Auto Update 2024/08/07 12:29:45

This commit is contained in:
motikan2010-bot 2024-08-07 21:29:45 +09:00
parent 2f17e1d803
commit 0b6747e475
45 changed files with 209 additions and 178 deletions

View file

@ -163,10 +163,10 @@
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
"fork": false,
"created_at": "2020-11-13T16:33:52Z",
"updated_at": "2024-04-12T13:36:23Z",
"updated_at": "2024-08-07T11:52:54Z",
"pushed_at": "2020-12-31T20:34:30Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 2
},

View file

@ -103,10 +103,10 @@
"description": "php-fpm+Nginx RCE",
"fork": false,
"created_at": "2019-10-23T23:26:57Z",
"updated_at": "2024-07-24T22:54:41Z",
"updated_at": "2024-08-07T06:48:31Z",
"pushed_at": "2020-08-20T04:43:25Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 102,
"watchers": 103,
"score": 0,
"subscribers_count": 4
},

File diff suppressed because one or more lines are too long

View file

@ -13,10 +13,10 @@
"description": "telegram bug that discloses user's hidden phone number (still unpatched) (exploit included) ",
"fork": false,
"created_at": "2021-12-21T19:23:09Z",
"updated_at": "2024-06-02T07:38:46Z",
"updated_at": "2024-08-07T10:23:54Z",
"pushed_at": "2021-12-19T18:18:36Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 0
}

View file

@ -73,10 +73,10 @@
"description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets",
"fork": false,
"created_at": "2024-08-05T16:55:40Z",
"updated_at": "2024-08-05T23:09:05Z",
"updated_at": "2024-08-07T11:26:25Z",
"pushed_at": "2024-08-05T18:31:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-06T06:45:26Z",
"updated_at": "2024-08-07T08:42:17Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4076,
"watchers_count": 4076,
"stargazers_count": 4077,
"watchers_count": 4077,
"has_discussions": false,
"forks_count": 1087,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1087,
"watchers": 4076,
"watchers": 4077,
"score": 0,
"subscribers_count": 151
},

View file

@ -43,10 +43,10 @@
"description": "A PoC exploit for CVE-2020-13945 - Apache APISIX Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-07-18T19:05:24Z",
"updated_at": "2024-08-03T20:14:56Z",
"updated_at": "2024-08-07T11:13:30Z",
"pushed_at": "2024-07-21T16:21:07Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -66,7 +66,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-06T06:45:26Z",
"updated_at": "2024-08-07T08:42:17Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4076,
"watchers_count": 4076,
"stargazers_count": 4077,
"watchers_count": 4077,
"has_discussions": false,
"forks_count": 1087,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1087,
"watchers": 4076,
"watchers": 4077,
"score": 0,
"subscribers_count": 151
},

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-08-06T07:33:28Z",
"updated_at": "2024-08-07T11:03:15Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1081,
"watchers_count": 1081,
"stargazers_count": 1082,
"watchers_count": 1082,
"has_discussions": false,
"forks_count": 320,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 320,
"watchers": 1081,
"watchers": 1082,
"score": 0,
"subscribers_count": 37
},

View file

@ -851,12 +851,12 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-08-06T09:40:14Z",
"updated_at": "2024-08-07T08:18:16Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1291,
"watchers_count": 1291,
"stargazers_count": 1292,
"watchers_count": 1292,
"has_discussions": false,
"forks_count": 164,
"forks_count": 165,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -869,8 +869,8 @@
"vcenter"
],
"visibility": "public",
"forks": 164,
"watchers": 1291,
"forks": 165,
"watchers": 1292,
"score": 0,
"subscribers_count": 14
}

View file

@ -225,10 +225,10 @@
"description": "CVE-2021-22205未授权漏洞批量检测与利用工具",
"fork": false,
"created_at": "2021-10-31T04:15:30Z",
"updated_at": "2024-06-17T07:29:46Z",
"updated_at": "2024-08-07T07:07:28Z",
"pushed_at": "2021-11-04T12:49:58Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -239,7 +239,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 1
},

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-08-06T07:33:28Z",
"updated_at": "2024-08-07T11:03:15Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1081,
"watchers_count": 1081,
"stargazers_count": 1082,
"watchers_count": 1082,
"has_discussions": false,
"forks_count": 320,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 320,
"watchers": 1081,
"watchers": 1082,
"score": 0,
"subscribers_count": 37
},

View file

@ -347,10 +347,10 @@
"description": "Laravel RCE (CVE-2021-3129)",
"fork": false,
"created_at": "2022-04-16T17:22:55Z",
"updated_at": "2024-08-06T02:59:08Z",
"updated_at": "2024-08-07T09:00:56Z",
"pushed_at": "2024-08-05T13:02:41Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -368,7 +368,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 73,
"watchers": 74,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 18,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 17,
"watchers": 66,
"score": 0,
"subscribers_count": 5

View file

@ -73,10 +73,10 @@
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2024-07-24T08:36:15Z",
"updated_at": "2024-08-07T09:02:40Z",
"pushed_at": "2023-02-14T07:05:22Z",
"stargazers_count": 350,
"watchers_count": 350,
"stargazers_count": 351,
"watchers_count": 351,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 90,
"watchers": 350,
"watchers": 351,
"score": 0,
"subscribers_count": 7
},

View file

@ -912,7 +912,7 @@
"stargazers_count": 1782,
"watchers_count": 1782,
"has_discussions": false,
"forks_count": 526,
"forks_count": 527,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -923,7 +923,7 @@
"security"
],
"visibility": "public",
"forks": 526,
"forks": 527,
"watchers": 1782,
"score": 0,
"subscribers_count": 27

View file

@ -103,19 +103,19 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2024-07-24T08:38:15Z",
"updated_at": "2024-08-07T11:10:17Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1080,
"watchers_count": 1080,
"stargazers_count": 1081,
"watchers_count": 1081,
"has_discussions": false,
"forks_count": 221,
"forks_count": 220,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 221,
"watchers": 1080,
"forks": 220,
"watchers": 1081,
"score": 0,
"subscribers_count": 17
},
@ -1155,10 +1155,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2024-08-06T18:24:59Z",
"updated_at": "2024-08-07T12:17:40Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 526,
"watchers_count": 526,
"stargazers_count": 527,
"watchers_count": 527,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@ -1167,7 +1167,7 @@
"topics": [],
"visibility": "public",
"forks": 140,
"watchers": 526,
"watchers": 527,
"score": 0,
"subscribers_count": 15
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 0,
"watchers": 8,
"score": 0,
"subscribers_count": 2

View file

@ -18,13 +18,13 @@
"stargazers_count": 197,
"watchers_count": 197,
"has_discussions": false,
"forks_count": 35,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 35,
"forks": 34,
"watchers": 197,
"score": 0,
"subscribers_count": 7

View file

@ -766,12 +766,12 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-08-06T09:40:14Z",
"updated_at": "2024-08-07T08:18:16Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1291,
"watchers_count": 1291,
"stargazers_count": 1292,
"watchers_count": 1292,
"has_discussions": false,
"forks_count": 164,
"forks_count": 165,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -784,8 +784,8 @@
"vcenter"
],
"visibility": "public",
"forks": 164,
"watchers": 1291,
"forks": 165,
"watchers": 1292,
"score": 0,
"subscribers_count": 14
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 464,
"watchers_count": 464,
"has_discussions": false,
"forks_count": 72,
"forks_count": 71,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 72,
"forks": 71,
"watchers": 464,
"score": 0,
"subscribers_count": 49

View file

@ -226,10 +226,10 @@
"description": "ImageMagick LFI PoC [CVE-2022-44268]",
"fork": false,
"created_at": "2023-02-06T10:44:43Z",
"updated_at": "2024-06-08T20:50:02Z",
"updated_at": "2024-08-07T07:46:21Z",
"pushed_at": "2023-11-06T00:38:18Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -242,7 +242,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 49,
"watchers": 50,
"score": 0,
"subscribers_count": 0
},

View file

@ -108,13 +108,13 @@
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 22,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"forks": 21,
"watchers": 113,
"score": 0,
"subscribers_count": 4
@ -225,10 +225,10 @@
"description": "非常简单的CVE-2023-0386's exp and analysis.Use c and sh.",
"fork": false,
"created_at": "2023-06-28T07:49:52Z",
"updated_at": "2024-05-31T12:26:15Z",
"updated_at": "2024-08-07T10:35:20Z",
"pushed_at": "2023-06-28T07:55:23Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -237,7 +237,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 13,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -227,10 +227,10 @@
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
"fork": false,
"created_at": "2024-02-06T15:09:33Z",
"updated_at": "2024-08-06T01:36:37Z",
"updated_at": "2024-08-07T08:52:17Z",
"pushed_at": "2024-02-06T15:56:12Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -239,7 +239,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "A script to automate privilege escalation with CVE-2023-22809 vulnerability",
"fork": false,
"created_at": "2023-01-21T15:19:23Z",
"updated_at": "2024-08-07T02:41:36Z",
"updated_at": "2024-08-07T07:22:08Z",
"pushed_at": "2023-02-15T18:10:53Z",
"stargazers_count": 145,
"watchers_count": 145,
"stargazers_count": 146,
"watchers_count": 146,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 145,
"watchers": 146,
"score": 0,
"subscribers_count": 3
},
@ -232,10 +232,10 @@
"description": "Running this exploit on a vulnerable system allows a local attacker to gain a root shell on the machine.",
"fork": false,
"created_at": "2023-08-06T06:46:40Z",
"updated_at": "2024-08-06T14:57:56Z",
"updated_at": "2024-08-07T07:22:23Z",
"pushed_at": "2023-09-03T06:54:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -249,7 +249,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,
"forks_count": 26,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"forks": 25,
"watchers": 154,
"score": 0,
"subscribers_count": 5

View file

@ -47,10 +47,10 @@
"description": "Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler \/ Citrix ADC to CVE-2023-3519",
"fork": false,
"created_at": "2023-07-20T16:05:07Z",
"updated_at": "2024-08-05T20:54:13Z",
"updated_at": "2024-08-07T09:23:28Z",
"pushed_at": "2023-07-23T03:54:44Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -64,7 +64,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 77,
"watchers": 78,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-08-06T13:03:00Z",
"updated_at": "2024-08-07T09:55:09Z",
"pushed_at": "2024-07-24T13:17:05Z",
"stargazers_count": 1040,
"watchers_count": 1040,
"stargazers_count": 1041,
"watchers_count": 1041,
"has_discussions": false,
"forks_count": 176,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 176,
"watchers": 1040,
"watchers": 1041,
"score": 0,
"subscribers_count": 17
},

View file

@ -13,10 +13,10 @@
"description": "Critical use-after-free vulnerability discovered in Tinyproxy",
"fork": false,
"created_at": "2024-05-07T10:03:01Z",
"updated_at": "2024-07-05T10:39:45Z",
"updated_at": "2024-08-07T09:23:32Z",
"pushed_at": "2024-05-07T10:11:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 30,
"score": 0,
"subscribers_count": 4

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-08-07T01:29:36Z",
"updated_at": "2024-08-07T11:53:10Z",
"pushed_at": "2024-07-25T18:12:57Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 185,
"watchers_count": 185,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 184,
"watchers": 185,
"score": 0,
"subscribers_count": 5
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 2203,
"watchers_count": 2203,
"has_discussions": false,
"forks_count": 289,
"forks_count": 288,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"poc"
],
"visibility": "public",
"forks": 289,
"forks": 288,
"watchers": 2203,
"score": 0,
"subscribers_count": 23

View file

@ -103,10 +103,10 @@
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
"fork": false,
"created_at": "2024-02-06T15:09:33Z",
"updated_at": "2024-08-06T01:36:37Z",
"updated_at": "2024-08-07T08:52:17Z",
"pushed_at": "2024-02-06T15:56:12Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 2
}

View file

@ -163,10 +163,10 @@
"description": "Windows AppLocker Driver (appid.sys) LPE",
"fork": false,
"created_at": "2024-07-29T13:18:06Z",
"updated_at": "2024-08-07T04:28:31Z",
"updated_at": "2024-08-07T12:14:23Z",
"pushed_at": "2024-07-29T13:29:59Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -180,7 +180,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 21,
"watchers": 24,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": "This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands.",
"fork": false,
"created_at": "2024-02-22T10:53:45Z",
"updated_at": "2024-07-31T20:33:17Z",
"updated_at": "2024-08-07T10:46:14Z",
"pushed_at": "2024-02-22T10:54:26Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "PoC for SQL Injection in CVE-2024-27956",
"fork": false,
"created_at": "2024-05-01T01:58:28Z",
"updated_at": "2024-08-01T18:03:14Z",
"updated_at": "2024-08-07T12:27:06Z",
"pushed_at": "2024-05-03T11:28:21Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 77,
"watchers": 78,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-24T10:37:26Z",
"updated_at": "2024-08-06T22:48:24Z",
"updated_at": "2024-08-07T12:16:21Z",
"pushed_at": "2024-07-31T19:11:55Z",
"stargazers_count": 186,
"watchers_count": 186,
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 186,
"watchers": 187,
"score": 0,
"subscribers_count": 3
},

View file

@ -235,10 +235,10 @@
"description": "CVE-2024-32002 RCE PoC",
"fork": false,
"created_at": "2024-05-18T15:05:28Z",
"updated_at": "2024-08-01T13:27:07Z",
"updated_at": "2024-08-07T07:45:46Z",
"pushed_at": "2024-05-18T15:12:59Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -251,7 +251,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 95,
"watchers": 96,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]",
"fork": false,
"created_at": "2024-06-03T15:57:59Z",
"updated_at": "2024-08-01T08:13:12Z",
"updated_at": "2024-08-07T08:01:34Z",
"pushed_at": "2024-06-03T16:13:49Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -65,8 +65,38 @@
],
"visibility": "public",
"forks": 8,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 1
},
{
"id": 839216934,
"name": "CVE-2024-32113",
"full_name": "YongYe-Security\/CVE-2024-32113",
"owner": {
"login": "YongYe-Security",
"id": 90460865,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90460865?v=4",
"html_url": "https:\/\/github.com\/YongYe-Security"
},
"html_url": "https:\/\/github.com\/YongYe-Security\/CVE-2024-32113",
"description": "CVE-2024-32113 Apache OFBIZ Batch Scanning",
"fork": false,
"created_at": "2024-08-07T07:12:56Z",
"updated_at": "2024-08-07T07:18:23Z",
"pushed_at": "2024-08-07T07:16:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -103,10 +103,10 @@
"description": "Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions with multies ways to exploit",
"fork": false,
"created_at": "2024-07-06T01:10:28Z",
"updated_at": "2024-08-05T09:14:43Z",
"updated_at": "2024-08-07T08:55:28Z",
"pushed_at": "2024-07-06T01:57:58Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -122,7 +122,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 1
},

View file

@ -969,13 +969,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "a signal handler race condition in OpenSSH's server (sshd)",
"fork": false,
"created_at": "2024-07-01T10:55:29Z",
"updated_at": "2024-08-06T13:40:58Z",
"updated_at": "2024-08-07T10:46:14Z",
"pushed_at": "2024-07-01T10:54:02Z",
"stargazers_count": 447,
"watchers_count": 447,
"stargazers_count": 446,
"watchers_count": 446,
"has_discussions": false,
"forks_count": 181,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 181,
"watchers": 447,
"watchers": 446,
"score": 0,
"subscribers_count": 5
},
@ -260,10 +260,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-08-06T13:41:01Z",
"updated_at": "2024-08-07T10:46:14Z",
"pushed_at": "2024-07-14T09:58:48Z",
"stargazers_count": 429,
"watchers_count": 429,
"stargazers_count": 428,
"watchers_count": 428,
"has_discussions": false,
"forks_count": 85,
"allow_forking": true,
@ -278,7 +278,7 @@
],
"visibility": "public",
"forks": 85,
"watchers": 429,
"watchers": 428,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,19 +13,19 @@
"description": "Calibre 远程代码执行CVE-2024-6782Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.",
"fork": false,
"created_at": "2024-08-06T15:31:48Z",
"updated_at": "2024-08-07T05:10:02Z",
"updated_at": "2024-08-07T08:09:49Z",
"pushed_at": "2024-08-06T15:35:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 10,
"score": 0,
"subscribers_count": 1

View file

@ -3041,6 +3041,7 @@
- [RacerZ-fighting/CVE-2024-32113-POC](https://github.com/RacerZ-fighting/CVE-2024-32113-POC)
- [Mr-xn/CVE-2024-32113](https://github.com/Mr-xn/CVE-2024-32113)
- [YongYe-Security/CVE-2024-32113](https://github.com/YongYe-Security/CVE-2024-32113)
### CVE-2024-32136 (2024-04-15)