Auto Update 2024/09/03 06:29:43

This commit is contained in:
motikan2010-bot 2024-09-03 15:29:43 +09:00
parent 208e997f58
commit 1705361917
57 changed files with 243 additions and 247 deletions

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-02T05:09:31Z",
"updated_at": "2024-09-03T03:26:07Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1977,
"watchers_count": 1977,
"stargazers_count": 1978,
"watchers_count": 1978,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1977,
"watchers": 1978,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-02T05:09:31Z",
"updated_at": "2024-09-03T03:26:07Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1977,
"watchers_count": 1977,
"stargazers_count": 1978,
"watchers_count": 1978,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1977,
"watchers": 1978,
"score": 0,
"subscribers_count": 35
},

View file

@ -263,10 +263,10 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2024-08-29T02:57:53Z",
"updated_at": "2024-09-03T01:43:45Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 312,
"watchers_count": 312,
"stargazers_count": 311,
"watchers_count": 311,
"has_discussions": false,
"forks_count": 120,
"allow_forking": true,
@ -279,7 +279,7 @@
],
"visibility": "public",
"forks": 120,
"watchers": 312,
"watchers": 311,
"score": 0,
"subscribers_count": 16
},
@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-08-30T04:24:08Z",
"updated_at": "2024-09-03T01:43:42Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 845,
"watchers_count": 845,
"stargazers_count": 844,
"watchers_count": 844,
"has_discussions": false,
"forks_count": 426,
"allow_forking": true,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 426,
"watchers": 845,
"watchers": 844,
"score": 0,
"subscribers_count": 10
},

View file

@ -414,10 +414,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2024-09-02T17:55:30Z",
"updated_at": "2024-09-03T00:48:20Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 450,
"watchers_count": 450,
"stargazers_count": 451,
"watchers_count": 451,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -426,7 +426,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 450,
"watchers": 451,
"score": 0,
"subscribers_count": 9
},

View file

@ -343,10 +343,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-08-26T15:23:53Z",
"updated_at": "2024-09-03T03:32:37Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 182,
"watchers_count": 182,
"stargazers_count": 183,
"watchers_count": 183,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 182,
"watchers": 183,
"score": 0,
"subscribers_count": 5
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-02T05:09:31Z",
"updated_at": "2024-09-03T03:26:07Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1977,
"watchers_count": 1977,
"stargazers_count": 1978,
"watchers_count": 1978,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1977,
"watchers": 1978,
"score": 0,
"subscribers_count": 35
},

View file

@ -103,10 +103,10 @@
"description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.",
"fork": false,
"created_at": "2021-01-29T16:08:35Z",
"updated_at": "2024-08-30T21:00:20Z",
"updated_at": "2024-09-03T00:53:09Z",
"pushed_at": "2021-01-29T16:22:39Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 3
},

View file

@ -119,10 +119,10 @@
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
"fork": false,
"created_at": "2018-10-03T10:18:04Z",
"updated_at": "2024-08-26T13:34:26Z",
"updated_at": "2024-09-03T01:43:01Z",
"pushed_at": "2024-04-29T13:17:43Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -131,7 +131,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 99,
"watchers": 98,
"score": 0,
"subscribers_count": 1
},

View file

@ -357,10 +357,10 @@
"description": "Exploit to trigger RCE for CVE-2018-16763 on FuelCMS <= 1.4.1 and interactive shell. ",
"fork": false,
"created_at": "2022-05-31T15:31:37Z",
"updated_at": "2024-08-12T20:23:43Z",
"updated_at": "2024-09-03T03:06:43Z",
"pushed_at": "2022-06-01T20:45:02Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -374,7 +374,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 2
},

View file

@ -557,10 +557,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-02T05:09:31Z",
"updated_at": "2024-09-03T03:26:07Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1977,
"watchers_count": 1977,
"stargazers_count": 1978,
"watchers_count": 1978,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -590,7 +590,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1977,
"watchers": 1978,
"score": 0,
"subscribers_count": 35
},

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-09-02T05:37:39Z",
"updated_at": "2024-09-03T06:07:58Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4093,
"watchers_count": 4093,
"stargazers_count": 4094,
"watchers_count": 4094,
"has_discussions": false,
"forks_count": 1088,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1088,
"watchers": 4093,
"watchers": 4094,
"score": 0,
"subscribers_count": 149
},

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-02T05:09:31Z",
"updated_at": "2024-09-03T03:26:07Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1977,
"watchers_count": 1977,
"stargazers_count": 1978,
"watchers_count": 1978,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1977,
"watchers": 1978,
"score": 0,
"subscribers_count": 35
}

View file

@ -13,10 +13,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2024-09-02T17:55:30Z",
"updated_at": "2024-09-03T00:48:20Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 450,
"watchers_count": 450,
"stargazers_count": 451,
"watchers_count": 451,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 450,
"watchers": 451,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2024-08-12T20:02:42Z",
"updated_at": "2024-09-03T01:43:22Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 713,
"watchers_count": 713,
"stargazers_count": 712,
"watchers_count": 712,
"has_discussions": false,
"forks_count": 173,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 173,
"watchers": 713,
"watchers": 712,
"score": 0,
"subscribers_count": 19
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 18,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 17,
"watchers": 43,
"score": 0,
"subscribers_count": 3

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-09-02T05:37:39Z",
"updated_at": "2024-09-03T06:07:58Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4093,
"watchers_count": 4093,
"stargazers_count": 4094,
"watchers_count": 4094,
"has_discussions": false,
"forks_count": 1088,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1088,
"watchers": 4093,
"watchers": 4094,
"score": 0,
"subscribers_count": 149
},
@ -63,10 +63,10 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2024-08-12T20:07:09Z",
"updated_at": "2024-09-03T05:25:21Z",
"pushed_at": "2020-11-16T04:23:09Z",
"stargazers_count": 282,
"watchers_count": 282,
"stargazers_count": 283,
"watchers_count": 283,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -75,7 +75,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 282,
"watchers": 283,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability",
"fork": false,
"created_at": "2020-07-29T19:02:29Z",
"updated_at": "2024-08-12T20:04:15Z",
"updated_at": "2024-09-03T00:36:33Z",
"pushed_at": "2020-11-11T19:48:38Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 9
}

View file

@ -859,10 +859,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-08-26T15:23:53Z",
"updated_at": "2024-09-03T03:32:37Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 182,
"watchers_count": 182,
"stargazers_count": 183,
"watchers_count": 183,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -871,7 +871,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 182,
"watchers": 183,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-09-02T05:09:31Z",
"updated_at": "2024-09-03T03:26:07Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1977,
"watchers_count": 1977,
"stargazers_count": 1978,
"watchers_count": 1978,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1977,
"watchers": 1978,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T16:13:38Z",
"updated_at": "2024-08-12T20:16:59Z",
"updated_at": "2024-09-03T02:15:12Z",
"pushed_at": "2022-08-30T11:58:32Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Local privilege escalation PoC for Linux kernel CVE-2022-1015",
"fork": false,
"created_at": "2022-04-02T03:27:11Z",
"updated_at": "2024-08-12T20:22:04Z",
"updated_at": "2024-09-03T05:23:50Z",
"pushed_at": "2022-04-03T01:36:45Z",
"stargazers_count": 195,
"watchers_count": 195,
"stargazers_count": 196,
"watchers_count": 196,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 195,
"watchers": 196,
"score": 0,
"subscribers_count": 7
},

View file

@ -1,32 +0,0 @@
[
{
"id": 848671215,
"name": "CVE-2022-20073",
"full_name": "m1erphy\/CVE-2022-20073",
"owner": {
"login": "m1erphy",
"id": 178880761,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178880761?v=4",
"html_url": "https:\/\/github.com\/m1erphy"
},
"html_url": "https:\/\/github.com\/m1erphy\/CVE-2022-20073",
"description": "arbitrary file upload em routers cisco com payloads encodificados para bypassar proteções XSS-PROTECTION e CSP. ",
"fork": false,
"created_at": "2024-08-28T07:29:45Z",
"updated_at": "2024-08-28T07:40:48Z",
"pushed_at": "2024-08-28T07:40:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,7 +13,7 @@
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T07:54:45Z",
"updated_at": "2024-08-12T20:21:59Z",
"updated_at": "2024-09-03T02:50:19Z",
"pushed_at": "2022-11-09T15:46:06Z",
"stargazers_count": 355,
"watchers_count": 355,

View file

@ -825,7 +825,7 @@
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
"updated_at": "2024-09-02T14:33:09Z",
"updated_at": "2024-09-03T02:17:34Z",
"pushed_at": "2023-04-13T16:46:26Z",
"stargazers_count": 394,
"watchers_count": 394,

View file

@ -774,6 +774,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 472,
"watchers_count": 472,
"has_discussions": false,
"forks_count": 163,
"forks_count": 162,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 163,
"forks": 162,
"watchers": 472,
"score": 0,
"subscribers_count": 10

View file

@ -13,10 +13,10 @@
"description": "FortiOS 管理界面中的堆内存下溢导致远程代码执行",
"fork": false,
"created_at": "2023-06-17T06:57:28Z",
"updated_at": "2024-08-28T20:08:34Z",
"updated_at": "2024-09-03T01:03:35Z",
"pushed_at": "2023-06-21T13:48:25Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 3
}

View file

@ -47,10 +47,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2024-08-29T18:21:58Z",
"updated_at": "2024-09-03T04:36:46Z",
"pushed_at": "2024-08-24T13:38:50Z",
"stargazers_count": 264,
"watchers_count": 264,
"stargazers_count": 265,
"watchers_count": 265,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 264,
"watchers": 265,
"score": 0,
"subscribers_count": 4
},

View file

@ -87,6 +87,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -73,10 +73,10 @@
"description": "GameOver(lay) Ubuntu Privilege Escalation",
"fork": false,
"created_at": "2023-10-09T22:02:42Z",
"updated_at": "2024-08-23T14:24:03Z",
"updated_at": "2024-09-03T00:53:36Z",
"pushed_at": "2023-10-09T22:44:21Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 110,
"watchers": 111,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "POC for CVE-2023-29360",
"fork": false,
"created_at": "2024-08-31T21:08:39Z",
"updated_at": "2024-09-02T12:41:54Z",
"updated_at": "2024-09-03T01:46:31Z",
"pushed_at": "2024-08-31T21:11:39Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 461,
"watchers_count": 461,
"has_discussions": false,
"forks_count": 40,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 40,
"forks": 39,
"watchers": 461,
"score": 0,
"subscribers_count": 15

View file

@ -87,6 +87,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -103,10 +103,10 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-10-23T18:33:41Z",
"updated_at": "2024-08-23T15:40:46Z",
"updated_at": "2024-09-03T01:43:48Z",
"pushed_at": "2023-10-26T11:44:46Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 108,
"watchers_count": 108,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 109,
"watchers": 108,
"score": 0,
"subscribers_count": 3
},

View file

@ -38,6 +38,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -147,6 +147,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -73,7 +73,7 @@
"description": "利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。",
"fork": false,
"created_at": "2024-07-03T10:29:06Z",
"updated_at": "2024-08-23T01:46:07Z",
"updated_at": "2024-09-03T02:35:02Z",
"pushed_at": "2024-07-12T02:59:00Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -94,6 +94,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-09-01T15:13:06Z",
"updated_at": "2024-09-03T00:48:49Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 668,
"watchers_count": 668,
"stargazers_count": 670,
"watchers_count": 670,
"has_discussions": false,
"forks_count": 147,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 147,
"watchers": 668,
"watchers": 670,
"score": 0,
"subscribers_count": 10
},

View file

@ -120,8 +120,8 @@
"description": "Fully automated PoC - CVE-2024-25641 - RCE - Cacti < v1.2.26 🌵",
"fork": false,
"created_at": "2024-08-29T06:27:25Z",
"updated_at": "2024-08-31T07:30:29Z",
"pushed_at": "2024-08-31T07:32:02Z",
"updated_at": "2024-09-03T05:21:07Z",
"pushed_at": "2024-09-03T05:21:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": "Windows LPE",
"fork": false,
"created_at": "2024-06-11T08:03:29Z",
"updated_at": "2024-08-18T07:02:52Z",
"updated_at": "2024-09-03T02:30:48Z",
"pushed_at": "2024-06-11T20:41:59Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 90,
"watchers_count": 90,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 88,
"watchers": 90,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-08-31T11:11:42Z",
"updated_at": "2024-09-03T05:21:28Z",
"pushed_at": "2024-07-29T12:20:50Z",
"stargazers_count": 355,
"watchers_count": 355,
"stargazers_count": 357,
"watchers_count": 357,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 355,
"watchers": 357,
"score": 0,
"subscribers_count": 7
},

View file

@ -73,10 +73,10 @@
"description": "该漏洞存在于 NtQueryInformationToken 函数中特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。",
"fork": false,
"created_at": "2024-07-05T16:02:56Z",
"updated_at": "2024-09-02T12:59:47Z",
"updated_at": "2024-09-03T01:19:14Z",
"pushed_at": "2024-07-05T16:06:16Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 31,
"score": 0,
"subscribers_count": 1

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-37085 VMware ESXi RCE Vulnerability",
"fork": false,
"created_at": "2024-08-06T18:23:43Z",
"updated_at": "2024-08-27T13:07:46Z",
"updated_at": "2024-09-03T02:14:04Z",
"pushed_at": "2024-08-06T18:25:19Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -256,19 +256,19 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-09-02T23:36:54Z",
"updated_at": "2024-09-03T05:55:22Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 485,
"watchers_count": 485,
"stargazers_count": 491,
"watchers_count": 491,
"has_discussions": false,
"forks_count": 92,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 92,
"watchers": 485,
"forks": 93,
"watchers": 491,
"score": 0,
"subscribers_count": 4
},
@ -406,8 +406,8 @@
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
"fork": false,
"created_at": "2024-08-31T13:56:26Z",
"updated_at": "2024-09-02T16:06:45Z",
"pushed_at": "2024-09-02T16:06:41Z",
"updated_at": "2024-09-03T01:35:32Z",
"pushed_at": "2024-09-03T01:35:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
@ -486,7 +486,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 851150728,
@ -516,6 +516,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 4
}
]

View file

@ -43,10 +43,10 @@
"description": "RDL的堆溢出导致的RCE",
"fork": false,
"created_at": "2024-08-09T05:00:44Z",
"updated_at": "2024-09-01T12:25:15Z",
"updated_at": "2024-09-03T01:02:39Z",
"pushed_at": "2024-08-14T04:43:05Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 190,
"watchers_count": 190,
"has_discussions": false,
"forks_count": 82,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 189,
"watchers": 190,
"score": 0,
"subscribers_count": 5
},

View file

@ -77,10 +77,10 @@
"description": "CVE-2024-43044的利用方式",
"fork": false,
"created_at": "2024-08-13T07:32:35Z",
"updated_at": "2024-09-02T07:14:57Z",
"updated_at": "2024-09-03T01:53:30Z",
"pushed_at": "2024-08-13T07:43:22Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
@ -107,19 +107,19 @@
"description": "Exploit for the vulnerability CVE-2024-43044 in Jenkins",
"fork": false,
"created_at": "2024-08-23T20:26:26Z",
"updated_at": "2024-09-02T18:57:00Z",
"updated_at": "2024-09-03T06:06:02Z",
"pushed_at": "2024-08-29T17:05:04Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 10,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 61,
"forks": 15,
"watchers": 85,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,19 +13,19 @@
"description": "Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)",
"fork": false,
"created_at": "2024-08-23T09:13:03Z",
"updated_at": "2024-09-02T01:02:29Z",
"updated_at": "2024-09-03T02:18:39Z",
"pushed_at": "2024-08-23T09:36:55Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 0
}

32
2024/CVE-2024-45589.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 851408287,
"name": "CVE-2024-45589",
"full_name": "BenRogozinski\/CVE-2024-45589",
"owner": {
"login": "BenRogozinski",
"id": 95942910,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95942910?v=4",
"html_url": "https:\/\/github.com\/BenRogozinski"
},
"html_url": "https:\/\/github.com\/BenRogozinski\/CVE-2024-45589",
"description": "Writeup and proof-of-concept code for CVE-2024-45589",
"fork": false,
"created_at": "2024-09-03T03:32:24Z",
"updated_at": "2024-09-03T03:32:24Z",
"pushed_at": "2024-09-03T03:32:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -163,10 +163,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-08-27T17:16:02Z",
"updated_at": "2024-09-03T00:50:25Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 198,
"watchers_count": 198,
"stargazers_count": 199,
"watchers_count": 199,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 198,
"watchers": 199,
"score": 0,
"subscribers_count": 4
},
@ -590,10 +590,10 @@
"description": "PHP CGI Argument Injection vulnerability",
"fork": false,
"created_at": "2024-06-09T14:18:21Z",
"updated_at": "2024-08-23T14:47:02Z",
"updated_at": "2024-09-03T05:57:13Z",
"pushed_at": "2024-06-09T14:20:36Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -602,7 +602,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,7 +27,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 851215428,
@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -260,10 +260,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-09-02T21:05:57Z",
"updated_at": "2024-09-03T00:44:49Z",
"pushed_at": "2024-07-14T09:58:48Z",
"stargazers_count": 434,
"watchers_count": 434,
"stargazers_count": 435,
"watchers_count": 435,
"has_discussions": false,
"forks_count": 84,
"allow_forking": true,
@ -278,7 +278,7 @@
],
"visibility": "public",
"forks": 84,
"watchers": 434,
"watchers": 435,
"score": 0,
"subscribers_count": 5
},
@ -1135,10 +1135,10 @@
"description": "CVE-2024-6387 with auto ip scanner and auto expliot ",
"fork": false,
"created_at": "2024-07-02T12:57:35Z",
"updated_at": "2024-07-11T22:21:11Z",
"updated_at": "2024-09-03T05:11:38Z",
"pushed_at": "2024-07-04T01:55:26Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1165,7 +1165,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
@ -2233,10 +2233,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-09-02T21:53:49Z",
"updated_at": "2024-09-03T04:02:13Z",
"pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -2245,7 +2245,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2024-08-30T17:13:14Z",
"updated_at": "2024-09-02T14:04:46Z",
"updated_at": "2024-09-03T05:36:19Z",
"pushed_at": "2024-08-30T17:22:31Z",
"stargazers_count": 21,
"watchers_count": 21,

View file

@ -43,12 +43,12 @@
"description": "A PoC tool for exploiting CVE-2024-7029 in AvTech devices, enabling RCE, vulnerability scanning, and an interactive shell.",
"fork": false,
"created_at": "2024-09-02T10:16:49Z",
"updated_at": "2024-09-02T11:39:48Z",
"updated_at": "2024-09-03T05:12:07Z",
"pushed_at": "2024-09-02T11:43:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": true,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -63,9 +63,9 @@
"remote-code-execution"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -4578,6 +4578,9 @@
- [TheHermione/CVE-2024-45265](https://github.com/TheHermione/CVE-2024-45265)
### CVE-2024-45589
- [BenRogozinski/CVE-2024-45589](https://github.com/BenRogozinski/CVE-2024-45589)
### CVE-2024-56662
- [nimosec/cve-2024-56662](https://github.com/nimosec/cve-2024-56662)
@ -13787,13 +13790,6 @@
- [szymonh/android-gadget](https://github.com/szymonh/android-gadget)
### CVE-2022-20073 (2022-04-11)
<code>In preloader (usb), there is a possible out of bounds write due to a integer underflow. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160841; Issue ID: ALPS06160841.
</code>
- [m1erphy/CVE-2022-20073](https://github.com/m1erphy/CVE-2022-20073)
### CVE-2022-20126 (2022-06-15)
<code>In setScanMode of AdapterService.java, there is a possible way to enable Bluetooth discovery mode without user interaction due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-203431023