024-27673",
"owner": {
"login": "Alaatk",
"id": 21007805,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21007805?v=4",
"html_url": "https:\/\/github.com\/Alaatk"
},
"html_url": "https:\/\/github.com\/Alaatk\/CVE-2024-27673",
"description": "ASUS Control Center Express =< 01.06.15 - Unquoted Service Path",
"fork": false,
"created_at": "2024-04-03T14:47:20Z",
"updated_at": "2024-04-03T14:47:20Z",
"pushed_at": "2024-04-03T15:00:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-27674.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 781539000,
"name": "CVE-2024-27674",
"full_name": "Alaatk\/CVE-2024-27674",
"owner": {
"login": "Alaatk",
"id": 21007805,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21007805?v=4",
"html_url": "https:\/\/github.com\/Alaatk"
},
"html_url": "https:\/\/github.com\/Alaatk\/CVE-2024-27674",
"description": "Macro Expert <= 4.9.4 - Insecure Permissions Privilege Escalation",
"fork": false,
"created_at": "2024-04-03T15:16:09Z",
"updated_at": "2024-04-03T15:16:10Z",
"pushed_at": "2024-04-03T15:20:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,12 +13,12 @@
"description": "WallEscape vulnerability in util-linux",
"fork": false,
"created_at": "2024-03-11T00:15:03Z",
"updated_at": "2024-04-02T18:32:27Z",
"updated_at": "2024-04-03T15:17:05Z",
"pushed_at": "2024-03-30T01:32:02Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 6,
"watchers": 37,
"forks": 7,
"watchers": 38,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-28589.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 781546021,
"name": "CVE-2024-28589",
"full_name": "Alaatk\/CVE-2024-28589",
"owner": {
"login": "Alaatk",
"id": 21007805,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21007805?v=4",
"html_url": "https:\/\/github.com\/Alaatk"
},
"html_url": "https:\/\/github.com\/Alaatk\/CVE-2024-28589",
"description": "Local Privilege Escalation Vulnerability on Axigen for Windows",
"fork": false,
"created_at": "2024-04-03T15:31:02Z",
"updated_at": "2024-04-03T15:31:03Z",
"pushed_at": "2024-04-03T15:38:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
"fork": false,
"created_at": "2024-03-11T10:14:39Z",
"updated_at": "2024-04-03T12:17:07Z",
"updated_at": "2024-04-03T18:22:00Z",
"pushed_at": "2024-03-25T12:56:16Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 57,
"watchers": 61,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Information for CVE-2024-3094",
"fork": false,
"created_at": "2024-03-29T17:03:01Z",
"updated_at": "2024-04-03T06:18:43Z",
"updated_at": "2024-04-03T18:20:39Z",
"pushed_at": "2024-04-01T16:01:34Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 40,
"watchers": 42,
"score": 0,
"subscribers_count": 2
},
@ -387,10 +387,10 @@
"description": "A shell script designed to help users identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6) or upgrading to latest version.",
"fork": false,
"created_at": "2024-03-30T19:23:30Z",
"updated_at": "2024-04-02T14:13:24Z",
"updated_at": "2024-04-03T16:50:40Z",
"pushed_at": "2024-04-03T07:56:31Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -409,7 +409,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 2
},
@ -646,19 +646,19 @@
"description": null,
"fork": false,
"created_at": "2024-03-31T10:46:33Z",
"updated_at": "2024-04-03T10:51:38Z",
"pushed_at": "2024-04-02T16:10:59Z",
"stargazers_count": 15,
"watchers_count": 15,
"updated_at": "2024-04-03T16:13:17Z",
"pushed_at": "2024-04-03T15:46:41Z",
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"forks": 6,
"watchers": 16,
"score": 0,
"subscribers_count": 2
},
@ -1006,19 +1006,19 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-04-03T12:29:38Z",
"updated_at": "2024-04-03T18:29:40Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 1799,
"watchers_count": 1799,
"stargazers_count": 2214,
"watchers_count": 2214,
"has_discussions": false,
"forks_count": 106,
"forks_count": 127,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 106,
"watchers": 1799,
"forks": 127,
"watchers": 2214,
"score": 0,
"subscribers_count": 14
},
@ -1096,10 +1096,10 @@
"description": "XZ Backdoor Extract(Test on Ubuntu 23.10)",
"fork": false,
"created_at": "2024-04-01T16:08:50Z",
"updated_at": "2024-04-03T11:45:12Z",
"updated_at": "2024-04-03T18:29:05Z",
"pushed_at": "2024-04-02T07:12:53Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -1113,7 +1113,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
@ -1281,10 +1281,10 @@
"description": "Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094",
"fork": false,
"created_at": "2024-04-02T20:07:14Z",
"updated_at": "2024-04-03T08:16:40Z",
"updated_at": "2024-04-03T16:40:17Z",
"pushed_at": "2024-04-02T20:34:30Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1293,7 +1293,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -1311,8 +1311,8 @@
"description": "apocalypxze: xz backdoor (2024) AKA CVE-2024-3094 related links",
"fork": false,
"created_at": "2024-04-02T20:17:07Z",
"updated_at": "2024-04-03T00:52:23Z",
"pushed_at": "2024-04-03T12:15:14Z",
"updated_at": "2024-04-03T15:52:48Z",
"pushed_at": "2024-04-03T17:47:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -1320,7 +1320,11 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"apocalypxze",
"cve-2024-3094",
"xz-utils-backdoor"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
@ -1402,7 +1406,7 @@
"fork": false,
"created_at": "2024-04-03T10:50:47Z",
"updated_at": "2024-04-03T11:59:50Z",
"pushed_at": "2024-04-03T11:33:03Z",
"pushed_at": "2024-04-03T13:05:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -1416,5 +1420,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 781477807,
"name": "xz-backdoor-CVE-2024-3094-Check",
"full_name": "Bella-Bc\/xz-backdoor-CVE-2024-3094-Check",
"owner": {
"login": "Bella-Bc",
"id": 10534659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10534659?v=4",
"html_url": "https:\/\/github.com\/Bella-Bc"
},
"html_url": "https:\/\/github.com\/Bella-Bc\/xz-backdoor-CVE-2024-3094-Check",
"description": "Verify if your installed version of xz-utils is vulnerable to CVE-2024-3094 backdoor",
"fork": false,
"created_at": "2024-04-03T13:09:32Z",
"updated_at": "2024-04-03T14:39:09Z",
"pushed_at": "2024-04-03T14:02:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -83,6 +83,7 @@
</code>
- [Notselwyn/CVE-2024-1086](https://github.com/Notselwyn/CVE-2024-1086)
- [Alicey0719/docker-POC_CVE-2024-1086](https://github.com/Alicey0719/docker-POC_CVE-2024-1086)
### CVE-2024-1208 (2024-02-05)
@ -279,6 +280,7 @@
- [CyberGuard-Foundation/CVE-2024-3094](https://github.com/CyberGuard-Foundation/CVE-2024-3094)
- [Security-Phoenix-demo/CVE-2024-3094-fix-exploits](https://github.com/Security-Phoenix-demo/CVE-2024-3094-fix-exploits)
- [MagpieRYL/CVE-2024-3094-backdoor-env-container](https://github.com/MagpieRYL/CVE-2024-3094-backdoor-env-container)
- [Bella-Bc/xz-backdoor-CVE-2024-3094-Check](https://github.com/Bella-Bc/xz-backdoor-CVE-2024-3094-Check)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -422,6 +424,7 @@
- [h4x0r-dz/CVE-2024-21762](https://github.com/h4x0r-dz/CVE-2024-21762)
- [r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check](https://github.com/r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check)
- [d0rb/CVE-2024-21762](https://github.com/d0rb/CVE-2024-21762)
- [lore-is-already-taken/multicheck_CVE-2024-21762](https://github.com/lore-is-already-taken/multicheck_CVE-2024-21762)
### CVE-2024-21887 (2024-01-12)
@ -996,6 +999,13 @@
- [0xNslabs/CVE-2024-25832-PoC](https://github.com/0xNslabs/CVE-2024-25832-PoC)
### CVE-2024-26198 (2024-03-12)
<code>Microsoft Exchange Server Remote Code Execution Vulnerability
</code>
- [babywalkerenc/CVE-2024-26198-POC](https://github.com/babywalkerenc/CVE-2024-26198-POC)
### CVE-2024-26475 (2024-03-14)
<code>An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function.
@ -1040,6 +1050,9 @@
- [K3ysTr0K3R/CVE-2024-27198-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-27198-EXPLOIT)
- [Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-](https://github.com/Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-)
### CVE-2024-27518
- [secunnix/CVE-2024-27518](https://github.com/secunnix/CVE-2024-27518)
### CVE-2024-27619 (-)
<code>Dlink Dir-3040us A1 1.20b03a hotfix is vulnerable to Buffer Overflow. Any user having read/write access to ftp server can write directly to ram causing buffer overflow if file or files uploaded are greater than available ram. Ftp server allows change of directory to root which is one level up than root of usb flash directory. During upload ram is getting filled and causing system resource exhaustion (no free memory) which causes system to crash and reboot.
@ -1050,6 +1063,16 @@
### CVE-2024-27665
- [Thirukrishnan/CVE-2024-27665](https://github.com/Thirukrishnan/CVE-2024-27665)
### CVE-2024-27673
- [Alaatk/CVE-2024-27673](https://github.com/Alaatk/CVE-2024-27673)
### CVE-2024-27674 (-)
<code>Macro Expert through 4.9.4 allows BUILTIN\Users:(OI)(CI)(M) access to the &quot;%PROGRAMFILES(X86)%\GrassSoft\Macro Expert&quot; folder and thus an unprivileged user can escalate to SYSTEM by replacing the MacroService.exe binary.
</code>
- [Alaatk/CVE-2024-27674](https://github.com/Alaatk/CVE-2024-27674)
### CVE-2024-27697
- [SanjinDedic/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697](https://github.com/SanjinDedic/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697)
@ -1098,6 +1121,13 @@
- [heshi906/CVE-2024-28515](https://github.com/heshi906/CVE-2024-28515)
### CVE-2024-28589 (-)
<code>An issue was discovered in Axigen Mail Server for Windows versions 10.5.18 and before, allows local low-privileged attackers to execute arbitrary code and escalate privileges via insecure DLL loading from a world-writable directory during service initialization.
</code>
- [Alaatk/CVE-2024-28589](https://github.com/Alaatk/CVE-2024-28589)
### CVE-2024-28715 (2024-03-19)
<code>Cross Site Scripting vulnerability in DOraCMS v.2.18 and before allows a remote attacker to execute arbitrary code via the markdown0 function in the /app/public/apidoc/oas3/wrap-components/markdown.jsx endpoint.
@ -7366,6 +7396,9 @@
- [0x1717/ssrf-via-img](https://github.com/0x1717/ssrf-via-img)
### CVE-2023-46304
- [jselliott/CVE-2023-46304](https://github.com/jselliott/CVE-2023-46304)
### CVE-2023-46344 (2024-02-01)
<code>A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&amp;b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks.