Auto Update 2024/08/27 06:29:33

This commit is contained in:
motikan2010-bot 2024-08-27 15:29:33 +09:00
parent d6b13e9b57
commit 157d317ae0
40 changed files with 259 additions and 256 deletions

View file

@ -13,10 +13,10 @@
"description": "Microsoft FrontPage Extensions Check (shtml.dll)",
"fork": false,
"created_at": "2024-05-30T09:55:41Z",
"updated_at": "2024-07-22T17:19:29Z",
"updated_at": "2024-08-27T03:19:43Z",
"pushed_at": "2024-06-24T09:48:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},

View file

@ -258,7 +258,7 @@
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -274,7 +274,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 13,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "None",
"fork": false,
"created_at": "2017-07-09T06:03:37Z",
"updated_at": "2022-11-09T17:57:30Z",
"updated_at": "2024-08-27T00:45:28Z",
"pushed_at": "2018-08-25T16:09:21Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 0
},

View file

@ -78,13 +78,13 @@
"stargazers_count": 184,
"watchers_count": 184,
"has_discussions": false,
"forks_count": 45,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 45,
"forks": 44,
"watchers": 184,
"score": 0,
"subscribers_count": 7

View file

@ -154,10 +154,10 @@
"description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。",
"fork": false,
"created_at": "2020-05-16T03:01:32Z",
"updated_at": "2024-07-27T03:42:54Z",
"updated_at": "2024-08-27T01:36:01Z",
"pushed_at": "2022-08-07T06:36:30Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -166,7 +166,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 89,
"watchers": 90,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
"updated_at": "2024-08-21T22:09:21Z",
"updated_at": "2024-08-27T05:04:04Z",
"pushed_at": "2021-03-29T12:33:38Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 131,
"watchers_count": 131,
"has_discussions": true,
"forks_count": 23,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 129,
"watchers": 131,
"score": 0,
"subscribers_count": 11
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-09T11:40:56Z",
"updated_at": "2024-08-12T20:13:46Z",
"updated_at": "2024-08-27T02:27:45Z",
"pushed_at": "2021-06-09T06:58:20Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -4958,5 +4958,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 848038594,
"name": "CVE-2021-4034",
"full_name": "lsclsclsc\/CVE-2021-4034",
"owner": {
"login": "lsclsclsc",
"id": 59271192,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59271192?v=4",
"html_url": "https:\/\/github.com\/lsclsclsc"
},
"html_url": "https:\/\/github.com\/lsclsclsc\/CVE-2021-4034",
"description": null,
"fork": false,
"created_at": "2024-08-27T02:39:10Z",
"updated_at": "2024-08-27T02:40:02Z",
"pushed_at": "2024-08-27T02:40:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1284,10 +1284,10 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
"updated_at": "2024-08-06T05:38:46Z",
"updated_at": "2024-08-27T04:53:38Z",
"pushed_at": "2022-04-26T05:55:58Z",
"stargazers_count": 203,
"watchers_count": 203,
"stargazers_count": 202,
"watchers_count": 202,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -1296,7 +1296,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 203,
"watchers": 202,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-15T03:27:03Z",
"updated_at": "2024-08-26T12:06:32Z",
"updated_at": "2024-08-27T02:16:02Z",
"pushed_at": "2024-02-28T03:23:27Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 4
}

View file

@ -726,6 +726,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-07T05:43:48Z",
"updated_at": "2024-08-08T03:17:23Z",
"updated_at": "2024-08-27T01:34:03Z",
"pushed_at": "2024-04-05T00:05:44Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 1
}

View file

@ -311,6 +311,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-15T04:16:46Z",
"updated_at": "2024-06-15T15:09:13Z",
"updated_at": "2024-08-27T04:59:16Z",
"pushed_at": "2023-08-17T11:43:26Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 119,
"watchers": 120,
"score": 0,
"subscribers_count": 7
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-05-30T02:18:29Z",
"updated_at": "2024-08-12T20:31:32Z",
"updated_at": "2024-08-27T03:30:09Z",
"pushed_at": "2023-05-30T02:43:06Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 60,
"watchers": 61,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-08-25T21:02:30Z",
"updated_at": "2024-08-27T01:34:48Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2223,
"watchers_count": 2223,
"stargazers_count": 2224,
"watchers_count": 2224,
"has_discussions": false,
"forks_count": 291,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 291,
"watchers": 2223,
"watchers": 2224,
"score": 0,
"subscribers_count": 23
},

View file

@ -1,32 +0,0 @@
[
{
"id": 759748409,
"name": "sumkaluissessss",
"full_name": "sanderswannalive\/sumkaluissessss",
"owner": {
"login": "sanderswannalive",
"id": 50711470,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50711470?v=4",
"html_url": "https:\/\/github.com\/sanderswannalive"
},
"html_url": "https:\/\/github.com\/sanderswannalive\/sumkaluissessss",
"description": "CVE-2024-206565",
"fork": false,
"created_at": "2024-02-19T09:06:06Z",
"updated_at": "2024-02-22T14:52:06Z",
"pushed_at": "2024-02-19T10:02:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -43,7 +43,7 @@
"description": "CVE-2024-21006 exp",
"fork": false,
"created_at": "2024-07-02T06:25:14Z",
"updated_at": "2024-08-11T07:18:28Z",
"updated_at": "2024-08-27T02:37:27Z",
"pushed_at": "2024-07-29T19:39:15Z",
"stargazers_count": 13,
"watchers_count": 13,

View file

@ -27,6 +27,36 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 848016259,
"name": "CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26",
"full_name": "thisisveryfunny\/CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26",
"owner": {
"login": "thisisveryfunny",
"id": 179417827,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179417827?v=4",
"html_url": "https:\/\/github.com\/thisisveryfunny"
},
"html_url": "https:\/\/github.com\/thisisveryfunny\/CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26",
"description": "CVE-2024-25641 - RCE Automated Exploit - Cacti 1.2.26",
"fork": false,
"created_at": "2024-08-27T01:19:25Z",
"updated_at": "2024-08-27T03:16:37Z",
"pushed_at": "2024-08-27T02:06:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
"fork": false,
"created_at": "2024-03-06T03:15:03Z",
"updated_at": "2024-08-21T01:20:11Z",
"updated_at": "2024-08-27T04:32:02Z",
"pushed_at": "2024-03-11T07:57:40Z",
"stargazers_count": 132,
"watchers_count": 132,
"stargazers_count": 133,
"watchers_count": 133,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -98,7 +98,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 132,
"watchers": 133,
"score": 0,
"subscribers_count": 3
},

View file

@ -223,10 +223,10 @@
"description": "CVE-2024-28955 Exploitation PoC ",
"fork": false,
"created_at": "2024-07-01T11:49:51Z",
"updated_at": "2024-08-21T05:18:31Z",
"updated_at": "2024-08-27T03:16:55Z",
"pushed_at": "2024-07-01T12:53:21Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -244,7 +244,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing",
"fork": false,
"created_at": "2024-06-06T18:31:57Z",
"updated_at": "2024-08-12T13:30:22Z",
"updated_at": "2024-08-27T04:54:31Z",
"pushed_at": "2024-06-06T18:38:06Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 30,
"watchers": 29,
"score": 0,
"subscribers_count": 1
}

View file

@ -1072,10 +1072,10 @@
"description": "XZ Backdoor Extract(Test on Ubuntu 23.10)",
"fork": false,
"created_at": "2024-04-01T16:08:50Z",
"updated_at": "2024-05-14T11:09:48Z",
"updated_at": "2024-08-27T01:30:39Z",
"pushed_at": "2024-04-02T07:12:53Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -1089,7 +1089,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 2
},

View file

@ -1,32 +0,0 @@
[
{
"id": 817700177,
"name": "hook",
"full_name": "bonnettheo\/hook",
"owner": {
"login": "bonnettheo",
"id": 33837840,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33837840?v=4",
"html_url": "https:\/\/github.com\/bonnettheo"
},
"html_url": "https:\/\/github.com\/bonnettheo\/hook",
"description": "submodule for CVE-2024-320002",
"fork": false,
"created_at": "2024-06-20T09:02:23Z",
"updated_at": "2024-06-21T14:23:27Z",
"pushed_at": "2024-06-21T14:23:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1375,36 +1375,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 817662725,
"name": "CVE-2024-32002",
"full_name": "bonnettheo\/CVE-2024-32002",
"owner": {
"login": "bonnettheo",
"id": 33837840,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33837840?v=4",
"html_url": "https:\/\/github.com\/bonnettheo"
},
"html_url": "https:\/\/github.com\/bonnettheo\/CVE-2024-32002",
"description": "exploit for CVE-2024-32002",
"fork": false,
"created_at": "2024-06-20T07:37:09Z",
"updated_at": "2024-06-27T09:40:51Z",
"pushed_at": "2024-06-27T09:40:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823532806,
"name": "git_rce",

View file

@ -73,10 +73,10 @@
"description": "CVE-2024-3400",
"fork": false,
"created_at": "2024-04-13T14:00:31Z",
"updated_at": "2024-08-11T13:05:27Z",
"updated_at": "2024-08-27T04:13:55Z",
"pushed_at": "2024-04-18T07:11:17Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 2
},

View file

@ -73,10 +73,10 @@
"description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.",
"fork": false,
"created_at": "2024-08-17T14:58:36Z",
"updated_at": "2024-08-26T14:02:52Z",
"updated_at": "2024-08-27T01:15:49Z",
"pushed_at": "2024-08-21T06:24:27Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 69,
"watchers": 68,
"score": 0,
"subscribers_count": 4
},
@ -226,10 +226,10 @@
"description": "CVE-2024-38063 Research Tool",
"fork": false,
"created_at": "2024-08-24T15:04:54Z",
"updated_at": "2024-08-26T09:41:30Z",
"updated_at": "2024-08-27T01:18:32Z",
"pushed_at": "2024-08-26T06:18:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -238,7 +238,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -256,19 +256,19 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-08-27T00:21:33Z",
"updated_at": "2024-08-27T06:33:24Z",
"pushed_at": "2024-08-26T08:14:55Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 7,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 45,
"forks": 22,
"watchers": 94,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "RDL的堆溢出导致的RCE",
"fork": false,
"created_at": "2024-08-09T05:00:44Z",
"updated_at": "2024-08-26T14:53:15Z",
"updated_at": "2024-08-27T04:49:48Z",
"pushed_at": "2024-08-14T04:43:05Z",
"stargazers_count": 185,
"watchers_count": 185,
"stargazers_count": 186,
"watchers_count": 186,
"has_discussions": false,
"forks_count": 80,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 80,
"watchers": 185,
"watchers": 186,
"score": 0,
"subscribers_count": 5
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1,32 +1,32 @@
[
{
"id": 845866253,
"id": 847526830,
"name": "CVE-2024-42992",
"full_name": "juwenyi\/CVE-2024-42992",
"full_name": "thanhh23\/CVE-2024-42992",
"owner": {
"login": "juwenyi",
"id": 117093096,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117093096?v=4",
"html_url": "https:\/\/github.com\/juwenyi"
"login": "thanhh23",
"id": 82047405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82047405?v=4",
"html_url": "https:\/\/github.com\/thanhh23"
},
"html_url": "https:\/\/github.com\/juwenyi\/CVE-2024-42992",
"html_url": "https:\/\/github.com\/thanhh23\/CVE-2024-42992",
"description": "CVE-2024-42992",
"fork": false,
"created_at": "2024-08-22T04:40:34Z",
"updated_at": "2024-08-26T09:34:43Z",
"created_at": "2024-08-26T03:13:45Z",
"updated_at": "2024-08-26T03:13:45Z",
"pushed_at": "2024-08-22T04:43:17Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

View file

@ -168,13 +168,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Makes IDA (most versions) to crash upon opening it. ",
"fork": false,
"created_at": "2024-08-25T12:33:14Z",
"updated_at": "2024-08-26T16:45:03Z",
"updated_at": "2024-08-27T03:49:18Z",
"pushed_at": "2024-08-26T00:12:57Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 1
}

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -238,5 +238,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 848057101,
"name": "CVE-2024-4879",
"full_name": "fa-rrel\/CVE-2024-4879",
"owner": {
"login": "fa-rrel",
"id": 153366162,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
"html_url": "https:\/\/github.com\/fa-rrel"
},
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-4879",
"description": "Jelly Template Injection Vulnerability in ServiceNow | POC CVE-2024-4879",
"fork": false,
"created_at": "2024-08-27T03:43:28Z",
"updated_at": "2024-08-27T03:56:55Z",
"pushed_at": "2024-08-27T03:56:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept for CVE-2024-5932",
"fork": false,
"created_at": "2024-08-25T11:51:36Z",
"updated_at": "2024-08-26T23:00:51Z",
"pushed_at": "2024-08-26T13:05:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"updated_at": "2024-08-27T05:45:31Z",
"pushed_at": "2024-08-27T05:45:28Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

39
2024/CVE-2024-6386.json Normal file
View file

@ -0,0 +1,39 @@
[
{
"id": 848061892,
"name": "CVE-2024-6386",
"full_name": "realbotnet\/CVE-2024-6386",
"owner": {
"login": "realbotnet",
"id": 178095526,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178095526?v=4",
"html_url": "https:\/\/github.com\/realbotnet"
},
"html_url": "https:\/\/github.com\/realbotnet\/CVE-2024-6386",
"description": "CVE-2024-6386 - Wordpress WPML (WordPress Multilingual Plugin) ≤ 4.6.12. RCE Exploit 0Day (300K Sites Vulnerability) -- Telegram: @bl4ckhatx",
"fork": false,
"created_at": "2024-08-27T04:01:03Z",
"updated_at": "2024-08-27T04:04:25Z",
"pushed_at": "2024-08-27T04:04:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-6386",
"hack",
"poc",
"rce",
"wordpress",
"wpml"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -2847,6 +2847,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 747127213,
"name": "cve-2024-65230",
"full_name": "CBaekhyunC\/cve-2024-65230",
"owner": {
"login": "CBaekhyunC",
"id": 157479885,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/157479885?v=4",
"html_url": "https:\/\/github.com\/CBaekhyunC"
},
"html_url": "https:\/\/github.com\/CBaekhyunC\/cve-2024-65230",
"description": null,
"fork": false,
"created_at": "2024-01-23T10:16:43Z",
"updated_at": "2024-01-23T10:16:43Z",
"pushed_at": "2024-01-23T10:16:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -884,6 +884,7 @@
- [Praison001/CVE-2024-4879-ServiceNow](https://github.com/Praison001/CVE-2024-4879-ServiceNow)
- [NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning](https://github.com/NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning)
- [jdusane/CVE-2024-4879](https://github.com/jdusane/CVE-2024-4879)
- [fa-rrel/CVE-2024-4879](https://github.com/fa-rrel/CVE-2024-4879)
### CVE-2024-4883 (2024-06-25)
@ -1070,6 +1071,13 @@
- [Abdurahmon3236/CVE-2024-6366](https://github.com/Abdurahmon3236/CVE-2024-6366)
### CVE-2024-6386 (2024-08-21)
<code>The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via the Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
</code>
- [realbotnet/CVE-2024-6386](https://github.com/realbotnet/CVE-2024-6386)
### CVE-2024-6387 (2024-07-01)
<code>A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
@ -2400,6 +2408,7 @@
</code>
- [5ma1l/CVE-2024-25641](https://github.com/5ma1l/CVE-2024-25641)
- [thisisveryfunny/CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26](https://github.com/thisisveryfunny/CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26)
### CVE-2024-25723 (2024-02-27)
@ -3239,7 +3248,6 @@
- [AD-Appledog/wakuwaku](https://github.com/AD-Appledog/wakuwaku)
- [tobelight/cve_2024_32002](https://github.com/tobelight/cve_2024_32002)
- [Basyaact/CVE-2024-32002-PoC_Chinese](https://github.com/Basyaact/CVE-2024-32002-PoC_Chinese)
- [bonnettheo/CVE-2024-32002](https://github.com/bonnettheo/CVE-2024-32002)
- [EQSTSeminar/git_rce](https://github.com/EQSTSeminar/git_rce)
- [sysonlai/CVE-2024-32002-hook](https://github.com/sysonlai/CVE-2024-32002-hook)
- [TSY244/CVE-2024-32002-git-rce-father-poc](https://github.com/TSY244/CVE-2024-32002-git-rce-father-poc)
@ -4407,7 +4415,7 @@
- [jeyabalaji711/CVE-2024-42919](https://github.com/jeyabalaji711/CVE-2024-42919)
### CVE-2024-42992
- [juwenyi/CVE-2024-42992](https://github.com/juwenyi/CVE-2024-42992)
- [thanhh23/CVE-2024-42992](https://github.com/thanhh23/CVE-2024-42992)
### CVE-2024-43035
- [ZeroPathAI/Fonoster-LFI-PoC](https://github.com/ZeroPathAI/Fonoster-LFI-PoC)
@ -4448,15 +4456,6 @@
### CVE-2024-56662
- [nimosec/cve-2024-56662](https://github.com/nimosec/cve-2024-56662)
### CVE-2024-65230
- [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230)
### CVE-2024-206565
- [sanderswannalive/sumkaluissessss](https://github.com/sanderswannalive/sumkaluissessss)
### CVE-2024-320002
- [bonnettheo/hook](https://github.com/bonnettheo/hook)
### CVE-2024-1642470
- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)
@ -20476,6 +20475,7 @@
- [X-Projetion/Exploiting-PwnKit-CVE-2021-4034-](https://github.com/X-Projetion/Exploiting-PwnKit-CVE-2021-4034-)
- [evkl1d/CVE-2021-4034](https://github.com/evkl1d/CVE-2021-4034)
- [Typical0day/CVE-2021-4034](https://github.com/Typical0day/CVE-2021-4034)
- [lsclsclsc/CVE-2021-4034](https://github.com/lsclsclsc/CVE-2021-4034)
### CVE-2021-4043 (2022-02-04)