From 88e97192f797cc7bdf6cf4b4b867dce1bb1f52c5 Mon Sep 17 00:00:00 2001 From: 0xMarcio Date: Mon, 10 Jun 2024 08:49:13 +0000 Subject: [PATCH] Trending CVEs update 2024-06-10 08:49 :robot: --- README.md | 104 ++++++++++++++++++++++++++++++++++++++++++++---------- 1 file changed, 86 insertions(+), 18 deletions(-) diff --git a/README.md b/README.md index 00768cb50..bdfc2ff17 100644 --- a/README.md +++ b/README.md @@ -1,23 +1,91 @@ -# CVE +# Trending Proof-of-Concept exploits -

Almost every publicly available CVE PoC.

-## Current hottest CVEs -| Title | URL | -| ----------- | ----------- | -| CVE-2022-0001 | [/0xMarcio/cve/blob/main/2022/CVE-2022-0001.md](https://github.com/0xMarcio/cve/blob/main/2022/CVE-2022-0001.md) | -| CVE-2022-25297 | [/0xMarcio/cve/blob/main/2022/CVE-2022-25297.md](https://github.com/0xMarcio/cve/blob/main/2022/CVE-2022-25297.md) | -| CVE-2022-1388 | [/0xMarcio/cve/blob/main/2022/CVE-2022-1388.md](https://github.com/0xMarcio/cve/blob/main/2022/CVE-2022-1388.md) | -| CVE-2022-25451 | [/0xMarcio/cve/blob/main/2022/CVE-2022-25451.md](https://github.com/0xMarcio/cve/blob/main/2022/CVE-2022-25451.md) | +## 2024 -To see the complete history go [here](hot_cves.csv) +### Top 10 of 405 Repositories -## Use cases -- Browse around, find a nice PoC, and test away! -- `Watch` the repository to receive notifications about new PoCs as soon as they go public. -- Search for a specific product(s) (and possibly version) to find all public exploits related to it. -- Monitor the [atom feed](https://github.com/0xMarcio/cve/commits/main.atom) for a specific product(s). -- Create a searchable HTML table using the template and script in [summary_html](summary_html) +| Stars | Updated | Name | Description | +| --- | --- | --- | --- | +| 2091⭐ | 12 hours ago | [CVE-2024-1086](https://github.com/Notselwyn/CVE-2024-1086) | Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images. | +| 630⭐ | 6 hours ago | [CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability](https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability) | Microsoft-Outlook-Remote-Code-Execution-Vulnerability | +| 237⭐ | 4 days ago | [CVE-2024-21338](https://github.com/hakaioffsec/CVE-2024-21338) | Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled. | +| 182⭐ | 1 day ago | [CVE-2024-23897](https://github.com/h4x0r-dz/CVE-2024-23897) | CVE-2024-23897 | +| 149⭐ | 3 hours ago | [CVE-2024-21413](https://github.com/duy-31/CVE-2024-21413) | Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC | +| 131⭐ | 12 hours ago | [CVE-2024-25600](https://github.com/Chocapikk/CVE-2024-25600) | Unauthenticated Remote Code Execution – Bricks <= 1.9.6 | +| 127⭐ | 4 days ago | [CVE-2024-27198-RCE](https://github.com/W01fh4cker/CVE-2024-27198-RCE) | CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4 | +| 107⭐ | 22 hours ago | [CVE-2024-21683-RCE](https://github.com/W01fh4cker/CVE-2024-21683-RCE) | CVE-2024-21683 Confluence Post Auth RCE | +| 101⭐ | 5 days ago | [CVE-2024-21762](https://github.com/h4x0r-dz/CVE-2024-21762) | out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability | +| 95⭐ | 2 days ago | [CVE-2024-22120-RCE](https://github.com/W01fh4cker/CVE-2024-22120-RCE) | Time Based SQL Injection in Zabbix Server Audit Log --> RCE | -## Contribution -All contribtutions/ideas/suggestions are welcome! Create a new ticket via [GitHub issues](https://github.com/0xMarcio/cve/issues) . \ No newline at end of file + +## 2023 + +### Top 10 of 1053 Repositories + +| Stars | Updated | Name | Description | +| --- | --- | --- | --- | +| 769⭐ | 14 hours ago | [CVE-2023-38831-winrar-exploit](https://github.com/b1tg/CVE-2023-38831-winrar-exploit) | CVE-2023-38831 winrar exploit generator | +| 468⭐ | 2 days ago | [Windows_LPE_AFD_CVE-2023-21768](https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768) | LPE exploit for CVE-2023-21768 | +| 376⭐ | 6 days ago | [CVE-2023-4911](https://github.com/leesh3288/CVE-2023-4911) | PoC for CVE-2023-4911 | +| 374⭐ | 5 days ago | [CVE-2023-0386](https://github.com/xkaneiki/CVE-2023-0386) | CVE-2023-0386在ubuntu22.04上的提权 | +| 365⭐ | 2 days ago | [CVE-2023-32233](https://github.com/Liuk3r/CVE-2023-32233) | CVE-2023-32233: Linux内核中的安全漏洞 | +| 339⭐ | 26 days ago | [CVE-2023-23397-POC-Powershell](https://github.com/api0cradle/CVE-2023-23397-POC-Powershell) | | +| 307⭐ | 6 days ago | [CVE-2023-4863](https://github.com/mistymntncop/CVE-2023-4863) | | +| 262⭐ | 4 days ago | [CVE-2023-21608](https://github.com/hacksysteam/CVE-2023-21608) | Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit | +| 237⭐ | 6 days ago | [CVE-2023-7028](https://github.com/Vozec/CVE-2023-7028) | This repository presents a proof-of-concept of CVE-2023-7028 | +| 227⭐ | 4 days ago | [CVE-2023-20887](https://github.com/sinsinology/CVE-2023-20887) | VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887) | + + +## 2022 + +### Top 10 of 1134 Repositories + +| Stars | Updated | Name | Description | +| --- | --- | --- | --- | +| 1076⭐ | 8 days ago | [CVE-2022-0847-DirtyPipe-Exploit](https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit) | A root exploit for CVE-2022-0847 (Dirty Pipe) | +| 556⭐ | 26 days ago | [CVE-2022-23222](https://github.com/tr3ee/CVE-2022-23222) | CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation | +| 514⭐ | 3 days ago | [CVE-2022-0847-DirtyPipe-Exploits](https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits) | A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability. | +| 493⭐ | 30 days ago | [CVE-2022-0995](https://github.com/Bonfee/CVE-2022-0995) | CVE-2022-0995 exploit | +| 463⭐ | 2 days ago | [CVE-2022-2588](https://github.com/Markakd/CVE-2022-2588) | exploit for CVE-2022-2588 | +| 427⭐ | 24 days ago | [CVE-2022-25636](https://github.com/Bonfee/CVE-2022-25636) | CVE-2022-25636 | +| 394⭐ | 6 days ago | [CVE-2022-30190-follina-Office-MSDT-Fixed](https://github.com/komomon/CVE-2022-30190-follina-Office-MSDT-Fixed) | CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。 | +| 390⭐ | 30 days ago | [CVE-2022-33679](https://github.com/Bdenneu/CVE-2022-33679) | One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html | +| 372⭐ | 6 days ago | [CVE-2022-39197](https://github.com/its-arun/CVE-2022-39197) | CobaltStrike <= 4.7.1 RCE | +| 365⭐ | 12 days ago | [CVE-2022-0185](https://github.com/Crusaders-of-Rust/CVE-2022-0185) | CVE-2022-0185 | + + +## 2021 + +### Top 10 of 1247 Repositories + +| Stars | Updated | Name | Description | +| --- | --- | --- | --- | +| 1926⭐ | 3 days ago | [CVE-2021-4034](https://github.com/berdav/CVE-2021-4034) | CVE-2021-4034 1day | +| 1029⭐ | 2 days ago | [CVE-2021-4034](https://github.com/arthepsy/CVE-2021-4034) | PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034) | +| 977⭐ | 18 hours ago | [CVE-2021-1675](https://github.com/calebstewart/CVE-2021-1675) | Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare) | +| 930⭐ | 2 days ago | [CVE-2021-3156](https://github.com/blasty/CVE-2021-3156) | | +| 928⭐ | 5 days ago | [CVE-2021-44228-PoC-log4j-bypass-words](https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words) | 🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks | +| 850⭐ | 24 days ago | [CVE-2021-44228-Scanner](https://github.com/logpresso/CVE-2021-44228-Scanner) | Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228 | +| 820⭐ | 9 days ago | [CVE-2021-31166](https://github.com/0vercl0k/CVE-2021-31166) | Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. | +| 714⭐ | 14 days ago | [CVE-2021-3156](https://github.com/worawit/CVE-2021-3156) | Sudo Baron Samedit Exploit | +| 475⭐ | 9 days ago | [CVE-2021-21972](https://github.com/NS-Sp4ce/CVE-2021-21972) | CVE-2021-21972 Exploit | +| 429⭐ | 7 days ago | [CVE-2021-3156](https://github.com/stong/CVE-2021-3156) | PoC for CVE-2021-3156 (sudo heap overflow) | + + +## 2020 + +### Top 10 of 845 Repositories + +| Stars | Updated | Name | Description | +| --- | --- | --- | --- | +| 1699⭐ | 19 hours ago | [CVE-2020-1472](https://github.com/SecuraBV/CVE-2020-1472) | Test tool for CVE-2020-1472 | +| 1290⭐ | 5 days ago | [CVE-2020-0796](https://github.com/danigargu/CVE-2020-0796) | CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost | +| 1152⭐ | 2 days ago | [CVE-2020-1472](https://github.com/dirkjanm/CVE-2020-1472) | PoC for Zerologon - all research credits go to Tom Tervoort of Secura | +| 515⭐ | 21 days ago | [CVE-2020-0796-RCE-POC](https://github.com/jamf/CVE-2020-0796-RCE-POC) | CVE-2020-0796 Remote Code Execution POC | +| 372⭐ | 6 days ago | [CVE-2020-5902](https://github.com/jas502n/CVE-2020-5902) | CVE-2020-5902 BIG-IP | +| 367⭐ | 8 days ago | [CVE-2020-1472](https://github.com/VoidSec/CVE-2020-1472) | Exploit Code for CVE-2020-1472 aka Zerologon | +| 333⭐ | 6 days ago | [CVEAC-2020](https://github.com/thesecretclub/CVEAC-2020) | EasyAntiCheat Integrity check bypass by mimicking memory changes | +| 333⭐ | 27 days ago | [CVE-2020-2551](https://github.com/Y4er/CVE-2020-2551) | Weblogic IIOP CVE-2020-2551 | +| 322⭐ | 38 days ago | [cve-2020-0688](https://github.com/Ridter/cve-2020-0688) | cve-2020-0688 | +| 322⭐ | 21 hours ago | [CVE-2020-0796-PoC](https://github.com/eerykitty/CVE-2020-0796-PoC) | PoC for triggering buffer overflow via CVE-2020-0796 | \ No newline at end of file