From bdc834b299b5d9d65ed93ec3852585e3134f8303 Mon Sep 17 00:00:00 2001 From: adminlove520 <791751568@qq.com> Date: Mon, 27 Jan 2025 04:48:57 +0000 Subject: [PATCH] Auto Update 2025-01-27 04:48:57+00:00 --- 2024/CVE-2024-49138.json | 2 +- 2025/CVE-2025-0411.json | 2 +- dateLog/2025-01-27.json | 2 +- update.json | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/2024/CVE-2024-49138.json b/2024/CVE-2024-49138.json index f7218c5f62..bb742ad4c7 100644 --- a/2024/CVE-2024-49138.json +++ b/2024/CVE-2024-49138.json @@ -1 +1 @@ -[{"id":916896042,"node_id":"R_kgDONqa5Kg","name":"CVE-2024-49138-POC","full_name":"MrAle98/CVE-2024-49138-POC","private":false,"owner":{"login":"MrAle98","id":74059030,"node_id":"MDQ6VXNlcjc0MDU5MDMw","avatar_url":"https://avatars.githubusercontent.com/u/74059030?v=4","url":"https://api.github.com/users/MrAle98","html_url":"https://github.com/MrAle98","type":"User","site_admin":false},"html_url":"https://github.com/MrAle98/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/MrAle98/CVE-2024-49138-POC","created_at":"2025-01-15T00:43:37Z","updated_at":"2025-01-26T19:05:09Z","pushed_at":"2025-01-23T14:59:40Z","stargazers_count":217,"watchers_count":217,"forks_count":43,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":43,"watchers":217,"default_branch":"master","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T04:20:12Z","pushed_at":"2025-01-27T04:20:08Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":919776614,"node_id":"R_kgDONtKtZg","name":"CVE-2024-49138-POC","full_name":"bananoname/CVE-2024-49138-POC","private":false,"owner":{"login":"bananoname","id":177087379,"node_id":"U_kgDOCo4jkw","avatar_url":"https://avatars.githubusercontent.com/u/177087379?v=4","url":"https://api.github.com/users/bananoname","html_url":"https://github.com/bananoname","type":"User","site_admin":false},"html_url":"https://github.com/bananoname/CVE-2024-49138-POC","description":"","fork":false,"url":"https://api.github.com/repos/bananoname/CVE-2024-49138-POC","created_at":"2025-01-21T01:50:34Z","updated_at":"2025-01-21T02:06:03Z","pushed_at":"2025-01-21T02:06:00Z","stargazers_count":0,"watchers_count":0,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":0,"watchers":0,"default_branch":"main","score":1}] \ No newline at end of file +[{"id":916896042,"node_id":"R_kgDONqa5Kg","name":"CVE-2024-49138-POC","full_name":"MrAle98/CVE-2024-49138-POC","private":false,"owner":{"login":"MrAle98","id":74059030,"node_id":"MDQ6VXNlcjc0MDU5MDMw","avatar_url":"https://avatars.githubusercontent.com/u/74059030?v=4","url":"https://api.github.com/users/MrAle98","html_url":"https://github.com/MrAle98","type":"User","site_admin":false},"html_url":"https://github.com/MrAle98/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/MrAle98/CVE-2024-49138-POC","created_at":"2025-01-15T00:43:37Z","updated_at":"2025-01-26T19:05:09Z","pushed_at":"2025-01-23T14:59:40Z","stargazers_count":217,"watchers_count":217,"forks_count":43,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":43,"watchers":217,"default_branch":"master","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T04:40:00Z","pushed_at":"2025-01-27T04:39:56Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":919776614,"node_id":"R_kgDONtKtZg","name":"CVE-2024-49138-POC","full_name":"bananoname/CVE-2024-49138-POC","private":false,"owner":{"login":"bananoname","id":177087379,"node_id":"U_kgDOCo4jkw","avatar_url":"https://avatars.githubusercontent.com/u/177087379?v=4","url":"https://api.github.com/users/bananoname","html_url":"https://github.com/bananoname","type":"User","site_admin":false},"html_url":"https://github.com/bananoname/CVE-2024-49138-POC","description":"","fork":false,"url":"https://api.github.com/repos/bananoname/CVE-2024-49138-POC","created_at":"2025-01-21T01:50:34Z","updated_at":"2025-01-21T02:06:03Z","pushed_at":"2025-01-21T02:06:00Z","stargazers_count":0,"watchers_count":0,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":0,"watchers":0,"default_branch":"main","score":1}] \ No newline at end of file diff --git a/2025/CVE-2025-0411.json b/2025/CVE-2025-0411.json index c6f50087ed..33c6df6bd8 100644 --- a/2025/CVE-2025-0411.json +++ b/2025/CVE-2025-0411.json @@ -1 +1 @@ -[{"id":920653253,"node_id":"R_kgDONuANxQ","name":"7-Zip-CVE-2025-0411-POC","full_name":"dhmosfunk/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"dhmosfunk","id":45040001,"node_id":"MDQ6VXNlcjQ1MDQwMDAx","avatar_url":"https://avatars.githubusercontent.com/u/45040001?v=4","url":"https://api.github.com/users/dhmosfunk","html_url":"https://github.com/dhmosfunk","type":"User","site_admin":false},"html_url":"https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/dhmosfunk/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-22T14:40:34Z","updated_at":"2025-01-25T15:52:41Z","pushed_at":"2025-01-22T15:08:56Z","stargazers_count":61,"watchers_count":61,"forks_count":13,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":13,"watchers":61,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T04:24:23Z","pushed_at":"2025-01-27T04:24:19Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1}] \ No newline at end of file +[{"id":920653253,"node_id":"R_kgDONuANxQ","name":"7-Zip-CVE-2025-0411-POC","full_name":"dhmosfunk/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"dhmosfunk","id":45040001,"node_id":"MDQ6VXNlcjQ1MDQwMDAx","avatar_url":"https://avatars.githubusercontent.com/u/45040001?v=4","url":"https://api.github.com/users/dhmosfunk","html_url":"https://github.com/dhmosfunk","type":"User","site_admin":false},"html_url":"https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/dhmosfunk/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-22T14:40:34Z","updated_at":"2025-01-25T15:52:41Z","pushed_at":"2025-01-22T15:08:56Z","stargazers_count":61,"watchers_count":61,"forks_count":13,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":13,"watchers":61,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T04:44:02Z","pushed_at":"2025-01-27T04:43:59Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1}] \ No newline at end of file diff --git a/dateLog/2025-01-27.json b/dateLog/2025-01-27.json index 5c4bcdd3cc..6d5c0def70 100644 --- a/dateLog/2025-01-27.json +++ b/dateLog/2025-01-27.json @@ -1 +1 @@ -{"new":[{"id":922771086,"node_id":"R_kgDONwBejg","name":"CVE-2024-2961-Remote-File-Read","full_name":"kyotozx/CVE-2024-2961-Remote-File-Read","private":false,"owner":{"login":"kyotozx","id":134347770,"node_id":"U_kgDOCAH7-g","avatar_url":"https://avatars.githubusercontent.com/u/134347770?v=4","url":"https://api.github.com/users/kyotozx","html_url":"https://github.com/kyotozx","type":"User","site_admin":false},"html_url":"https://github.com/kyotozx/CVE-2024-2961-Remote-File-Read","description":"This script demonstrates a proof-of-concept (PoC) for exploiting a file read vulnerability in the iconv library, as detailed in Ambionics Security's blog https://www.ambionics.io/blog/iconv-cve-2024-2961-p1.","fork":false,"url":"https://api.github.com/repos/kyotozx/CVE-2024-2961-Remote-File-Read","created_at":"2025-01-27T03:06:37Z","updated_at":"2025-01-27T03:13:59Z","pushed_at":"2025-01-27T03:10:30Z","stargazers_count":0,"watchers_count":0,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":0,"watchers":0,"default_branch":"main","score":1}],"update":[{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T04:20:12Z","pushed_at":"2025-01-27T04:20:08Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T04:24:23Z","pushed_at":"2025-01-27T04:24:19Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T01:57:38Z","pushed_at":"2025-01-27T01:57:35Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T01:41:45Z","pushed_at":"2025-01-27T01:41:42Z","stargazers_count":0,"watchers_count":0,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":0,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T02:43:51Z","pushed_at":"2025-01-27T02:43:47Z","stargazers_count":0,"watchers_count":0,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":0,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T02:38:59Z","pushed_at":"2025-01-27T02:38:55Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T03:04:08Z","pushed_at":"2025-01-27T03:04:06Z","stargazers_count":0,"watchers_count":0,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":0,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T02:59:40Z","pushed_at":"2025-01-27T02:59:36Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T03:31:53Z","pushed_at":"2025-01-27T03:24:22Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T03:20:06Z","pushed_at":"2025-01-27T03:20:02Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":806456046,"node_id":"R_kgDOMBGK7g","name":"cnext-exploits","full_name":"ambionics/cnext-exploits","private":false,"owner":{"login":"ambionics","id":29630660,"node_id":"MDEyOk9yZ2FuaXphdGlvbjI5NjMwNjYw","avatar_url":"https://avatars.githubusercontent.com/u/29630660?v=4","url":"https://api.github.com/users/ambionics","html_url":"https://github.com/ambionics","type":"Organization","site_admin":false},"html_url":"https://github.com/ambionics/cnext-exploits","description":"Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()","fork":false,"url":"https://api.github.com/repos/ambionics/cnext-exploits","created_at":"2024-05-27T08:30:06Z","updated_at":"2025-01-26T23:41:32Z","pushed_at":"2024-09-30T08:45:56Z","stargazers_count":432,"watchers_count":432,"forks_count":55,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":55,"watchers":432,"default_branch":"main","score":1},{"id":810234472,"node_id":"R_kgDOMEsyaA","name":"CVE-2024-2961_poc","full_name":"kjdfklha/CVE-2024-2961_poc","private":false,"owner":{"login":"kjdfklha","id":106435455,"node_id":"U_kgDOBlgTfw","avatar_url":"https://avatars.githubusercontent.com/u/106435455?v=4","url":"https://api.github.com/users/kjdfklha","html_url":"https://github.com/kjdfklha","type":"User","site_admin":false},"html_url":"https://github.com/kjdfklha/CVE-2024-2961_poc","description":"","fork":false,"url":"https://api.github.com/repos/kjdfklha/CVE-2024-2961_poc","created_at":"2024-06-04T09:57:46Z","updated_at":"2024-09-20T09:16:54Z","pushed_at":"2024-06-04T10:02:44Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":0,"watchers":1,"default_branch":"master","score":1},{"id":803147840,"node_id":"R_kgDOL98QQA","name":"CVE-2024-2961","full_name":"rvizx/CVE-2024-2961","private":false,"owner":{"login":"rvizx","id":84989569,"node_id":"MDQ6VXNlcjg0OTg5NTY5","avatar_url":"https://avatars.githubusercontent.com/u/84989569?v=4","url":"https://api.github.com/users/rvizx","html_url":"https://github.com/rvizx","type":"User","site_admin":false},"html_url":"https://github.com/rvizx/CVE-2024-2961","description":"CVE-2024–2961 Security Issue Mitigation Script","fork":false,"url":"https://api.github.com/repos/rvizx/CVE-2024-2961","created_at":"2024-05-20T06:53:23Z","updated_at":"2024-07-10T16:47:26Z","pushed_at":"2024-05-20T07:12:24Z","stargazers_count":5,"watchers_count":5,"forks_count":1,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":1,"watchers":5,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T03:44:22Z","pushed_at":"2025-01-27T03:44:19Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T03:40:10Z","pushed_at":"2025-01-27T03:40:07Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T04:04:21Z","pushed_at":"2025-01-27T04:04:18Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T04:00:08Z","pushed_at":"2025-01-27T04:00:05Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T04:24:23Z","pushed_at":"2025-01-27T04:24:19Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T04:20:12Z","pushed_at":"2025-01-27T04:20:08Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1}]} \ No newline at end of file +{"new":[{"id":922771086,"node_id":"R_kgDONwBejg","name":"CVE-2024-2961-Remote-File-Read","full_name":"kyotozx/CVE-2024-2961-Remote-File-Read","private":false,"owner":{"login":"kyotozx","id":134347770,"node_id":"U_kgDOCAH7-g","avatar_url":"https://avatars.githubusercontent.com/u/134347770?v=4","url":"https://api.github.com/users/kyotozx","html_url":"https://github.com/kyotozx","type":"User","site_admin":false},"html_url":"https://github.com/kyotozx/CVE-2024-2961-Remote-File-Read","description":"This script demonstrates a proof-of-concept (PoC) for exploiting a file read vulnerability in the iconv library, as detailed in Ambionics Security's blog https://www.ambionics.io/blog/iconv-cve-2024-2961-p1.","fork":false,"url":"https://api.github.com/repos/kyotozx/CVE-2024-2961-Remote-File-Read","created_at":"2025-01-27T03:06:37Z","updated_at":"2025-01-27T03:13:59Z","pushed_at":"2025-01-27T03:10:30Z","stargazers_count":0,"watchers_count":0,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":0,"watchers":0,"default_branch":"main","score":1}],"update":[{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T04:40:00Z","pushed_at":"2025-01-27T04:39:56Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T04:44:02Z","pushed_at":"2025-01-27T04:43:59Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T01:57:38Z","pushed_at":"2025-01-27T01:57:35Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T01:41:45Z","pushed_at":"2025-01-27T01:41:42Z","stargazers_count":0,"watchers_count":0,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":0,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T02:43:51Z","pushed_at":"2025-01-27T02:43:47Z","stargazers_count":0,"watchers_count":0,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":0,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T02:38:59Z","pushed_at":"2025-01-27T02:38:55Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T03:04:08Z","pushed_at":"2025-01-27T03:04:06Z","stargazers_count":0,"watchers_count":0,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":0,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T02:59:40Z","pushed_at":"2025-01-27T02:59:36Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T03:31:53Z","pushed_at":"2025-01-27T03:24:22Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T03:20:06Z","pushed_at":"2025-01-27T03:20:02Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":806456046,"node_id":"R_kgDOMBGK7g","name":"cnext-exploits","full_name":"ambionics/cnext-exploits","private":false,"owner":{"login":"ambionics","id":29630660,"node_id":"MDEyOk9yZ2FuaXphdGlvbjI5NjMwNjYw","avatar_url":"https://avatars.githubusercontent.com/u/29630660?v=4","url":"https://api.github.com/users/ambionics","html_url":"https://github.com/ambionics","type":"Organization","site_admin":false},"html_url":"https://github.com/ambionics/cnext-exploits","description":"Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()","fork":false,"url":"https://api.github.com/repos/ambionics/cnext-exploits","created_at":"2024-05-27T08:30:06Z","updated_at":"2025-01-26T23:41:32Z","pushed_at":"2024-09-30T08:45:56Z","stargazers_count":432,"watchers_count":432,"forks_count":55,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":55,"watchers":432,"default_branch":"main","score":1},{"id":810234472,"node_id":"R_kgDOMEsyaA","name":"CVE-2024-2961_poc","full_name":"kjdfklha/CVE-2024-2961_poc","private":false,"owner":{"login":"kjdfklha","id":106435455,"node_id":"U_kgDOBlgTfw","avatar_url":"https://avatars.githubusercontent.com/u/106435455?v=4","url":"https://api.github.com/users/kjdfklha","html_url":"https://github.com/kjdfklha","type":"User","site_admin":false},"html_url":"https://github.com/kjdfklha/CVE-2024-2961_poc","description":"","fork":false,"url":"https://api.github.com/repos/kjdfklha/CVE-2024-2961_poc","created_at":"2024-06-04T09:57:46Z","updated_at":"2024-09-20T09:16:54Z","pushed_at":"2024-06-04T10:02:44Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":0,"watchers":1,"default_branch":"master","score":1},{"id":803147840,"node_id":"R_kgDOL98QQA","name":"CVE-2024-2961","full_name":"rvizx/CVE-2024-2961","private":false,"owner":{"login":"rvizx","id":84989569,"node_id":"MDQ6VXNlcjg0OTg5NTY5","avatar_url":"https://avatars.githubusercontent.com/u/84989569?v=4","url":"https://api.github.com/users/rvizx","html_url":"https://github.com/rvizx","type":"User","site_admin":false},"html_url":"https://github.com/rvizx/CVE-2024-2961","description":"CVE-2024–2961 Security Issue Mitigation Script","fork":false,"url":"https://api.github.com/repos/rvizx/CVE-2024-2961","created_at":"2024-05-20T06:53:23Z","updated_at":"2024-07-10T16:47:26Z","pushed_at":"2024-05-20T07:12:24Z","stargazers_count":5,"watchers_count":5,"forks_count":1,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":1,"watchers":5,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T03:44:22Z","pushed_at":"2025-01-27T03:44:19Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T03:40:10Z","pushed_at":"2025-01-27T03:40:07Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T04:04:21Z","pushed_at":"2025-01-27T04:04:18Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T04:00:08Z","pushed_at":"2025-01-27T04:00:05Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T04:24:23Z","pushed_at":"2025-01-27T04:24:19Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T04:20:12Z","pushed_at":"2025-01-27T04:20:08Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T04:44:02Z","pushed_at":"2025-01-27T04:43:59Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T04:40:00Z","pushed_at":"2025-01-27T04:39:56Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1}]} \ No newline at end of file diff --git a/update.json b/update.json index 09c4199d74..0aa559f078 100644 --- a/update.json +++ b/update.json @@ -1 +1 @@ -[{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T04:24:23Z","pushed_at":"2025-01-27T04:24:19Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T04:20:12Z","pushed_at":"2025-01-27T04:20:08Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1}] \ No newline at end of file +[{"id":922252842,"node_id":"R_kgDONvh2Kg","name":"7-Zip-CVE-2025-0411-POC","full_name":"CastroJared/7-Zip-CVE-2025-0411-POC","private":false,"owner":{"login":"CastroJared","id":128201656,"node_id":"U_kgDOB6QzuA","avatar_url":"https://avatars.githubusercontent.com/u/128201656?v=4","url":"https://api.github.com/users/CastroJared","html_url":"https://github.com/CastroJared","type":"User","site_admin":false},"html_url":"https://github.com/CastroJared/7-Zip-CVE-2025-0411-POC","description":"This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.","fork":false,"url":"https://api.github.com/repos/CastroJared/7-Zip-CVE-2025-0411-POC","created_at":"2025-01-25T18:07:12Z","updated_at":"2025-01-27T04:44:02Z","pushed_at":"2025-01-27T04:43:59Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["7zip","cve","cve-2025-0411","cve-2025-0411-poc","payload-delivery","poc"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":917243015,"node_id":"R_kgDONqwEhw","name":"CVE-2024-49138-POC","full_name":"aspire20x/CVE-2024-49138-POC","private":false,"owner":{"login":"aspire20x","id":68471668,"node_id":"MDQ6VXNlcjY4NDcxNjY4","avatar_url":"https://avatars.githubusercontent.com/u/68471668?v=4","url":"https://api.github.com/users/aspire20x","html_url":"https://github.com/aspire20x","type":"User","site_admin":false},"html_url":"https://github.com/aspire20x/CVE-2024-49138-POC","description":"POC exploit for CVE-2024-49138","fork":false,"url":"https://api.github.com/repos/aspire20x/CVE-2024-49138-POC","created_at":"2025-01-15T16:14:34Z","updated_at":"2025-01-27T04:40:00Z","pushed_at":"2025-01-27T04:39:56Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["clfs","exploitation","kernel","windows"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1}] \ No newline at end of file