Auto Update 2024/08/17 06:29:17

This commit is contained in:
motikan2010-bot 2024-08-17 15:29:17 +09:00
parent 6851dc0e87
commit 1e2fb9d57f
41 changed files with 259 additions and 189 deletions

View file

@ -13,10 +13,10 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2024-08-12T19:13:37Z",
"updated_at": "2024-08-17T02:51:40Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2305,
"watchers_count": 2305,
"stargazers_count": 2306,
"watchers_count": 2306,
"has_discussions": false,
"forks_count": 465,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 465,
"watchers": 2305,
"watchers": 2306,
"score": 0,
"subscribers_count": 117
},

View file

@ -414,10 +414,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2024-08-16T17:52:19Z",
"updated_at": "2024-08-17T04:59:03Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 443,
"watchers_count": 443,
"stargazers_count": 444,
"watchers_count": 444,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -426,7 +426,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 443,
"watchers": 444,
"score": 0,
"subscribers_count": 9
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2024-08-12T19:34:13Z",
"updated_at": "2024-08-17T01:40:23Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 536,
"watchers_count": 536,
"stargazers_count": 537,
"watchers_count": 537,
"has_discussions": false,
"forks_count": 253,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 253,
"watchers": 536,
"watchers": 537,
"score": 0,
"subscribers_count": 28
},

File diff suppressed because one or more lines are too long

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-15T20:54:57Z",
"updated_at": "2024-08-17T01:18:01Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4085,
"watchers_count": 4085,
"stargazers_count": 4086,
"watchers_count": 4086,
"has_discussions": false,
"forks_count": 1087,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1087,
"watchers": 4085,
"watchers": 4086,
"score": 0,
"subscribers_count": 151
},

View file

@ -13,10 +13,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2024-08-16T17:52:19Z",
"updated_at": "2024-08-17T04:59:03Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 443,
"watchers_count": 443,
"stargazers_count": 444,
"watchers_count": 444,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 443,
"watchers": 444,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "Double-Free BUG in WhatsApp exploit poc.",
"fork": false,
"created_at": "2020-05-10T15:25:59Z",
"updated_at": "2024-08-13T11:22:56Z",
"updated_at": "2024-08-17T05:00:38Z",
"pushed_at": "2020-05-10T15:32:54Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 91,
"watchers": 92,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-15T20:54:57Z",
"updated_at": "2024-08-17T01:18:01Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4085,
"watchers_count": 4085,
"stargazers_count": 4086,
"watchers_count": 4086,
"has_discussions": false,
"forks_count": 1087,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1087,
"watchers": 4085,
"watchers": 4086,
"score": 0,
"subscribers_count": 151
},

View file

@ -13,10 +13,10 @@
"description": "A simple POC that demonstrates A vulnerability found in IObitUnlocker 1.1.2 that leverages IOCTL codes found it its vulnerable driver (IObitUnlocker.sys), providing ability to unlock, delete, rename, copy, and move running files and a low privileged user.",
"fork": false,
"created_at": "2024-04-14T19:53:03Z",
"updated_at": "2024-08-16T10:51:26Z",
"updated_at": "2024-08-17T01:50:45Z",
"pushed_at": "2024-04-14T20:07:14Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -90,10 +90,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2024-08-12T20:10:39Z",
"updated_at": "2024-08-17T01:41:14Z",
"pushed_at": "2023-06-08T04:01:33Z",
"stargazers_count": 477,
"watchers_count": 477,
"stargazers_count": 478,
"watchers_count": 478,
"has_discussions": false,
"forks_count": 147,
"allow_forking": true,
@ -104,7 +104,7 @@
],
"visibility": "public",
"forks": 147,
"watchers": 477,
"watchers": 478,
"score": 0,
"subscribers_count": 8
},
@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-08-13T02:40:51Z",
"updated_at": "2024-08-17T01:41:22Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1292,
"watchers_count": 1292,
"stargazers_count": 1293,
"watchers_count": 1293,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 165,
"watchers": 1292,
"watchers": 1293,
"score": 0,
"subscribers_count": 14
}

View file

@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2021-05-29T13:07:14Z",
"updated_at": "2024-08-12T20:13:26Z",
"updated_at": "2024-08-17T01:41:28Z",
"pushed_at": "2023-01-19T16:24:33Z",
"stargazers_count": 213,
"watchers_count": 213,
"stargazers_count": 214,
"watchers_count": 214,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 213,
"watchers": 214,
"score": 0,
"subscribers_count": 7
},

View file

@ -944,7 +944,7 @@
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 34,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -961,7 +961,7 @@
"zeroday"
],
"visibility": "public",
"forks": 34,
"forks": 33,
"watchers": 120,
"score": 0,
"subscribers_count": 2

View file

@ -1224,10 +1224,10 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
"updated_at": "2024-08-12T20:12:34Z",
"updated_at": "2024-08-17T00:48:44Z",
"pushed_at": "2022-02-12T19:33:07Z",
"stargazers_count": 216,
"watchers_count": 216,
"stargazers_count": 217,
"watchers_count": 217,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -1236,7 +1236,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 216,
"watchers": 217,
"score": 0,
"subscribers_count": 8
},

View file

@ -43,10 +43,10 @@
"description": "This is a exploit of CVE-2021-32305 a web vulnerability to command injection on search.php path, this exploit allows execute commands.",
"fork": false,
"created_at": "2023-12-26T20:20:00Z",
"updated_at": "2023-12-26T20:29:35Z",
"updated_at": "2024-08-17T02:08:19Z",
"pushed_at": "2023-12-26T20:29:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -471,36 +471,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 479265759,
"name": "CVE-2021-42013",
"full_name": "Adashz\/CVE-2021-42013",
"owner": {
"login": "Adashz",
"id": 70690472,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70690472?v=4",
"html_url": "https:\/\/github.com\/Adashz"
},
"html_url": "https:\/\/github.com\/Adashz\/CVE-2021-42013",
"description": null,
"fork": false,
"created_at": "2022-04-08T06:07:37Z",
"updated_at": "2022-04-08T06:08:55Z",
"pushed_at": "2022-04-08T07:07:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 482976975,
"name": "apache_2.4.50",

View file

@ -1186,10 +1186,10 @@
"description": "F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB",
"fork": false,
"created_at": "2022-05-12T16:54:52Z",
"updated_at": "2024-08-12T20:23:13Z",
"updated_at": "2024-08-17T03:10:10Z",
"pushed_at": "2023-05-11T02:55:01Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -1206,7 +1206,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 2
},

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-08-13T02:40:51Z",
"updated_at": "2024-08-17T01:41:22Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1292,
"watchers_count": 1292,
"stargazers_count": 1293,
"watchers_count": 1293,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 165,
"watchers": 1292,
"watchers": 1293,
"score": 0,
"subscribers_count": 14
},

View file

@ -13,10 +13,10 @@
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
"fork": false,
"created_at": "2022-10-13T14:24:12Z",
"updated_at": "2024-08-14T03:11:31Z",
"updated_at": "2024-08-17T01:41:09Z",
"pushed_at": "2022-10-13T15:25:00Z",
"stargazers_count": 335,
"watchers_count": 335,
"stargazers_count": 336,
"watchers_count": 336,
"has_discussions": false,
"forks_count": 91,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 91,
"watchers": 335,
"watchers": 336,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering them ineffective, working for both x32 and x64(CVE-2023-44976).",
"fork": false,
"created_at": "2023-10-01T18:24:38Z",
"updated_at": "2024-08-16T22:07:08Z",
"updated_at": "2024-08-17T06:03:37Z",
"pushed_at": "2024-07-06T23:35:51Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 62,
"watchers": 63,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-08-15T14:09:09Z",
"updated_at": "2024-08-17T03:30:33Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2210,
"watchers_count": 2210,
"stargazers_count": 2211,
"watchers_count": 2211,
"has_discussions": false,
"forks_count": 288,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 288,
"watchers": 2210,
"watchers": 2211,
"score": 0,
"subscribers_count": 23
},

View file

@ -13,10 +13,10 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-08-13T15:15:27Z",
"updated_at": "2024-08-17T06:18:13Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 258,
"watchers_count": 258,
"stargazers_count": 259,
"watchers_count": 259,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 258,
"watchers": 259,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "一个验证对CVE-2024-21733",
"fork": false,
"created_at": "2024-08-15T09:47:32Z",
"updated_at": "2024-08-16T18:26:02Z",
"updated_at": "2024-08-17T06:20:11Z",
"pushed_at": "2024-08-16T05:52:08Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -80,10 +80,10 @@
"description": "PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)",
"fork": false,
"created_at": "2024-07-15T07:26:59Z",
"updated_at": "2024-08-07T01:49:55Z",
"updated_at": "2024-08-17T06:32:03Z",
"pushed_at": "2024-07-16T23:22:14Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -103,7 +103,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-08-15T05:09:08Z",
"updated_at": "2024-08-17T01:44:38Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 185,
"watchers_count": 185,
"stargazers_count": 186,
"watchers_count": 186,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 185,
"watchers": 186,
"score": 0,
"subscribers_count": 2
},

View file

@ -364,6 +364,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
"fork": false,
"created_at": "2024-07-06T00:49:40Z",
"updated_at": "2024-08-05T13:44:14Z",
"updated_at": "2024-08-17T05:33:53Z",
"pushed_at": "2024-07-12T00:41:36Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 101,
"watchers": 102,
"score": 0,
"subscribers_count": 2
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "mitigation script by disabling ipv6 of all interfaces",
"fork": false,
"created_at": "2024-08-15T12:41:01Z",
"updated_at": "2024-08-16T14:51:44Z",
"updated_at": "2024-08-17T02:41:54Z",
"pushed_at": "2024-08-15T13:53:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
@ -43,10 +43,10 @@
"description": "CVE-2024-38063 exploits for sale. CVE-2024-38063 PoC. CVE-2024-38063 Demo",
"fork": false,
"created_at": "2024-08-16T03:33:47Z",
"updated_at": "2024-08-16T15:37:17Z",
"updated_at": "2024-08-17T02:01:12Z",
"pushed_at": "2024-08-16T15:37:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -64,6 +64,36 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 843636100,
"name": "CVE-2024-38063-VB",
"full_name": "noradlb1\/CVE-2024-38063-VB",
"owner": {
"login": "noradlb1",
"id": 74623428,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74623428?v=4",
"html_url": "https:\/\/github.com\/noradlb1"
},
"html_url": "https:\/\/github.com\/noradlb1\/CVE-2024-38063-VB",
"description": "CVE-2024-38063 VB",
"fork": false,
"created_at": "2024-08-17T01:11:12Z",
"updated_at": "2024-08-17T01:20:05Z",
"pushed_at": "2024-08-17T01:20:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -193,10 +193,10 @@
"description": "检测RDL服务是否运行快速排查受影响资产",
"fork": false,
"created_at": "2024-08-10T01:10:06Z",
"updated_at": "2024-08-13T07:38:52Z",
"updated_at": "2024-08-17T04:04:07Z",
"pushed_at": "2024-08-10T02:19:43Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

32
2024/CVE-2024-42657.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 843654614,
"name": "CVE-2024-42657",
"full_name": "sudo-subho\/CVE-2024-42657",
"owner": {
"login": "sudo-subho",
"id": 77957540,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77957540?v=4",
"html_url": "https:\/\/github.com\/sudo-subho"
},
"html_url": "https:\/\/github.com\/sudo-subho\/CVE-2024-42657",
"description": "CVE-2024-42657 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the lack of encryption during login process.",
"fork": false,
"created_at": "2024-08-17T02:55:14Z",
"updated_at": "2024-08-17T02:59:43Z",
"pushed_at": "2024-08-17T02:59:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-42658.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 843655957,
"name": "CVE-2024-42658",
"full_name": "sudo-subho\/CVE-2024-42658",
"owner": {
"login": "sudo-subho",
"id": 77957540,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77957540?v=4",
"html_url": "https:\/\/github.com\/sudo-subho"
},
"html_url": "https:\/\/github.com\/sudo-subho\/CVE-2024-42658",
"description": " CVE-2024-42658 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the cookies parameter",
"fork": false,
"created_at": "2024-08-17T03:02:20Z",
"updated_at": "2024-08-17T03:03:41Z",
"pushed_at": "2024-08-17T03:03:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.",
"fork": false,
"created_at": "2024-08-08T08:28:26Z",
"updated_at": "2024-08-15T01:17:05Z",
"updated_at": "2024-08-17T04:03:30Z",
"pushed_at": "2024-08-08T09:32:00Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -620,10 +620,10 @@
"description": "A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-06-09T23:32:11Z",
"updated_at": "2024-08-16T12:50:54Z",
"updated_at": "2024-08-17T03:15:40Z",
"pushed_at": "2024-07-12T02:56:25Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -646,7 +646,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
@ -1190,36 +1190,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 824582405,
"name": "CVE-2024-4577",
"full_name": "cybersagor\/CVE-2024-4577",
"owner": {
"login": "cybersagor",
"id": 132956845,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132956845?v=4",
"html_url": "https:\/\/github.com\/cybersagor"
},
"html_url": "https:\/\/github.com\/cybersagor\/CVE-2024-4577",
"description": "CVE-2024-4577 Exploits",
"fork": false,
"created_at": "2024-07-05T12:47:44Z",
"updated_at": "2024-07-05T16:43:53Z",
"pushed_at": "2024-07-05T16:43:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 825104886,
"name": "CVE-2024-4577-RCE",
@ -1466,5 +1436,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 843644753,
"name": "CVE-2024-4577",
"full_name": "bughuntar\/CVE-2024-4577",
"owner": {
"login": "bughuntar",
"id": 99727538,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99727538?v=4",
"html_url": "https:\/\/github.com\/bughuntar"
},
"html_url": "https:\/\/github.com\/bughuntar\/CVE-2024-4577",
"description": "CVE-2024-4577 Exploits",
"fork": false,
"created_at": "2024-08-17T02:01:57Z",
"updated_at": "2024-08-17T02:02:29Z",
"pushed_at": "2024-08-17T02:02:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 449,
"watchers_count": 449,
"has_discussions": false,
"forks_count": 181,
"forks_count": 179,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 181,
"forks": 179,
"watchers": 449,
"score": 0,
"subscribers_count": 5

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -822,7 +822,6 @@
- [olebris/CVE-2024-4577](https://github.com/olebris/CVE-2024-4577)
- [AlperenY-cs/CVE-2024-4577](https://github.com/AlperenY-cs/CVE-2024-4577)
- [charis3306/CVE-2024-4577](https://github.com/charis3306/CVE-2024-4577)
- [cybersagor/CVE-2024-4577](https://github.com/cybersagor/CVE-2024-4577)
- [l0n3m4n/CVE-2024-4577-RCE](https://github.com/l0n3m4n/CVE-2024-4577-RCE)
- [bibo318/CVE-2024-4577-RCE-ATTACK](https://github.com/bibo318/CVE-2024-4577-RCE-ATTACK)
- [waived/CVE-2024-4577-PHP-RCE](https://github.com/waived/CVE-2024-4577-PHP-RCE)
@ -831,6 +830,7 @@
- [a-roshbaik/CVE-2024-4577-PHP-RCE](https://github.com/a-roshbaik/CVE-2024-4577-PHP-RCE)
- [Jcccccx/CVE-2024-4577](https://github.com/Jcccccx/CVE-2024-4577)
- [ManuelKy08/CVE-2024-4577---RR](https://github.com/ManuelKy08/CVE-2024-4577---RR)
- [bughuntar/CVE-2024-4577](https://github.com/bughuntar/CVE-2024-4577)
### CVE-2024-4701 (2024-05-10)
@ -3824,6 +3824,7 @@
- [diegoalbuquerque/CVE-2024-38063](https://github.com/diegoalbuquerque/CVE-2024-38063)
- [proxykingdev/CVE-2024-38063](https://github.com/proxykingdev/CVE-2024-38063)
- [noradlb1/CVE-2024-38063-VB](https://github.com/noradlb1/CVE-2024-38063-VB)
### CVE-2024-38077 (2024-07-09)
@ -4176,6 +4177,12 @@
- [fevar54/CVE-2024-42461](https://github.com/fevar54/CVE-2024-42461)
### CVE-2024-42657
- [sudo-subho/CVE-2024-42657](https://github.com/sudo-subho/CVE-2024-42657)
### CVE-2024-42658
- [sudo-subho/CVE-2024-42658](https://github.com/sudo-subho/CVE-2024-42658)
### CVE-2024-42758 (2024-08-16)
<code>A Cross-site Scripting (XSS) vulnerability exists in version v2024-01-05 of the indexmenu plugin when is used and enabled in Dokuwiki (Open Source Wiki Engine). A malicious attacker can input XSS payloads for example when creating or editing existing page, to trigger the XSS on Dokuwiki, which is then stored in .txt file (due to nature of how Dokuwiki is designed), which presents stored XSS.
@ -23970,7 +23977,6 @@
- [tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway](https://github.com/tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway)
- [mauricelambert/CVE-2021-42013](https://github.com/mauricelambert/CVE-2021-42013)
- [honypot/CVE-2021-42013](https://github.com/honypot/CVE-2021-42013)
- [Adashz/CVE-2021-42013](https://github.com/Adashz/CVE-2021-42013)
- [hadrian3689/apache_2.4.50](https://github.com/hadrian3689/apache_2.4.50)
- [viliuspovilaika/cve-2021-42013](https://github.com/viliuspovilaika/cve-2021-42013)
- [mightysai1997/cve-2021-42013](https://github.com/mightysai1997/cve-2021-42013)