Auto Update 2024/07/05 18:28:52

This commit is contained in:
motikan2010-bot 2024-07-06 03:28:52 +09:00
parent 30ab255686
commit f0a02ec28b
58 changed files with 534 additions and 208 deletions

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)",
"fork": false,
"created_at": "2021-12-10T16:06:46Z",
"updated_at": "2024-05-13T14:42:41Z",
"updated_at": "2024-07-05T16:20:15Z",
"pushed_at": "2022-05-03T10:37:18Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "PoC + Docker Environment for Python PIL\/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509",
"fork": false,
"created_at": "2018-10-15T07:44:43Z",
"updated_at": "2024-02-20T09:23:04Z",
"updated_at": "2024-07-05T17:31:44Z",
"pushed_at": "2021-01-06T01:11:32Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 59,
"watchers": 58,
"score": 0,
"subscribers_count": 2
},

View file

@ -357,10 +357,10 @@
"description": "Exploit to trigger RCE for CVE-2018-16763 on FuelCMS <= 1.4.1 and interactive shell. ",
"fork": false,
"created_at": "2022-05-31T15:31:37Z",
"updated_at": "2024-06-25T09:35:19Z",
"updated_at": "2024-07-05T16:19:59Z",
"pushed_at": "2022-06-01T20:45:02Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -374,7 +374,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,8 +43,8 @@
"description": "A tool for retrieving login credentials from Netwave IP cameras using a memory dump vulnerability (CVE-2018-17240)",
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-07-04T15:39:26Z",
"pushed_at": "2024-07-05T08:50:36Z",
"updated_at": "2024-07-05T15:02:52Z",
"pushed_at": "2024-07-05T15:02:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -2612,7 +2612,7 @@
"subscribers_count": 1
},
{
"id": 824447804,
"id": 824678662,
"name": "CVE-2018-6574",
"full_name": "athulmur\/CVE-2018-6574",
"owner": {
@ -2622,11 +2622,11 @@
"html_url": "https:\/\/github.com\/athulmur"
},
"html_url": "https:\/\/github.com\/athulmur\/CVE-2018-6574",
"description": null,
"description": "A POC to demonstrate CVE-2018-6574",
"fork": false,
"created_at": "2024-07-05T06:48:11Z",
"updated_at": "2024-07-05T11:12:53Z",
"pushed_at": "2024-07-05T11:12:50Z",
"created_at": "2024-07-05T17:06:18Z",
"updated_at": "2024-07-05T17:06:18Z",
"pushed_at": "2024-07-05T17:06:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2019-11-12T14:47:25Z",
"updated_at": "2023-08-09T21:34:18Z",
"updated_at": "2024-07-05T17:31:57Z",
"pushed_at": "2019-11-12T14:54:10Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 11,
"score": 0,
"subscribers_count": 2
}

View file

@ -724,7 +724,7 @@
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -737,7 +737,7 @@
"redteam-tools"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 13,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
"fork": false,
"created_at": "2022-03-08T17:14:27Z",
"updated_at": "2024-03-20T14:28:07Z",
"updated_at": "2024-07-05T16:20:13Z",
"pushed_at": "2022-05-03T10:40:14Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 2
}

View file

@ -103,10 +103,10 @@
"description": "CVE-2020-8813 - RCE through graph_realtime.php in Cacti 1.2.8",
"fork": false,
"created_at": "2022-09-30T11:23:52Z",
"updated_at": "2023-06-08T16:39:23Z",
"updated_at": "2024-07-05T16:18:13Z",
"pushed_at": "2024-03-16T08:25:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
"fork": false,
"created_at": "2022-01-29T10:14:32Z",
"updated_at": "2024-07-05T12:08:57Z",
"updated_at": "2024-07-05T15:48:43Z",
"pushed_at": "2022-03-03T17:50:03Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 102,
"watchers_count": 102,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 100,
"watchers": 102,
"score": 0,
"subscribers_count": 5
}

View file

@ -301,7 +301,7 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2024-07-05T08:17:00Z",
"updated_at": "2024-07-05T12:57:47Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 980,
"watchers_count": 980,

View file

@ -13,10 +13,10 @@
"description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false,
"created_at": "2021-03-22T11:53:57Z",
"updated_at": "2024-04-09T12:36:00Z",
"updated_at": "2024-07-05T17:32:23Z",
"pushed_at": "2021-03-22T18:24:20Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 165,
"watchers_count": 165,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -40,7 +40,7 @@
],
"visibility": "public",
"forks": 29,
"watchers": 166,
"watchers": 165,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "A path traversal in smbserver.py allows an attacker to read\/write arbitrary files on the server.",
"fork": false,
"created_at": "2022-08-28T19:04:46Z",
"updated_at": "2023-06-03T03:56:18Z",
"updated_at": "2024-07-05T16:19:36Z",
"pushed_at": "2023-01-19T11:06:33Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},

View file

@ -109,7 +109,7 @@
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
"fork": false,
"created_at": "2021-07-03T15:15:12Z",
"updated_at": "2024-07-04T15:41:02Z",
"updated_at": "2024-07-05T12:57:49Z",
"pushed_at": "2021-09-13T12:12:17Z",
"stargazers_count": 116,
"watchers_count": 116,

View file

@ -133,10 +133,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2024-07-05T03:38:26Z",
"updated_at": "2024-07-05T18:16:40Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -148,7 +148,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 129,
"watchers": 130,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "POC to test the BootROM vulnerability found in LPC55S69 and K82 Series ",
"fork": false,
"created_at": "2021-11-24T01:34:47Z",
"updated_at": "2023-03-15T10:01:19Z",
"updated_at": "2024-07-05T17:03:44Z",
"pushed_at": "2023-02-18T19:00:03Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "A PoC exploit for CVE-2021-4191 - GitLab User Enumeration.",
"fork": false,
"created_at": "2023-07-22T21:06:51Z",
"updated_at": "2024-04-24T15:52:38Z",
"updated_at": "2024-07-05T14:52:36Z",
"pushed_at": "2023-08-09T10:41:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability ",
"fork": false,
"created_at": "2021-12-13T17:26:49Z",
"updated_at": "2024-06-17T00:40:41Z",
"updated_at": "2024-07-05T16:18:12Z",
"pushed_at": "2024-03-16T08:25:52Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 75,
"watchers": 76,
"score": 0,
"subscribers_count": 3
}

View file

@ -1966,10 +1966,10 @@
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2024-05-27T00:43:09Z",
"updated_at": "2024-07-05T15:13:36Z",
"pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 631,
"watchers_count": 631,
"stargazers_count": 632,
"watchers_count": 632,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
@ -1990,7 +1990,7 @@
],
"visibility": "public",
"forks": 98,
"watchers": 631,
"watchers": 632,
"score": 0,
"subscribers_count": 28
},

View file

@ -153,10 +153,10 @@
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
"fork": false,
"created_at": "2022-01-17T15:42:37Z",
"updated_at": "2024-06-29T08:44:53Z",
"updated_at": "2024-07-05T16:18:11Z",
"pushed_at": "2024-03-16T08:26:06Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -172,7 +172,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 77,
"watchers": 78,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "A python exploit to automatically dump all the data stored by the auto-completion plugin of Ametys CMS to a local sqlite database file. ",
"fork": false,
"created_at": "2022-02-21T19:59:11Z",
"updated_at": "2024-04-06T08:24:24Z",
"updated_at": "2024-07-05T16:20:09Z",
"pushed_at": "2022-05-03T10:40:26Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-30780 - lighttpd remote denial of service",
"fork": false,
"created_at": "2022-05-18T12:01:17Z",
"updated_at": "2024-04-15T07:34:21Z",
"updated_at": "2024-07-05T16:18:10Z",
"pushed_at": "2024-03-16T08:26:24Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.",
"fork": false,
"created_at": "2022-08-11T11:47:17Z",
"updated_at": "2024-05-10T10:46:46Z",
"updated_at": "2024-07-05T16:19:45Z",
"pushed_at": "2022-08-23T15:57:41Z",
"stargazers_count": 107,
"watchers_count": 107,
"stargazers_count": 108,
"watchers_count": 108,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 107,
"watchers": 108,
"score": 0,
"subscribers_count": 3
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 274,
"watchers_count": 274,
"has_discussions": false,
"forks_count": 38,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"forks": 39,
"watchers": 274,
"score": 0,
"subscribers_count": 5

View file

@ -43,10 +43,10 @@
"description": "Zimbra <9.0.0.p27 RCE",
"fork": false,
"created_at": "2022-11-11T20:58:08Z",
"updated_at": "2024-05-11T19:14:13Z",
"updated_at": "2024-07-05T17:32:22Z",
"pushed_at": "2022-11-24T14:59:35Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -62,7 +62,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 102,
"watchers": 101,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Pwndoc local file inclusion to remote code execution of Node.js code on the server",
"fork": false,
"created_at": "2022-12-13T10:03:14Z",
"updated_at": "2024-06-18T12:53:42Z",
"updated_at": "2024-07-05T16:19:25Z",
"pushed_at": "2023-09-14T20:19:41Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 2
},

View file

@ -687,13 +687,13 @@
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 36,
"score": 0,
"subscribers_count": 3

32
2023/CVE-2023-20945.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 824635242,
"name": "CVE-2023-20945",
"full_name": "Ailenchick\/CVE-2023-20945",
"owner": {
"login": "Ailenchick",
"id": 71263121,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71263121?v=4",
"html_url": "https:\/\/github.com\/Ailenchick"
},
"html_url": "https:\/\/github.com\/Ailenchick\/CVE-2023-20945",
"description": null,
"fork": false,
"created_at": "2024-07-05T15:03:40Z",
"updated_at": "2024-07-05T15:07:42Z",
"pushed_at": "2024-07-05T15:07:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -58,5 +58,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824634694,
"name": "CVE-2023-20963",
"full_name": "Ailenchick\/CVE-2023-20963",
"owner": {
"login": "Ailenchick",
"id": 71263121,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71263121?v=4",
"html_url": "https:\/\/github.com\/Ailenchick"
},
"html_url": "https:\/\/github.com\/Ailenchick\/CVE-2023-20963",
"description": null,
"fork": false,
"created_at": "2024-07-05T15:02:07Z",
"updated_at": "2024-07-05T15:15:12Z",
"pushed_at": "2024-07-05T15:02:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -58,5 +58,35 @@
"watchers": 102,
"score": 0,
"subscribers_count": 5
},
{
"id": 824610391,
"name": "CVE-2023-27532-RCE-Only",
"full_name": "puckiestyle\/CVE-2023-27532-RCE-Only",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2023-27532-RCE-Only",
"description": null,
"fork": false,
"created_at": "2024-07-05T14:00:48Z",
"updated_at": "2024-07-05T14:07:57Z",
"pushed_at": "2024-07-05T14:07:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "Exploit for file upload vulnerability in BoidCMS version <=2.0.0",
"fork": false,
"created_at": "2023-08-16T14:30:30Z",
"updated_at": "2024-06-23T10:35:19Z",
"pushed_at": "2024-06-23T10:35:16Z",
"updated_at": "2024-07-05T18:17:10Z",
"pushed_at": "2024-07-05T18:17:07Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -223,5 +223,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824689719,
"name": "CVE-2023-42793",
"full_name": "HusenjanDev\/CVE-2023-42793",
"owner": {
"login": "HusenjanDev",
"id": 88688451,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88688451?v=4",
"html_url": "https:\/\/github.com\/HusenjanDev"
},
"html_url": "https:\/\/github.com\/HusenjanDev\/CVE-2023-42793",
"description": "TeamCity RCE for Linux (CVE-2023-42793)",
"fork": false,
"created_at": "2024-07-05T17:39:25Z",
"updated_at": "2024-07-05T17:48:29Z",
"pushed_at": "2024-07-05T17:48:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-07-04T20:27:27Z",
"pushed_at": "2024-07-05T12:28:57Z",
"stargazers_count": 952,
"watchers_count": 952,
"updated_at": "2024-07-05T18:17:52Z",
"pushed_at": "2024-07-05T12:35:27Z",
"stargazers_count": 954,
"watchers_count": 954,
"has_discussions": false,
"forks_count": 162,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 952,
"watchers": 954,
"score": 0,
"subscribers_count": 15
},

View file

@ -48,7 +48,7 @@
"stargazers_count": 200,
"watchers_count": 200,
"has_discussions": false,
"forks_count": 45,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -60,7 +60,7 @@
"redteam"
],
"visibility": "public",
"forks": 45,
"forks": 46,
"watchers": 200,
"score": 0,
"subscribers_count": 2

View file

@ -18,7 +18,7 @@
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"sysaid"
],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 52,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
"fork": false,
"created_at": "2024-06-18T09:22:59Z",
"updated_at": "2024-07-05T09:55:36Z",
"updated_at": "2024-07-05T15:30:38Z",
"pushed_at": "2024-06-18T09:35:44Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 27,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"screenconnect"
],
"visibility": "public",
"forks": 27,
"forks": 28,
"watchers": 91,
"score": 0,
"subscribers_count": 4

View file

@ -48,7 +48,7 @@
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 28,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -58,7 +58,7 @@
"redteam"
],
"visibility": "public",
"forks": 28,
"forks": 27,
"watchers": 113,
"score": 0,
"subscribers_count": 1

View file

@ -18,7 +18,7 @@
"stargazers_count": 97,
"watchers_count": 97,
"has_discussions": false,
"forks_count": 19,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,7 +28,7 @@
"zabbix"
],
"visibility": "public",
"forks": 19,
"forks": 20,
"watchers": 97,
"score": 0,
"subscribers_count": 1

View file

@ -48,13 +48,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1

View file

@ -103,10 +103,10 @@
"description": "CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. ",
"fork": false,
"created_at": "2024-01-26T19:00:03Z",
"updated_at": "2024-06-10T13:50:20Z",
"updated_at": "2024-07-05T15:23:49Z",
"pushed_at": "2024-02-29T12:13:21Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 3
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 29,
"score": 0,
"subscribers_count": 2
@ -81,7 +81,7 @@
"stargazers_count": 127,
"watchers_count": 127,
"has_discussions": false,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -97,7 +97,7 @@
"teamcity"
],
"visibility": "public",
"forks": 32,
"forks": 33,
"watchers": 127,
"score": 0,
"subscribers_count": 3

View file

@ -78,13 +78,13 @@
"stargazers_count": 303,
"watchers_count": 303,
"has_discussions": false,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"forks": 33,
"watchers": 303,
"score": 0,
"subscribers_count": 8

View file

@ -18,13 +18,13 @@
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 27,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-24T10:37:26Z",
"updated_at": "2024-07-05T06:53:36Z",
"updated_at": "2024-07-05T16:52:50Z",
"pushed_at": "2024-06-24T11:16:26Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 150,
"watchers_count": 150,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 148,
"watchers": 150,
"score": 0,
"subscribers_count": 1
},
@ -58,5 +58,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 824657284,
"name": "CVE-2024-30088-Windows-poc",
"full_name": "Zombie-Kaiser\/CVE-2024-30088-Windows-poc",
"owner": {
"login": "Zombie-Kaiser",
"id": 141570642,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141570642?v=4",
"html_url": "https:\/\/github.com\/Zombie-Kaiser"
},
"html_url": "https:\/\/github.com\/Zombie-Kaiser\/CVE-2024-30088-Windows-poc",
"description": "该漏洞存在于 NtQueryInformationToken 函数中特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。",
"fork": false,
"created_at": "2024-07-05T16:02:56Z",
"updated_at": "2024-07-05T16:06:36Z",
"pushed_at": "2024-07-05T16:06:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "A tool for vulnerability detection and exploitation tool for CVE-2024-31982 ",
"fork": false,
"created_at": "2024-06-22T17:04:02Z",
"updated_at": "2024-06-23T16:15:33Z",
"updated_at": "2024-07-05T14:59:32Z",
"pushed_at": "2024-06-22T19:31:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,12 +73,12 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-07-05T02:36:29Z",
"updated_at": "2024-07-05T14:13:42Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 460,
"watchers_count": 460,
"stargazers_count": 461,
"watchers_count": 461,
"has_discussions": false,
"forks_count": 134,
"forks_count": 135,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -89,8 +89,8 @@
"rce"
],
"visibility": "public",
"forks": 134,
"watchers": 460,
"forks": 135,
"watchers": 461,
"score": 0,
"subscribers_count": 3
},

View file

@ -288,13 +288,13 @@
"stargazers_count": 141,
"watchers_count": 141,
"has_discussions": false,
"forks_count": 22,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"forks": 23,
"watchers": 141,
"score": 0,
"subscribers_count": 1
@ -318,13 +318,13 @@
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 73,
"score": 0,
"subscribers_count": 3

View file

@ -163,10 +163,10 @@
"description": "CosmicSting (CVE-2024-34102)",
"fork": false,
"created_at": "2024-06-28T23:33:21Z",
"updated_at": "2024-07-05T12:27:07Z",
"updated_at": "2024-07-05T16:26:37Z",
"pushed_at": "2024-06-28T23:34:43Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 14,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.",
"fork": false,
"created_at": "2024-07-04T13:19:47Z",
"updated_at": "2024-07-05T10:49:18Z",
"updated_at": "2024-07-05T16:38:50Z",
"pushed_at": "2024-07-04T19:18:04Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 13,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},
@ -58,5 +58,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 824643210,
"name": "CVE-2024-36401",
"full_name": "RevoltSecurities\/CVE-2024-36401",
"owner": {
"login": "RevoltSecurities",
"id": 119435129,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119435129?v=4",
"html_url": "https:\/\/github.com\/RevoltSecurities"
},
"html_url": "https:\/\/github.com\/RevoltSecurities\/CVE-2024-36401",
"description": "Exploiter a Vulnerability detection and Exploitation tool for GeoServer Unauthenticated Remote Code Execution CVE-2024-36401.",
"fork": false,
"created_at": "2024-07-05T15:24:50Z",
"updated_at": "2024-07-05T15:33:12Z",
"pushed_at": "2024-07-05T15:33:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-07-03T07:26:07Z",
"updated_at": "2024-07-05T09:24:57Z",
"updated_at": "2024-07-05T16:34:29Z",
"pushed_at": "2024-07-04T04:23:40Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 20,
"watchers": 22,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-37770.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 824660920,
"name": "CVE-2024-37770",
"full_name": "k3ppf0r\/CVE-2024-37770",
"owner": {
"login": "k3ppf0r",
"id": 63085409,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63085409?v=4",
"html_url": "https:\/\/github.com\/k3ppf0r"
},
"html_url": "https:\/\/github.com\/k3ppf0r\/CVE-2024-37770",
"description": "CVE-2024-37770",
"fork": false,
"created_at": "2024-07-05T16:13:34Z",
"updated_at": "2024-07-05T16:25:35Z",
"pushed_at": "2024-07-05T16:25:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "CVE-2024-39943 rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js).",
"fork": false,
"created_at": "2024-07-05T06:46:34Z",
"updated_at": "2024-07-05T10:09:51Z",
"updated_at": "2024-07-05T15:51:50Z",
"pushed_at": "2024-07-05T06:51:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 0
}

View file

@ -358,10 +358,10 @@
"description": "CVE-2024-4040 PoC",
"fork": false,
"created_at": "2024-07-05T05:46:56Z",
"updated_at": "2024-07-05T11:53:45Z",
"updated_at": "2024-07-05T17:01:56Z",
"pushed_at": "2024-07-05T11:53:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -374,7 +374,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -1189,5 +1189,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824582405,
"name": "CVE-2024-4577",
"full_name": "cybersagor\/CVE-2024-4577",
"owner": {
"login": "cybersagor",
"id": 132956845,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132956845?v=4",
"html_url": "https:\/\/github.com\/cybersagor"
},
"html_url": "https:\/\/github.com\/cybersagor\/CVE-2024-4577",
"description": "CVE-2024-4577 Exploits",
"fork": false,
"created_at": "2024-07-05T12:47:44Z",
"updated_at": "2024-07-05T16:43:53Z",
"pushed_at": "2024-07-05T16:43:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -56,19 +56,19 @@
"description": "a signal handler race condition in OpenSSH's server (sshd)",
"fork": false,
"created_at": "2024-07-01T10:55:29Z",
"updated_at": "2024-07-05T09:17:44Z",
"updated_at": "2024-07-05T13:08:46Z",
"pushed_at": "2024-07-01T10:54:02Z",
"stargazers_count": 396,
"watchers_count": 396,
"stargazers_count": 397,
"watchers_count": 397,
"has_discussions": false,
"forks_count": 177,
"forks_count": 178,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 177,
"watchers": 396,
"forks": 178,
"watchers": 397,
"score": 0,
"subscribers_count": 5
},
@ -86,10 +86,10 @@
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:16:21Z",
"updated_at": "2024-07-05T07:01:45Z",
"updated_at": "2024-07-05T18:01:51Z",
"pushed_at": "2024-07-01T12:25:01Z",
"stargazers_count": 359,
"watchers_count": 359,
"stargazers_count": 360,
"watchers_count": 360,
"has_discussions": false,
"forks_count": 80,
"allow_forking": true,
@ -98,7 +98,7 @@
"topics": [],
"visibility": "public",
"forks": 80,
"watchers": 359,
"watchers": 360,
"score": 0,
"subscribers_count": 6
},
@ -116,10 +116,10 @@
"description": "32-bit PoC for CVE-2024-6387 \"regreSSHion\" -- mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:26:40Z",
"updated_at": "2024-07-05T10:07:39Z",
"updated_at": "2024-07-05T13:54:38Z",
"pushed_at": "2024-07-01T14:16:36Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 84,
"watchers": 85,
"score": 0,
"subscribers_count": 3
},
@ -303,12 +303,12 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-07-05T11:48:31Z",
"updated_at": "2024-07-05T17:46:02Z",
"pushed_at": "2024-07-05T11:14:02Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 324,
"watchers_count": 324,
"has_discussions": false,
"forks_count": 66,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -320,8 +320,8 @@
"redteam"
],
"visibility": "public",
"forks": 66,
"watchers": 321,
"forks": 67,
"watchers": 324,
"score": 0,
"subscribers_count": 3
},
@ -370,17 +370,17 @@
"fork": false,
"created_at": "2024-07-01T22:53:32Z",
"updated_at": "2024-07-03T16:47:03Z",
"pushed_at": "2024-07-02T17:30:06Z",
"pushed_at": "2024-07-05T15:34:34Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
@ -1500,10 +1500,10 @@
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) ",
"fork": false,
"created_at": "2024-07-02T18:32:46Z",
"updated_at": "2024-07-05T09:35:40Z",
"pushed_at": "2024-07-04T08:54:03Z",
"stargazers_count": 27,
"watchers_count": 27,
"updated_at": "2024-07-05T15:19:31Z",
"pushed_at": "2024-07-05T15:19:28Z",
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -1521,7 +1521,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 27,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},
@ -2044,10 +2044,10 @@
"description": null,
"fork": false,
"created_at": "2024-07-04T13:28:53Z",
"updated_at": "2024-07-04T13:36:00Z",
"updated_at": "2024-07-05T13:30:06Z",
"pushed_at": "2024-07-04T13:35:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -2056,7 +2056,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -2144,10 +2144,10 @@
"description": "HASSH fingerprints for identifying OpenSSH servers potentially vulnerable to CVE-2024-6387 (regreSSHion).",
"fork": false,
"created_at": "2024-07-05T02:46:57Z",
"updated_at": "2024-07-05T05:20:56Z",
"updated_at": "2024-07-05T15:29:53Z",
"pushed_at": "2024-07-05T03:40:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -2156,7 +2156,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
@ -2249,5 +2249,65 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 824639761,
"name": "CVE-2024-6387-Finder",
"full_name": "SiberianHacker\/CVE-2024-6387-Finder",
"owner": {
"login": "SiberianHacker",
"id": 115571334,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115571334?v=4",
"html_url": "https:\/\/github.com\/SiberianHacker"
},
"html_url": "https:\/\/github.com\/SiberianHacker\/CVE-2024-6387-Finder",
"description": "CVE-2024-6387 SSH finder",
"fork": false,
"created_at": "2024-07-05T15:15:41Z",
"updated_at": "2024-07-05T15:22:29Z",
"pushed_at": "2024-07-05T15:22:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 824676344,
"name": "patch_regreSSHion",
"full_name": "dgicloud\/patch_regreSSHion",
"owner": {
"login": "dgicloud",
"id": 85541525,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85541525?v=4",
"html_url": "https:\/\/github.com\/dgicloud"
},
"html_url": "https:\/\/github.com\/dgicloud\/patch_regreSSHion",
"description": "Correção e Atualização do OpenSSH para CVE-2024-6387",
"fork": false,
"created_at": "2024-07-05T16:59:19Z",
"updated_at": "2024-07-05T16:59:55Z",
"pushed_at": "2024-07-05T16:59:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -737,6 +737,7 @@
- [olebris/CVE-2024-4577](https://github.com/olebris/CVE-2024-4577)
- [AlperenY-cs/CVE-2024-4577](https://github.com/AlperenY-cs/CVE-2024-4577)
- [charis3306/CVE-2024-4577](https://github.com/charis3306/CVE-2024-4577)
- [cybersagor/CVE-2024-4577](https://github.com/cybersagor/CVE-2024-4577)
### CVE-2024-4701 (2024-05-10)
@ -950,6 +951,8 @@
- [Segurmatica/CVE-2024-6387-CHECK](https://github.com/Segurmatica/CVE-2024-6387-CHECK)
- [sardine-web/CVE-2024-6387-template](https://github.com/sardine-web/CVE-2024-6387-template)
- [imv7/CVE-2024-6387](https://github.com/imv7/CVE-2024-6387)
- [SiberianHacker/CVE-2024-6387-Finder](https://github.com/SiberianHacker/CVE-2024-6387-Finder)
- [dgicloud/patch_regreSSHion](https://github.com/dgicloud/patch_regreSSHion)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -2526,6 +2529,7 @@
- [tykawaii98/CVE-2024-30088](https://github.com/tykawaii98/CVE-2024-30088)
- [NextGenPentesters/CVE-2024-30088-](https://github.com/NextGenPentesters/CVE-2024-30088-)
- [Zombie-Kaiser/CVE-2024-30088-Windows-poc](https://github.com/Zombie-Kaiser/CVE-2024-30088-Windows-poc)
### CVE-2024-30212 (2024-05-28)
@ -3134,6 +3138,7 @@
- [bigb0x/CVE-2024-36401](https://github.com/bigb0x/CVE-2024-36401)
- [Niuwoo/CVE-2024-36401](https://github.com/Niuwoo/CVE-2024-36401)
- [RevoltSecurities/CVE-2024-36401](https://github.com/RevoltSecurities/CVE-2024-36401)
### CVE-2024-36416 (2024-06-10)
@ -3234,6 +3239,9 @@
- [Atreb92/cve-2024-37765](https://github.com/Atreb92/cve-2024-37765)
### CVE-2024-37770
- [k3ppf0r/CVE-2024-37770](https://github.com/k3ppf0r/CVE-2024-37770)
### CVE-2024-37791 (2024-06-18)
<code>DuxCMS3 v3.1.3 was discovered to contain a SQL injection vulnerability via the keyword parameter at /article/Content/index?class_id.
@ -3279,7 +3287,11 @@
### CVE-2024-39203
- [5r1an/CVE-2024-39203](https://github.com/5r1an/CVE-2024-39203)
### CVE-2024-39210
### CVE-2024-39210 (2024-07-05)
<code>Best House Rental Management System v1.0 was discovered to contain an arbitrary file read vulnerability via the Page parameter at index.php. This vulnerability allows attackers to read arbitrary PHP files and access other sensitive information within the application.
</code>
- [KRookieSec/CVE-2024-39210](https://github.com/KRookieSec/CVE-2024-39210)
### CVE-2024-39211 (2024-07-04)
@ -4913,6 +4925,13 @@
- [Trinadh465/frameworks_base_CVE-2023-20944](https://github.com/Trinadh465/frameworks_base_CVE-2023-20944)
- [hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2023-20944](https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2023-20944)
### CVE-2023-20945 (2023-02-28)
<code>In phNciNfc_MfCreateXchgDataHdr of phNxpExtns_MifareStd.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-246932269
</code>
- [Ailenchick/CVE-2023-20945](https://github.com/Ailenchick/CVE-2023-20945)
### CVE-2023-20955 (2023-03-24)
<code>In onPrepareOptionsMenu of AppInfoDashboardFragment.java, there is a possible way to bypass admin restrictions and uninstall applications for all users due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-258653813
@ -4927,6 +4946,7 @@
- [pwnipc/BadParcel](https://github.com/pwnipc/BadParcel)
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20963](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20963)
- [Ailenchick/CVE-2023-20963](https://github.com/Ailenchick/CVE-2023-20963)
### CVE-2023-21036 (2023-03-24)
@ -6171,6 +6191,7 @@
- [horizon3ai/CVE-2023-27532](https://github.com/horizon3ai/CVE-2023-27532)
- [sfewer-r7/CVE-2023-27532](https://github.com/sfewer-r7/CVE-2023-27532)
- [puckiestyle/CVE-2023-27532-RCE-Only](https://github.com/puckiestyle/CVE-2023-27532-RCE-Only)
### CVE-2023-27564 (2023-05-10)
@ -9248,6 +9269,7 @@
- [hotplugin0x01/CVE-2023-42793](https://github.com/hotplugin0x01/CVE-2023-42793)
- [Zyad-Elsayed/CVE-2023-42793](https://github.com/Zyad-Elsayed/CVE-2023-42793)
- [junnythemarksman/CVE-2023-42793](https://github.com/junnythemarksman/CVE-2023-42793)
- [HusenjanDev/CVE-2023-42793](https://github.com/HusenjanDev/CVE-2023-42793)
### CVE-2023-42819 (2023-09-26)