Auto Update 2024/09/13 18:30:25

This commit is contained in:
motikan2010-bot 2024-09-14 03:30:25 +09:00
parent 905481bf6b
commit 04280d09c8
43 changed files with 253 additions and 183 deletions

View file

@ -13,10 +13,10 @@
"description": "Win32k LPE vulnerability used in APT attack",
"fork": false,
"created_at": "2015-05-12T18:04:48Z",
"updated_at": "2024-08-12T19:17:25Z",
"updated_at": "2024-09-13T14:05:38Z",
"pushed_at": "2017-12-18T14:11:29Z",
"stargazers_count": 285,
"watchers_count": 285,
"stargazers_count": 284,
"watchers_count": 284,
"has_discussions": false,
"forks_count": 178,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 178,
"watchers": 285,
"watchers": 284,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container",
"fork": false,
"created_at": "2017-12-16T00:23:30Z",
"updated_at": "2024-08-12T19:34:50Z",
"updated_at": "2024-09-13T15:02:06Z",
"pushed_at": "2017-12-16T00:39:19Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "A coordinated disclosure and security advisory on Fermax Intercom DTML Injection vulneraiblity. Special thanks to Fermax International for prompt responses and allowing details to be publicized.",
"fork": false,
"created_at": "2019-12-20T07:20:50Z",
"updated_at": "2024-09-12T19:16:30Z",
"updated_at": "2024-09-13T18:04:59Z",
"pushed_at": "2020-07-30T19:15:08Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-01-11T10:20:27Z",
"updated_at": "2024-09-13T11:27:23Z",
"pushed_at": "2024-09-13T11:54:27Z",
"pushed_at": "2024-09-13T15:13:43Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-3245-PoC",
"fork": false,
"created_at": "2018-10-24T06:49:33Z",
"updated_at": "2024-09-05T15:38:42Z",
"updated_at": "2024-09-13T14:17:13Z",
"pushed_at": "2021-07-13T02:29:19Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 167,
"watchers_count": 167,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 166,
"watchers": 167,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-8174 - VBScript memory corruption exploit.",
"fork": false,
"created_at": "2018-05-22T21:50:32Z",
"updated_at": "2024-09-12T19:18:15Z",
"updated_at": "2024-09-13T15:40:47Z",
"pushed_at": "2018-05-23T20:43:58Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 167,
"watchers_count": 167,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 166,
"watchers": 167,
"score": 0,
"subscribers_count": 14
},

View file

@ -13,10 +13,10 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2024-09-06T08:10:47Z",
"updated_at": "2024-09-13T12:42:59Z",
"pushed_at": "2020-06-13T17:40:14Z",
"stargazers_count": 615,
"watchers_count": 615,
"stargazers_count": 616,
"watchers_count": 616,
"has_discussions": false,
"forks_count": 81,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 81,
"watchers": 615,
"watchers": 616,
"score": 0,
"subscribers_count": 19
}

View file

@ -43,10 +43,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2024-09-11T06:22:37Z",
"updated_at": "2024-09-13T16:33:29Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 167,
"watchers_count": 167,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 166,
"watchers": 167,
"score": 0,
"subscribers_count": 5
},

View file

@ -1354,10 +1354,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2024-09-08T14:31:36Z",
"updated_at": "2024-09-13T12:53:38Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 530,
"watchers_count": 530,
"stargazers_count": 531,
"watchers_count": 531,
"has_discussions": false,
"forks_count": 170,
"allow_forking": true,
@ -1372,7 +1372,7 @@
],
"visibility": "public",
"forks": 170,
"watchers": 530,
"watchers": 531,
"score": 0,
"subscribers_count": 26
},

View file

@ -43,10 +43,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-09-11T01:14:16Z",
"updated_at": "2024-09-13T16:33:17Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1720,
"watchers_count": 1720,
"stargazers_count": 1721,
"watchers_count": 1721,
"has_discussions": false,
"forks_count": 357,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 357,
"watchers": 1720,
"watchers": 1721,
"score": 0,
"subscribers_count": 87
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 16,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -37,7 +37,7 @@
"urls"
],
"visibility": "public",
"forks": 16,
"forks": 14,
"watchers": 78,
"score": 0,
"subscribers_count": 7

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-09-13T02:34:20Z",
"updated_at": "2024-09-13T16:28:04Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1307,
"watchers_count": 1307,
"stargazers_count": 1308,
"watchers_count": 1308,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 165,
"watchers": 1307,
"watchers": 1308,
"score": 0,
"subscribers_count": 15
}

View file

@ -13,10 +13,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2024-09-11T06:22:37Z",
"updated_at": "2024-09-13T16:33:29Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 167,
"watchers_count": 167,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 166,
"watchers": 167,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2024-09-08T09:44:14Z",
"updated_at": "2024-09-13T12:41:17Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 972,
"watchers_count": 972,
"stargazers_count": 973,
"watchers_count": 973,
"has_discussions": false,
"forks_count": 189,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 189,
"watchers": 972,
"watchers": 973,
"score": 0,
"subscribers_count": 26
},

View file

@ -8872,14 +8872,14 @@
{
"id": 440154999,
"name": "log4j-dork-scanner",
"full_name": "JagarYousef\/log4j-dork-scanner",
"full_name": "cergo123\/log4j-dork-scanner",
"owner": {
"login": "JagarYousef",
"login": "cergo123",
"id": 41321155,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41321155?v=4",
"html_url": "https:\/\/github.com\/JagarYousef"
"html_url": "https:\/\/github.com\/cergo123"
},
"html_url": "https:\/\/github.com\/JagarYousef\/log4j-dork-scanner",
"html_url": "https:\/\/github.com\/cergo123\/log4j-dork-scanner",
"description": "A script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks",
"fork": false,
"created_at": "2021-12-20T12:01:52Z",

View file

@ -73,10 +73,10 @@
"description": "SQLPad - Template injection (POC exploit for SQLPad RCE [CVE-2022-0944])",
"fork": false,
"created_at": "2024-09-09T19:09:43Z",
"updated_at": "2024-09-10T14:30:04Z",
"updated_at": "2024-09-13T16:27:33Z",
"pushed_at": "2024-09-10T14:23:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -315,7 +315,7 @@
"description": "Reappear-CVE-2022-21449-TLS-PoC",
"fork": false,
"created_at": "2024-08-01T03:27:17Z",
"updated_at": "2024-08-06T16:02:16Z",
"updated_at": "2024-09-13T17:08:41Z",
"pushed_at": "2024-08-06T16:02:13Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-09-13T02:34:20Z",
"updated_at": "2024-09-13T16:28:04Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1307,
"watchers_count": 1307,
"stargazers_count": 1308,
"watchers_count": 1308,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 165,
"watchers": 1307,
"watchers": 1308,
"score": 0,
"subscribers_count": 15
},

View file

@ -228,13 +228,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -48,7 +48,7 @@
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -56,7 +56,7 @@
"cve-2023-1671"
],
"visibility": "public",
"forks": 4,
"forks": 3,
"watchers": 18,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-12-08T13:51:37Z",
"updated_at": "2024-08-11T01:28:35Z",
"updated_at": "2024-09-13T17:07:40Z",
"pushed_at": "2023-12-09T13:35:12Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Cloudpanel 0-day Exploit",
"fork": false,
"created_at": "2023-06-08T09:20:22Z",
"updated_at": "2024-08-20T12:56:18Z",
"updated_at": "2024-09-13T15:51:02Z",
"pushed_at": "2023-07-24T01:43:17Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-6319 proof of concept",
"fork": false,
"created_at": "2024-04-11T18:58:17Z",
"updated_at": "2024-08-24T19:00:40Z",
"updated_at": "2024-09-13T13:56:33Z",
"pushed_at": "2024-08-09T18:16:49Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 4
}

View file

@ -1,32 +0,0 @@
[
{
"id": 766855313,
"name": "CVE-2023-6548-POC",
"full_name": "Roonye660\/CVE-2023-6548-POC",
"owner": {
"login": "Roonye660",
"id": 162106909,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162106909?v=4",
"html_url": "https:\/\/github.com\/Roonye660"
},
"html_url": "https:\/\/github.com\/Roonye660\/CVE-2023-6548-POC",
"description": "0day for Citrix Netscaler ADC and NetScaler Gateway latest versions",
"fork": false,
"created_at": "2024-03-04T08:57:27Z",
"updated_at": "2024-05-02T10:58:27Z",
"pushed_at": "2024-03-04T09:36:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T15:08:01Z",
"updated_at": "2024-09-10T15:04:31Z",
"updated_at": "2024-09-13T17:02:29Z",
"pushed_at": "2024-01-14T07:14:33Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 124,
"watchers": 125,
"score": 0,
"subscribers_count": 3
}

View file

@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-09-11T12:42:22Z",
"updated_at": "2024-09-13T17:48:27Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 671,
"watchers_count": 671,
"stargazers_count": 672,
"watchers_count": 672,
"has_discussions": false,
"forks_count": 148,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 148,
"watchers": 671,
"watchers": 672,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-07T11:07:01Z",
"updated_at": "2024-08-08T22:13:04Z",
"updated_at": "2024-09-13T17:07:30Z",
"pushed_at": "2024-01-07T15:29:51Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-10T20:35:38Z",
"updated_at": "2024-08-15T11:56:51Z",
"updated_at": "2024-09-13T17:07:18Z",
"pushed_at": "2024-01-10T20:43:07Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 12,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "[CVE-2024-26581] Vulnerability Checker for BGN Internal",
"fork": false,
"created_at": "2024-09-10T09:32:25Z",
"updated_at": "2024-09-12T10:16:05Z",
"updated_at": "2024-09-13T16:59:43Z",
"pushed_at": "2024-09-12T10:16:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -142,10 +142,10 @@
"description": "CVE-2024-28000 Exploit for litespeed-cache =<6.3 allows Privilege Escalation with creation of administrator account",
"fork": false,
"created_at": "2024-09-10T08:16:16Z",
"updated_at": "2024-09-12T07:41:03Z",
"updated_at": "2024-09-13T16:27:27Z",
"pushed_at": "2024-09-11T15:52:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -154,7 +154,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-29847.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 856944203,
"name": "CVE-2024-29847",
"full_name": "horizon3ai\/CVE-2024-29847",
"owner": {
"login": "horizon3ai",
"id": 79593994,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
"html_url": "https:\/\/github.com\/horizon3ai"
},
"html_url": "https:\/\/github.com\/horizon3ai\/CVE-2024-29847",
"description": "Ivanti EPM AgentPortal RCE Vulnerability",
"fork": false,
"created_at": "2024-09-13T14:02:04Z",
"updated_at": "2024-09-13T16:52:26Z",
"pushed_at": "2024-09-13T14:02:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2024-08-14T16:20:38Z",
"updated_at": "2024-09-13T08:48:05Z",
"updated_at": "2024-09-13T16:27:42Z",
"pushed_at": "2024-09-05T23:21:00Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 23,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 85,
"forks": 25,
"watchers": 86,
"score": 0,
"subscribers_count": 1
}

View file

@ -982,10 +982,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-09-10T15:03:30Z",
"updated_at": "2024-09-13T13:25:05Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3481,
"watchers_count": 3481,
"stargazers_count": 3482,
"watchers_count": 3482,
"has_discussions": false,
"forks_count": 233,
"allow_forking": true,
@ -994,7 +994,7 @@
"topics": [],
"visibility": "public",
"forks": 233,
"watchers": 3481,
"watchers": 3482,
"score": 0,
"subscribers_count": 39
},

View file

@ -256,10 +256,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-09-13T09:58:41Z",
"updated_at": "2024-09-13T13:55:27Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 564,
"watchers_count": 564,
"stargazers_count": 565,
"watchers_count": 565,
"has_discussions": false,
"forks_count": 103,
"allow_forking": true,
@ -268,7 +268,7 @@
"topics": [],
"visibility": "public",
"forks": 103,
"watchers": 564,
"watchers": 565,
"score": 0,
"subscribers_count": 4
},
@ -406,8 +406,8 @@
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
"fork": false,
"created_at": "2024-08-31T13:56:26Z",
"updated_at": "2024-09-11T15:00:03Z",
"pushed_at": "2024-09-11T14:55:20Z",
"updated_at": "2024-09-13T14:30:20Z",
"pushed_at": "2024-09-13T14:30:18Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,

View file

@ -48,13 +48,13 @@
"stargazers_count": 195,
"watchers_count": 195,
"has_discussions": false,
"forks_count": 83,
"forks_count": 84,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 83,
"forks": 84,
"watchers": 195,
"score": 0,
"subscribers_count": 5

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-30T17:24:58Z",
"updated_at": "2024-09-13T11:47:43Z",
"updated_at": "2024-09-13T13:48:23Z",
"pushed_at": "2024-08-31T19:25:38Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-44542.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 856975237,
"name": "CVE-2024-44542",
"full_name": "alphandbelt\/CVE-2024-44542",
"owner": {
"login": "alphandbelt",
"id": 28209685,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28209685?v=4",
"html_url": "https:\/\/github.com\/alphandbelt"
},
"html_url": "https:\/\/github.com\/alphandbelt\/CVE-2024-44542",
"description": null,
"fork": false,
"created_at": "2024-09-13T15:05:17Z",
"updated_at": "2024-09-13T15:05:40Z",
"pushed_at": "2024-09-13T15:05:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-44623.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 857035292,
"name": "CVE-2024-44623",
"full_name": "merbinr\/CVE-2024-44623",
"owner": {
"login": "merbinr",
"id": 59112642,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59112642?v=4",
"html_url": "https:\/\/github.com\/merbinr"
},
"html_url": "https:\/\/github.com\/merbinr\/CVE-2024-44623",
"description": "Details about the Blind RCE issue(SPX-GC) in SPX-GC",
"fork": false,
"created_at": "2024-09-13T17:11:16Z",
"updated_at": "2024-09-13T18:17:38Z",
"pushed_at": "2024-09-13T18:17:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -2,14 +2,14 @@
{
"id": 852855160,
"name": "CVE-2024-6386",
"full_name": "Argendo\/CVE-2024-6386",
"full_name": "argendo\/CVE-2024-6386",
"owner": {
"login": "Argendo",
"login": "argendo",
"id": 42393831,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42393831?v=4",
"html_url": "https:\/\/github.com\/Argendo"
"html_url": "https:\/\/github.com\/argendo"
},
"html_url": "https:\/\/github.com\/Argendo\/CVE-2024-6386",
"html_url": "https:\/\/github.com\/argendo\/CVE-2024-6386",
"description": "Research and PoC for CVE-2024-6386",
"fork": false,
"created_at": "2024-09-05T14:44:36Z",

View file

@ -43,10 +43,10 @@
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:16:21Z",
"updated_at": "2024-08-30T09:53:58Z",
"updated_at": "2024-09-13T15:33:56Z",
"pushed_at": "2024-07-01T12:25:01Z",
"stargazers_count": 383,
"watchers_count": 383,
"stargazers_count": 382,
"watchers_count": 382,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 90,
"watchers": 383,
"watchers": 382,
"score": 0,
"subscribers_count": 8
},
@ -1635,7 +1635,7 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1643,7 +1643,7 @@
"cve-2024-6387"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-30T07:58:27Z",
"updated_at": "2024-09-13T05:13:04Z",
"updated_at": "2024-09-13T16:27:20Z",
"pushed_at": "2024-08-29T17:41:35Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 0
},

View file

@ -1190,7 +1190,7 @@
<code>The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via the Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
</code>
- [Argendo/CVE-2024-6386](https://github.com/Argendo/CVE-2024-6386)
- [argendo/CVE-2024-6386](https://github.com/argendo/CVE-2024-6386)
### CVE-2024-6387 (2024-07-01)
@ -3223,6 +3223,13 @@
- [horizon3ai/CVE-2024-29824](https://github.com/horizon3ai/CVE-2024-29824)
- [R4be1/CVE-2024-29824](https://github.com/R4be1/CVE-2024-29824)
### CVE-2024-29847 (2024-09-12)
<code>Deserialization of untrusted data in the agent portal of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution.
</code>
- [horizon3ai/CVE-2024-29847](https://github.com/horizon3ai/CVE-2024-29847)
### CVE-2024-29849 (2024-05-22)
<code>Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface.
@ -4827,6 +4834,12 @@
- [pointedsec/CVE-2024-44541](https://github.com/pointedsec/CVE-2024-44541)
### CVE-2024-44542
- [alphandbelt/CVE-2024-44542](https://github.com/alphandbelt/CVE-2024-44542)
### CVE-2024-44623
- [merbinr/CVE-2024-44623](https://github.com/merbinr/CVE-2024-44623)
### CVE-2024-44812
- [b1u3st0rm/CVE-2024-44812-PoC](https://github.com/b1u3st0rm/CVE-2024-44812-PoC)
@ -6292,13 +6305,6 @@
- [Arszilla/CVE-2023-6538](https://github.com/Arszilla/CVE-2023-6538)
### CVE-2023-6548 (2024-01-17)
<code>Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.
</code>
- [Roonye660/CVE-2023-6548-POC](https://github.com/Roonye660/CVE-2023-6548-POC)
### CVE-2023-6553 (2023-12-15)
<code>The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.
@ -25792,7 +25798,7 @@
- [TotallyNotAHaxxer/f-for-java](https://github.com/TotallyNotAHaxxer/f-for-java)
- [spasam/log4j2-exploit](https://github.com/spasam/log4j2-exploit)
- [bumheehan/cve-2021-44228-log4j-test](https://github.com/bumheehan/cve-2021-44228-log4j-test)
- [JagarYousef/log4j-dork-scanner](https://github.com/JagarYousef/log4j-dork-scanner)
- [cergo123/log4j-dork-scanner](https://github.com/cergo123/log4j-dork-scanner)
- [dmitsuo/log4shell-war-fixer](https://github.com/dmitsuo/log4shell-war-fixer)
- [Y0-kan/Log4jShell-Scan](https://github.com/Y0-kan/Log4jShell-Scan)
- [julian911015/Log4j-Scanner-Exploit](https://github.com/julian911015/Log4j-Scanner-Exploit)