Auto Update 2024/11/05 00:32:01

This commit is contained in:
motikan2010-bot 2024-11-05 09:32:01 +09:00
parent b810924096
commit 1d6e7b0b9f
27 changed files with 143 additions and 107 deletions

View file

@ -490,15 +490,15 @@
{
"id": 806726183,
"name": "CVE-2011-2523-PoC",
"full_name": "R4idB0Y\/CVE-2011-2523-PoC",
"full_name": "0xB0y426\/CVE-2011-2523-PoC",
"owner": {
"login": "R4idB0Y",
"login": "0xB0y426",
"id": 132174647,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132174647?v=4",
"html_url": "https:\/\/github.com\/R4idB0Y",
"html_url": "https:\/\/github.com\/0xB0y426",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/R4idB0Y\/CVE-2011-2523-PoC",
"html_url": "https:\/\/github.com\/0xB0y426\/CVE-2011-2523-PoC",
"description": "PoC CVE-2011-2523 ",
"fork": false,
"created_at": "2024-05-27T19:13:59Z",

View file

@ -1,33 +1,33 @@
[
{
"id": 79682713,
"id": 80442312,
"name": "CVE-2017-3730",
"full_name": "guidovranken\/CVE-2017-3730",
"full_name": "olivierh59500\/CVE-2017-3730",
"owner": {
"login": "guidovranken",
"id": 6846644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6846644?v=4",
"html_url": "https:\/\/github.com\/guidovranken",
"login": "olivierh59500",
"id": 3375676,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3375676?v=4",
"html_url": "https:\/\/github.com\/olivierh59500",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/guidovranken\/CVE-2017-3730",
"html_url": "https:\/\/github.com\/olivierh59500\/CVE-2017-3730",
"description": "OpenSSL CVE-2017-3730 proof-of-concept",
"fork": false,
"created_at": "2017-01-22T00:40:34Z",
"updated_at": "2024-08-03T03:05:06Z",
"created_at": "2017-01-30T17:00:17Z",
"updated_at": "2017-01-30T17:00:18Z",
"pushed_at": "2017-01-26T01:30:54Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 7,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 13,
"forks": 5,
"watchers": 0,
"score": 0,
"subscribers_count": 4
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "PoC exploit for CVE-2018-5234",
"fork": false,
"created_at": "2018-05-01T16:40:30Z",
"updated_at": "2024-10-07T12:55:46Z",
"updated_at": "2024-11-04T22:52:01Z",
"pushed_at": "2018-05-02T08:50:57Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2019-1040 with Exchange",
"fork": false,
"created_at": "2019-06-14T11:16:03Z",
"updated_at": "2024-10-05T13:11:16Z",
"updated_at": "2024-11-04T18:58:55Z",
"pushed_at": "2021-06-18T18:43:46Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 249,
"watchers_count": 249,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 248,
"watchers": 249,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2020-16899 - Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-12T20:59:03Z",
"updated_at": "2024-08-12T20:06:41Z",
"updated_at": "2024-11-04T19:19:38Z",
"pushed_at": "2020-10-19T13:58:46Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 6
}

View file

@ -964,7 +964,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 849195359,

View file

@ -1346,10 +1346,10 @@
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
"fork": false,
"created_at": "2022-01-26T17:53:16Z",
"updated_at": "2024-10-24T01:53:13Z",
"updated_at": "2024-11-04T20:58:24Z",
"pushed_at": "2022-01-28T00:29:15Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 155,
"watchers_count": 155,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -1358,7 +1358,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 154,
"watchers": 155,
"score": 0,
"subscribers_count": 2
},
@ -2606,10 +2606,10 @@
"description": "Pwnkit Exploit (CVE-2021-4034), no download capabilty? Copy and paste it!",
"fork": false,
"created_at": "2022-01-28T18:12:54Z",
"updated_at": "2024-10-03T19:25:36Z",
"updated_at": "2024-11-04T23:39:24Z",
"pushed_at": "2022-01-28T18:22:53Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -2618,7 +2618,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 18,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},

View file

@ -55,13 +55,13 @@
"stargazers_count": 798,
"watchers_count": 798,
"has_discussions": false,
"forks_count": 122,
"forks_count": 123,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 122,
"forks": 123,
"watchers": 798,
"score": 0,
"subscribers_count": 13

View file

@ -14,10 +14,10 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false,
"created_at": "2022-08-09T15:53:48Z",
"updated_at": "2024-10-30T14:06:52Z",
"updated_at": "2024-11-04T19:00:07Z",
"pushed_at": "2023-09-27T06:44:27Z",
"stargazers_count": 292,
"watchers_count": 292,
"stargazers_count": 293,
"watchers_count": 293,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 60,
"watchers": 292,
"watchers": 293,
"score": 0,
"subscribers_count": 12
},

View file

@ -45,10 +45,10 @@
"description": "it's a CVE-2022-3368 ( patched ), but feel free to use it for check any outdated software or reseach",
"fork": false,
"created_at": "2024-03-05T18:31:29Z",
"updated_at": "2024-09-20T08:39:13Z",
"updated_at": "2024-11-04T20:30:39Z",
"pushed_at": "2024-07-08T16:18:51Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2023-03-10T19:08:28Z",
"updated_at": "2024-10-24T11:00:30Z",
"updated_at": "2024-11-04T19:00:09Z",
"pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 174,
"watchers_count": 174,
"stargazers_count": 175,
"watchers_count": 175,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -96,7 +96,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 174,
"watchers": 175,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-09-24T21:59:23Z",
"updated_at": "2024-11-01T07:45:59Z",
"updated_at": "2024-11-04T23:19:16Z",
"pushed_at": "2023-10-12T19:18:32Z",
"stargazers_count": 141,
"watchers_count": 141,
"stargazers_count": 142,
"watchers_count": 142,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 141,
"watchers": 142,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": "A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE).",
"fork": false,
"created_at": "2023-12-13T09:31:36Z",
"updated_at": "2024-11-04T06:30:19Z",
"updated_at": "2024-11-04T19:19:56Z",
"pushed_at": "2024-08-30T06:37:53Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 79,
"watchers": 80,
"score": 0,
"subscribers_count": 4
},

View file

@ -52,10 +52,10 @@
"description": "CVE-2024-25641 - RCE Automated Exploit - Cacti 1.2.26",
"fork": false,
"created_at": "2024-08-27T01:19:25Z",
"updated_at": "2024-09-11T20:45:26Z",
"updated_at": "2024-11-04T21:55:47Z",
"pushed_at": "2024-08-28T18:46:58Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -64,7 +64,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 13,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 15,
"watchers": 47,
"score": 0,
"subscribers_count": 3

View file

@ -76,10 +76,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-11-04T10:33:13Z",
"updated_at": "2024-11-04T19:00:24Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 407,
"watchers_count": 407,
"stargazers_count": 408,
"watchers_count": 408,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 407,
"watchers": 408,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,10 +14,10 @@
"description": "basic concept for the latest windows wifi driver CVE",
"fork": false,
"created_at": "2024-11-04T03:40:01Z",
"updated_at": "2024-11-04T14:45:50Z",
"updated_at": "2024-11-04T20:31:55Z",
"pushed_at": "2024-11-04T03:49:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -112,7 +112,7 @@
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -125,7 +125,7 @@
"vulnerabilities"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 43,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-44258",
"fork": false,
"created_at": "2024-10-29T09:45:03Z",
"updated_at": "2024-11-04T18:21:57Z",
"updated_at": "2024-11-05T00:19:49Z",
"pushed_at": "2024-11-02T19:20:44Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 24,
"watchers": 27,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
"fork": false,
"created_at": "2024-10-05T00:15:18Z",
"updated_at": "2024-11-03T19:22:24Z",
"updated_at": "2024-11-04T20:46:57Z",
"pushed_at": "2024-10-05T00:18:49Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 103,
"watchers": 104,
"score": 0,
"subscribers_count": 3
}

View file

@ -169,10 +169,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-11-01T19:02:39Z",
"updated_at": "2024-11-05T00:18:18Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 221,
"watchers_count": 221,
"stargazers_count": 222,
"watchers_count": 222,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 221,
"watchers": 222,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "Proof-of-Concept for CVE-2024-46538",
"fork": false,
"created_at": "2024-10-23T10:50:01Z",
"updated_at": "2024-11-04T12:48:07Z",
"updated_at": "2024-11-04T21:35:28Z",
"pushed_at": "2024-11-04T06:30:35Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 31,
"watchers": 34,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-50498.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 883392821,
"name": "CVE-2024-50498",
"full_name": "RandomRobbieBF\/CVE-2024-50498",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50498",
"description": "WP Query Console <= 1.0 - Unauthenticated Remote Code Execution",
"fork": false,
"created_at": "2024-11-04T22:13:45Z",
"updated_at": "2024-11-04T22:15:06Z",
"pushed_at": "2024-11-04T22:15:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -2282,13 +2282,13 @@
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 43,
"score": 0,
"subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-30T17:13:14Z",
"updated_at": "2024-10-12T16:14:45Z",
"updated_at": "2024-11-04T21:41:38Z",
"pushed_at": "2024-08-30T17:22:31Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 1
}

View file

@ -64,15 +64,15 @@
{
"id": 857843697,
"name": "CVE-2024-6782-PoC",
"full_name": "R4idB0Y\/CVE-2024-6782-PoC",
"full_name": "0xB0y426\/CVE-2024-6782-PoC",
"owner": {
"login": "R4idB0Y",
"login": "0xB0y426",
"id": 132174647,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132174647?v=4",
"html_url": "https:\/\/github.com\/R4idB0Y",
"html_url": "https:\/\/github.com\/0xB0y426",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/R4idB0Y\/CVE-2024-6782-PoC",
"html_url": "https:\/\/github.com\/0xB0y426\/CVE-2024-6782-PoC",
"description": "Unauthenticated remote code execution via Calibres content server in Calibre &lt;= 7.14.0.",
"fork": false,
"created_at": "2024-09-15T18:45:44Z",

View file

@ -1433,7 +1433,7 @@
- [zangjiahe/CVE-2024-6782](https://github.com/zangjiahe/CVE-2024-6782)
- [jdpsl/CVE-2024-6782](https://github.com/jdpsl/CVE-2024-6782)
- [R4idB0Y/CVE-2024-6782-PoC](https://github.com/R4idB0Y/CVE-2024-6782-PoC)
- [0xB0y426/CVE-2024-6782-PoC](https://github.com/0xB0y426/CVE-2024-6782-PoC)
### CVE-2024-6788 (2024-08-13)
@ -5803,6 +5803,9 @@
### CVE-2024-50476
- [RandomRobbieBF/CVE-2024-50476](https://github.com/RandomRobbieBF/CVE-2024-50476)
### CVE-2024-50498
- [RandomRobbieBF/CVE-2024-50498](https://github.com/RandomRobbieBF/CVE-2024-50498)
### CVE-2024-50526
- [hatvix1/CVE-2024-50526-Private-POC](https://github.com/hatvix1/CVE-2024-50526-Private-POC)
@ -40805,7 +40808,7 @@
<code>In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.
</code>
- [guidovranken/CVE-2017-3730](https://github.com/guidovranken/CVE-2017-3730)
- [olivierh59500/CVE-2017-3730](https://github.com/olivierh59500/CVE-2017-3730)
### CVE-2017-3881 (2017-03-17)
@ -46661,7 +46664,7 @@
- [4m3rr0r/CVE-2011-2523-poc](https://github.com/4m3rr0r/CVE-2011-2523-poc)
- [Shubham-2k1/Exploit-CVE-2011-2523](https://github.com/Shubham-2k1/Exploit-CVE-2011-2523)
- [Tenor-Z/SmileySploit](https://github.com/Tenor-Z/SmileySploit)
- [R4idB0Y/CVE-2011-2523-PoC](https://github.com/R4idB0Y/CVE-2011-2523-PoC)
- [0xB0y426/CVE-2011-2523-PoC](https://github.com/0xB0y426/CVE-2011-2523-PoC)
- [AnugiArrawwala/CVE-Research](https://github.com/AnugiArrawwala/CVE-Research)
- [Gill-Singh-A/vsFTP-2.3.4-Remote-Root-Shell-Exploit](https://github.com/Gill-Singh-A/vsFTP-2.3.4-Remote-Root-Shell-Exploit)
- [everythingBlackkk/vsFTPd-Backdoor-Exploit-CVE-2011-2523-](https://github.com/everythingBlackkk/vsFTPd-Backdoor-Exploit-CVE-2011-2523-)