Auto Update 2024/05/14 18:29:05

This commit is contained in:
motikan2010-bot 2024-05-15 03:29:05 +09:00
parent 8cbd24f03f
commit 1cd66aa5b2
46 changed files with 369 additions and 244 deletions

View file

@ -57,7 +57,7 @@
"forks": 4,
"watchers": 13,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 424360665,

View file

@ -43,10 +43,10 @@
"description": "Proof of Concept exploit for CVE-2017-8570",
"fork": false,
"created_at": "2018-01-09T19:09:33Z",
"updated_at": "2024-05-04T07:46:15Z",
"updated_at": "2024-05-14T13:20:31Z",
"pushed_at": "2018-01-09T19:23:43Z",
"stargazers_count": 185,
"watchers_count": 185,
"stargazers_count": 186,
"watchers_count": 186,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 185,
"watchers": 186,
"score": 0,
"subscribers_count": 9
},

View file

@ -46,10 +46,10 @@
"html_url": "https:\/\/github.com\/octodi"
},
"html_url": "https:\/\/github.com\/octodi\/CVE-2018-10583",
"description": "Update python3 exploit for CVE-2018-10583 (LibreOffice\/Open Office - '.odt' Information Disclosure )",
"description": "Updated python3 exploit for CVE-2018-10583 (LibreOffice\/Open Office - '.odt' Information Disclosure )",
"fork": false,
"created_at": "2024-05-13T17:13:17Z",
"updated_at": "2024-05-13T17:31:12Z",
"updated_at": "2024-05-14T15:03:13Z",
"pushed_at": "2024-05-13T17:31:09Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -63,6 +63,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "Modified standalone exploit ported for Python 3",
"fork": false,
"created_at": "2019-09-16T12:14:52Z",
"updated_at": "2024-04-30T06:42:13Z",
"updated_at": "2024-05-14T17:21:30Z",
"pushed_at": "2019-09-16T14:04:00Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},

View file

@ -103,10 +103,10 @@
"description": "CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42",
"fork": false,
"created_at": "2019-11-21T14:25:39Z",
"updated_at": "2024-02-14T17:25:57Z",
"updated_at": "2024-05-14T18:00:21Z",
"pushed_at": "2019-11-21T15:03:15Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2024-04-17T21:54:17Z",
"updated_at": "2024-05-14T17:56:55Z",
"pushed_at": "2022-04-14T18:23:38Z",
"stargazers_count": 335,
"watchers_count": 335,
"stargazers_count": 336,
"watchers_count": 336,
"has_discussions": false,
"forks_count": 85,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 85,
"watchers": 335,
"watchers": 336,
"score": 0,
"subscribers_count": 13
},

View file

@ -43,10 +43,10 @@
"description": "QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)",
"fork": false,
"created_at": "2020-05-24T15:44:29Z",
"updated_at": "2024-04-11T10:19:13Z",
"updated_at": "2024-05-14T17:25:36Z",
"pushed_at": "2020-05-24T16:28:46Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -58,7 +58,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 80,
"watchers": 81,
"score": 0,
"subscribers_count": 2
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 12,
"score": 0,
"subscribers_count": 2

View file

@ -265,10 +265,10 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2024-05-10T10:41:04Z",
"updated_at": "2024-05-14T14:13:48Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 346,
"watchers_count": 346,
"stargazers_count": 348,
"watchers_count": 348,
"has_discussions": false,
"forks_count": 81,
"allow_forking": true,
@ -277,7 +277,7 @@
"topics": [],
"visibility": "public",
"forks": 81,
"watchers": 346,
"watchers": 348,
"score": 0,
"subscribers_count": 9
},
@ -719,10 +719,10 @@
"description": "GUI Exploit Tool for CVE-2020-0688(Microsoft Exchange default MachineKeySection deserialize vulnerability)",
"fork": false,
"created_at": "2024-05-09T12:50:48Z",
"updated_at": "2024-05-13T10:20:18Z",
"updated_at": "2024-05-14T14:14:22Z",
"pushed_at": "2024-05-09T13:51:27Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -738,7 +738,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -373,10 +373,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2024-05-14T07:14:49Z",
"updated_at": "2024-05-14T12:57:15Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 343,
"watchers_count": 343,
"stargazers_count": 344,
"watchers_count": 344,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -391,7 +391,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 343,
"watchers": 344,
"score": 0,
"subscribers_count": 5
},

View file

@ -1,20 +1,20 @@
[
{
"id": 799195135,
"name": "CVE-2023-2752",
"full_name": "Cappricio-Securities\/CVE-2023-2752",
"id": 800580605,
"name": "CVE-2020-27838",
"full_name": "Cappricio-Securities\/CVE-2020-27838",
"owner": {
"login": "Cappricio-Securities",
"id": 102907425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
"html_url": "https:\/\/github.com\/Cappricio-Securities"
},
"html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2023-2752",
"description": "Tool for finding CVE-2023-27524 (Apache Superset - Authentication Bypass)",
"html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2020-27838",
"description": "CVE-2020-27838 - KeyCloak - Information Exposure ",
"fork": false,
"created_at": "2024-05-11T12:29:08Z",
"updated_at": "2024-05-11T12:34:06Z",
"pushed_at": "2024-05-11T12:29:46Z",
"created_at": "2024-05-14T15:50:16Z",
"updated_at": "2024-05-14T15:59:14Z",
"pushed_at": "2024-05-14T15:59:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -22,15 +22,7 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache-superset",
"apache-superset---authentication-bypass",
"authentication-bypass",
"bugbounty",
"cve-2023-2752",
"vapt",
"wapt"
],
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -18,13 +18,13 @@
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 67,
"score": 0,
"subscribers_count": 5

View file

@ -2143,5 +2143,43 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 800600797,
"name": "CVE-2021-3156-checker",
"full_name": "lypd0\/CVE-2021-3156-checker",
"owner": {
"login": "lypd0",
"id": 146327014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146327014?v=4",
"html_url": "https:\/\/github.com\/lypd0"
},
"html_url": "https:\/\/github.com\/lypd0\/CVE-2021-3156-checker",
"description": "Checker for CVE-2021-3156 with static version check",
"fork": false,
"created_at": "2024-05-14T16:35:09Z",
"updated_at": "2024-05-14T17:04:55Z",
"pushed_at": "2024-05-14T17:04:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"checker",
"cve",
"cve-2021-3156",
"escalation",
"privesc",
"privilege",
"python"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -169,10 +169,10 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2024-05-14T07:19:06Z",
"updated_at": "2024-05-14T12:34:43Z",
"pushed_at": "2023-05-04T19:24:39Z",
"stargazers_count": 1023,
"watchers_count": 1023,
"stargazers_count": 1022,
"watchers_count": 1022,
"has_discussions": false,
"forks_count": 308,
"allow_forking": true,
@ -185,7 +185,7 @@
],
"visibility": "public",
"forks": 308,
"watchers": 1023,
"watchers": 1022,
"score": 0,
"subscribers_count": 16
},

View file

@ -13,10 +13,10 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
"updated_at": "2024-05-13T20:52:04Z",
"updated_at": "2024-05-14T13:41:18Z",
"pushed_at": "2023-05-27T15:39:41Z",
"stargazers_count": 215,
"watchers_count": 215,
"stargazers_count": 216,
"watchers_count": 216,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 215,
"watchers": 216,
"score": 0,
"subscribers_count": 7
}

View file

@ -13,10 +13,10 @@
"description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.",
"fork": false,
"created_at": "2022-01-28T20:37:14Z",
"updated_at": "2024-03-06T22:50:10Z",
"updated_at": "2024-05-14T17:56:49Z",
"pushed_at": "2022-08-30T02:11:05Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 143,
"watchers_count": 143,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 144,
"watchers": 143,
"score": 0,
"subscribers_count": 3
}

View file

@ -1561,10 +1561,10 @@
"description": "Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)",
"fork": false,
"created_at": "2022-06-09T09:32:10Z",
"updated_at": "2024-03-30T12:00:40Z",
"updated_at": "2024-05-14T15:53:57Z",
"pushed_at": "2022-06-16T07:28:13Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -1583,7 +1583,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "This is working POC of CVE-2022-36271 ",
"fork": false,
"created_at": "2022-08-16T19:48:36Z",
"updated_at": "2023-09-28T11:41:58Z",
"updated_at": "2024-05-14T17:06:24Z",
"pushed_at": "2022-09-01T16:43:49Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 2
}

View file

@ -280,10 +280,10 @@
"description": "Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.",
"fork": false,
"created_at": "2022-10-19T11:49:08Z",
"updated_at": "2024-04-21T17:20:37Z",
"updated_at": "2024-05-14T14:34:50Z",
"pushed_at": "2023-12-29T14:57:34Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -304,7 +304,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 2
},

View file

@ -586,10 +586,10 @@
"description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理",
"fork": false,
"created_at": "2024-02-26T02:34:44Z",
"updated_at": "2024-05-14T01:51:48Z",
"updated_at": "2024-05-14T15:20:02Z",
"pushed_at": "2024-04-24T02:34:16Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -598,7 +598,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
"fork": false,
"created_at": "2023-06-06T14:05:09Z",
"updated_at": "2024-05-10T10:50:31Z",
"updated_at": "2024-05-14T17:54:06Z",
"pushed_at": "2023-07-14T10:40:17Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 149,
"watchers_count": 149,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 148,
"watchers": 149,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,8 +43,8 @@
"description": null,
"fork": false,
"created_at": "2024-05-14T11:22:35Z",
"updated_at": "2024-05-14T11:22:39Z",
"pushed_at": "2024-05-14T11:22:36Z",
"updated_at": "2024-05-14T13:37:04Z",
"pushed_at": "2024-05-14T13:37:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -332,5 +332,43 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 799195135,
"name": "CVE-2023-27524",
"full_name": "Cappricio-Securities\/CVE-2023-27524",
"owner": {
"login": "Cappricio-Securities",
"id": 102907425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
"html_url": "https:\/\/github.com\/Cappricio-Securities"
},
"html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2023-27524",
"description": "Tool for finding CVE-2023-27524 (Apache Superset - Authentication Bypass)",
"fork": false,
"created_at": "2024-05-11T12:29:08Z",
"updated_at": "2024-05-14T15:26:47Z",
"pushed_at": "2024-05-14T15:26:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache-superset",
"apache-superset---authentication-bypass",
"authentication-bypass",
"bugbounty",
"cve-2023-2752",
"vapt",
"wapt"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -103,10 +103,10 @@
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
"fork": false,
"created_at": "2023-06-18T15:42:00Z",
"updated_at": "2024-05-12T13:42:09Z",
"updated_at": "2024-05-14T13:21:41Z",
"pushed_at": "2024-03-07T07:23:41Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-33733 reportlab RCE",
"fork": false,
"created_at": "2023-05-30T22:22:50Z",
"updated_at": "2024-05-13T18:13:45Z",
"updated_at": "2024-05-14T17:49:07Z",
"pushed_at": "2023-09-05T15:49:14Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 94,
"watchers": 96,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
"fork": false,
"created_at": "2024-03-21T21:39:24Z",
"updated_at": "2024-05-12T16:31:42Z",
"updated_at": "2024-05-14T12:31:53Z",
"pushed_at": "2024-03-22T06:45:43Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 102,
"watchers": 103,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-05-14T12:14:52Z",
"updated_at": "2024-05-14T18:12:14Z",
"pushed_at": "2024-05-14T09:04:25Z",
"stargazers_count": 593,
"watchers_count": 593,
"stargazers_count": 606,
"watchers_count": 606,
"has_discussions": false,
"forks_count": 98,
"forks_count": 103,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 98,
"watchers": 593,
"forks": 103,
"watchers": 606,
"score": 0,
"subscribers_count": 9
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -103,10 +103,10 @@
"description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ",
"fork": false,
"created_at": "2023-11-03T22:06:09Z",
"updated_at": "2024-05-14T10:19:17Z",
"updated_at": "2024-05-14T17:06:38Z",
"pushed_at": "2024-01-20T16:59:23Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "exploit for cve-2023-47246 SysAid RCE (shell upload)",
"fork": false,
"created_at": "2023-11-17T07:03:06Z",
"updated_at": "2024-04-30T00:09:31Z",
"updated_at": "2024-05-14T17:06:56Z",
"pushed_at": "2023-12-07T02:55:01Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 49,
"watchers": 50,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-21T05:22:51Z",
"updated_at": "2024-05-14T10:37:08Z",
"updated_at": "2024-05-14T17:19:11Z",
"pushed_at": "2023-12-18T04:25:00Z",
"stargazers_count": 293,
"watchers_count": 293,
"stargazers_count": 294,
"watchers_count": 294,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 293,
"watchers": 294,
"score": 0,
"subscribers_count": 15
},

View file

@ -103,19 +103,19 @@
"description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")",
"fork": false,
"created_at": "2023-12-17T14:18:54Z",
"updated_at": "2024-03-14T14:50:28Z",
"updated_at": "2024-05-14T15:21:41Z",
"pushed_at": "2023-12-18T02:46:21Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": true,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 55,
"forks": 16,
"watchers": 56,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,12 +13,12 @@
"description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
"fork": false,
"created_at": "2023-12-13T20:26:59Z",
"updated_at": "2024-05-10T10:52:14Z",
"updated_at": "2024-05-14T15:19:05Z",
"pushed_at": "2024-02-06T23:22:31Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -38,8 +38,8 @@
"wordpress"
],
"visibility": "public",
"forks": 20,
"watchers": 63,
"forks": 21,
"watchers": 64,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-05-14T12:14:53Z",
"updated_at": "2024-05-14T16:45:49Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 1925,
"watchers_count": 1925,
"stargazers_count": 1926,
"watchers_count": 1926,
"has_discussions": false,
"forks_count": 239,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 239,
"watchers": 1925,
"watchers": 1926,
"score": 0,
"subscribers_count": 21
},

View file

@ -1,32 +0,0 @@
[
{
"id": 795510133,
"name": "CVE-2024-20353-CiscoASAandFTD",
"full_name": "Spl0stus\/CVE-2024-20353-CiscoASAandFTD",
"owner": {
"login": "Spl0stus",
"id": 168833593,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168833593?v=4",
"html_url": "https:\/\/github.com\/Spl0stus"
},
"html_url": "https:\/\/github.com\/Spl0stus\/CVE-2024-20353-CiscoASAandFTD",
"description": "Exploit for Cisco ASA and FTD (may 2024)",
"fork": false,
"created_at": "2024-05-03T12:46:09Z",
"updated_at": "2024-05-07T06:33:37Z",
"pushed_at": "2024-05-03T12:52:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 795883499,
"name": "CVE-2024-20359-CiscoASA-FTD-exploit",
"full_name": "Garvard-Agency\/CVE-2024-20359-CiscoASA-FTD-exploit",
"owner": {
"login": "Garvard-Agency",
"id": 168903663,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168903663?v=4",
"html_url": "https:\/\/github.com\/Garvard-Agency"
},
"html_url": "https:\/\/github.com\/Garvard-Agency\/CVE-2024-20359-CiscoASA-FTD-exploit",
"description": "Exploit for Cisco ASA and FTD (may 2024)",
"fork": false,
"created_at": "2024-05-04T10:40:22Z",
"updated_at": "2024-05-09T12:13:02Z",
"pushed_at": "2024-05-04T10:50:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -103,10 +103,10 @@
"description": "Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)",
"fork": false,
"created_at": "2024-03-13T22:57:00Z",
"updated_at": "2024-05-07T12:07:45Z",
"updated_at": "2024-05-14T12:40:44Z",
"pushed_at": "2024-03-24T22:01:21Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.",
"fork": false,
"created_at": "2024-01-16T20:59:38Z",
"updated_at": "2024-04-26T05:00:24Z",
"updated_at": "2024-05-14T16:25:10Z",
"pushed_at": "2024-01-17T00:38:28Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,8 +13,8 @@
"description": "HP Plantronics Hub 3.2.1 Updater Privilege Escalation",
"fork": false,
"created_at": "2024-05-13T11:15:14Z",
"updated_at": "2024-05-14T06:00:17Z",
"pushed_at": "2024-05-13T11:46:39Z",
"updated_at": "2024-05-14T13:55:32Z",
"pushed_at": "2024-05-14T13:55:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

32
2024/CVE-2024-27804.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 800535361,
"name": "CVE-2024-27804",
"full_name": "R00tkitSMM\/CVE-2024-27804",
"owner": {
"login": "R00tkitSMM",
"id": 78787782,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78787782?v=4",
"html_url": "https:\/\/github.com\/R00tkitSMM"
},
"html_url": "https:\/\/github.com\/R00tkitSMM\/CVE-2024-27804",
"description": "POC for CVE-2024-27804",
"fork": false,
"created_at": "2024-05-14T14:17:06Z",
"updated_at": "2024-05-14T17:43:08Z",
"pushed_at": "2024-05-14T14:55:23Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 18,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -183,5 +183,55 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 800537570,
"name": "WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956",
"full_name": "AiGptCode\/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956",
"owner": {
"login": "AiGptCode",
"id": 146197697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146197697?v=4",
"html_url": "https:\/\/github.com\/AiGptCode"
},
"html_url": "https:\/\/github.com\/AiGptCode\/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956",
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
"fork": false,
"created_at": "2024-05-14T14:21:49Z",
"updated_at": "2024-05-14T15:00:27Z",
"pushed_at": "2024-05-14T15:00:23Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"android",
"backdoor",
"backdoors",
"cve",
"cve-2024-27956",
"hack",
"hacking",
"html",
"php",
"ransomware",
"rce",
"reverse-shell",
"shell",
"web",
"website",
"windows",
"wordpress",
"wordpress-plugin",
"wordpress-reversshell"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
"fork": false,
"created_at": "2024-03-11T10:14:39Z",
"updated_at": "2024-05-02T20:58:32Z",
"updated_at": "2024-05-14T13:43:50Z",
"pushed_at": "2024-03-25T12:56:16Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 68,
"watchers": 69,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,7 +13,7 @@
"description": "Exploit for Microsoft SmartScreen malicious execution (april 2024)",
"fork": false,
"created_at": "2024-05-03T12:17:25Z",
"updated_at": "2024-05-06T13:06:49Z",
"updated_at": "2024-05-14T15:58:14Z",
"pushed_at": "2024-05-03T12:57:49Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-05-14T08:47:24Z",
"updated_at": "2024-05-14T13:20:47Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3459,
"watchers_count": 3459,
"stargazers_count": 3460,
"watchers_count": 3460,
"has_discussions": false,
"forks_count": 233,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 233,
"watchers": 3459,
"watchers": 3460,
"score": 0,
"subscribers_count": 38
},

32
2024/CVE-2024-4761.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 800632738,
"name": "CVE-2024-4761",
"full_name": "michredteam\/CVE-2024-4761",
"owner": {
"login": "michredteam",
"id": 168865716,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168865716?v=4",
"html_url": "https:\/\/github.com\/michredteam"
},
"html_url": "https:\/\/github.com\/michredteam\/CVE-2024-4761",
"description": "High CVE-2024-4761 Exploit ",
"fork": false,
"created_at": "2024-05-14T17:45:22Z",
"updated_at": "2024-05-14T18:11:56Z",
"pushed_at": "2024-05-14T18:21:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -516,6 +516,13 @@
- [JoeBeeton/CVE-2024-4701-POC](https://github.com/JoeBeeton/CVE-2024-4701-POC)
### CVE-2024-4761 (2024-05-14)
<code>Out of bounds write in V8 in Google Chrome prior to 124.0.6367.207 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
</code>
- [michredteam/CVE-2024-4761](https://github.com/michredteam/CVE-2024-4761)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -526,13 +533,6 @@
- [Instructor-Team8/CVE-2024-20291-POC](https://github.com/Instructor-Team8/CVE-2024-20291-POC)
### CVE-2024-20353 (2024-04-24)
<code>A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted web server on a device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads.
</code>
- [Spl0stus/CVE-2024-20353-CiscoASAandFTD](https://github.com/Spl0stus/CVE-2024-20353-CiscoASAandFTD)
### CVE-2024-20356 (2024-04-24)
<code>A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root.
@ -540,13 +540,6 @@
- [nettitude/CVE-2024-20356](https://github.com/nettitude/CVE-2024-20356)
### CVE-2024-20359 (2024-04-24)
<code>A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability.\r\n\r This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
</code>
- [Garvard-Agency/CVE-2024-20359-CiscoASA-FTD-exploit](https://github.com/Garvard-Agency/CVE-2024-20359-CiscoASA-FTD-exploit)
### CVE-2024-20656 (2024-01-09)
<code>Visual Studio Elevation of Privilege Vulnerability
@ -1546,6 +1539,13 @@
### CVE-2024-27697
- [SanjinDedic/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697](https://github.com/SanjinDedic/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697)
### CVE-2024-27804 (2024-05-13)
<code>The issue was addressed with improved memory handling. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges.
</code>
- [R00tkitSMM/CVE-2024-27804](https://github.com/R00tkitSMM/CVE-2024-27804)
### CVE-2024-27956 (2024-03-21)
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.\n\n
@ -1557,6 +1557,7 @@
- [FoxyProxys/CVE-2024-27956](https://github.com/FoxyProxys/CVE-2024-27956)
- [k3ppf0r/CVE-2024-27956](https://github.com/k3ppf0r/CVE-2024-27956)
- [nancyariah4/CVE-2024-27956](https://github.com/nancyariah4/CVE-2024-27956)
- [AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956](https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956)
### CVE-2024-27971
- [truonghuuphuc/CVE-2024-27971-Note](https://github.com/truonghuuphuc/CVE-2024-27971-Note)
@ -2485,13 +2486,6 @@
- [pashayogi/CVE-2023-2744](https://github.com/pashayogi/CVE-2023-2744)
### CVE-2023-2752 (2023-05-17)
<code>Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.
</code>
- [Cappricio-Securities/CVE-2023-2752](https://github.com/Cappricio-Securities/CVE-2023-2752)
### CVE-2023-2822 (2023-05-20)
<code>Es wurde eine problematische Schwachstelle in Ellucian Ethos Identity bis 5.10.5 ausgemacht. Hiervon betroffen ist ein unbekannter Codeblock der Datei /cas/logout. Durch Manipulation des Arguments url mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 5.10.6 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.
@ -4232,7 +4226,11 @@
### CVE-2023-24100
- [badboycxcc/CVE-2023-24100](https://github.com/badboycxcc/CVE-2023-24100)
### CVE-2023-24203
### CVE-2023-24203 (-)
<code>Cross Site Scripting vulnerability in SourceCodester Simple Customer Relationship Management System v1.0 allows attacker to execute arbitary code via the company or query parameter(s).
</code>
- [momo1239/CVE-2023-24203-and-CVE-2023-24204](https://github.com/momo1239/CVE-2023-24203-and-CVE-2023-24204)
### CVE-2023-24317 (2023-02-23)
@ -4731,6 +4729,7 @@
- [CN016/Apache-Superset-SECRET_KEY-CVE-2023-27524-](https://github.com/CN016/Apache-Superset-SECRET_KEY-CVE-2023-27524-)
- [NguyenCongHaiNam/Research-CVE-2023-27524](https://github.com/NguyenCongHaiNam/Research-CVE-2023-27524)
- [karthi-the-hacker/CVE-2023-27524](https://github.com/karthi-the-hacker/CVE-2023-27524)
- [Cappricio-Securities/CVE-2023-27524](https://github.com/Cappricio-Securities/CVE-2023-27524)
### CVE-2023-27532 (2023-03-10)
@ -17062,6 +17061,7 @@
- [DDayLuong/CVE-2021-3156](https://github.com/DDayLuong/CVE-2021-3156)
- [wurwur/CVE-2021-3156](https://github.com/wurwur/CVE-2021-3156)
- [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156)
- [lypd0/CVE-2021-3156-checker](https://github.com/lypd0/CVE-2021-3156-checker)
### CVE-2021-3157
- [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)
@ -27578,6 +27578,13 @@
- [pazhanivel07/openjpeg-2.3.0_CVE-2020-27824](https://github.com/pazhanivel07/openjpeg-2.3.0_CVE-2020-27824)
### CVE-2020-27838 (2021-03-08)
<code>A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality.
</code>
- [Cappricio-Securities/CVE-2020-27838](https://github.com/Cappricio-Securities/CVE-2020-27838)
### CVE-2020-27904 (2020-12-08)
<code>A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges.