Auto Update 2024/12/04 12:32:39

This commit is contained in:
motikan2010-bot 2024-12-04 21:32:39 +09:00
parent f37c473940
commit 088987f975
74 changed files with 580 additions and 379 deletions

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-04T02:32:21Z",
"updated_at": "2024-12-04T10:12:23Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2013,
"watchers_count": 2013,
"stargazers_count": 2012,
"watchers_count": 2012,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2013,
"watchers": 2012,
"score": 0,
"subscribers_count": 37
},

View file

@ -45,10 +45,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2024-11-16T02:44:07Z",
"updated_at": "2024-12-04T06:45:11Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 340,
"watchers_count": 340,
"stargazers_count": 339,
"watchers_count": 339,
"has_discussions": false,
"forks_count": 110,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 110,
"watchers": 340,
"watchers": 339,
"score": 0,
"subscribers_count": 48
}

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-04T02:32:21Z",
"updated_at": "2024-12-04T10:12:23Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2013,
"watchers_count": 2013,
"stargazers_count": 2012,
"watchers_count": 2012,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2013,
"watchers": 2012,
"score": 0,
"subscribers_count": 37
},

View file

@ -45,10 +45,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2024-11-16T02:44:07Z",
"updated_at": "2024-12-04T06:45:11Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 340,
"watchers_count": 340,
"stargazers_count": 339,
"watchers_count": 339,
"has_discussions": false,
"forks_count": 110,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 110,
"watchers": 340,
"watchers": 339,
"score": 0,
"subscribers_count": 48
}

View file

@ -272,10 +272,10 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2024-11-27T10:43:05Z",
"updated_at": "2024-12-04T10:09:50Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 316,
"watchers_count": 316,
"stargazers_count": 315,
"watchers_count": 315,
"has_discussions": false,
"forks_count": 120,
"allow_forking": true,
@ -288,7 +288,7 @@
],
"visibility": "public",
"forks": 120,
"watchers": 316,
"watchers": 315,
"score": 0,
"subscribers_count": 16
},

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-04T02:32:21Z",
"updated_at": "2024-12-04T10:12:23Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2013,
"watchers_count": 2013,
"stargazers_count": 2012,
"watchers_count": 2012,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2013,
"watchers": 2012,
"score": 0,
"subscribers_count": 37
},

View file

@ -46,7 +46,7 @@
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-12-02T17:21:33Z",
"pushed_at": "2024-12-02T17:21:30Z",
"pushed_at": "2024-12-04T09:38:17Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -576,10 +576,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-04T02:32:21Z",
"updated_at": "2024-12-04T10:12:23Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2013,
"watchers_count": 2013,
"stargazers_count": 2012,
"watchers_count": 2012,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -609,7 +609,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2013,
"watchers": 2012,
"score": 0,
"subscribers_count": 37
},

View file

@ -14,10 +14,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2024-11-22T21:23:56Z",
"updated_at": "2024-12-04T08:14:45Z",
"pushed_at": "2022-12-11T10:44:39Z",
"stargazers_count": 528,
"watchers_count": 528,
"stargazers_count": 529,
"watchers_count": 529,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 528,
"watchers": 529,
"score": 0,
"subscribers_count": 55
},

View file

@ -14,10 +14,10 @@
"description": "Apache Tomcat Remote Code Execution on Windows",
"fork": false,
"created_at": "2019-04-15T07:54:25Z",
"updated_at": "2024-08-12T19:47:56Z",
"updated_at": "2024-12-04T10:13:12Z",
"pushed_at": "2019-11-27T07:39:40Z",
"stargazers_count": 185,
"watchers_count": 185,
"stargazers_count": 184,
"watchers_count": 184,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 185,
"watchers": 184,
"score": 0,
"subscribers_count": 3
},

View file

@ -1618,10 +1618,10 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2024-12-01T12:18:09Z",
"updated_at": "2024-12-04T08:31:06Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 896,
"watchers_count": 896,
"stargazers_count": 897,
"watchers_count": 897,
"has_discussions": false,
"forks_count": 242,
"allow_forking": true,
@ -1630,7 +1630,7 @@
"topics": [],
"visibility": "public",
"forks": 242,
"watchers": 896,
"watchers": 897,
"score": 0,
"subscribers_count": 55
},

View file

@ -107,10 +107,10 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2024-11-13T12:58:30Z",
"updated_at": "2024-12-04T08:34:29Z",
"pushed_at": "2020-11-09T07:33:12Z",
"stargazers_count": 287,
"watchers_count": 287,
"stargazers_count": 286,
"watchers_count": 286,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 287,
"watchers": 286,
"score": 0,
"subscribers_count": 8
},

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-02T12:12:56Z",
"updated_at": "2024-12-04T10:18:27Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4136,
"watchers_count": 4136,
"stargazers_count": 4135,
"watchers_count": 4135,
"has_discussions": false,
"forks_count": 1099,
"allow_forking": true,
@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1099,
"watchers": 4136,
"watchers": 4135,
"score": 0,
"subscribers_count": 149
},

View file

@ -107,10 +107,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2024-12-04T02:32:27Z",
"updated_at": "2024-12-04T10:09:56Z",
"pushed_at": "2024-06-16T15:35:20Z",
"stargazers_count": 953,
"watchers_count": 953,
"stargazers_count": 952,
"watchers_count": 952,
"has_discussions": false,
"forks_count": 178,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 178,
"watchers": 953,
"watchers": 952,
"score": 0,
"subscribers_count": 18
},
@ -200,10 +200,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-04T02:32:21Z",
"updated_at": "2024-12-04T10:12:23Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2013,
"watchers_count": 2013,
"stargazers_count": 2012,
"watchers_count": 2012,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -233,7 +233,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2013,
"watchers": 2012,
"score": 0,
"subscribers_count": 37
}

View file

@ -231,10 +231,10 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2024-10-15T07:32:48Z",
"updated_at": "2024-12-04T10:14:02Z",
"pushed_at": "2023-05-08T16:23:06Z",
"stargazers_count": 438,
"watchers_count": 438,
"stargazers_count": 437,
"watchers_count": 437,
"has_discussions": false,
"forks_count": 162,
"allow_forking": true,
@ -243,7 +243,7 @@
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 438,
"watchers": 437,
"score": 0,
"subscribers_count": 9
},

View file

@ -200,10 +200,10 @@
"description": "A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)",
"fork": false,
"created_at": "2023-08-28T09:20:38Z",
"updated_at": "2024-11-30T08:28:57Z",
"updated_at": "2024-12-04T12:14:41Z",
"pushed_at": "2023-11-21T13:32:01Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -227,7 +227,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}

View file

@ -138,10 +138,10 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2024-11-26T23:51:11Z",
"updated_at": "2024-12-04T07:18:39Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 666,
"watchers_count": 666,
"stargazers_count": 667,
"watchers_count": 667,
"has_discussions": false,
"forks_count": 197,
"allow_forking": true,
@ -152,7 +152,7 @@
],
"visibility": "public",
"forks": 197,
"watchers": 666,
"watchers": 667,
"score": 0,
"subscribers_count": 26
},
@ -461,10 +461,10 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T18:34:40Z",
"updated_at": "2024-10-29T21:41:51Z",
"updated_at": "2024-12-04T11:12:46Z",
"pushed_at": "2023-02-26T07:01:03Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 322,
"watchers_count": 322,
"has_discussions": false,
"forks_count": 121,
"allow_forking": true,
@ -478,7 +478,7 @@
],
"visibility": "public",
"forks": 121,
"watchers": 321,
"watchers": 322,
"score": 0,
"subscribers_count": 19
},
@ -1039,10 +1039,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2024-11-21T08:35:28Z",
"updated_at": "2024-12-04T06:56:00Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1304,
"watchers_count": 1304,
"stargazers_count": 1305,
"watchers_count": 1305,
"has_discussions": false,
"forks_count": 343,
"allow_forking": true,
@ -1057,7 +1057,7 @@
],
"visibility": "public",
"forks": 343,
"watchers": 1304,
"watchers": 1305,
"score": 0,
"subscribers_count": 34
},

View file

@ -14,10 +14,10 @@
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
"fork": false,
"created_at": "2022-03-08T17:14:27Z",
"updated_at": "2024-12-03T08:48:07Z",
"updated_at": "2024-12-04T08:36:15Z",
"pushed_at": "2022-05-03T10:40:14Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-02T12:12:56Z",
"updated_at": "2024-12-04T10:18:27Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4136,
"watchers_count": 4136,
"stargazers_count": 4135,
"watchers_count": 4135,
"has_discussions": false,
"forks_count": 1099,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1099,
"watchers": 4136,
"watchers": 4135,
"score": 0,
"subscribers_count": 149
},

View file

@ -76,10 +76,10 @@
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
"fork": false,
"created_at": "2021-07-02T16:03:16Z",
"updated_at": "2024-12-02T00:41:17Z",
"updated_at": "2024-12-04T08:52:09Z",
"pushed_at": "2022-09-01T06:33:36Z",
"stargazers_count": 180,
"watchers_count": 180,
"stargazers_count": 181,
"watchers_count": 181,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 180,
"watchers": 181,
"score": 0,
"subscribers_count": 7
},

View file

@ -107,10 +107,10 @@
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2024-11-18T08:48:23Z",
"updated_at": "2024-12-04T10:06:34Z",
"pushed_at": "2021-11-26T07:40:35Z",
"stargazers_count": 294,
"watchers_count": 294,
"stargazers_count": 293,
"watchers_count": 293,
"has_discussions": false,
"forks_count": 96,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 96,
"watchers": 294,
"watchers": 293,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-04T02:32:21Z",
"updated_at": "2024-12-04T10:12:23Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2013,
"watchers_count": 2013,
"stargazers_count": 2012,
"watchers_count": 2012,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2013,
"watchers": 2012,
"score": 0,
"subscribers_count": 37
},
@ -128,10 +128,10 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2024-11-01T02:37:51Z",
"updated_at": "2024-12-04T10:13:48Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 333,
"watchers_count": 333,
"stargazers_count": 332,
"watchers_count": 332,
"has_discussions": false,
"forks_count": 77,
"allow_forking": true,
@ -140,7 +140,7 @@
"topics": [],
"visibility": "public",
"forks": 77,
"watchers": 333,
"watchers": 332,
"score": 0,
"subscribers_count": 4
},

View file

@ -82,10 +82,10 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2024-08-12T20:03:24Z",
"updated_at": "2024-12-04T10:10:24Z",
"pushed_at": "2021-10-13T07:53:46Z",
"stargazers_count": 372,
"watchers_count": 372,
"stargazers_count": 371,
"watchers_count": 371,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -94,7 +94,7 @@
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 372,
"watchers": 371,
"score": 0,
"subscribers_count": 9
},

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2021-10-19T01:08:48Z",
"updated_at": "2023-08-24T05:14:06Z",
"updated_at": "2024-12-04T10:07:11Z",
"pushed_at": "2021-10-19T01:18:49Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "h2-jdbc(https:\/\/github.com\/h2database\/h2database\/issues\/3195) & mysql-jdbc(CVE-2021-2471) SQLXML XXE vulnerability reproduction.",
"fork": false,
"created_at": "2021-10-22T07:14:25Z",
"updated_at": "2024-08-12T20:17:27Z",
"updated_at": "2024-12-04T06:53:55Z",
"pushed_at": "2021-12-12T06:16:02Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 52,
"watchers": 53,
"score": 0,
"subscribers_count": 1
},

View file

@ -60,5 +60,36 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 898307814,
"name": "CVE-2021-29441",
"full_name": "azhao1981\/CVE-2021-29441",
"owner": {
"login": "azhao1981",
"id": 352355,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/352355?v=4",
"html_url": "https:\/\/github.com\/azhao1981",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/azhao1981\/CVE-2021-29441",
"description": null,
"fork": false,
"created_at": "2024-12-04T06:55:24Z",
"updated_at": "2024-12-04T06:56:15Z",
"pushed_at": "2024-12-04T06:56:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "Nacos Derby命令执行漏洞利用脚本",
"fork": false,
"created_at": "2024-11-22T01:32:37Z",
"updated_at": "2024-12-02T02:55:21Z",
"updated_at": "2024-12-04T06:57:44Z",
"pushed_at": "2024-11-22T01:33:26Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -204,10 +204,10 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false,
"created_at": "2021-02-18T05:42:13Z",
"updated_at": "2024-11-23T08:57:08Z",
"updated_at": "2024-12-04T09:45:01Z",
"pushed_at": "2021-12-14T05:12:17Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -216,7 +216,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 148,
"watchers": 147,
"score": 0,
"subscribers_count": 1
},

View file

@ -231,10 +231,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-12-02T12:19:35Z",
"updated_at": "2024-12-04T10:06:55Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1602,
"watchers_count": 1602,
"stargazers_count": 1601,
"watchers_count": 1601,
"has_discussions": false,
"forks_count": 482,
"allow_forking": true,
@ -243,7 +243,7 @@
"topics": [],
"visibility": "public",
"forks": 482,
"watchers": 1602,
"watchers": 1601,
"score": 0,
"subscribers_count": 28
},

View file

@ -1195,10 +1195,10 @@
"description": "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability",
"fork": false,
"created_at": "2021-10-08T01:13:33Z",
"updated_at": "2024-08-12T20:17:05Z",
"updated_at": "2024-12-04T10:08:03Z",
"pushed_at": "2021-11-12T00:03:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1207,7 +1207,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -1449,10 +1449,10 @@
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
"fork": false,
"created_at": "2021-10-09T03:32:18Z",
"updated_at": "2024-11-06T23:16:22Z",
"updated_at": "2024-12-04T10:07:59Z",
"pushed_at": "2021-10-09T03:49:21Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -1461,7 +1461,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 148,
"watchers": 147,
"score": 0,
"subscribers_count": 3
},
@ -2232,37 +2232,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 447314257,
"name": "CVE-2021-41773-exploiter",
"full_name": "norrig\/CVE-2021-41773-exploiter",
"owner": {
"login": "norrig",
"id": 5526261,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4",
"html_url": "https:\/\/github.com\/norrig",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter",
"description": "School project - Please use other repos for actual testing",
"fork": false,
"created_at": "2022-01-12T17:42:36Z",
"updated_at": "2022-01-12T18:26:57Z",
"pushed_at": "2022-01-13T16:18:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 452242021,
"name": "CVE-2021-41773-exercise",
@ -2414,10 +2383,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2024-11-26T17:30:46Z",
"updated_at": "2024-12-04T06:22:14Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -2435,7 +2404,7 @@
],
"visibility": "public",
"forks": 34,
"watchers": 98,
"watchers": 99,
"score": 0,
"subscribers_count": 2
},

33
2021/CVE-2021-42260.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 898319759,
"name": "tinyxml",
"full_name": "vm2mv\/tinyxml",
"owner": {
"login": "vm2mv",
"id": 4291086,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4291086?v=4",
"html_url": "https:\/\/github.com\/vm2mv",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vm2mv\/tinyxml",
"description": "TinyXML 2.6.2 with fixes for CVE-2021-42260 and CVE-2023-34194",
"fork": false,
"created_at": "2024-12-04T07:24:59Z",
"updated_at": "2024-12-04T09:14:12Z",
"pushed_at": "2024-12-04T09:12:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -3749,10 +3749,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2024-11-29T08:50:43Z",
"updated_at": "2024-12-04T10:02:36Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3407,
"watchers_count": 3407,
"stargazers_count": 3405,
"watchers_count": 3405,
"has_discussions": true,
"forks_count": 740,
"allow_forking": true,
@ -3761,7 +3761,7 @@
"topics": [],
"visibility": "public",
"forks": 740,
"watchers": 3407,
"watchers": 3405,
"score": 0,
"subscribers_count": 55
},
@ -10741,37 +10741,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 447615580,
"name": "Log4j-CVE-2021-44228",
"full_name": "solitarysp\/Log4j-CVE-2021-44228",
"owner": {
"login": "solitarysp",
"id": 20993683,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20993683?v=4",
"html_url": "https:\/\/github.com\/solitarysp",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/solitarysp\/Log4j-CVE-2021-44228",
"description": null,
"fork": false,
"created_at": "2022-01-13T13:46:12Z",
"updated_at": "2022-01-13T13:46:52Z",
"pushed_at": "2022-01-13T14:43:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 447754863,
"name": "log4j_github_repository",

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-12-04T02:35:43Z",
"updated_at": "2024-12-04T07:09:20Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1172,
"watchers_count": 1172,
"stargazers_count": 1173,
"watchers_count": 1173,
"has_discussions": true,
"forks_count": 190,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 1172,
"watchers": 1173,
"score": 0,
"subscribers_count": 19
},

View file

@ -266,10 +266,10 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
"updated_at": "2024-11-01T07:14:50Z",
"updated_at": "2024-12-04T09:58:47Z",
"pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 394,
"watchers_count": 394,
"stargazers_count": 393,
"watchers_count": 393,
"has_discussions": false,
"forks_count": 83,
"allow_forking": true,
@ -278,7 +278,7 @@
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 394,
"watchers": 393,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
"fork": false,
"created_at": "2023-01-19T20:36:49Z",
"updated_at": "2024-09-24T19:37:03Z",
"updated_at": "2024-12-04T08:58:01Z",
"pushed_at": "2023-01-20T17:58:39Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 62,
"watchers": 63,
"score": 0,
"subscribers_count": 5
}

View file

@ -107,10 +107,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2024-12-02T07:36:51Z",
"updated_at": "2024-12-04T06:54:46Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 885,
"watchers_count": 885,
"stargazers_count": 884,
"watchers_count": 884,
"has_discussions": false,
"forks_count": 73,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 73,
"watchers": 885,
"watchers": 884,
"score": 0,
"subscribers_count": 25
},

View file

@ -45,10 +45,10 @@
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
"fork": false,
"created_at": "2023-06-16T20:15:36Z",
"updated_at": "2024-10-10T03:00:26Z",
"updated_at": "2024-12-04T10:43:06Z",
"pushed_at": "2024-05-08T16:17:07Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 131,
"watchers_count": 131,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 130,
"watchers": 131,
"score": 0,
"subscribers_count": 3
},

View file

@ -342,5 +342,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 898440595,
"name": "CVE-2023-32784-EXPLOIT-REPORT",
"full_name": "dev0558\/CVE-2023-32784-EXPLOIT-REPORT",
"owner": {
"login": "dev0558",
"id": 137286912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137286912?v=4",
"html_url": "https:\/\/github.com\/dev0558",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dev0558\/CVE-2023-32784-EXPLOIT-REPORT",
"description": null,
"fork": false,
"created_at": "2024-12-04T11:57:35Z",
"updated_at": "2024-12-04T12:25:03Z",
"pushed_at": "2024-12-04T12:24:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2023/CVE-2023-34194.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 898319759,
"name": "tinyxml",
"full_name": "vm2mv\/tinyxml",
"owner": {
"login": "vm2mv",
"id": 4291086,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4291086?v=4",
"html_url": "https:\/\/github.com\/vm2mv",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vm2mv\/tinyxml",
"description": "TinyXML 2.6.2 with fixes for CVE-2021-42260 and CVE-2023-34194",
"fork": false,
"created_at": "2024-12-04T07:24:59Z",
"updated_at": "2024-12-04T09:14:12Z",
"pushed_at": "2024-12-04T09:12:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -578,40 +578,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 871328160,
"name": "CVE-2023-36845",
"full_name": "functionofpwnosec\/CVE-2023-36845",
"owner": {
"login": "functionofpwnosec",
"id": 38102497,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38102497?v=4",
"html_url": "https:\/\/github.com\/functionofpwnosec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/functionofpwnosec\/CVE-2023-36845",
"description": "Juniper Networks POC Understanding CVE-202336845 Remote Code Execution Exploit and Protection",
"fork": false,
"created_at": "2024-10-11T18:18:37Z",
"updated_at": "2024-10-11T18:30:23Z",
"pushed_at": "2024-10-11T18:30:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bugbountytips",
"cve-2023-36845",
"remote-code-execution"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "CVE-2023-36899漏洞的复现环境和工具针对ASP.NET框架中的无cookie会话身份验证绕过。",
"fork": false,
"created_at": "2023-08-15T23:36:17Z",
"updated_at": "2024-07-15T07:25:38Z",
"updated_at": "2024-12-04T08:35:49Z",
"pushed_at": "2023-08-15T23:37:11Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 2
}

View file

@ -50,13 +50,13 @@
"stargazers_count": 226,
"watchers_count": 226,
"has_discussions": false,
"forks_count": 29,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 28,
"watchers": 226,
"score": 0,
"subscribers_count": 4

View file

@ -60,5 +60,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 898427651,
"name": "CVE-2023-50387",
"full_name": "Pablodiz\/CVE-2023-50387",
"owner": {
"login": "Pablodiz",
"id": 114071507,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114071507?v=4",
"html_url": "https:\/\/github.com\/Pablodiz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Pablodiz\/CVE-2023-50387",
"description": null,
"fork": false,
"created_at": "2024-12-04T11:27:11Z",
"updated_at": "2024-12-04T11:30:55Z",
"pushed_at": "2024-12-04T11:30:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-12-03T19:42:43Z",
"updated_at": "2024-12-04T10:06:57Z",
"pushed_at": "2024-12-02T06:29:52Z",
"stargazers_count": 261,
"watchers_count": 261,
"stargazers_count": 262,
"watchers_count": 262,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 261,
"watchers": 262,
"score": 0,
"subscribers_count": 7
},

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-10220 Test repo",
"fork": false,
"created_at": "2024-12-01T05:15:25Z",
"updated_at": "2024-12-02T02:55:23Z",
"updated_at": "2024-12-04T11:01:09Z",
"pushed_at": "2024-12-01T05:18:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -251,7 +251,7 @@
"description": null,
"fork": false,
"created_at": "2024-12-01T14:43:16Z",
"updated_at": "2024-12-02T08:32:51Z",
"updated_at": "2024-12-04T11:29:31Z",
"pushed_at": "2024-12-02T08:32:47Z",
"stargazers_count": 1,
"watchers_count": 1,
@ -260,7 +260,19 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"bypass",
"bypass-mfa",
"bypass-wordpress",
"cibersecurity",
"cve",
"cve-2024-10924",
"exploit",
"hacking",
"hacking-etico",
"really-simple-security",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
@ -296,7 +308,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 897913649,
@ -327,6 +339,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Exploit for Pandora FMS Remote Code Execution CVE-2024-11320",
"fork": false,
"created_at": "2024-12-01T12:39:49Z",
"updated_at": "2024-12-03T23:11:26Z",
"updated_at": "2024-12-04T10:11:02Z",
"pushed_at": "2024-12-01T12:48:08Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -463,5 +463,45 @@
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 898401287,
"name": "CVE-2024-21413-Vulnerabilidad-Outlook-LAB",
"full_name": "D1se0\/CVE-2024-21413-Vulnerabilidad-Outlook-LAB",
"owner": {
"login": "D1se0",
"id": 164921056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4",
"html_url": "https:\/\/github.com\/D1se0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D1se0\/CVE-2024-21413-Vulnerabilidad-Outlook-LAB",
"description": null,
"fork": false,
"created_at": "2024-12-04T10:26:37Z",
"updated_at": "2024-12-04T11:29:53Z",
"pushed_at": "2024-12-04T11:18:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cibersecurity",
"cve",
"cve-2024-21413",
"exploit",
"hacking",
"hacking-etico",
"lab",
"outlook"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "jsonpath-plus 包(版本 <=10.0.7存在严重的远程代码执行RCE漏洞允许攻击者通过 Node.js 的 VM 模块执行任意代码。该漏洞由于输入验证不严格导致,影响版本为 10.0.7 以下CVSS 分数为 9.8(极其严重)。漏洞首次公开于 2024 年 10 月 11 日。",
"fork": false,
"created_at": "2024-11-23T05:54:24Z",
"updated_at": "2024-12-03T14:59:15Z",
"updated_at": "2024-12-04T06:56:31Z",
"pushed_at": "2024-11-23T05:57:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -200,10 +200,10 @@
"description": "CVE-2024-21762 是 Fortinet 公司的 FortiOS 和 FortiProxy 产品中的一个严重漏洞,存在于其 SSL VPN 组件中。",
"fork": false,
"created_at": "2024-11-24T07:20:45Z",
"updated_at": "2024-12-02T02:55:23Z",
"updated_at": "2024-12-04T06:56:12Z",
"pushed_at": "2024-11-24T08:07:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -329,10 +329,10 @@
"description": "CVE-2024-23692 是影响 Rejetto HTTP File ServerHFS2.3m 及之前版本的模板注入漏洞。该漏洞允许远程未授权的攻击者通过发送特制的 HTTP 请求,在受影响的系统上执行任意命令。",
"fork": false,
"created_at": "2024-11-23T03:59:13Z",
"updated_at": "2024-12-02T02:55:24Z",
"updated_at": "2024-12-04T06:56:48Z",
"pushed_at": "2024-11-23T04:00:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -341,7 +341,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Windows LPE",
"fork": false,
"created_at": "2024-06-11T08:03:29Z",
"updated_at": "2024-12-04T05:48:33Z",
"updated_at": "2024-12-04T12:14:02Z",
"pushed_at": "2024-06-11T20:41:59Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 108,
"watchers_count": 108,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 106,
"watchers": 108,
"score": 0,
"subscribers_count": 1
},

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-27130是影响QNAP网络附加存储NAS设备的一个严重漏洞。该漏洞源于QTS操作系统中share.cgi脚本的No_Support_ACL函数中不安全地使用strcpy函数导致堆栈缓冲区溢出。攻击者可以利用此漏洞通过精心构造的请求在目标系统上执行任意代码进而完全控制受影响的设备。 ",
"fork": false,
"created_at": "2024-11-22T14:18:08Z",
"updated_at": "2024-12-02T02:55:25Z",
"updated_at": "2024-12-04T06:57:05Z",
"pushed_at": "2024-11-22T14:20:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Proof of concept of CVE-2024-29868 affecting Apache StreamPipes from 0.69.0 through 0.93.0",
"fork": false,
"created_at": "2024-06-24T14:53:05Z",
"updated_at": "2024-06-25T10:22:48Z",
"updated_at": "2024-12-04T07:30:12Z",
"pushed_at": "2024-06-24T15:28:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -1856,10 +1856,10 @@
"description": "CVE-2024-3094 (XZ Backdoor) Tools",
"fork": false,
"created_at": "2024-12-01T05:22:08Z",
"updated_at": "2024-12-03T19:06:03Z",
"updated_at": "2024-12-04T11:01:08Z",
"pushed_at": "2024-12-01T05:30:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1868,7 +1868,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -138,10 +138,10 @@
"description": "CVE-2024-37084是Spring Cloud Data Flow中的一个高危漏洞影响版本为2.11.0至2.11.3。该漏洞允许具有Skipper服务器API访问权限的攻击者通过精心构造的上传请求将任意文件写入服务器文件系统的任意位置进而可能导致远程代码执行严重威胁服务器安全。",
"fork": false,
"created_at": "2024-11-22T13:53:42Z",
"updated_at": "2024-12-02T02:55:26Z",
"updated_at": "2024-12-04T06:57:15Z",
"pushed_at": "2024-11-22T14:02:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -155,7 +155,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-11-18T23:34:34Z",
"updated_at": "2024-12-04T06:08:59Z",
"updated_at": "2024-12-04T12:22:21Z",
"pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 17,
"forks": 4,
"watchers": 24,
"score": 0,
"subscribers_count": 1
}

View file

@ -208,10 +208,10 @@
"description": "CVE-2024-38856 是 Apache OFBiz 中的一个严重漏洞,允许未经身份验证的攻击者在受影响的系统上执行任意代码。 ",
"fork": false,
"created_at": "2024-11-23T03:54:28Z",
"updated_at": "2024-12-02T02:55:26Z",
"updated_at": "2024-12-04T06:56:49Z",
"pushed_at": "2024-11-23T03:57:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -220,7 +220,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Pre-Auth Exploit for CVE-2024-40711",
"fork": false,
"created_at": "2024-09-15T17:25:32Z",
"updated_at": "2024-11-30T00:51:06Z",
"updated_at": "2024-12-04T10:39:47Z",
"pushed_at": "2024-09-15T17:28:41Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,10 +14,10 @@
"description": "cve-2024-42327 ZBX-25623",
"fork": false,
"created_at": "2024-12-01T00:15:27Z",
"updated_at": "2024-12-04T06:05:32Z",
"updated_at": "2024-12-04T12:15:06Z",
"pushed_at": "2024-12-01T01:18:36Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 9,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
@ -45,10 +45,10 @@
"description": "PoC for CVE-2024-42327 \/ ZBX-25623",
"fork": false,
"created_at": "2024-12-03T12:44:07Z",
"updated_at": "2024-12-04T00:48:44Z",
"updated_at": "2024-12-04T11:43:42Z",
"pushed_at": "2024-12-03T12:56:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,8 +57,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 8,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -19,7 +19,7 @@
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"poc-exploit"
],
"visibility": "public",
"forks": 15,
"forks": 16,
"watchers": 26,
"score": 0,
"subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": "Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)",
"fork": false,
"created_at": "2024-08-23T09:13:03Z",
"updated_at": "2024-11-07T20:51:43Z",
"updated_at": "2024-12-04T09:24:45Z",
"pushed_at": "2024-08-23T09:36:55Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 0
}

View file

@ -107,10 +107,10 @@
"description": "CVE-2024-45519是Zimbra CollaborationZCS中的一个高危漏洞存在于其postjournal服务中。当该服务被启用时未经身份验证的攻击者可以通过构造特定的SMTP请求远程执行任意命令从而完全控制受影响的服务器。",
"fork": false,
"created_at": "2024-11-22T01:56:21Z",
"updated_at": "2024-12-02T02:55:26Z",
"updated_at": "2024-12-04T06:57:41Z",
"pushed_at": "2024-11-22T02:00:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -124,7 +124,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -107,10 +107,10 @@
"description": "CVE-2024-47575是Fortinet的FortiManager和FortiManager Cloud产品中的一个严重漏洞源于fgfmsd守护进程缺乏对关键功能的身份验证。",
"fork": false,
"created_at": "2024-11-22T03:13:03Z",
"updated_at": "2024-12-02T02:55:27Z",
"updated_at": "2024-12-04T06:57:26Z",
"pushed_at": "2024-11-22T03:17:57Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-04T04:16:24Z",
"updated_at": "2024-12-04T12:19:36Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 9,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 41,
"forks": 12,
"watchers": 46,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-5124 poc",
"fork": false,
"created_at": "2024-12-03T03:18:48Z",
"updated_at": "2024-12-03T16:37:43Z",
"updated_at": "2024-12-04T11:00:55Z",
"pushed_at": "2024-12-03T04:01:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,8 +57,8 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -79,10 +79,10 @@
"description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6s upgrademysqlstatus endpoint, bypassing CSRF protections.",
"fork": false,
"created_at": "2024-11-26T02:18:24Z",
"updated_at": "2024-12-02T02:55:27Z",
"updated_at": "2024-12-04T06:54:51Z",
"pushed_at": "2024-11-26T02:21:21Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -91,7 +91,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

33
2024/CVE-2024-53259.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 898373341,
"name": "cve-2024-53259",
"full_name": "kota-yata\/cve-2024-53259",
"owner": {
"login": "kota-yata",
"id": 51294895,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51294895?v=4",
"html_url": "https:\/\/github.com\/kota-yata",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kota-yata\/cve-2024-53259",
"description": null,
"fork": false,
"created_at": "2024-12-04T09:27:22Z",
"updated_at": "2024-12-04T09:27:53Z",
"pushed_at": "2024-12-04T09:28:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -29,5 +29,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 898312169,
"name": "CVE-2024-5910",
"full_name": "Farzan-Kh\/CVE-2024-5910",
"owner": {
"login": "Farzan-Kh",
"id": 65416059,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65416059?v=4",
"html_url": "https:\/\/github.com\/Farzan-Kh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Farzan-Kh\/CVE-2024-5910",
"description": "CVE-2024-5910 PoC",
"fork": false,
"created_at": "2024-12-04T07:06:44Z",
"updated_at": "2024-12-04T07:17:50Z",
"pushed_at": "2024-12-04T07:17:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-7965是Google Chrome浏览器中V8 JavaScript引擎的一个高危漏洞。该漏洞源于V8引擎在处理特定JavaScript代码时实现不当导致堆内存损坏。攻击者可通过诱导用户访问包含特制JavaScript的恶意网页利用此漏洞在Chrome渲染器中执行任意代码。",
"fork": false,
"created_at": "2024-11-22T02:55:33Z",
"updated_at": "2024-12-03T14:59:16Z",
"updated_at": "2024-12-04T06:57:34Z",
"pushed_at": "2024-11-22T02:58:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -62,7 +62,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -76,10 +76,10 @@
"description": "Proof of Concept Exploit for CVE-2024-9465",
"fork": false,
"created_at": "2024-12-03T12:16:44Z",
"updated_at": "2024-12-03T16:38:23Z",
"updated_at": "2024-12-04T11:00:54Z",
"pushed_at": "2024-12-03T12:21:35Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -88,8 +88,8 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1254,6 +1254,7 @@
</code>
- [p33d/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464](https://github.com/p33d/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464)
- [Farzan-Kh/CVE-2024-5910](https://github.com/Farzan-Kh/CVE-2024-5910)
### CVE-2024-5932 (2024-08-20)
@ -2469,6 +2470,7 @@
- [DerZiad/CVE-2024-21413](https://github.com/DerZiad/CVE-2024-21413)
- [Redfox-Secuirty/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape](https://github.com/Redfox-Secuirty/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape)
- [ThemeHackers/CVE-2024-21413](https://github.com/ThemeHackers/CVE-2024-21413)
- [D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB](https://github.com/D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB)
### CVE-2024-21514 (2024-06-22)
@ -7232,6 +7234,13 @@
- [0x4M3R/CVE-2024-53255](https://github.com/0x4M3R/CVE-2024-53255)
### CVE-2024-53259 (2024-12-02)
<code>quic-go is an implementation of the QUIC protocol in Go. An off-path attacker can inject an ICMP Packet Too Large packet. Since affected quic-go versions used IP_PMTUDISC_DO, the kernel would then return a &quot;message too large&quot; error on sendmsg, i.e. when quic-go attempts to send a packet that exceeds the MTU claimed in that ICMP packet. By setting this value to smaller than 1200 bytes (the minimum MTU for QUIC), the attacker can disrupt a QUIC connection. Crucially, this can be done after completion of the handshake, thereby circumventing any TCP fallback that might be implemented on the application layer (for example, many browsers fall back to HTTP over TCP if they're unable to establish a QUIC connection). The attacker needs to at least know the client's IP and port tuple to mount an attack. This vulnerability is fixed in 0.48.2.
</code>
- [kota-yata/cve-2024-53259](https://github.com/kota-yata/cve-2024-53259)
### CVE-2024-53375 (2024-12-02)
<code>Authenticated remote code execution (RCE) vulnerabilities affect TP-Link Archer, Deco, and Tapo series routers. A vulnerability exists in the &quot;tmp_get_sites&quot; function of the HomeShield functionality provided by TP-Link. This vulnerability is still exploitable without the installation or activation of the HomeShield functionality.
@ -11463,6 +11472,7 @@
- [mister-turtle/cve-2023-32784](https://github.com/mister-turtle/cve-2023-32784)
- [Cmadhushanka/CVE-2023-32784-Exploitation](https://github.com/Cmadhushanka/CVE-2023-32784-Exploitation)
- [SarahZimmermann-Schmutzler/exploit_keepass](https://github.com/SarahZimmermann-Schmutzler/exploit_keepass)
- [dev0558/CVE-2023-32784-EXPLOIT-REPORT](https://github.com/dev0558/CVE-2023-32784-EXPLOIT-REPORT)
### CVE-2023-32961 (2023-06-12)
@ -11805,6 +11815,13 @@
- [overgrowncarrot1/ImageTragick_CVE-2023-34152](https://github.com/overgrowncarrot1/ImageTragick_CVE-2023-34152)
- [SudoIndividual/CVE-2023-34152](https://github.com/SudoIndividual/CVE-2023-34152)
### CVE-2023-34194 (2023-12-13)
<code>StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in TinyXML through 2.6.2 has a reachable assertion (and application exit) via a crafted XML document with a '\0' located after whitespace.
</code>
- [vm2mv/tinyxml](https://github.com/vm2mv/tinyxml)
### CVE-2023-34212 (2023-06-12)
<code>The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location.\n\nThe resolution validates the JNDI URL and restricts locations to a set of allowed schemes.\n\nYou are recommended to upgrade to version 1.22.0 or later which fixes this issue.\n\n\n
@ -12413,7 +12430,6 @@
- [ifconfig-me/CVE-2023-36845](https://github.com/ifconfig-me/CVE-2023-36845)
- [e11i0t4lders0n/CVE-2023-36845](https://github.com/e11i0t4lders0n/CVE-2023-36845)
- [Vignesh2712/Automation-for-Juniper-cve-2023-36845](https://github.com/Vignesh2712/Automation-for-Juniper-cve-2023-36845)
- [functionofpwnosec/CVE-2023-36845](https://github.com/functionofpwnosec/CVE-2023-36845)
### CVE-2023-36846 (2023-08-17)
@ -15412,6 +15428,7 @@
- [knqyf263/CVE-2023-50387](https://github.com/knqyf263/CVE-2023-50387)
- [Meirelez/SSR-DNSSEC](https://github.com/Meirelez/SSR-DNSSEC)
- [Pablodiz/CVE-2023-50387](https://github.com/Pablodiz/CVE-2023-50387)
### CVE-2023-50465 (2023-12-11)
@ -25407,6 +25424,7 @@
- [hh-hunter/nacos-cve-2021-29441](https://github.com/hh-hunter/nacos-cve-2021-29441)
- [bysinks/CVE-2021-29441](https://github.com/bysinks/CVE-2021-29441)
- [azhao1981/CVE-2021-29441](https://github.com/azhao1981/CVE-2021-29441)
### CVE-2021-29442 (2021-04-27)
@ -27450,7 +27468,6 @@
- [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773)
- [xMohamed0/CVE-2021-41773](https://github.com/xMohamed0/CVE-2021-41773)
- [i6c/MASS_CVE-2021-41773](https://github.com/i6c/MASS_CVE-2021-41773)
- [norrig/CVE-2021-41773-exploiter](https://github.com/norrig/CVE-2021-41773-exploiter)
- [m96dg/CVE-2021-41773-exercise](https://github.com/m96dg/CVE-2021-41773-exercise)
- [skentagon/CVE-2021-41773](https://github.com/skentagon/CVE-2021-41773)
- [mauricelambert/CVE-2021-41773](https://github.com/mauricelambert/CVE-2021-41773)
@ -27628,6 +27645,13 @@
- [vesperp/CVE-2021-42237-SiteCore-XP](https://github.com/vesperp/CVE-2021-42237-SiteCore-XP)
- [crankyyash/SiteCore-RCE-Detection](https://github.com/crankyyash/SiteCore-RCE-Detection)
### CVE-2021-42260 (2021-10-11)
<code>TinyXML through 2.6.2 has an infinite loop in TiXmlParsingData::Stamp in tinyxmlparser.cpp via the TIXML_UTF_LEAD_0 case. It can be triggered by a crafted XML message and leads to a denial of service.
</code>
- [vm2mv/tinyxml](https://github.com/vm2mv/tinyxml)
### CVE-2021-42261 (2021-10-19)
<code>Revisor Video Management System (VMS) before 2.0.0 has a directory traversal vulnerability. Successful exploitation could allow an attacker to traverse the file system to access files or directories that are outside of restricted directory on the remote server. This could lead to the disclosure of sensitive data on the vulnerable server.
@ -28584,7 +28608,6 @@
- [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer)
- [mebibite/log4jhound](https://github.com/mebibite/log4jhound)
- [jxerome/log4shell](https://github.com/jxerome/log4shell)
- [solitarysp/Log4j-CVE-2021-44228](https://github.com/solitarysp/Log4j-CVE-2021-44228)
- [sdogancesur/log4j_github_repository](https://github.com/sdogancesur/log4j_github_repository)
- [jrocia/Search-log4Jvuln-AppScanSTD](https://github.com/jrocia/Search-log4Jvuln-AppScanSTD)
- [aajuvonen/log4stdin](https://github.com/aajuvonen/log4stdin)