Auto Update 2024/03/28 00:26:31

This commit is contained in:
motikan2010-bot 2024-03-28 09:26:31 +09:00
parent 750ab042a5
commit ff48f56792
35 changed files with 266 additions and 218 deletions

View file

@ -73,10 +73,10 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)", "description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false, "fork": false,
"created_at": "2017-05-26T00:58:25Z", "created_at": "2017-05-26T00:58:25Z",
"updated_at": "2024-02-07T04:27:39Z", "updated_at": "2024-03-27T20:00:05Z",
"pushed_at": "2022-12-27T20:25:09Z", "pushed_at": "2022-12-27T20:25:09Z",
"stargazers_count": 367, "stargazers_count": 368,
"watchers_count": 367, "watchers_count": 368,
"has_discussions": false, "has_discussions": false,
"forks_count": 99, "forks_count": 99,
"allow_forking": true, "allow_forking": true,
@ -91,7 +91,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 99, "forks": 99,
"watchers": 367, "watchers": 368,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },
@ -169,10 +169,10 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability", "description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false, "fork": false,
"created_at": "2017-06-05T16:25:57Z", "created_at": "2017-06-05T16:25:57Z",
"updated_at": "2024-01-04T16:14:38Z", "updated_at": "2024-03-27T20:05:20Z",
"pushed_at": "2021-03-09T09:12:55Z", "pushed_at": "2021-03-09T09:12:55Z",
"stargazers_count": 258, "stargazers_count": 259,
"watchers_count": 258, "watchers_count": 259,
"has_discussions": false, "has_discussions": false,
"forks_count": 80, "forks_count": 80,
"allow_forking": true, "allow_forking": true,
@ -181,7 +181,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 80, "forks": 80,
"watchers": 258, "watchers": 259,
"score": 0, "score": 0,
"subscribers_count": 14 "subscribers_count": 14
}, },

View file

@ -1841,10 +1841,10 @@
"description": "Proof of concept for CVE-2019-0708", "description": "Proof of concept for CVE-2019-0708",
"fork": false, "fork": false,
"created_at": "2019-05-29T16:53:54Z", "created_at": "2019-05-29T16:53:54Z",
"updated_at": "2024-03-21T15:50:09Z", "updated_at": "2024-03-27T20:01:48Z",
"pushed_at": "2021-12-02T12:00:46Z", "pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1160, "stargazers_count": 1161,
"watchers_count": 1160, "watchers_count": 1161,
"has_discussions": false, "has_discussions": false,
"forks_count": 346, "forks_count": 346,
"allow_forking": true, "allow_forking": true,
@ -1853,7 +1853,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 346, "forks": 346,
"watchers": 1160, "watchers": 1161,
"score": 0, "score": 0,
"subscribers_count": 68 "subscribers_count": 68
}, },

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2019-11043", "description": "Exploit for CVE-2019-11043",
"fork": false, "fork": false,
"created_at": "2019-09-23T21:37:27Z", "created_at": "2019-09-23T21:37:27Z",
"updated_at": "2024-03-26T22:13:16Z", "updated_at": "2024-03-27T21:04:19Z",
"pushed_at": "2019-11-12T18:53:14Z", "pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1782, "stargazers_count": 1783,
"watchers_count": 1782, "watchers_count": 1783,
"has_discussions": false, "has_discussions": false,
"forks_count": 259, "forks_count": 259,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 259, "forks": 259,
"watchers": 1782, "watchers": 1783,
"score": 0, "score": 0,
"subscribers_count": 37 "subscribers_count": 37
}, },

View file

@ -13,10 +13,10 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447", "description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false, "fork": false,
"created_at": "2019-01-09T22:30:42Z", "created_at": "2019-01-09T22:30:42Z",
"updated_at": "2024-03-05T19:31:51Z", "updated_at": "2024-03-27T22:26:45Z",
"pushed_at": "2023-09-28T18:58:28Z", "pushed_at": "2023-09-28T18:58:28Z",
"stargazers_count": 672, "stargazers_count": 671,
"watchers_count": 672, "watchers_count": 671,
"has_discussions": false, "has_discussions": false,
"forks_count": 137, "forks_count": 137,
"allow_forking": true, "allow_forking": true,
@ -30,7 +30,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 137, "forks": 137,
"watchers": 672, "watchers": 671,
"score": 0, "score": 0,
"subscribers_count": 44 "subscribers_count": 44
}, },

View file

@ -313,7 +313,7 @@
"forks": 13, "forks": 13,
"watchers": 65, "watchers": 65,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 5
}, },
{ {
"id": 234442281, "id": 234442281,

View file

@ -13,10 +13,10 @@
"description": "Little thing put together quickly to demonstrate this CVE ", "description": "Little thing put together quickly to demonstrate this CVE ",
"fork": false, "fork": false,
"created_at": "2021-10-16T01:10:33Z", "created_at": "2021-10-16T01:10:33Z",
"updated_at": "2024-03-22T11:34:05Z", "updated_at": "2024-03-27T19:28:31Z",
"pushed_at": "2022-09-11T22:06:40Z", "pushed_at": "2022-09-11T22:06:40Z",
"stargazers_count": 22, "stargazers_count": 23,
"watchers_count": 22, "watchers_count": 23,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 22, "watchers": 23,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)", "description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false, "fork": false,
"created_at": "2020-06-08T07:37:49Z", "created_at": "2020-06-08T07:37:49Z",
"updated_at": "2024-03-23T18:19:54Z", "updated_at": "2024-03-27T18:33:50Z",
"pushed_at": "2021-08-07T16:48:55Z", "pushed_at": "2021-08-07T16:48:55Z",
"stargazers_count": 398, "stargazers_count": 399,
"watchers_count": 398, "watchers_count": 399,
"has_discussions": false, "has_discussions": false,
"forks_count": 70, "forks_count": 70,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 70, "forks": 70,
"watchers": 398, "watchers": 399,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },

View file

@ -18,13 +18,13 @@
"stargazers_count": 184, "stargazers_count": 184,
"watchers_count": 184, "watchers_count": 184,
"has_discussions": false, "has_discussions": false,
"forks_count": 43, "forks_count": 44,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 43, "forks": 44,
"watchers": 184, "watchers": 184,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
@ -138,7 +138,7 @@
"stargazers_count": 253, "stargazers_count": 253,
"watchers_count": 253, "watchers_count": 253,
"has_discussions": false, "has_discussions": false,
"forks_count": 99, "forks_count": 100,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -146,7 +146,7 @@
"cve-2021-22205" "cve-2021-22205"
], ],
"visibility": "public", "visibility": "public",
"forks": 99, "forks": 100,
"watchers": 253, "watchers": 253,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
@ -225,10 +225,10 @@
"description": "CVE-2021-22205未授权漏洞批量检测与利用工具", "description": "CVE-2021-22205未授权漏洞批量检测与利用工具",
"fork": false, "fork": false,
"created_at": "2021-10-31T04:15:30Z", "created_at": "2021-10-31T04:15:30Z",
"updated_at": "2023-09-12T11:13:45Z", "updated_at": "2024-03-27T18:37:33Z",
"pushed_at": "2021-11-04T12:49:58Z", "pushed_at": "2021-11-04T12:49:58Z",
"stargazers_count": 31, "stargazers_count": 32,
"watchers_count": 31, "watchers_count": 32,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -239,7 +239,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 31, "watchers": 32,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -412,13 +412,13 @@
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 3,
"watchers": 3, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
@ -478,7 +478,7 @@
"stargazers_count": 205, "stargazers_count": 205,
"watchers_count": 205, "watchers_count": 205,
"has_discussions": false, "has_discussions": false,
"forks_count": 38, "forks_count": 39,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -491,7 +491,7 @@
"security" "security"
], ],
"visibility": "public", "visibility": "public",
"forks": 38, "forks": 39,
"watchers": 205, "watchers": 205,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -18,13 +18,13 @@
"stargazers_count": 15, "stargazers_count": 15,
"watchers_count": 15, "watchers_count": 15,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 4,
"watchers": 15, "watchers": 15,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false, "fork": false,
"created_at": "2021-12-13T10:28:12Z", "created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-03-21T15:24:28Z", "updated_at": "2024-03-27T20:42:58Z",
"pushed_at": "2023-01-29T03:31:27Z", "pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 704, "stargazers_count": 705,
"watchers_count": 704, "watchers_count": 705,
"has_discussions": false, "has_discussions": false,
"forks_count": 115, "forks_count": 115,
"allow_forking": true, "allow_forking": true,
@ -60,7 +60,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 115, "forks": 115,
"watchers": 704, "watchers": 705,
"score": 0, "score": 0,
"subscribers_count": 12 "subscribers_count": 12
}, },

View file

@ -1239,5 +1239,35 @@
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 778520336,
"name": "CVE-2021-43798",
"full_name": "ticofookfook\/CVE-2021-43798",
"owner": {
"login": "ticofookfook",
"id": 99700348,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99700348?v=4",
"html_url": "https:\/\/github.com\/ticofookfook"
},
"html_url": "https:\/\/github.com\/ticofookfook\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2024-03-27T21:47:06Z",
"updated_at": "2024-03-27T21:57:13Z",
"pushed_at": "2024-03-27T22:02:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false, "fork": false,
"created_at": "2021-12-10T23:19:28Z", "created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-03-26T22:37:44Z", "updated_at": "2024-03-27T21:06:51Z",
"pushed_at": "2024-02-12T22:37:25Z", "pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1734, "stargazers_count": 1735,
"watchers_count": 1734, "watchers_count": 1735,
"has_discussions": false, "has_discussions": false,
"forks_count": 514, "forks_count": 514,
"allow_forking": true, "allow_forking": true,
@ -924,7 +924,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 514, "forks": 514,
"watchers": 1734, "watchers": 1735,
"score": 0, "score": 0,
"subscribers_count": 28 "subscribers_count": 28
}, },
@ -1428,7 +1428,7 @@
"stargazers_count": 854, "stargazers_count": 854,
"watchers_count": 854, "watchers_count": 854,
"has_discussions": false, "has_discussions": false,
"forks_count": 173, "forks_count": 174,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -1447,7 +1447,7 @@
"scanner" "scanner"
], ],
"visibility": "public", "visibility": "public",
"forks": 173, "forks": 174,
"watchers": 854, "watchers": 854,
"score": 0, "score": 0,
"subscribers_count": 33 "subscribers_count": 33
@ -12005,10 +12005,10 @@
"description": "Vulnerability CVE-2021-44228 allows remote code execution without authentication for several versions of Apache Log4j2 (Log4Shell). Attackers can exploit vulnerable servers by connecting over any protocol, such as HTTPS, and sending a specially crafted string.", "description": "Vulnerability CVE-2021-44228 allows remote code execution without authentication for several versions of Apache Log4j2 (Log4Shell). Attackers can exploit vulnerable servers by connecting over any protocol, such as HTTPS, and sending a specially crafted string.",
"fork": false, "fork": false,
"created_at": "2023-01-31T20:29:26Z", "created_at": "2023-01-31T20:29:26Z",
"updated_at": "2023-09-28T11:44:58Z", "updated_at": "2024-03-27T19:53:25Z",
"pushed_at": "2023-01-31T20:35:59Z", "pushed_at": "2023-01-31T20:35:59Z",
"stargazers_count": 6, "stargazers_count": 7,
"watchers_count": 6, "watchers_count": 7,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -12031,7 +12031,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 6, "watchers": 7,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -18,13 +18,13 @@
"stargazers_count": 11, "stargazers_count": 11,
"watchers_count": 11, "watchers_count": 11,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 4,
"watchers": 11, "watchers": 11,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -29,45 +29,6 @@
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },
{
"id": 523301905,
"name": "CVE-2022-1040",
"full_name": "APTIRAN\/CVE-2022-1040",
"owner": {
"login": "APTIRAN",
"id": 80196564,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80196564?v=4",
"html_url": "https:\/\/github.com\/APTIRAN"
},
"html_url": "https:\/\/github.com\/APTIRAN\/CVE-2022-1040",
"description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication",
"fork": false,
"created_at": "2022-08-10T10:38:59Z",
"updated_at": "2024-01-24T06:11:09Z",
"pushed_at": "2022-10-21T07:55:22Z",
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-1040",
"cve-2022-1040-poc",
"exploit",
"firewall",
"poc",
"sophos",
"sophos-xg",
"xg115w"
],
"visibility": "public",
"forks": 4,
"watchers": 29,
"score": 0,
"subscribers_count": 2
},
{ {
"id": 541212587, "id": 541212587,
"name": "Sophos-Vulnerability", "name": "Sophos-Vulnerability",
@ -128,6 +89,36 @@
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
{
"id": 559654558,
"name": "CVE-2022-1040",
"full_name": "jackson5sec\/CVE-2022-1040",
"owner": {
"login": "jackson5sec",
"id": 17192323,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17192323?v=4",
"html_url": "https:\/\/github.com\/jackson5sec"
},
"html_url": "https:\/\/github.com\/jackson5sec\/CVE-2022-1040",
"description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication",
"fork": false,
"created_at": "2022-10-30T19:20:57Z",
"updated_at": "2022-10-24T03:11:53Z",
"pushed_at": "2022-10-21T07:55:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{ {
"id": 586568152, "id": 586568152,
"name": "CVE-2022-1040", "name": "CVE-2022-1040",

View file

@ -150,40 +150,34 @@
"subscribers_count": 1 "subscribers_count": 1
}, },
{ {
"id": 562600305, "id": 563211004,
"name": "CVE-2022-21661", "name": "CVE-2022-21661",
"full_name": "APTIRAN\/CVE-2022-21661", "full_name": "safe3s\/CVE-2022-21661",
"owner": { "owner": {
"login": "APTIRAN", "login": "safe3s",
"id": 80196564, "id": 108328094,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80196564?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108328094?v=4",
"html_url": "https:\/\/github.com\/APTIRAN" "html_url": "https:\/\/github.com\/safe3s"
}, },
"html_url": "https:\/\/github.com\/APTIRAN\/CVE-2022-21661", "html_url": "https:\/\/github.com\/safe3s\/CVE-2022-21661",
"description": "The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' \/ CVE-2022-21661) ", "description": "The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' \/ CVE-2022-21661) ",
"fork": false, "fork": false,
"created_at": "2022-11-06T20:44:10Z", "created_at": "2022-11-08T06:10:49Z",
"updated_at": "2024-01-24T11:21:41Z", "updated_at": "2022-11-07T04:28:00Z",
"pushed_at": "2022-11-23T21:09:11Z", "pushed_at": "2022-11-06T21:43:48Z",
"stargazers_count": 100, "stargazers_count": 0,
"watchers_count": 100, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 24, "forks_count": 22,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [ "topics": [],
"cve",
"cve-2022-21661",
"exploit",
"poc",
"wordpress"
],
"visibility": "public", "visibility": "public",
"forks": 24, "forks": 22,
"watchers": 100, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 0
}, },
{ {
"id": 588582544, "id": 588582544,

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.", "description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false, "fork": false,
"created_at": "2022-04-20T21:23:52Z", "created_at": "2022-04-20T21:23:52Z",
"updated_at": "2024-03-13T00:05:04Z", "updated_at": "2024-03-27T21:52:11Z",
"pushed_at": "2022-04-27T05:52:43Z", "pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 359, "stargazers_count": 360,
"watchers_count": 359, "watchers_count": 360,
"has_discussions": false, "has_discussions": false,
"forks_count": 92, "forks_count": 92,
"allow_forking": true, "allow_forking": true,
@ -27,7 +27,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 92, "forks": 92,
"watchers": 359, "watchers": 360,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
}, },

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2022-08-24T06:00:47Z", "created_at": "2022-08-24T06:00:47Z",
"updated_at": "2024-02-22T09:54:50Z", "updated_at": "2024-03-27T20:50:58Z",
"pushed_at": "2023-06-18T14:43:52Z", "pushed_at": "2023-06-18T14:43:52Z",
"stargazers_count": 159, "stargazers_count": 160,
"watchers_count": 159, "watchers_count": 160,
"has_discussions": false, "has_discussions": false,
"forks_count": 44, "forks_count": 44,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 44, "forks": 44,
"watchers": 159, "watchers": 160,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -45,10 +45,10 @@
"description": "Apache Spark Shell Command Injection Vulnerability", "description": "Apache Spark Shell Command Injection Vulnerability",
"fork": false, "fork": false,
"created_at": "2022-07-19T18:52:12Z", "created_at": "2022-07-19T18:52:12Z",
"updated_at": "2024-01-04T17:10:29Z", "updated_at": "2024-03-27T19:32:37Z",
"pushed_at": "2022-09-07T18:12:27Z", "pushed_at": "2022-09-07T18:12:27Z",
"stargazers_count": 87, "stargazers_count": 88,
"watchers_count": 87, "watchers_count": 88,
"has_discussions": false, "has_discussions": false,
"forks_count": 20, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 20,
"watchers": 87, "watchers": 88,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -13,10 +13,10 @@
"description": "Public disclosure of TitanFTP 19.X Open Redirection vulnerability", "description": "Public disclosure of TitanFTP 19.X Open Redirection vulnerability",
"fork": false, "fork": false,
"created_at": "2022-12-19T09:34:49Z", "created_at": "2022-12-19T09:34:49Z",
"updated_at": "2022-12-19T09:34:49Z", "updated_at": "2024-03-27T20:36:30Z",
"pushed_at": "2022-12-19T11:53:34Z", "pushed_at": "2022-12-19T11:53:34Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-21554 Windows MessageQueuing PoC分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/", "description": "CVE-2023-21554 Windows MessageQueuing PoC分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
"fork": false, "fork": false,
"created_at": "2023-05-18T10:30:49Z", "created_at": "2023-05-18T10:30:49Z",
"updated_at": "2023-12-01T21:48:35Z", "updated_at": "2024-03-27T22:00:07Z",
"pushed_at": "2023-05-18T10:38:57Z", "pushed_at": "2023-05-18T10:38:57Z",
"stargazers_count": 50, "stargazers_count": 51,
"watchers_count": 50, "watchers_count": 51,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 14,
"watchers": 50, "watchers": 51,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-02-07T15:33:41Z", "created_at": "2023-02-07T15:33:41Z",
"updated_at": "2024-01-18T14:51:33Z", "updated_at": "2024-03-27T19:31:55Z",
"pushed_at": "2023-02-09T09:06:15Z", "pushed_at": "2023-02-09T09:06:15Z",
"stargazers_count": 42, "stargazers_count": 43,
"watchers_count": 42, "watchers_count": 43,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 42, "watchers": 43,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },
@ -103,10 +103,10 @@
"description": "OpenSSH Pre-Auth Double Free CVE-2023-25136 POC", "description": "OpenSSH Pre-Auth Double Free CVE-2023-25136 POC",
"fork": false, "fork": false,
"created_at": "2023-04-18T21:47:47Z", "created_at": "2023-04-18T21:47:47Z",
"updated_at": "2024-01-02T10:32:22Z", "updated_at": "2024-03-27T19:12:22Z",
"pushed_at": "2023-04-21T14:22:41Z", "pushed_at": "2023-04-21T14:22:41Z",
"stargazers_count": 44, "stargazers_count": 45,
"watchers_count": 44, "watchers_count": 45,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -115,7 +115,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 44, "watchers": 45,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -133,10 +133,10 @@
"description": "OpenSSH 9.1 vulnerability mass scan and exploit", "description": "OpenSSH 9.1 vulnerability mass scan and exploit",
"fork": false, "fork": false,
"created_at": "2023-04-28T19:46:03Z", "created_at": "2023-04-28T19:46:03Z",
"updated_at": "2023-12-24T02:52:24Z", "updated_at": "2024-03-27T19:25:21Z",
"pushed_at": "2023-04-28T20:29:10Z", "pushed_at": "2023-04-28T20:29:10Z",
"stargazers_count": 7, "stargazers_count": 8,
"watchers_count": 7, "watchers_count": 8,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -145,7 +145,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 7, "watchers": 8,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -103,10 +103,10 @@
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin", "description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
"fork": false, "fork": false,
"created_at": "2023-06-18T15:42:00Z", "created_at": "2023-06-18T15:42:00Z",
"updated_at": "2024-03-19T00:12:15Z", "updated_at": "2024-03-28T00:15:48Z",
"pushed_at": "2024-03-07T07:23:41Z", "pushed_at": "2024-03-07T07:23:41Z",
"stargazers_count": 25, "stargazers_count": 26,
"watchers_count": 25, "watchers_count": 26,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -115,7 +115,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 25, "watchers": 26,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability", "description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false, "fork": false,
"created_at": "2023-06-28T13:22:26Z", "created_at": "2023-06-28T13:22:26Z",
"updated_at": "2024-03-25T11:17:49Z", "updated_at": "2024-03-27T20:50:24Z",
"pushed_at": "2023-07-28T13:20:45Z", "pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 446, "stargazers_count": 447,
"watchers_count": 446, "watchers_count": 447,
"has_discussions": false, "has_discussions": false,
"forks_count": 45, "forks_count": 45,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 45, "forks": 45,
"watchers": 446, "watchers": 447,
"score": 0, "score": 0,
"subscribers_count": 14 "subscribers_count": 14
} }

View file

@ -13,10 +13,10 @@
"description": "Linux kernel LPE practice with an NPD vulnerability", "description": "Linux kernel LPE practice with an NPD vulnerability",
"fork": false, "fork": false,
"created_at": "2023-06-29T10:12:18Z", "created_at": "2023-06-29T10:12:18Z",
"updated_at": "2024-02-26T06:09:32Z", "updated_at": "2024-03-27T21:07:48Z",
"pushed_at": "2023-07-11T23:13:38Z", "pushed_at": "2023-07-11T23:13:38Z",
"stargazers_count": 34, "stargazers_count": 35,
"watchers_count": 34, "watchers_count": 35,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 34, "watchers": 35,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
} }

View file

@ -1,4 +1,34 @@
[ [
{
"id": 773579290,
"name": "CVE-2023-3824-PHP-to-RCE-LockBit-LEAK",
"full_name": "StayBeautiful-collab\/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK",
"owner": {
"login": "StayBeautiful-collab",
"id": 106727356,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106727356?v=4",
"html_url": "https:\/\/github.com\/StayBeautiful-collab"
},
"html_url": "https:\/\/github.com\/StayBeautiful-collab\/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK",
"description": null,
"fork": false,
"created_at": "2024-03-18T02:19:03Z",
"updated_at": "2024-03-18T02:19:03Z",
"pushed_at": "2024-03-10T04:37:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{ {
"id": 773755811, "id": 773755811,
"name": "CVE-2023-3824", "name": "CVE-2023-3824",

View file

@ -13,10 +13,10 @@
"description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2", "description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2",
"fork": false, "fork": false,
"created_at": "2023-08-09T19:56:07Z", "created_at": "2023-08-09T19:56:07Z",
"updated_at": "2024-03-20T23:10:02Z", "updated_at": "2024-03-27T19:32:37Z",
"pushed_at": "2023-08-10T05:12:20Z", "pushed_at": "2023-08-10T05:12:20Z",
"stargazers_count": 26, "stargazers_count": 27,
"watchers_count": 26, "watchers_count": 27,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 26, "watchers": 27,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -43,10 +43,10 @@
"description": "Takeover Account OpenSSH", "description": "Takeover Account OpenSSH",
"fork": false, "fork": false,
"created_at": "2023-11-09T04:34:39Z", "created_at": "2023-11-09T04:34:39Z",
"updated_at": "2024-03-14T00:54:26Z", "updated_at": "2024-03-27T19:33:46Z",
"pushed_at": "2024-03-14T03:55:10Z", "pushed_at": "2024-03-14T03:55:10Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -61,7 +61,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 9, "watchers": 10,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -1234,10 +1234,10 @@
"description": "evil-winrar,CVE-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, CVE-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework)", "description": "evil-winrar,CVE-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, CVE-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework)",
"fork": false, "fork": false,
"created_at": "2024-03-25T14:05:24Z", "created_at": "2024-03-25T14:05:24Z",
"updated_at": "2024-03-26T04:12:11Z", "updated_at": "2024-03-27T18:41:32Z",
"pushed_at": "2024-03-25T14:38:29Z", "pushed_at": "2024-03-25T14:38:29Z",
"stargazers_count": 4, "stargazers_count": 5,
"watchers_count": 4, "watchers_count": 5,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -1246,7 +1246,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 4, "watchers": 5,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -13,10 +13,10 @@
"description": "Public disclosure of Ivanti's Avalanche Path Traversal vulnerability", "description": "Public disclosure of Ivanti's Avalanche Path Traversal vulnerability",
"fork": false, "fork": false,
"created_at": "2024-01-08T08:21:39Z", "created_at": "2024-01-08T08:21:39Z",
"updated_at": "2024-01-30T15:10:36Z", "updated_at": "2024-03-27T20:40:42Z",
"pushed_at": "2024-01-08T08:46:27Z", "pushed_at": "2024-01-08T08:46:27Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 3, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-03-27T18:05:15Z", "updated_at": "2024-03-28T00:12:04Z",
"pushed_at": "2024-03-27T18:25:56Z", "pushed_at": "2024-03-27T18:25:56Z",
"stargazers_count": 110, "stargazers_count": 139,
"watchers_count": 110, "watchers_count": 139,
"has_discussions": false, "has_discussions": false,
"forks_count": 21, "forks_count": 26,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 21, "forks": 26,
"watchers": 110, "watchers": 139,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false, "fork": false,
"created_at": "2024-03-20T21:16:41Z", "created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-03-27T18:04:07Z", "updated_at": "2024-03-28T00:29:11Z",
"pushed_at": "2024-03-27T09:22:28Z", "pushed_at": "2024-03-27T09:22:28Z",
"stargazers_count": 347, "stargazers_count": 369,
"watchers_count": 347, "watchers_count": 369,
"has_discussions": false, "has_discussions": false,
"forks_count": 30, "forks_count": 35,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc" "poc"
], ],
"visibility": "public", "visibility": "public",
"forks": 30, "forks": 35,
"watchers": 347, "watchers": 369,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,12 +13,12 @@
"description": "Exploit for CVE-2024-20767 - Adobe ColdFusion", "description": "Exploit for CVE-2024-20767 - Adobe ColdFusion",
"fork": false, "fork": false,
"created_at": "2024-03-26T06:51:08Z", "created_at": "2024-03-26T06:51:08Z",
"updated_at": "2024-03-27T13:41:37Z", "updated_at": "2024-03-27T23:31:42Z",
"pushed_at": "2024-03-26T15:52:49Z", "pushed_at": "2024-03-26T15:52:49Z",
"stargazers_count": 15, "stargazers_count": 18,
"watchers_count": 15, "watchers_count": 18,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -28,8 +28,8 @@
"cve-2024-20767" "cve-2024-20767"
], ],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 9,
"watchers": 15, "watchers": 18,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -77,10 +77,10 @@
"description": "Exploit Toolkit for Adobe ColdFusion CVE-2024-20767 Vulnerability", "description": "Exploit Toolkit for Adobe ColdFusion CVE-2024-20767 Vulnerability",
"fork": false, "fork": false,
"created_at": "2024-03-26T19:17:14Z", "created_at": "2024-03-26T19:17:14Z",
"updated_at": "2024-03-27T17:01:30Z", "updated_at": "2024-03-27T21:09:20Z",
"pushed_at": "2024-03-26T19:21:19Z", "pushed_at": "2024-03-26T19:21:19Z",
"stargazers_count": 4, "stargazers_count": 5,
"watchers_count": 4, "watchers_count": 5,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -89,7 +89,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 4, "watchers": 5,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": "The Poc for CVE-2024-20931", "description": "The Poc for CVE-2024-20931",
"fork": false, "fork": false,
"created_at": "2024-02-02T01:58:49Z", "created_at": "2024-02-02T01:58:49Z",
"updated_at": "2024-03-26T07:52:42Z", "updated_at": "2024-03-27T18:45:37Z",
"pushed_at": "2024-02-02T02:05:01Z", "pushed_at": "2024-02-02T02:05:01Z",
"stargazers_count": 69, "stargazers_count": 70,
"watchers_count": 69, "watchers_count": 70,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 69, "watchers": 70,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -133,10 +133,10 @@
"description": "Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)", "description": "Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)",
"fork": false, "fork": false,
"created_at": "2024-03-13T22:57:00Z", "created_at": "2024-03-13T22:57:00Z",
"updated_at": "2024-03-15T15:08:21Z", "updated_at": "2024-03-27T23:12:59Z",
"pushed_at": "2024-03-24T22:01:21Z", "pushed_at": "2024-03-24T22:01:21Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -145,7 +145,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 2, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": "WallEscape vulnerability in util-linux", "description": "WallEscape vulnerability in util-linux",
"fork": false, "fork": false,
"created_at": "2024-03-11T00:15:03Z", "created_at": "2024-03-11T00:15:03Z",
"updated_at": "2024-03-27T16:28:14Z", "updated_at": "2024-03-27T19:01:51Z",
"pushed_at": "2024-03-12T00:28:14Z", "pushed_at": "2024-03-12T00:28:14Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -24,14 +24,15 @@
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [ "topics": [
"cve", "cve",
"cve-2024-28085",
"exploit", "exploit",
"privesc",
"privilege-escalation", "privilege-escalation",
"redteam",
"vulnerability" "vulnerability"
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -1611,6 +1611,7 @@
<code>In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. \n\n <code>In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. \n\n
</code> </code>
- [StayBeautiful-collab/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK](https://github.com/StayBeautiful-collab/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK)
- [jhonnybonny/CVE-2023-3824](https://github.com/jhonnybonny/CVE-2023-3824) - [jhonnybonny/CVE-2023-3824](https://github.com/jhonnybonny/CVE-2023-3824)
### CVE-2023-3836 (2023-07-22) ### CVE-2023-3836 (2023-07-22)
@ -8521,9 +8522,9 @@
</code> </code>
- [killvxk/CVE-2022-1040](https://github.com/killvxk/CVE-2022-1040) - [killvxk/CVE-2022-1040](https://github.com/killvxk/CVE-2022-1040)
- [APTIRAN/CVE-2022-1040](https://github.com/APTIRAN/CVE-2022-1040)
- [jam620/Sophos-Vulnerability](https://github.com/jam620/Sophos-Vulnerability) - [jam620/Sophos-Vulnerability](https://github.com/jam620/Sophos-Vulnerability)
- [Keith-amateur/cve-2022-1040](https://github.com/Keith-amateur/cve-2022-1040) - [Keith-amateur/cve-2022-1040](https://github.com/Keith-amateur/cve-2022-1040)
- [jackson5sec/CVE-2022-1040](https://github.com/jackson5sec/CVE-2022-1040)
- [michealadams30/CVE-2022-1040](https://github.com/michealadams30/CVE-2022-1040) - [michealadams30/CVE-2022-1040](https://github.com/michealadams30/CVE-2022-1040)
- [Cyb3rEnthusiast/CVE-2022-1040](https://github.com/Cyb3rEnthusiast/CVE-2022-1040) - [Cyb3rEnthusiast/CVE-2022-1040](https://github.com/Cyb3rEnthusiast/CVE-2022-1040)
- [xMr110/CVE-2022-1040](https://github.com/xMr110/CVE-2022-1040) - [xMr110/CVE-2022-1040](https://github.com/xMr110/CVE-2022-1040)
@ -9485,7 +9486,7 @@
- [0x4E0x650x6F/Wordpress-cve-CVE-2022-21661](https://github.com/0x4E0x650x6F/Wordpress-cve-CVE-2022-21661) - [0x4E0x650x6F/Wordpress-cve-CVE-2022-21661](https://github.com/0x4E0x650x6F/Wordpress-cve-CVE-2022-21661)
- [z92g/CVE-2022-21661](https://github.com/z92g/CVE-2022-21661) - [z92g/CVE-2022-21661](https://github.com/z92g/CVE-2022-21661)
- [guestzz/CVE-2022-21661](https://github.com/guestzz/CVE-2022-21661) - [guestzz/CVE-2022-21661](https://github.com/guestzz/CVE-2022-21661)
- [APTIRAN/CVE-2022-21661](https://github.com/APTIRAN/CVE-2022-21661) - [safe3s/CVE-2022-21661](https://github.com/safe3s/CVE-2022-21661)
- [WellingtonEspindula/SSI-CVE-2022-21661](https://github.com/WellingtonEspindula/SSI-CVE-2022-21661) - [WellingtonEspindula/SSI-CVE-2022-21661](https://github.com/WellingtonEspindula/SSI-CVE-2022-21661)
- [daniel616/CVE-2022-21661-Demo](https://github.com/daniel616/CVE-2022-21661-Demo) - [daniel616/CVE-2022-21661-Demo](https://github.com/daniel616/CVE-2022-21661-Demo)
- [sealldeveloper/CVE-2022-21661-PoC](https://github.com/sealldeveloper/CVE-2022-21661-PoC) - [sealldeveloper/CVE-2022-21661-PoC](https://github.com/sealldeveloper/CVE-2022-21661-PoC)
@ -20130,6 +20131,7 @@
- [Iris288/CVE-2021-43798](https://github.com/Iris288/CVE-2021-43798) - [Iris288/CVE-2021-43798](https://github.com/Iris288/CVE-2021-43798)
- [wagneralves/CVE-2021-43798](https://github.com/wagneralves/CVE-2021-43798) - [wagneralves/CVE-2021-43798](https://github.com/wagneralves/CVE-2021-43798)
- [K3ysTr0K3R/CVE-2021-43798-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2021-43798-EXPLOIT) - [K3ysTr0K3R/CVE-2021-43798-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2021-43798-EXPLOIT)
- [ticofookfook/CVE-2021-43798](https://github.com/ticofookfook/CVE-2021-43798)
### CVE-2021-43799 (2022-01-25) ### CVE-2021-43799 (2022-01-25)