Auto Update 2024/12/19 06:32:53

This commit is contained in:
motikan2010-bot 2024-12-19 15:32:53 +09:00
parent 6cdef57e04
commit 14a2cccec0
51 changed files with 205 additions and 205 deletions

View file

@ -50,7 +50,7 @@
"stargazers_count": 2012,
"watchers_count": 2012,
"has_discussions": true,
"forks_count": 341,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -77,7 +77,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 341,
"forks": 340,
"watchers": 2012,
"score": 0,
"subscribers_count": 37

View file

@ -19,7 +19,7 @@
"stargazers_count": 2012,
"watchers_count": 2012,
"has_discussions": true,
"forks_count": 341,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -46,7 +46,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 341,
"forks": 340,
"watchers": 2012,
"score": 0,
"subscribers_count": 37

View file

@ -76,10 +76,10 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2024-11-12T08:13:46Z",
"updated_at": "2024-12-19T05:38:57Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 540,
"watchers_count": 540,
"stargazers_count": 541,
"watchers_count": 541,
"has_discussions": false,
"forks_count": 252,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 252,
"watchers": 540,
"watchers": 541,
"score": 0,
"subscribers_count": 28
},

View file

@ -50,7 +50,7 @@
"stargazers_count": 2012,
"watchers_count": 2012,
"has_discussions": true,
"forks_count": 341,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -77,7 +77,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 341,
"forks": 340,
"watchers": 2012,
"score": 0,
"subscribers_count": 37

View file

@ -581,7 +581,7 @@
"stargazers_count": 2012,
"watchers_count": 2012,
"has_discussions": true,
"forks_count": 341,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -608,7 +608,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 341,
"forks": 340,
"watchers": 2012,
"score": 0,
"subscribers_count": 37

View file

@ -1,35 +1,4 @@
[
{
"id": 361168922,
"name": "CVE-2018-5158",
"full_name": "ppcrab\/CVE-2018-5158",
"owner": {
"login": "ppcrab",
"id": 39876329,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39876329?v=4",
"html_url": "https:\/\/github.com\/ppcrab",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ppcrab\/CVE-2018-5158",
"description": null,
"fork": false,
"created_at": "2021-04-24T13:28:14Z",
"updated_at": "2023-12-29T05:42:42Z",
"pushed_at": "2021-04-24T13:41:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 748568686,
"name": "-CVE-2018-5158.pdf",

View file

@ -83,10 +83,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2024-12-04T15:23:57Z",
"updated_at": "2024-12-19T05:22:03Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 581,
"watchers_count": 581,
"stargazers_count": 582,
"watchers_count": 582,
"has_discussions": false,
"forks_count": 173,
"allow_forking": true,
@ -105,7 +105,7 @@
],
"visibility": "public",
"forks": 173,
"watchers": 581,
"watchers": 582,
"score": 0,
"subscribers_count": 23
},

View file

@ -206,19 +206,19 @@
"description": "Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto.",
"fork": false,
"created_at": "2019-10-16T20:13:23Z",
"updated_at": "2024-10-15T10:43:22Z",
"updated_at": "2024-12-19T04:52:25Z",
"pushed_at": "2021-06-16T16:49:33Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 11,
"forks": 9,
"watchers": 12,
"score": 0,
"subscribers_count": 5
},

View file

@ -50,7 +50,7 @@
"stargazers_count": 4147,
"watchers_count": 4147,
"has_discussions": false,
"forks_count": 1100,
"forks_count": 1099,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -76,7 +76,7 @@
"webshell"
],
"visibility": "public",
"forks": 1100,
"forks": 1099,
"watchers": 4147,
"score": 0,
"subscribers_count": 149

View file

@ -205,7 +205,7 @@
"stargazers_count": 2012,
"watchers_count": 2012,
"has_discussions": true,
"forks_count": 341,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -232,7 +232,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 341,
"forks": 340,
"watchers": 2012,
"score": 0,
"subscribers_count": 37

View file

@ -19,7 +19,7 @@
"stargazers_count": 4147,
"watchers_count": 4147,
"has_discussions": false,
"forks_count": 1100,
"forks_count": 1099,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -45,7 +45,7 @@
"webshell"
],
"visibility": "public",
"forks": 1100,
"forks": 1099,
"watchers": 4147,
"score": 0,
"subscribers_count": 149

View file

@ -14,10 +14,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2024-12-13T15:15:39Z",
"updated_at": "2024-12-19T02:01:10Z",
"pushed_at": "2022-04-14T03:17:44Z",
"stargazers_count": 443,
"watchers_count": 443,
"stargazers_count": 444,
"watchers_count": 444,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 45,
"watchers": 443,
"watchers": 444,
"score": 0,
"subscribers_count": 6
},

View file

@ -19,7 +19,7 @@
"stargazers_count": 2012,
"watchers_count": 2012,
"has_discussions": true,
"forks_count": 341,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -46,7 +46,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 341,
"forks": 340,
"watchers": 2012,
"score": 0,
"subscribers_count": 37

View file

@ -19,13 +19,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -45,10 +45,10 @@
"description": "CVE-2020-8597 pppd buffer overflow poc",
"fork": false,
"created_at": "2020-03-07T19:00:46Z",
"updated_at": "2024-08-12T19:58:28Z",
"updated_at": "2024-12-19T02:50:00Z",
"pushed_at": "2020-03-12T11:10:31Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 48,
"watchers": 49,
"score": 0,
"subscribers_count": 4
},

View file

@ -93,10 +93,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2024-12-03T03:14:01Z",
"updated_at": "2024-12-19T02:07:29Z",
"pushed_at": "2023-06-08T04:01:33Z",
"stargazers_count": 485,
"watchers_count": 485,
"stargazers_count": 486,
"watchers_count": 486,
"has_discussions": false,
"forks_count": 148,
"allow_forking": true,
@ -107,7 +107,7 @@
],
"visibility": "public",
"forks": 148,
"watchers": 485,
"watchers": 486,
"score": 0,
"subscribers_count": 8
},
@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-18T03:01:57Z",
"updated_at": "2024-12-19T03:07:49Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1342,
"watchers_count": 1342,
"stargazers_count": 1343,
"watchers_count": 1343,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1342,
"watchers": 1343,
"score": 0,
"subscribers_count": 15
}

View file

@ -14,10 +14,10 @@
"description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
"fork": false,
"created_at": "2021-11-15T14:48:14Z",
"updated_at": "2024-12-08T20:40:46Z",
"updated_at": "2024-12-19T00:35:12Z",
"pushed_at": "2024-10-31T18:50:48Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 72,
"watchers": 73,
"score": 0,
"subscribers_count": 2
},

View file

@ -1307,10 +1307,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-12-15T07:54:07Z",
"updated_at": "2024-12-19T04:27:55Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 803,
"watchers_count": 803,
"stargazers_count": 804,
"watchers_count": 804,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -1324,7 +1324,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 803,
"watchers": 804,
"score": 0,
"subscribers_count": 11
},

View file

@ -14,10 +14,10 @@
"description": "Experimenting with CVE-2022-20120 (Pixel Bootloader \/ ABL) using Unicorn, derived from eShard's emulator at https:\/\/github.com\/eshard\/pixel6-boot\/blob\/main\/run_abl_public.ipynb",
"fork": false,
"created_at": "2024-12-18T10:44:34Z",
"updated_at": "2024-12-18T19:07:29Z",
"updated_at": "2024-12-19T01:13:59Z",
"pushed_at": "2024-12-18T11:00:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,8 +26,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -642,13 +642,13 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 7,
"score": 0,
"subscribers_count": 2
@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-18T03:01:57Z",
"updated_at": "2024-12-19T03:07:49Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1342,
"watchers_count": 1342,
"stargazers_count": 1343,
"watchers_count": 1343,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1342,
"watchers": 1343,
"score": 0,
"subscribers_count": 15
}

View file

@ -50,10 +50,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-30T23:32:56Z",
"updated_at": "2024-08-12T20:28:05Z",
"updated_at": "2024-12-19T02:40:39Z",
"pushed_at": "2022-11-01T19:56:40Z",
"stargazers_count": 167,
"watchers_count": 167,
"stargazers_count": 168,
"watchers_count": 168,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 167,
"watchers": 168,
"score": 0,
"subscribers_count": 4
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -107,10 +107,10 @@
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
"fork": false,
"created_at": "2023-06-18T15:42:00Z",
"updated_at": "2024-12-05T17:12:27Z",
"updated_at": "2024-12-19T02:51:38Z",
"pushed_at": "2024-03-07T07:23:41Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 2
},
@ -266,10 +266,10 @@
"description": "A PoC exploit for CVE-2023-32315 - Openfire Authentication Bypass",
"fork": false,
"created_at": "2023-12-15T16:30:51Z",
"updated_at": "2024-12-02T16:19:44Z",
"updated_at": "2024-12-19T02:44:01Z",
"pushed_at": "2024-05-17T23:51:11Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -282,7 +282,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -265,8 +265,8 @@
"description": "Cái này dựng lên với mục đích cho ae tham khảo, chê thì đừng có xem. :))))",
"fork": false,
"created_at": "2024-12-11T07:38:22Z",
"updated_at": "2024-12-16T13:51:41Z",
"pushed_at": "2024-12-16T13:51:36Z",
"updated_at": "2024-12-19T01:21:03Z",
"pushed_at": "2024-12-19T01:20:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -19,7 +19,7 @@
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -36,7 +36,7 @@
"cve-2024-39573"
],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 40,
"score": 0,
"subscribers_count": 1

View file

@ -447,6 +447,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -35,6 +35,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -141,8 +141,8 @@
"description": "Exploit for CVE-2023-7028 - GitLab CE\/EE",
"fork": false,
"created_at": "2024-01-18T05:17:00Z",
"updated_at": "2024-08-12T20:33:09Z",
"pushed_at": "2024-03-14T05:30:59Z",
"updated_at": "2024-12-19T04:12:19Z",
"pushed_at": "2024-12-19T04:12:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -297,10 +297,10 @@
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
"fork": false,
"created_at": "2024-09-27T09:02:08Z",
"updated_at": "2024-12-18T14:01:26Z",
"updated_at": "2024-12-19T02:53:07Z",
"pushed_at": "2024-09-30T12:48:08Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -309,7 +309,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 125,
"watchers": 126,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,8 +14,8 @@
"description": "Exploit for CVE-2024-20767 - Adobe ColdFusion",
"fork": false,
"created_at": "2024-03-26T06:51:08Z",
"updated_at": "2024-12-17T16:21:55Z",
"pushed_at": "2024-03-26T15:52:49Z",
"updated_at": "2024-12-19T04:04:55Z",
"pushed_at": "2024-12-19T04:04:52Z",
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -83,10 +83,10 @@
"description": "PoC for CVE-2024-25641 Authenticated RCE on Cacti v1.2.26",
"fork": false,
"created_at": "2024-08-27T16:41:39Z",
"updated_at": "2024-09-01T04:05:36Z",
"updated_at": "2024-12-19T04:56:26Z",
"pushed_at": "2024-09-01T04:05:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -105,7 +105,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,8 +45,8 @@
"description": "Exploit for CVE-2024-27198 - TeamCity Server",
"fork": false,
"created_at": "2024-03-05T05:43:06Z",
"updated_at": "2024-12-02T20:15:09Z",
"pushed_at": "2024-03-08T06:13:09Z",
"updated_at": "2024-12-19T04:08:46Z",
"pushed_at": "2024-12-19T04:08:43Z",
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-30090 - LPE PoC",
"fork": false,
"created_at": "2024-10-17T08:38:47Z",
"updated_at": "2024-12-17T11:43:11Z",
"updated_at": "2024-12-19T03:10:07Z",
"pushed_at": "2024-10-17T09:53:33Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 101,
"watchers": 102,
"score": 0,
"subscribers_count": 3
}

View file

@ -243,10 +243,10 @@
"description": "CVE-2024-32002 RCE PoC",
"fork": false,
"created_at": "2024-05-18T15:05:28Z",
"updated_at": "2024-11-29T13:18:24Z",
"updated_at": "2024-12-19T04:00:37Z",
"pushed_at": "2024-05-18T15:12:59Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -259,7 +259,7 @@
],
"visibility": "public",
"forks": 25,
"watchers": 103,
"watchers": 104,
"score": 0,
"subscribers_count": 3
},

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-3400",
"fork": false,
"created_at": "2024-04-13T14:00:31Z",
"updated_at": "2024-11-18T17:41:54Z",
"updated_at": "2024-12-19T00:57:57Z",
"pushed_at": "2024-04-18T07:11:17Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 63,
"watchers": 64,
"score": 0,
"subscribers_count": 2
},

View file

@ -50,7 +50,7 @@
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -67,7 +67,7 @@
"cve-2024-39573"
],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 40,
"score": 0,
"subscribers_count": 1

View file

@ -19,13 +19,13 @@
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 67,
"score": 0,
"subscribers_count": 1
@ -76,20 +76,20 @@
"description": "exploit CVE-2024-40725 (Apache httpd) with ",
"fork": false,
"created_at": "2024-12-18T15:09:38Z",
"updated_at": "2024-12-18T19:06:31Z",
"updated_at": "2024-12-19T01:36:21Z",
"pushed_at": "2024-12-18T15:12:31Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit",
"fork": false,
"created_at": "2024-07-13T19:54:27Z",
"updated_at": "2024-11-20T16:30:56Z",
"updated_at": "2024-12-19T02:47:57Z",
"pushed_at": "2024-09-11T20:00:46Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Proof of concept (POC) for CVE-2024-45337 ",
"fork": false,
"created_at": "2024-12-17T22:07:53Z",
"updated_at": "2024-12-17T22:39:12Z",
"updated_at": "2024-12-19T03:53:11Z",
"pushed_at": "2024-12-17T22:27:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -28,6 +28,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 10,
"score": 0,
"subscribers_count": 1

View file

@ -262,8 +262,8 @@
"description": null,
"fork": false,
"created_at": "2024-12-18T03:39:57Z",
"updated_at": "2024-12-19T00:10:07Z",
"pushed_at": "2024-12-19T00:10:04Z",
"updated_at": "2024-12-19T00:45:19Z",
"pushed_at": "2024-12-19T00:45:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -276,6 +276,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-18T22:30:25Z",
"updated_at": "2024-12-19T03:04:12Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 89,
"watchers": 93,
"score": 0,
"subscribers_count": 1
},

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,20 +14,20 @@
"description": null,
"fork": false,
"created_at": "2024-12-18T19:53:46Z",
"updated_at": "2024-12-18T20:18:43Z",
"pushed_at": "2024-12-18T20:18:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-12-19T06:00:44Z",
"pushed_at": "2024-12-19T06:00:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -45,19 +45,19 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-18T21:16:34Z",
"pushed_at": "2024-12-18T03:54:48Z",
"stargazers_count": 55,
"watchers_count": 55,
"updated_at": "2024-12-19T03:41:08Z",
"pushed_at": "2024-12-19T03:23:02Z",
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 22,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 55,
"forks": 24,
"watchers": 59,
"score": 0,
"subscribers_count": 3
},
@ -107,10 +107,10 @@
"description": "A Docker-based environment to reproduce the CVE-2024-53677 vulnerability in Apache Struts 2. ",
"fork": false,
"created_at": "2024-12-17T06:42:16Z",
"updated_at": "2024-12-17T10:24:01Z",
"updated_at": "2024-12-19T05:46:48Z",
"pushed_at": "2024-12-17T07:01:11Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
@ -152,7 +152,7 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 905399741,
@ -169,10 +169,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-18T18:42:34Z",
"updated_at": "2024-12-18T19:10:52Z",
"updated_at": "2024-12-19T03:18:25Z",
"pushed_at": "2024-12-18T19:10:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -181,8 +181,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,8 +14,8 @@
"description": "Exploit POC Code for CVE-2024-55968",
"fork": false,
"created_at": "2024-12-17T21:07:59Z",
"updated_at": "2024-12-17T21:28:22Z",
"pushed_at": "2024-12-17T21:17:20Z",
"updated_at": "2024-12-19T04:47:33Z",
"pushed_at": "2024-12-19T04:47:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -1360,7 +1360,7 @@
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 27,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1375,7 +1375,7 @@
"rce"
],
"visibility": "public",
"forks": 27,
"forks": 28,
"watchers": 69,
"score": 0,
"subscribers_count": 2
@ -2853,5 +2853,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 905536150,
"name": "CVE-2024-6387",
"full_name": "zql-gif\/CVE-2024-6387",
"owner": {
"login": "zql-gif",
"id": 84617316,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84617316?v=4",
"html_url": "https:\/\/github.com\/zql-gif",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zql-gif\/CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-12-19T03:08:19Z",
"updated_at": "2024-12-19T06:22:28Z",
"pushed_at": "2024-12-19T06:22:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1432,6 +1432,7 @@
- [identity-threat-labs/CVE-2024-6387-Vulnerability-Checker](https://github.com/identity-threat-labs/CVE-2024-6387-Vulnerability-Checker)
- [identity-threat-labs/Article-RegreSSHion-CVE-2024-6387](https://github.com/identity-threat-labs/Article-RegreSSHion-CVE-2024-6387)
- [YassDEV221608/CVE-2024-6387](https://github.com/YassDEV221608/CVE-2024-6387)
- [zql-gif/CVE-2024-6387](https://github.com/zql-gif/CVE-2024-6387)
### CVE-2024-6473 (2024-09-03)
@ -39691,7 +39692,6 @@
<code>The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR &lt; 52.8 and Firefox &lt; 60.
</code>
- [ppcrab/CVE-2018-5158](https://github.com/ppcrab/CVE-2018-5158)
- [puzzle-tools/-CVE-2018-5158.pdf](https://github.com/puzzle-tools/-CVE-2018-5158.pdf)
### CVE-2018-5234 (2018-04-30)