Auto Update 2024/03/28 00:26:31

This commit is contained in:
motikan2010-bot 2024-03-28 09:26:31 +09:00
parent 750ab042a5
commit ff48f56792
35 changed files with 266 additions and 218 deletions

View file

@ -73,10 +73,10 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2024-02-07T04:27:39Z",
"updated_at": "2024-03-27T20:00:05Z",
"pushed_at": "2022-12-27T20:25:09Z",
"stargazers_count": 367,
"watchers_count": 367,
"stargazers_count": 368,
"watchers_count": 368,
"has_discussions": false,
"forks_count": 99,
"allow_forking": true,
@ -91,7 +91,7 @@
],
"visibility": "public",
"forks": 99,
"watchers": 367,
"watchers": 368,
"score": 0,
"subscribers_count": 11
},
@ -169,10 +169,10 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2024-01-04T16:14:38Z",
"updated_at": "2024-03-27T20:05:20Z",
"pushed_at": "2021-03-09T09:12:55Z",
"stargazers_count": 258,
"watchers_count": 258,
"stargazers_count": 259,
"watchers_count": 259,
"has_discussions": false,
"forks_count": 80,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 80,
"watchers": 258,
"watchers": 259,
"score": 0,
"subscribers_count": 14
},

View file

@ -1841,10 +1841,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2024-03-21T15:50:09Z",
"updated_at": "2024-03-27T20:01:48Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1160,
"watchers_count": 1160,
"stargazers_count": 1161,
"watchers_count": 1161,
"has_discussions": false,
"forks_count": 346,
"allow_forking": true,
@ -1853,7 +1853,7 @@
"topics": [],
"visibility": "public",
"forks": 346,
"watchers": 1160,
"watchers": 1161,
"score": 0,
"subscribers_count": 68
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2024-03-26T22:13:16Z",
"updated_at": "2024-03-27T21:04:19Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1782,
"watchers_count": 1782,
"stargazers_count": 1783,
"watchers_count": 1783,
"has_discussions": false,
"forks_count": 259,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 259,
"watchers": 1782,
"watchers": 1783,
"score": 0,
"subscribers_count": 37
},

View file

@ -13,10 +13,10 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2024-03-05T19:31:51Z",
"updated_at": "2024-03-27T22:26:45Z",
"pushed_at": "2023-09-28T18:58:28Z",
"stargazers_count": 672,
"watchers_count": 672,
"stargazers_count": 671,
"watchers_count": 671,
"has_discussions": false,
"forks_count": 137,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 137,
"watchers": 672,
"watchers": 671,
"score": 0,
"subscribers_count": 44
},

View file

@ -313,7 +313,7 @@
"forks": 13,
"watchers": 65,
"score": 0,
"subscribers_count": 6
"subscribers_count": 5
},
{
"id": 234442281,

View file

@ -13,10 +13,10 @@
"description": "Little thing put together quickly to demonstrate this CVE ",
"fork": false,
"created_at": "2021-10-16T01:10:33Z",
"updated_at": "2024-03-22T11:34:05Z",
"updated_at": "2024-03-27T19:28:31Z",
"pushed_at": "2022-09-11T22:06:40Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2024-03-23T18:19:54Z",
"updated_at": "2024-03-27T18:33:50Z",
"pushed_at": "2021-08-07T16:48:55Z",
"stargazers_count": 398,
"watchers_count": 398,
"stargazers_count": 399,
"watchers_count": 399,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 398,
"watchers": 399,
"score": 0,
"subscribers_count": 11
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 184,
"watchers_count": 184,
"has_discussions": false,
"forks_count": 43,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 43,
"forks": 44,
"watchers": 184,
"score": 0,
"subscribers_count": 3
@ -138,7 +138,7 @@
"stargazers_count": 253,
"watchers_count": 253,
"has_discussions": false,
"forks_count": 99,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -146,7 +146,7 @@
"cve-2021-22205"
],
"visibility": "public",
"forks": 99,
"forks": 100,
"watchers": 253,
"score": 0,
"subscribers_count": 3
@ -225,10 +225,10 @@
"description": "CVE-2021-22205未授权漏洞批量检测与利用工具",
"fork": false,
"created_at": "2021-10-31T04:15:30Z",
"updated_at": "2023-09-12T11:13:45Z",
"updated_at": "2024-03-27T18:37:33Z",
"pushed_at": "2021-11-04T12:49:58Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -239,7 +239,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 1
},
@ -412,13 +412,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 3,
"score": 0,
"subscribers_count": 1
@ -478,7 +478,7 @@
"stargazers_count": 205,
"watchers_count": 205,
"has_discussions": false,
"forks_count": 38,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -491,7 +491,7 @@
"security"
],
"visibility": "public",
"forks": 38,
"forks": 39,
"watchers": 205,
"score": 0,
"subscribers_count": 2

View file

@ -18,13 +18,13 @@
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 15,
"score": 0,
"subscribers_count": 1

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-03-21T15:24:28Z",
"updated_at": "2024-03-27T20:42:58Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 704,
"watchers_count": 704,
"stargazers_count": 705,
"watchers_count": 705,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 704,
"watchers": 705,
"score": 0,
"subscribers_count": 12
},

View file

@ -1239,5 +1239,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 778520336,
"name": "CVE-2021-43798",
"full_name": "ticofookfook\/CVE-2021-43798",
"owner": {
"login": "ticofookfook",
"id": 99700348,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99700348?v=4",
"html_url": "https:\/\/github.com\/ticofookfook"
},
"html_url": "https:\/\/github.com\/ticofookfook\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2024-03-27T21:47:06Z",
"updated_at": "2024-03-27T21:57:13Z",
"pushed_at": "2024-03-27T22:02:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-03-26T22:37:44Z",
"updated_at": "2024-03-27T21:06:51Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1734,
"watchers_count": 1734,
"stargazers_count": 1735,
"watchers_count": 1735,
"has_discussions": false,
"forks_count": 514,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 514,
"watchers": 1734,
"watchers": 1735,
"score": 0,
"subscribers_count": 28
},
@ -1428,7 +1428,7 @@
"stargazers_count": 854,
"watchers_count": 854,
"has_discussions": false,
"forks_count": 173,
"forks_count": 174,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1447,7 +1447,7 @@
"scanner"
],
"visibility": "public",
"forks": 173,
"forks": 174,
"watchers": 854,
"score": 0,
"subscribers_count": 33
@ -12005,10 +12005,10 @@
"description": "Vulnerability CVE-2021-44228 allows remote code execution without authentication for several versions of Apache Log4j2 (Log4Shell). Attackers can exploit vulnerable servers by connecting over any protocol, such as HTTPS, and sending a specially crafted string.",
"fork": false,
"created_at": "2023-01-31T20:29:26Z",
"updated_at": "2023-09-28T11:44:58Z",
"updated_at": "2024-03-27T19:53:25Z",
"pushed_at": "2023-01-31T20:35:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -12031,7 +12031,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 5,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 4,
"watchers": 11,
"score": 0,
"subscribers_count": 1

View file

@ -29,45 +29,6 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 523301905,
"name": "CVE-2022-1040",
"full_name": "APTIRAN\/CVE-2022-1040",
"owner": {
"login": "APTIRAN",
"id": 80196564,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80196564?v=4",
"html_url": "https:\/\/github.com\/APTIRAN"
},
"html_url": "https:\/\/github.com\/APTIRAN\/CVE-2022-1040",
"description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication",
"fork": false,
"created_at": "2022-08-10T10:38:59Z",
"updated_at": "2024-01-24T06:11:09Z",
"pushed_at": "2022-10-21T07:55:22Z",
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-1040",
"cve-2022-1040-poc",
"exploit",
"firewall",
"poc",
"sophos",
"sophos-xg",
"xg115w"
],
"visibility": "public",
"forks": 4,
"watchers": 29,
"score": 0,
"subscribers_count": 2
},
{
"id": 541212587,
"name": "Sophos-Vulnerability",
@ -128,6 +89,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 559654558,
"name": "CVE-2022-1040",
"full_name": "jackson5sec\/CVE-2022-1040",
"owner": {
"login": "jackson5sec",
"id": 17192323,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17192323?v=4",
"html_url": "https:\/\/github.com\/jackson5sec"
},
"html_url": "https:\/\/github.com\/jackson5sec\/CVE-2022-1040",
"description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication",
"fork": false,
"created_at": "2022-10-30T19:20:57Z",
"updated_at": "2022-10-24T03:11:53Z",
"pushed_at": "2022-10-21T07:55:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 586568152,
"name": "CVE-2022-1040",

View file

@ -150,40 +150,34 @@
"subscribers_count": 1
},
{
"id": 562600305,
"id": 563211004,
"name": "CVE-2022-21661",
"full_name": "APTIRAN\/CVE-2022-21661",
"full_name": "safe3s\/CVE-2022-21661",
"owner": {
"login": "APTIRAN",
"id": 80196564,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80196564?v=4",
"html_url": "https:\/\/github.com\/APTIRAN"
"login": "safe3s",
"id": 108328094,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108328094?v=4",
"html_url": "https:\/\/github.com\/safe3s"
},
"html_url": "https:\/\/github.com\/APTIRAN\/CVE-2022-21661",
"html_url": "https:\/\/github.com\/safe3s\/CVE-2022-21661",
"description": "The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' \/ CVE-2022-21661) ",
"fork": false,
"created_at": "2022-11-06T20:44:10Z",
"updated_at": "2024-01-24T11:21:41Z",
"pushed_at": "2022-11-23T21:09:11Z",
"stargazers_count": 100,
"watchers_count": 100,
"created_at": "2022-11-08T06:10:49Z",
"updated_at": "2022-11-07T04:28:00Z",
"pushed_at": "2022-11-06T21:43:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 24,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2022-21661",
"exploit",
"poc",
"wordpress"
],
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 100,
"forks": 22,
"watchers": 0,
"score": 0,
"subscribers_count": 2
"subscribers_count": 0
},
{
"id": 588582544,

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2024-03-13T00:05:04Z",
"updated_at": "2024-03-27T21:52:11Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 359,
"watchers_count": 359,
"stargazers_count": 360,
"watchers_count": 360,
"has_discussions": false,
"forks_count": 92,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 92,
"watchers": 359,
"watchers": 360,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-24T06:00:47Z",
"updated_at": "2024-02-22T09:54:50Z",
"updated_at": "2024-03-27T20:50:58Z",
"pushed_at": "2023-06-18T14:43:52Z",
"stargazers_count": 159,
"watchers_count": 159,
"stargazers_count": 160,
"watchers_count": 160,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 159,
"watchers": 160,
"score": 0,
"subscribers_count": 6
},

View file

@ -45,10 +45,10 @@
"description": "Apache Spark Shell Command Injection Vulnerability",
"fork": false,
"created_at": "2022-07-19T18:52:12Z",
"updated_at": "2024-01-04T17:10:29Z",
"updated_at": "2024-03-27T19:32:37Z",
"pushed_at": "2022-09-07T18:12:27Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 87,
"watchers": 88,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Public disclosure of TitanFTP 19.X Open Redirection vulnerability",
"fork": false,
"created_at": "2022-12-19T09:34:49Z",
"updated_at": "2022-12-19T09:34:49Z",
"updated_at": "2024-03-27T20:36:30Z",
"pushed_at": "2022-12-19T11:53:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-21554 Windows MessageQueuing PoC分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
"fork": false,
"created_at": "2023-05-18T10:30:49Z",
"updated_at": "2023-12-01T21:48:35Z",
"updated_at": "2024-03-27T22:00:07Z",
"pushed_at": "2023-05-18T10:38:57Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-02-07T15:33:41Z",
"updated_at": "2024-01-18T14:51:33Z",
"updated_at": "2024-03-27T19:31:55Z",
"pushed_at": "2023-02-09T09:06:15Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 4
},
@ -103,10 +103,10 @@
"description": "OpenSSH Pre-Auth Double Free CVE-2023-25136 POC",
"fork": false,
"created_at": "2023-04-18T21:47:47Z",
"updated_at": "2024-01-02T10:32:22Z",
"updated_at": "2024-03-27T19:12:22Z",
"pushed_at": "2023-04-21T14:22:41Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 1
},
@ -133,10 +133,10 @@
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
"fork": false,
"created_at": "2023-04-28T19:46:03Z",
"updated_at": "2023-12-24T02:52:24Z",
"updated_at": "2024-03-27T19:25:21Z",
"pushed_at": "2023-04-28T20:29:10Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -103,10 +103,10 @@
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
"fork": false,
"created_at": "2023-06-18T15:42:00Z",
"updated_at": "2024-03-19T00:12:15Z",
"updated_at": "2024-03-28T00:15:48Z",
"pushed_at": "2024-03-07T07:23:41Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2024-03-25T11:17:49Z",
"updated_at": "2024-03-27T20:50:24Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 446,
"watchers_count": 446,
"stargazers_count": 447,
"watchers_count": 447,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 446,
"watchers": 447,
"score": 0,
"subscribers_count": 14
}

View file

@ -13,10 +13,10 @@
"description": "Linux kernel LPE practice with an NPD vulnerability",
"fork": false,
"created_at": "2023-06-29T10:12:18Z",
"updated_at": "2024-02-26T06:09:32Z",
"updated_at": "2024-03-27T21:07:48Z",
"pushed_at": "2023-07-11T23:13:38Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 4
}

View file

@ -1,4 +1,34 @@
[
{
"id": 773579290,
"name": "CVE-2023-3824-PHP-to-RCE-LockBit-LEAK",
"full_name": "StayBeautiful-collab\/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK",
"owner": {
"login": "StayBeautiful-collab",
"id": 106727356,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106727356?v=4",
"html_url": "https:\/\/github.com\/StayBeautiful-collab"
},
"html_url": "https:\/\/github.com\/StayBeautiful-collab\/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK",
"description": null,
"fork": false,
"created_at": "2024-03-18T02:19:03Z",
"updated_at": "2024-03-18T02:19:03Z",
"pushed_at": "2024-03-10T04:37:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 773755811,
"name": "CVE-2023-3824",

View file

@ -13,10 +13,10 @@
"description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2",
"fork": false,
"created_at": "2023-08-09T19:56:07Z",
"updated_at": "2024-03-20T23:10:02Z",
"updated_at": "2024-03-27T19:32:37Z",
"pushed_at": "2023-08-10T05:12:20Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 1
},
@ -43,10 +43,10 @@
"description": "Takeover Account OpenSSH",
"fork": false,
"created_at": "2023-11-09T04:34:39Z",
"updated_at": "2024-03-14T00:54:26Z",
"updated_at": "2024-03-27T19:33:46Z",
"pushed_at": "2024-03-14T03:55:10Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 3
},

View file

@ -1234,10 +1234,10 @@
"description": "evil-winrar,CVE-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, CVE-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework)",
"fork": false,
"created_at": "2024-03-25T14:05:24Z",
"updated_at": "2024-03-26T04:12:11Z",
"updated_at": "2024-03-27T18:41:32Z",
"pushed_at": "2024-03-25T14:38:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -1246,7 +1246,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Public disclosure of Ivanti's Avalanche Path Traversal vulnerability",
"fork": false,
"created_at": "2024-01-08T08:21:39Z",
"updated_at": "2024-01-30T15:10:36Z",
"updated_at": "2024-03-27T20:40:42Z",
"pushed_at": "2024-01-08T08:46:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-03-27T18:05:15Z",
"updated_at": "2024-03-28T00:12:04Z",
"pushed_at": "2024-03-27T18:25:56Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 139,
"watchers_count": 139,
"has_discussions": false,
"forks_count": 21,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 110,
"forks": 26,
"watchers": 139,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-03-27T18:04:07Z",
"updated_at": "2024-03-28T00:29:11Z",
"pushed_at": "2024-03-27T09:22:28Z",
"stargazers_count": 347,
"watchers_count": 347,
"stargazers_count": 369,
"watchers_count": 369,
"has_discussions": false,
"forks_count": 30,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc"
],
"visibility": "public",
"forks": 30,
"watchers": 347,
"forks": 35,
"watchers": 369,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,12 +13,12 @@
"description": "Exploit for CVE-2024-20767 - Adobe ColdFusion",
"fork": false,
"created_at": "2024-03-26T06:51:08Z",
"updated_at": "2024-03-27T13:41:37Z",
"updated_at": "2024-03-27T23:31:42Z",
"pushed_at": "2024-03-26T15:52:49Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 4,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,8 +28,8 @@
"cve-2024-20767"
],
"visibility": "public",
"forks": 4,
"watchers": 15,
"forks": 9,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},
@ -77,10 +77,10 @@
"description": "Exploit Toolkit for Adobe ColdFusion CVE-2024-20767 Vulnerability",
"fork": false,
"created_at": "2024-03-26T19:17:14Z",
"updated_at": "2024-03-27T17:01:30Z",
"updated_at": "2024-03-27T21:09:20Z",
"pushed_at": "2024-03-26T19:21:19Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "The Poc for CVE-2024-20931",
"fork": false,
"created_at": "2024-02-02T01:58:49Z",
"updated_at": "2024-03-26T07:52:42Z",
"updated_at": "2024-03-27T18:45:37Z",
"pushed_at": "2024-02-02T02:05:01Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 69,
"watchers": 70,
"score": 0,
"subscribers_count": 3
},

View file

@ -133,10 +133,10 @@
"description": "Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)",
"fork": false,
"created_at": "2024-03-13T22:57:00Z",
"updated_at": "2024-03-15T15:08:21Z",
"updated_at": "2024-03-27T23:12:59Z",
"pushed_at": "2024-03-24T22:01:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "WallEscape vulnerability in util-linux",
"fork": false,
"created_at": "2024-03-11T00:15:03Z",
"updated_at": "2024-03-27T16:28:14Z",
"updated_at": "2024-03-27T19:01:51Z",
"pushed_at": "2024-03-12T00:28:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -24,14 +24,15 @@
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2024-28085",
"exploit",
"privesc",
"privilege-escalation",
"redteam",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}

View file

@ -1611,6 +1611,7 @@
<code>In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. \n\n
</code>
- [StayBeautiful-collab/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK](https://github.com/StayBeautiful-collab/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK)
- [jhonnybonny/CVE-2023-3824](https://github.com/jhonnybonny/CVE-2023-3824)
### CVE-2023-3836 (2023-07-22)
@ -8521,9 +8522,9 @@
</code>
- [killvxk/CVE-2022-1040](https://github.com/killvxk/CVE-2022-1040)
- [APTIRAN/CVE-2022-1040](https://github.com/APTIRAN/CVE-2022-1040)
- [jam620/Sophos-Vulnerability](https://github.com/jam620/Sophos-Vulnerability)
- [Keith-amateur/cve-2022-1040](https://github.com/Keith-amateur/cve-2022-1040)
- [jackson5sec/CVE-2022-1040](https://github.com/jackson5sec/CVE-2022-1040)
- [michealadams30/CVE-2022-1040](https://github.com/michealadams30/CVE-2022-1040)
- [Cyb3rEnthusiast/CVE-2022-1040](https://github.com/Cyb3rEnthusiast/CVE-2022-1040)
- [xMr110/CVE-2022-1040](https://github.com/xMr110/CVE-2022-1040)
@ -9485,7 +9486,7 @@
- [0x4E0x650x6F/Wordpress-cve-CVE-2022-21661](https://github.com/0x4E0x650x6F/Wordpress-cve-CVE-2022-21661)
- [z92g/CVE-2022-21661](https://github.com/z92g/CVE-2022-21661)
- [guestzz/CVE-2022-21661](https://github.com/guestzz/CVE-2022-21661)
- [APTIRAN/CVE-2022-21661](https://github.com/APTIRAN/CVE-2022-21661)
- [safe3s/CVE-2022-21661](https://github.com/safe3s/CVE-2022-21661)
- [WellingtonEspindula/SSI-CVE-2022-21661](https://github.com/WellingtonEspindula/SSI-CVE-2022-21661)
- [daniel616/CVE-2022-21661-Demo](https://github.com/daniel616/CVE-2022-21661-Demo)
- [sealldeveloper/CVE-2022-21661-PoC](https://github.com/sealldeveloper/CVE-2022-21661-PoC)
@ -20130,6 +20131,7 @@
- [Iris288/CVE-2021-43798](https://github.com/Iris288/CVE-2021-43798)
- [wagneralves/CVE-2021-43798](https://github.com/wagneralves/CVE-2021-43798)
- [K3ysTr0K3R/CVE-2021-43798-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2021-43798-EXPLOIT)
- [ticofookfook/CVE-2021-43798](https://github.com/ticofookfook/CVE-2021-43798)
### CVE-2021-43799 (2022-01-25)