Auto Update 2024/04/28 06:27:59

This commit is contained in:
motikan2010-bot 2024-04-28 15:27:59 +09:00
parent 73535a1ad8
commit 12ee209e5c
56 changed files with 317 additions and 305 deletions

View file

@ -13,10 +13,10 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2021-10-28T20:17:30Z",
"updated_at": "2024-04-28T00:59:13Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -47,10 +47,10 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2021-10-28T20:17:30Z",
"updated_at": "2024-04-28T00:59:13Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -1612,10 +1612,10 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2021-10-28T20:17:30Z",
"updated_at": "2024-04-28T00:59:13Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1624,7 +1624,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -107,10 +107,10 @@
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
"fork": false,
"created_at": "2015-02-03T20:28:27Z",
"updated_at": "2024-02-27T09:05:48Z",
"updated_at": "2024-04-28T01:01:52Z",
"pushed_at": "2023-10-06T16:11:26Z",
"stargazers_count": 240,
"watchers_count": 240,
"stargazers_count": 241,
"watchers_count": 241,
"has_discussions": false,
"forks_count": 73,
"allow_forking": true,
@ -127,7 +127,7 @@
],
"visibility": "public",
"forks": 73,
"watchers": 240,
"watchers": 241,
"score": 0,
"subscribers_count": 17
},

View file

@ -137,10 +137,10 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2021-10-28T20:17:30Z",
"updated_at": "2024-04-28T00:59:13Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -149,7 +149,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2021-10-28T20:17:30Z",
"updated_at": "2024-04-28T00:59:13Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

File diff suppressed because one or more lines are too long

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-04-27T08:28:20Z",
"updated_at": "2024-04-28T03:46:05Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4024,
"watchers_count": 4024,
"stargazers_count": 4025,
"watchers_count": 4025,
"has_discussions": false,
"forks_count": 1081,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1081,
"watchers": 4024,
"watchers": 4025,
"score": 0,
"subscribers_count": 151
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-04-27T08:28:20Z",
"updated_at": "2024-04-28T03:46:05Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4024,
"watchers_count": 4024,
"stargazers_count": 4025,
"watchers_count": 4025,
"has_discussions": false,
"forks_count": 1081,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1081,
"watchers": 4024,
"watchers": 4025,
"score": 0,
"subscribers_count": 151
},

View file

@ -13,10 +13,10 @@
"description": "Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability",
"fork": false,
"created_at": "2020-07-29T19:02:29Z",
"updated_at": "2023-11-17T06:40:18Z",
"updated_at": "2024-04-28T02:55:47Z",
"pushed_at": "2020-11-11T19:48:38Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 26,
"watchers": 25,
"score": 0,
"subscribers_count": 9
}

View file

@ -18,7 +18,7 @@
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 27,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,7 +28,7 @@
"zeroday"
],
"visibility": "public",
"forks": 27,
"forks": 25,
"watchers": 53,
"score": 0,
"subscribers_count": 2

View file

@ -856,7 +856,7 @@
"stargazers_count": 1247,
"watchers_count": 1247,
"has_discussions": false,
"forks_count": 157,
"forks_count": 158,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -869,7 +869,7 @@
"vcenter"
],
"visibility": "public",
"forks": 157,
"forks": 158,
"watchers": 1247,
"score": 0,
"subscribers_count": 13

View file

@ -60,34 +60,34 @@
"subscribers_count": 1
},
{
"id": 409714909,
"id": 409794887,
"name": "VMWare-CVE-Check",
"full_name": "X1pe0\/VMWare-CVE-Check",
"full_name": "Jeromeyoung\/VMWare-CVE-Check",
"owner": {
"login": "X1pe0",
"id": 9041120,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9041120?v=4",
"html_url": "https:\/\/github.com\/X1pe0"
"login": "Jeromeyoung",
"id": 39945364,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
"html_url": "https:\/\/github.com\/Jeromeyoung"
},
"html_url": "https:\/\/github.com\/X1pe0\/VMWare-CVE-Check",
"html_url": "https:\/\/github.com\/Jeromeyoung\/VMWare-CVE-Check",
"description": "CVE-2021-22005",
"fork": false,
"created_at": "2021-09-23T19:11:22Z",
"updated_at": "2023-05-05T16:11:59Z",
"created_at": "2021-09-24T01:31:29Z",
"updated_at": "2021-09-24T01:31:30Z",
"pushed_at": "2021-09-23T20:01:01Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 410204640,

View file

@ -363,36 +363,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 425020388,
"name": "Automated-Gitlab-RCE",
"full_name": "X1pe0\/Automated-Gitlab-RCE",
"owner": {
"login": "X1pe0",
"id": 9041120,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9041120?v=4",
"html_url": "https:\/\/github.com\/X1pe0"
},
"html_url": "https:\/\/github.com\/X1pe0\/Automated-Gitlab-RCE",
"description": "Automated Gitlab RCE via CVE-2021-22205",
"fork": false,
"created_at": "2021-11-05T16:48:11Z",
"updated_at": "2023-09-06T16:12:12Z",
"pushed_at": "2021-11-05T16:52:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 425022767,
"name": "GitLab-CVE-2021-22205-",

View file

@ -133,10 +133,10 @@
"description": "Confluence Server Webwork OGNL injection",
"fork": false,
"created_at": "2021-09-01T07:15:17Z",
"updated_at": "2024-04-09T06:23:31Z",
"updated_at": "2024-04-28T03:47:21Z",
"pushed_at": "2021-12-03T22:09:31Z",
"stargazers_count": 304,
"watchers_count": 304,
"stargazers_count": 305,
"watchers_count": 305,
"has_discussions": false,
"forks_count": 82,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 304,
"watchers": 305,
"score": 0,
"subscribers_count": 2
},
@ -223,10 +223,10 @@
"description": "CVE-2021-26084 Remote Code Execution on Confluence Servers",
"fork": false,
"created_at": "2021-09-01T09:50:26Z",
"updated_at": "2024-01-28T04:53:35Z",
"updated_at": "2024-04-28T03:13:44Z",
"pushed_at": "2022-02-10T11:38:46Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 68,
"watchers": 69,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "远程代码执行S2-062 CVE-2021-31805验证POC",
"fork": false,
"created_at": "2022-04-15T01:50:14Z",
"updated_at": "2024-04-16T13:53:41Z",
"updated_at": "2024-04-28T02:42:39Z",
"pushed_at": "2022-04-17T08:19:59Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 129,
"watchers": 130,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
"updated_at": "2024-04-26T16:58:18Z",
"updated_at": "2024-04-28T03:25:27Z",
"pushed_at": "2021-10-13T22:32:36Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 103,
"watchers": 104,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "Local Privilege Escalation in polkit's pkexec",
"fork": false,
"created_at": "2022-01-25T23:11:30Z",
"updated_at": "2024-02-13T14:30:42Z",
"updated_at": "2024-04-28T06:13:29Z",
"pushed_at": "2022-01-26T01:01:15Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 73,
"watchers": 74,
"score": 0,
"subscribers_count": 2
},
@ -174,7 +174,7 @@
"stargazers_count": 1021,
"watchers_count": 1021,
"has_discussions": false,
"forks_count": 309,
"forks_count": 308,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -184,7 +184,7 @@
"poc"
],
"visibility": "public",
"forks": 309,
"forks": 308,
"watchers": 1021,
"score": 0,
"subscribers_count": 16
@ -2436,10 +2436,10 @@
"description": "CVE-2021-4034 Add Root User - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-28T15:13:28Z",
"updated_at": "2024-04-18T13:52:58Z",
"updated_at": "2024-04-28T02:44:58Z",
"pushed_at": "2022-01-28T15:37:41Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -2448,7 +2448,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 99,
"watchers": 98,
"score": 0,
"subscribers_count": 4
},

View file

@ -887,10 +887,10 @@
"description": "CVE-2021-42013 Vulnerability Scanner This Python script checks for the Remote Code Execution (RCE) vulnerability (CVE-2021-42013) in Apache 2.4.50. ",
"fork": false,
"created_at": "2024-04-07T16:04:06Z",
"updated_at": "2024-04-08T11:24:18Z",
"updated_at": "2024-04-28T05:01:30Z",
"pushed_at": "2024-04-07T17:15:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -899,7 +899,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

32
2021/CVE-2021-42063.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 792995989,
"name": "CVE-2021-42063",
"full_name": "Cappricio-Securities\/CVE-2021-42063",
"owner": {
"login": "Cappricio-Securities",
"id": 102907425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
"html_url": "https:\/\/github.com\/Cappricio-Securities"
},
"html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2021-42063",
"description": "Tool for finding CVE-2021-42063",
"fork": false,
"created_at": "2024-04-28T06:09:14Z",
"updated_at": "2024-04-28T06:10:04Z",
"pushed_at": "2024-04-28T06:09:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -857,10 +857,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2024-04-24T17:28:39Z",
"updated_at": "2024-04-28T06:12:41Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 925,
"watchers_count": 925,
"stargazers_count": 926,
"watchers_count": 926,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@ -889,7 +889,7 @@
],
"visibility": "public",
"forks": 140,
"watchers": 925,
"watchers": 926,
"score": 0,
"subscribers_count": 25
},
@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-04-26T08:56:28Z",
"updated_at": "2024-04-28T06:14:10Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1748,
"watchers_count": 1748,
"stargazers_count": 1750,
"watchers_count": 1750,
"has_discussions": false,
"forks_count": 516,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 516,
"watchers": 1748,
"watchers": 1750,
"score": 0,
"subscribers_count": 28
},
@ -8820,10 +8820,10 @@
"description": "A Proof of Concept of the Log4j vulnerabilities (CVE-2021-44228) over Java-RMI",
"fork": false,
"created_at": "2021-12-19T17:53:31Z",
"updated_at": "2023-01-03T10:02:15Z",
"updated_at": "2024-04-28T06:13:53Z",
"pushed_at": "2021-12-19T22:09:40Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -8832,7 +8832,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
@ -11073,10 +11073,10 @@
"description": "Log4j vulner testing environment based on CVE-2021-44228. It provide guidance to build the sample infrastructure and the exploit scripts. Supporting cooki3 script as the main exploit tools & integration",
"fork": false,
"created_at": "2022-02-12T11:19:41Z",
"updated_at": "2023-04-24T13:24:14Z",
"updated_at": "2024-04-28T06:08:38Z",
"pushed_at": "2023-09-06T11:47:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -11095,7 +11095,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},

View file

@ -1,34 +1,4 @@
[
{
"id": 437968488,
"name": "Log4J-Scan-Win",
"full_name": "X1pe0\/Log4J-Scan-Win",
"owner": {
"login": "X1pe0",
"id": 9041120,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9041120?v=4",
"html_url": "https:\/\/github.com\/X1pe0"
},
"html_url": "https:\/\/github.com\/X1pe0\/Log4J-Scan-Win",
"description": "Windows Server Log4j Scanner - Powershell - CVE-2021-45046 and CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T17:43:38Z",
"updated_at": "2022-11-04T04:17:50Z",
"pushed_at": "2021-12-16T19:54:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 438510625,
"name": "Log4j_CVE-2021-45046",

View file

@ -588,13 +588,13 @@
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 28,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"forks": 27,
"watchers": 62,
"score": 0,
"subscribers_count": 1

View file

@ -18,13 +18,13 @@
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 7,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 6,
"watchers": 20,
"score": 0,
"subscribers_count": 1

View file

@ -103,10 +103,10 @@
"description": "Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947",
"fork": false,
"created_at": "2022-03-03T13:13:02Z",
"updated_at": "2023-11-20T02:57:12Z",
"updated_at": "2024-04-28T02:11:25Z",
"pushed_at": "2022-11-14T01:34:04Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 75,
"watchers": 76,
"score": 0,
"subscribers_count": 1
},
@ -523,10 +523,10 @@
"description": "Spring Cloud Gateway远程代码执行漏洞POC基于命令执行的基础上增加了反弹shell操作",
"fork": false,
"created_at": "2022-03-07T07:24:13Z",
"updated_at": "2024-01-01T02:49:20Z",
"updated_at": "2024-04-28T02:11:20Z",
"pushed_at": "2022-03-09T05:43:23Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -535,7 +535,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -771,7 +771,7 @@
"stargazers_count": 1247,
"watchers_count": 1247,
"has_discussions": false,
"forks_count": 157,
"forks_count": 158,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -784,10 +784,10 @@
"vcenter"
],
"visibility": "public",
"forks": 157,
"forks": 158,
"watchers": 1247,
"score": 0,
"subscribers_count": 12
"subscribers_count": 13
},
{
"id": 554685669,

View file

@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2022-03-01T15:10:20Z",
"updated_at": "2024-02-21T08:16:56Z",
"updated_at": "2024-04-28T02:58:23Z",
"pushed_at": "2022-03-05T01:02:42Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2024-04-13T16:47:19Z",
"updated_at": "2024-04-28T00:38:08Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 361,
"watchers_count": 361,
"stargazers_count": 362,
"watchers_count": 362,
"has_discussions": false,
"forks_count": 93,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 93,
"watchers": 361,
"watchers": 362,
"score": 0,
"subscribers_count": 8
},

View file

@ -133,10 +133,10 @@
"description": "Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team 9 - CW2023)",
"fork": false,
"created_at": "2023-02-15T15:22:48Z",
"updated_at": "2023-07-17T01:09:09Z",
"updated_at": "2024-04-28T06:08:43Z",
"pushed_at": "2023-09-06T11:54:19Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -150,7 +150,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -142,10 +142,10 @@
"description": "CVE-2023-22515 - Broken Access Control Vulnerability in Confluence Data Center and Server",
"fork": false,
"created_at": "2023-10-11T11:21:47Z",
"updated_at": "2024-04-16T10:23:13Z",
"updated_at": "2024-04-28T03:47:00Z",
"pushed_at": "2023-10-13T15:31:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -166,7 +166,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 3
},

View file

@ -193,10 +193,10 @@
"description": "A critical severity Remote Code Execution (RCE) vulnerability (CVE-2023-22527) was discovered in Confluence Server and Data Center. ",
"fork": false,
"created_at": "2024-01-23T02:17:36Z",
"updated_at": "2024-03-10T03:07:52Z",
"updated_at": "2024-04-28T02:54:07Z",
"pushed_at": "2024-01-23T12:03:00Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2024-04-21T17:39:05Z",
"updated_at": "2024-04-27T22:55:07Z",
"pushed_at": "2024-04-27T22:55:04Z",
"updated_at": "2024-04-28T03:51:43Z",
"pushed_at": "2024-04-28T03:51:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -256,19 +256,19 @@
"description": null,
"fork": false,
"created_at": "2024-02-01T09:41:24Z",
"updated_at": "2024-02-14T00:38:17Z",
"updated_at": "2024-04-28T01:09:02Z",
"pushed_at": "2024-02-01T14:15:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -168,10 +168,10 @@
"description": "JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE), CVE-2023-42793",
"fork": false,
"created_at": "2024-04-24T16:33:20Z",
"updated_at": "2024-04-25T13:27:42Z",
"updated_at": "2024-04-28T04:57:38Z",
"pushed_at": "2024-04-24T23:10:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -190,8 +190,8 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false,
"created_at": "2023-10-10T14:20:42Z",
"updated_at": "2024-04-17T17:55:48Z",
"updated_at": "2024-04-28T01:09:04Z",
"pushed_at": "2024-01-08T11:12:08Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 213,
"watchers_count": 213,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 212,
"watchers": 213,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
"fork": false,
"created_at": "2024-01-20T07:14:06Z",
"updated_at": "2024-04-04T11:11:43Z",
"updated_at": "2024-04-28T02:56:20Z",
"pushed_at": "2024-01-21T05:04:01Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 60,
"watchers": 61,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-27T13:56:16Z",
"updated_at": "2024-04-28T05:18:00Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 1886,
"watchers_count": 1886,
"stargazers_count": 1889,
"watchers_count": 1889,
"has_discussions": false,
"forks_count": 233,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 233,
"watchers": 1886,
"watchers": 1889,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,10 +13,10 @@
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
"fork": false,
"created_at": "2024-04-12T15:07:42Z",
"updated_at": "2024-04-26T16:52:56Z",
"updated_at": "2024-04-28T04:50:31Z",
"pushed_at": "2024-04-18T14:31:34Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -29,8 +29,8 @@
],
"visibility": "public",
"forks": 7,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
}
]

View file

@ -13,10 +13,10 @@
"description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
"fork": false,
"created_at": "2024-04-22T07:05:04Z",
"updated_at": "2024-04-27T21:32:01Z",
"updated_at": "2024-04-28T04:45:44Z",
"pushed_at": "2024-04-27T20:04:01Z",
"stargazers_count": 172,
"watchers_count": 172,
"stargazers_count": 174,
"watchers_count": 174,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -25,8 +25,8 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 172,
"watchers": 174,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-04-27T16:56:56Z",
"updated_at": "2024-04-28T03:59:14Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 204,
"watchers_count": 204,
"stargazers_count": 205,
"watchers_count": 205,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 204,
"watchers": 205,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,19 +13,19 @@
"description": "Proof-of-Concept for CVE-2024-21345",
"fork": false,
"created_at": "2024-04-26T16:38:17Z",
"updated_at": "2024-04-27T19:41:18Z",
"updated_at": "2024-04-28T05:38:37Z",
"pushed_at": "2024-04-26T16:39:48Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 7,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 10,
"forks": 10,
"watchers": 17,
"score": 0,
"subscribers_count": 1
}

View file

@ -133,8 +133,8 @@
"description": "This repository contains a proof of concept about the exploitation of the aiohttp library for the reported vulnerability CVE-2024-23334.",
"fork": false,
"created_at": "2024-04-27T13:21:50Z",
"updated_at": "2024-04-27T19:27:19Z",
"pushed_at": "2024-04-27T19:28:07Z",
"updated_at": "2024-04-28T00:54:13Z",
"pushed_at": "2024-04-28T00:54:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -147,6 +147,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,19 +13,19 @@
"description": "Proof-of-Concept for CVE-2024-26218",
"fork": false,
"created_at": "2024-04-26T16:41:04Z",
"updated_at": "2024-04-27T16:48:39Z",
"updated_at": "2024-04-28T02:12:27Z",
"pushed_at": "2024-04-26T16:46:15Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"forks": 3,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}

View file

@ -279,10 +279,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information",
"fork": false,
"created_at": "2024-04-22T22:14:24Z",
"updated_at": "2024-04-26T11:55:53Z",
"updated_at": "2024-04-28T02:30:12Z",
"pushed_at": "2024-04-25T17:55:35Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -302,7 +302,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "WallEscape vulnerability in util-linux",
"fork": false,
"created_at": "2024-03-11T00:15:03Z",
"updated_at": "2024-04-24T22:00:51Z",
"updated_at": "2024-04-28T03:19:49Z",
"pushed_at": "2024-03-30T01:32:02Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 48,
"watchers": 49,
"score": 0,
"subscribers_count": 1
}

View file

@ -493,10 +493,10 @@
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
"fork": false,
"created_at": "2024-03-30T22:07:24Z",
"updated_at": "2024-04-27T21:59:49Z",
"updated_at": "2024-04-28T06:21:20Z",
"pushed_at": "2024-04-02T03:38:32Z",
"stargazers_count": 134,
"watchers_count": 134,
"stargazers_count": 136,
"watchers_count": 136,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -510,7 +510,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 134,
"watchers": 136,
"score": 0,
"subscribers_count": 8
},
@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-04-27T23:21:33Z",
"updated_at": "2024-04-28T03:36:30Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3432,
"watchers_count": 3432,
"stargazers_count": 3434,
"watchers_count": 3434,
"has_discussions": false,
"forks_count": 232,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 232,
"watchers": 3432,
"watchers": 3434,
"score": 0,
"subscribers_count": 36
},

View file

@ -13,10 +13,10 @@
"description": "D-Link NAS CVE-2024-3273 Exploit Tool",
"fork": false,
"created_at": "2024-04-07T03:09:13Z",
"updated_at": "2024-04-26T05:01:29Z",
"updated_at": "2024-04-28T04:49:02Z",
"pushed_at": "2024-04-07T04:41:26Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,9 +25,9 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 64,
"watchers": 65,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 783329699,

32
2024/CVE-2024-33339.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 792945304,
"name": "Poc",
"full_name": "balckgu1\/Poc",
"owner": {
"login": "balckgu1",
"id": 52094532,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52094532?v=4",
"html_url": "https:\/\/github.com\/balckgu1"
},
"html_url": "https:\/\/github.com\/balckgu1\/Poc",
"description": "This repository is a proof of vulnerability for CVE-2024-33339",
"fork": false,
"created_at": "2024-04-28T01:56:40Z",
"updated_at": "2024-04-28T02:13:50Z",
"pushed_at": "2024-04-28T02:13:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2024-04-27T18:15:28Z",
"updated_at": "2024-04-27T18:22:12Z",
"updated_at": "2024-04-28T04:30:44Z",
"pushed_at": "2024-04-27T18:22:09Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -283,10 +283,10 @@
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
"fork": false,
"created_at": "2024-04-16T14:18:08Z",
"updated_at": "2024-04-26T10:37:45Z",
"updated_at": "2024-04-28T04:33:46Z",
"pushed_at": "2024-04-16T22:35:43Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -295,7 +295,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 121,
"watchers": 122,
"score": 0,
"subscribers_count": 1
},
@ -1002,6 +1002,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Scanner for CVE-2024-4040",
"fork": false,
"created_at": "2024-04-23T09:31:29Z",
"updated_at": "2024-04-27T06:37:19Z",
"updated_at": "2024-04-28T05:22:02Z",
"pushed_at": "2024-04-23T09:45:57Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 32,
"watchers": 34,
"score": 0,
"subscribers_count": 7
},
@ -43,10 +43,10 @@
"description": "CVE-2024-4040 (CrushFTP VFS escape) or (CrushFTP unauthenticated RCE)",
"fork": false,
"created_at": "2024-04-23T23:16:36Z",
"updated_at": "2024-04-25T08:02:33Z",
"updated_at": "2024-04-28T02:17:32Z",
"pushed_at": "2024-04-23T23:26:34Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
@ -133,10 +133,10 @@
"description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.",
"fork": false,
"created_at": "2024-04-25T05:18:06Z",
"updated_at": "2024-04-25T05:21:29Z",
"updated_at": "2024-04-28T02:24:14Z",
"pushed_at": "2024-04-25T05:21:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -163,10 +163,10 @@
"description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support",
"fork": false,
"created_at": "2024-04-25T19:51:38Z",
"updated_at": "2024-04-27T17:07:22Z",
"updated_at": "2024-04-28T02:23:47Z",
"pushed_at": "2024-04-27T17:07:19Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -187,7 +187,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -1578,6 +1578,9 @@
- [NN0b0dy/CVE-2024-32399](https://github.com/NN0b0dy/CVE-2024-32399)
### CVE-2024-33339
- [balckgu1/Poc](https://github.com/balckgu1/Poc)
### CVE-2024-33386
- [keaidmmc/CVE-2024-33386](https://github.com/keaidmmc/CVE-2024-33386)
@ -17325,7 +17328,7 @@
- [1ZRR4H/CVE-2021-22005](https://github.com/1ZRR4H/CVE-2021-22005)
- [pisut4152/Sigma-Rule-for-CVE-2021-22005-scanning-activity](https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-22005-scanning-activity)
- [X1pe0/VMWare-CVE-Check](https://github.com/X1pe0/VMWare-CVE-Check)
- [Jeromeyoung/VMWare-CVE-Check](https://github.com/Jeromeyoung/VMWare-CVE-Check)
- [5gstudent/CVE-2021-22005-](https://github.com/5gstudent/CVE-2021-22005-)
- [RedTeamExp/CVE-2021-22005_PoC](https://github.com/RedTeamExp/CVE-2021-22005_PoC)
- [rwincey/CVE-2021-22005](https://github.com/rwincey/CVE-2021-22005)
@ -17444,7 +17447,6 @@
- [shang159/CVE-2021-22205-getshell](https://github.com/shang159/CVE-2021-22205-getshell)
- [devdanqtuan/CVE-2021-22205](https://github.com/devdanqtuan/CVE-2021-22205)
- [hh-hunter/cve-2021-22205](https://github.com/hh-hunter/cve-2021-22205)
- [X1pe0/Automated-Gitlab-RCE](https://github.com/X1pe0/Automated-Gitlab-RCE)
- [runsel/GitLab-CVE-2021-22205-](https://github.com/runsel/GitLab-CVE-2021-22205-)
- [faisalfs10x/GitLab-CVE-2021-22205-scanner](https://github.com/faisalfs10x/GitLab-CVE-2021-22205-scanner)
- [inspiringz/CVE-2021-22205](https://github.com/inspiringz/CVE-2021-22205)
@ -20672,6 +20674,13 @@
- [z00z00z00/Safenet_SAC_CVE-2021-42056](https://github.com/z00z00z00/Safenet_SAC_CVE-2021-42056)
### CVE-2021-42063 (2021-12-14)
<code>A security vulnerability has been discovered in the SAP Knowledge Warehouse - versions 7.30, 7.31, 7.40, 7.50. The usage of one SAP KW component within a Web browser enables unauthorized attackers to conduct XSS attacks, which might lead to disclose sensitive data.
</code>
- [Cappricio-Securities/CVE-2021-42063](https://github.com/Cappricio-Securities/CVE-2021-42063)
### CVE-2021-42071 (2021-10-07)
<code>In Visual Tools DVR VX16 4.2.28.0, an unauthenticated attacker can achieve remote command execution via shell metacharacters in the cgi-bin/slogin/login.py User-Agent HTTP header.
@ -21863,7 +21872,6 @@
<code>It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.
</code>
- [X1pe0/Log4J-Scan-Win](https://github.com/X1pe0/Log4J-Scan-Win)
- [cckuailong/Log4j_CVE-2021-45046](https://github.com/cckuailong/Log4j_CVE-2021-45046)
- [BobTheShoplifter/CVE-2021-45046-Info](https://github.com/BobTheShoplifter/CVE-2021-45046-Info)
- [tejas-nagchandi/CVE-2021-45046](https://github.com/tejas-nagchandi/CVE-2021-45046)