Auto Update 2024/09/04 12:30:24

This commit is contained in:
motikan2010-bot 2024-09-04 21:30:24 +09:00
parent 84281ab6d5
commit 0b51fc044b
43 changed files with 241 additions and 134 deletions

View file

@ -13,10 +13,10 @@
"description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
"fork": false,
"created_at": "2018-12-18T04:24:43Z",
"updated_at": "2024-06-09T16:13:01Z",
"updated_at": "2024-09-04T06:57:22Z",
"pushed_at": "2019-09-30T23:38:11Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 7
}

View file

@ -233,10 +233,10 @@
"description": "PoC for Dirty COW (CVE-2016-5195)",
"fork": false,
"created_at": "2016-10-22T15:25:34Z",
"updated_at": "2024-08-30T01:06:25Z",
"updated_at": "2024-09-04T06:57:43Z",
"pushed_at": "2022-03-16T12:08:54Z",
"stargazers_count": 489,
"watchers_count": 489,
"stargazers_count": 490,
"watchers_count": 490,
"has_discussions": false,
"forks_count": 145,
"allow_forking": true,
@ -245,7 +245,7 @@
"topics": [],
"visibility": "public",
"forks": 145,
"watchers": 489,
"watchers": 490,
"score": 0,
"subscribers_count": 21
},

View file

@ -414,10 +414,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2024-09-03T00:48:20Z",
"updated_at": "2024-09-04T06:44:39Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 451,
"watchers_count": 451,
"stargazers_count": 452,
"watchers_count": 452,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -426,7 +426,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 451,
"watchers": 452,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for Red Hat \/ GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!",
"fork": false,
"created_at": "2018-06-11T02:18:05Z",
"updated_at": "2024-08-12T19:39:14Z",
"updated_at": "2024-09-04T10:46:40Z",
"pushed_at": "2020-04-30T20:18:17Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 2
}

View file

@ -2610,5 +2610,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 852063962,
"name": "cve-2018-6574",
"full_name": "ttyA0\/cve-2018-6574",
"owner": {
"login": "ttyA0",
"id": 96278236,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96278236?v=4",
"html_url": "https:\/\/github.com\/ttyA0"
},
"html_url": "https:\/\/github.com\/ttyA0\/cve-2018-6574",
"description": null,
"fork": false,
"created_at": "2024-09-04T06:55:16Z",
"updated_at": "2024-09-04T06:57:31Z",
"pushed_at": "2024-09-04T06:57:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2024-09-03T00:48:20Z",
"updated_at": "2024-09-04T06:44:39Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 451,
"watchers_count": 451,
"stargazers_count": 452,
"watchers_count": 452,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 451,
"watchers": 452,
"score": 0,
"subscribers_count": 9
},

View file

@ -43,10 +43,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-09-01T16:05:06Z",
"updated_at": "2024-09-04T06:52:00Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1718,
"watchers_count": 1718,
"stargazers_count": 1719,
"watchers_count": 1719,
"has_discussions": false,
"forks_count": 357,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 357,
"watchers": 1718,
"watchers": 1719,
"score": 0,
"subscribers_count": 87
},

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
"fork": false,
"created_at": "2022-01-29T10:14:32Z",
"updated_at": "2024-07-18T17:21:17Z",
"updated_at": "2024-09-04T09:44:50Z",
"pushed_at": "2022-03-03T17:50:03Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 106,
"watchers": 107,
"score": 0,
"subscribers_count": 5
}

View file

@ -78,13 +78,13 @@
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 30,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"forks": 29,
"watchers": 54,
"score": 0,
"subscribers_count": 3
@ -108,13 +108,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 0

View file

@ -344,11 +344,11 @@
"html_url": "https:\/\/github.com\/joshuavanderpoll"
},
"html_url": "https:\/\/github.com\/joshuavanderpoll\/CVE-2021-3129",
"description": "Laravel RCE (CVE-2021-3129)",
"description": "Laravel RCE Exploit Script (CVE-2021-3129) (Python)",
"fork": false,
"created_at": "2022-04-16T17:22:55Z",
"updated_at": "2024-08-24T01:56:25Z",
"pushed_at": "2024-08-10T20:28:48Z",
"updated_at": "2024-09-04T11:54:02Z",
"pushed_at": "2024-09-04T11:53:59Z",
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
@ -360,10 +360,16 @@
"cve",
"cve-2021-3129",
"exploit",
"exploits",
"laravel",
"pentest-tool",
"pentesting",
"python",
"rce",
"scanner",
"security",
"security-tools",
"vulnerabilities",
"vulnerability"
],
"visibility": "public",

View file

@ -228,13 +228,13 @@
"stargazers_count": 1572,
"watchers_count": 1572,
"has_discussions": false,
"forks_count": 482,
"forks_count": 481,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 482,
"forks": 481,
"watchers": 1572,
"score": 0,
"subscribers_count": 28

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-09-02T06:05:58Z",
"updated_at": "2024-09-04T10:25:03Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1790,
"watchers_count": 1790,
"stargazers_count": 1791,
"watchers_count": 1791,
"has_discussions": false,
"forks_count": 524,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 524,
"watchers": 1790,
"watchers": 1791,
"score": 0,
"subscribers_count": 27
},

View file

@ -13,10 +13,10 @@
"description": "Android Debug Bridge (adb) was vulnerable to directory traversal attacks that could have been mounted by rogue\/compromised adb daemons during an adb pull operation.",
"fork": false,
"created_at": "2022-09-09T12:40:21Z",
"updated_at": "2023-02-02T01:56:21Z",
"updated_at": "2024-09-04T07:29:05Z",
"pushed_at": "2022-09-09T12:42:19Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Apache Shiro CVE-2022-32532",
"fork": false,
"created_at": "2022-06-29T01:05:33Z",
"updated_at": "2024-08-12T20:24:35Z",
"updated_at": "2024-09-04T08:17:13Z",
"pushed_at": "2022-06-28T22:46:43Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 0
}

View file

@ -73,10 +73,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2022-12-26T00:08:55Z",
"updated_at": "2024-08-10T11:01:21Z",
"updated_at": "2024-09-04T07:56:21Z",
"pushed_at": "2023-10-10T16:53:48Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 116,
"watchers": 117,
"score": 0,
"subscribers_count": 8
},
@ -163,10 +163,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-03T21:46:37Z",
"updated_at": "2024-08-07T01:52:38Z",
"updated_at": "2024-09-04T08:10:37Z",
"pushed_at": "2023-01-19T08:04:02Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 65,
"watchers": 66,
"score": 0,
"subscribers_count": 3
},

32
2023/CVE-2023-25355.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 852173619,
"name": "CVE-2023-25355-25356",
"full_name": "glefait\/CVE-2023-25355-25356",
"owner": {
"login": "glefait",
"id": 7490317,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7490317?v=4",
"html_url": "https:\/\/github.com\/glefait"
},
"html_url": "https:\/\/github.com\/glefait\/CVE-2023-25355-25356",
"description": "CVE-2023-25355 and CVE-2023-25356 with automated service reload",
"fork": false,
"created_at": "2024-09-04T11:00:23Z",
"updated_at": "2024-09-04T11:30:15Z",
"pushed_at": "2024-09-04T11:30:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -73,8 +73,8 @@
"description": "Fix prototype pollution vulnerability (CVE-2023-26136) for tough-cookie package",
"fork": false,
"created_at": "2024-09-02T18:50:53Z",
"updated_at": "2024-09-04T05:39:00Z",
"pushed_at": "2024-09-04T05:38:56Z",
"updated_at": "2024-09-04T11:36:16Z",
"pushed_at": "2024-09-04T11:36:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -46,10 +46,10 @@
"description": "Juniper Firewalls CVE-2023-36845 - RCE",
"fork": false,
"created_at": "2023-09-26T17:56:55Z",
"updated_at": "2024-08-25T03:26:25Z",
"updated_at": "2024-09-04T11:15:01Z",
"pushed_at": "2023-12-29T14:56:44Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"teamcity"
],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 46,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept code for Android APEX key reuse vulnerability",
"fork": false,
"created_at": "2024-01-26T21:17:38Z",
"updated_at": "2024-08-17T10:08:11Z",
"updated_at": "2024-09-04T10:17:52Z",
"pushed_at": "2024-01-31T19:33:59Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 78,
"watchers": 79,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-09-04T00:53:39Z",
"updated_at": "2024-09-04T11:04:15Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1121,
"watchers_count": 1121,
"stargazers_count": 1122,
"watchers_count": 1122,
"has_discussions": false,
"forks_count": 193,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 193,
"watchers": 1121,
"watchers": 1122,
"score": 0,
"subscribers_count": 21
},

View file

@ -43,10 +43,10 @@
"description": "Apache OfBiz Auth Bypass Scanner for CVE-2023-51467",
"fork": false,
"created_at": "2023-12-29T15:01:46Z",
"updated_at": "2024-08-03T01:36:13Z",
"updated_at": "2024-09-04T08:57:07Z",
"pushed_at": "2023-12-31T01:23:55Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack",
"fork": false,
"created_at": "2023-12-13T16:43:18Z",
"updated_at": "2024-08-19T03:52:52Z",
"updated_at": "2024-09-04T06:48:57Z",
"pushed_at": "2023-12-13T16:47:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-09-02T11:12:07Z",
"updated_at": "2024-09-04T10:13:43Z",
"pushed_at": "2024-07-25T18:12:57Z",
"stargazers_count": 208,
"watchers_count": 208,
"stargazers_count": 209,
"watchers_count": 209,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 208,
"watchers": 209,
"score": 0,
"subscribers_count": 5
},

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,5 +28,35 @@
"watchers": 12,
"score": 0,
"subscribers_count": 2
},
{
"id": 852216536,
"name": "CVE-2024-1212",
"full_name": "MuhammadWaseem29\/CVE-2024-1212",
"owner": {
"login": "MuhammadWaseem29",
"id": 161931698,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161931698?v=4",
"html_url": "https:\/\/github.com\/MuhammadWaseem29"
},
"html_url": "https:\/\/github.com\/MuhammadWaseem29\/CVE-2024-1212",
"description": null,
"fork": false,
"created_at": "2024-09-04T12:34:30Z",
"updated_at": "2024-09-04T12:34:30Z",
"pushed_at": "2024-09-04T12:34:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -934,6 +934,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -82,10 +82,10 @@
"description": "PoC for the CVE-2024 Litespeed Cache Privilege Escalation ",
"fork": false,
"created_at": "2024-08-27T07:20:44Z",
"updated_at": "2024-09-02T08:43:33Z",
"updated_at": "2024-09-04T11:38:33Z",
"pushed_at": "2024-08-30T06:43:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -94,7 +94,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-09-03T19:33:48Z",
"updated_at": "2024-09-04T06:50:28Z",
"pushed_at": "2024-07-29T12:20:50Z",
"stargazers_count": 359,
"watchers_count": 359,
"stargazers_count": 360,
"watchers_count": 360,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 359,
"watchers": 360,
"score": 0,
"subscribers_count": 7
},

View file

@ -73,19 +73,19 @@
"description": "该漏洞存在于 NtQueryInformationToken 函数中特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。",
"fork": false,
"created_at": "2024-07-05T16:02:56Z",
"updated_at": "2024-09-04T01:50:53Z",
"updated_at": "2024-09-04T07:39:28Z",
"pushed_at": "2024-07-05T16:06:16Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 20,
"forks": 7,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -982,10 +982,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-09-04T05:04:07Z",
"updated_at": "2024-09-04T11:58:18Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3484,
"watchers_count": 3484,
"stargazers_count": 3485,
"watchers_count": 3485,
"has_discussions": false,
"forks_count": 232,
"allow_forking": true,
@ -994,7 +994,7 @@
"topics": [],
"visibility": "public",
"forks": 232,
"watchers": 3484,
"watchers": 3485,
"score": 0,
"subscribers_count": 39
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -256,10 +256,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-09-04T03:37:38Z",
"updated_at": "2024-09-04T12:12:19Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 498,
"watchers_count": 498,
"stargazers_count": 505,
"watchers_count": 505,
"has_discussions": false,
"forks_count": 96,
"allow_forking": true,
@ -268,7 +268,7 @@
"topics": [],
"visibility": "public",
"forks": 96,
"watchers": 498,
"watchers": 505,
"score": 0,
"subscribers_count": 4
},
@ -406,10 +406,10 @@
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
"fork": false,
"created_at": "2024-08-31T13:56:26Z",
"updated_at": "2024-09-03T15:04:13Z",
"updated_at": "2024-09-04T12:11:58Z",
"pushed_at": "2024-09-03T15:04:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -418,7 +418,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -546,6 +546,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -107,10 +107,10 @@
"description": "Exploit for the vulnerability CVE-2024-43044 in Jenkins",
"fork": false,
"created_at": "2024-08-23T20:26:26Z",
"updated_at": "2024-09-04T06:30:48Z",
"updated_at": "2024-09-04T11:53:41Z",
"pushed_at": "2024-08-29T17:05:04Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 124,
"watchers_count": 124,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 120,
"watchers": 124,
"score": 0,
"subscribers_count": 2
}

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2024-09-04T03:45:33Z",
"updated_at": "2024-09-04T03:45:39Z",
"pushed_at": "2024-09-04T03:45:35Z",
"updated_at": "2024-09-04T12:33:08Z",
"pushed_at": "2024-09-04T12:33:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -530,10 +530,10 @@
"description": "[漏洞复现] 全球首款利用PHP默认环境XAMPP的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。",
"fork": false,
"created_at": "2024-06-08T13:04:45Z",
"updated_at": "2024-08-30T04:47:09Z",
"updated_at": "2024-09-04T08:00:47Z",
"pushed_at": "2024-07-21T20:27:03Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 110,
"watchers_count": 110,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -542,7 +542,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 109,
"watchers": 110,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-29T11:58:25Z",
"updated_at": "2024-09-04T04:18:51Z",
"updated_at": "2024-09-04T10:52:38Z",
"pushed_at": "2024-08-30T01:15:43Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 56,
"watchers": 58,
"score": 0,
"subscribers_count": 2
}

View file

@ -242,6 +242,7 @@
</code>
- [Chocapikk/CVE-2024-1212](https://github.com/Chocapikk/CVE-2024-1212)
- [MuhammadWaseem29/CVE-2024-1212](https://github.com/MuhammadWaseem29/CVE-2024-1212)
### CVE-2024-1269 (2024-02-07)
@ -7235,6 +7236,13 @@
- [brainkok/CVE-2023-25292](https://github.com/brainkok/CVE-2023-25292)
- [tucommenceapousser/CVE-2023-25292](https://github.com/tucommenceapousser/CVE-2023-25292)
### CVE-2023-25355 (2023-04-04)
<code>CoreDial sipXcom up to and including 21.04 is vulnerable to Insecure Permissions. A user who has the ability to run commands as the `daemon` user on a sipXcom server can overwrite a service file, and escalate their privileges to `root`.
</code>
- [glefait/CVE-2023-25355-25356](https://github.com/glefait/CVE-2023-25355-25356)
### CVE-2023-25610
- [qi4L/CVE-2023-25610](https://github.com/qi4L/CVE-2023-25610)
@ -36354,6 +36362,7 @@
- [Dannners/CVE-2018-6574-go-get-RCE](https://github.com/Dannners/CVE-2018-6574-go-get-RCE)
- [bme2003/CVE-2018-6574](https://github.com/bme2003/CVE-2018-6574)
- [iNoSec2/cve-2018-6574](https://github.com/iNoSec2/cve-2018-6574)
- [ttyA0/cve-2018-6574](https://github.com/ttyA0/cve-2018-6574)
### CVE-2018-6622 (2018-08-17)