Auto Update 2024/11/12 12:33:31

This commit is contained in:
motikan2010-bot 2024-11-12 21:33:31 +09:00
parent 68b9d8b1cb
commit 2eb9b1b471
52 changed files with 381 additions and 215 deletions

View file

@ -14,10 +14,10 @@
"description": "CVE-2013-3660的x64 win7平台EXP源代码成功率100%。",
"fork": false,
"created_at": "2022-01-29T02:14:26Z",
"updated_at": "2022-04-09T12:07:19Z",
"updated_at": "2024-11-12T09:17:14Z",
"pushed_at": "2022-04-09T12:07:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

33
2016/CVE-2016-6328.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 887111403,
"name": "libexif_Android10_r33_CVE-2016-6328",
"full_name": "Pazhanivelmani\/libexif_Android10_r33_CVE-2016-6328",
"owner": {
"login": "Pazhanivelmani",
"id": 178174306,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178174306?v=4",
"html_url": "https:\/\/github.com\/Pazhanivelmani",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Pazhanivelmani\/libexif_Android10_r33_CVE-2016-6328",
"description": null,
"fork": false,
"created_at": "2024-11-12T07:26:22Z",
"updated_at": "2024-11-12T07:27:33Z",
"pushed_at": "2024-11-12T07:27:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2024-09-20T02:06:21Z",
"updated_at": "2024-11-12T08:13:46Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 539,
"watchers_count": 539,
"stargazers_count": 540,
"watchers_count": 540,
"has_discussions": false,
"forks_count": 252,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 252,
"watchers": 539,
"watchers": 540,
"score": 0,
"subscribers_count": 28
},
@ -138,10 +138,10 @@
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false,
"created_at": "2017-11-21T15:22:41Z",
"updated_at": "2024-10-14T13:13:16Z",
"updated_at": "2024-11-12T07:45:58Z",
"pushed_at": "2017-12-06T12:47:31Z",
"stargazers_count": 326,
"watchers_count": 326,
"stargazers_count": 325,
"watchers_count": 325,
"has_discussions": false,
"forks_count": 95,
"allow_forking": true,
@ -155,7 +155,7 @@
],
"visibility": "public",
"forks": 95,
"watchers": 326,
"watchers": 325,
"score": 0,
"subscribers_count": 18
},

View file

@ -417,10 +417,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-11-12T06:05:14Z",
"pushed_at": "2024-11-12T06:05:11Z",
"stargazers_count": 111,
"watchers_count": 111,
"updated_at": "2024-11-12T09:21:39Z",
"pushed_at": "2024-11-12T08:25:48Z",
"stargazers_count": 121,
"watchers_count": 121,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 111,
"watchers": 121,
"score": 0,
"subscribers_count": 2
}

View file

@ -138,10 +138,10 @@
"description": "Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.",
"fork": false,
"created_at": "2022-10-04T21:09:27Z",
"updated_at": "2024-08-21T20:42:49Z",
"updated_at": "2024-11-12T06:39:16Z",
"pushed_at": "2024-08-21T20:42:45Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -155,7 +155,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": "CVE-2018-8174_python",
"fork": false,
"created_at": "2018-05-30T03:12:32Z",
"updated_at": "2024-08-29T01:22:24Z",
"updated_at": "2024-11-12T07:16:33Z",
"pushed_at": "2022-04-19T13:24:53Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 139,
"watchers_count": 139,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 138,
"watchers": 139,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": "Proof of Concept for CVE-2019-18634",
"fork": false,
"created_at": "2020-02-07T18:07:03Z",
"updated_at": "2024-10-31T18:08:46Z",
"updated_at": "2024-11-12T12:05:13Z",
"pushed_at": "2021-09-12T02:55:24Z",
"stargazers_count": 209,
"watchers_count": 209,
"stargazers_count": 208,
"watchers_count": 208,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 209,
"watchers": 208,
"score": 0,
"subscribers_count": 3
},

View file

@ -107,10 +107,10 @@
"description": "CVE-2019-7238 Nexus RCE漏洞图形化一键检测工具。CVE-2019-7238 Nexus RCE Vul POC Tool.",
"fork": false,
"created_at": "2020-01-10T09:19:10Z",
"updated_at": "2024-08-12T19:56:28Z",
"updated_at": "2024-11-12T10:15:31Z",
"pushed_at": "2020-01-15T08:36:05Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 2
},

View file

@ -1652,10 +1652,10 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2024-11-08T14:50:44Z",
"updated_at": "2024-11-12T07:44:06Z",
"pushed_at": "2022-03-30T14:02:04Z",
"stargazers_count": 265,
"watchers_count": 265,
"stargazers_count": 266,
"watchers_count": 266,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -1664,7 +1664,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 265,
"watchers": 266,
"score": 0,
"subscribers_count": 7
},

View file

@ -76,10 +76,10 @@
"description": "CVE-2020-10199、CVE-2020-10204漏洞一键检测工具图形化界面。CVE-2020-10199 and CVE-2020-10204 Vul Tool with GUI.",
"fork": false,
"created_at": "2020-04-08T11:08:35Z",
"updated_at": "2024-08-12T19:59:53Z",
"updated_at": "2024-11-12T10:16:12Z",
"pushed_at": "2020-04-12T13:38:19Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -92,7 +92,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 3
},

View file

@ -107,10 +107,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2024-11-06T04:28:56Z",
"updated_at": "2024-11-12T11:44:20Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1188,
"watchers_count": 1188,
"stargazers_count": 1189,
"watchers_count": 1189,
"has_discussions": false,
"forks_count": 288,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 288,
"watchers": 1188,
"watchers": 1189,
"score": 0,
"subscribers_count": 34
},

View file

@ -981,10 +981,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-11-12T06:12:23Z",
"pushed_at": "2024-11-12T06:05:11Z",
"stargazers_count": 112,
"watchers_count": 112,
"updated_at": "2024-11-12T09:21:39Z",
"pushed_at": "2024-11-12T08:25:48Z",
"stargazers_count": 121,
"watchers_count": 121,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -1001,7 +1001,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 112,
"watchers": 121,
"score": 0,
"subscribers_count": 2
}

33
2020/CVE-2020-24881.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 887139437,
"name": "cve-2020-24881",
"full_name": "harshtech123\/cve-2020-24881",
"owner": {
"login": "harshtech123",
"id": 139060630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139060630?v=4",
"html_url": "https:\/\/github.com\/harshtech123",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/harshtech123\/cve-2020-24881",
"description": null,
"fork": false,
"created_at": "2024-11-12T08:32:19Z",
"updated_at": "2024-11-12T08:39:05Z",
"pushed_at": "2024-11-12T08:39:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-11-06T12:10:00Z",
"updated_at": "2024-11-12T06:46:27Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1327,
"watchers_count": 1327,
"stargazers_count": 1325,
"watchers_count": 1325,
"has_discussions": false,
"forks_count": 164,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 164,
"watchers": 1327,
"watchers": 1325,
"score": 0,
"subscribers_count": 15
}

View file

@ -45,10 +45,10 @@
"description": "Laravel debug rce",
"fork": false,
"created_at": "2021-01-22T05:12:21Z",
"updated_at": "2024-11-09T06:30:07Z",
"updated_at": "2024-11-12T09:02:36Z",
"pushed_at": "2021-01-24T05:28:07Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 124,
"watchers_count": 124,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 125,
"watchers": 124,
"score": 0,
"subscribers_count": 4
},
@ -359,10 +359,10 @@
"description": "Laravel RCE Exploit Script - CVE-2021-3129",
"fork": false,
"created_at": "2022-04-16T17:22:55Z",
"updated_at": "2024-11-12T00:36:21Z",
"updated_at": "2024-11-12T09:24:18Z",
"pushed_at": "2024-09-22T13:10:27Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -386,7 +386,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 89,
"watchers": 90,
"score": 0,
"subscribers_count": 1
},

View file

@ -967,10 +967,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-11-12T05:59:57Z",
"updated_at": "2024-11-12T11:14:48Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 1077,
"watchers_count": 1077,
"stargazers_count": 1078,
"watchers_count": 1078,
"has_discussions": false,
"forks_count": 188,
"allow_forking": true,
@ -981,7 +981,7 @@
],
"visibility": "public",
"forks": 188,
"watchers": 1077,
"watchers": 1078,
"score": 0,
"subscribers_count": 12
},

View file

@ -1194,10 +1194,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2024-11-08T14:08:43Z",
"updated_at": "2024-11-12T10:28:31Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 546,
"watchers_count": 546,
"stargazers_count": 547,
"watchers_count": 547,
"has_discussions": false,
"forks_count": 141,
"allow_forking": true,
@ -1206,7 +1206,7 @@
"topics": [],
"visibility": "public",
"forks": 141,
"watchers": 546,
"watchers": 547,
"score": 0,
"subscribers_count": 15
},

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-11-06T12:10:00Z",
"updated_at": "2024-11-12T06:46:27Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1327,
"watchers_count": 1327,
"stargazers_count": 1325,
"watchers_count": 1325,
"has_discussions": false,
"forks_count": 164,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 164,
"watchers": 1327,
"watchers": 1325,
"score": 0,
"subscribers_count": 15
}

View file

@ -107,10 +107,10 @@
"description": "CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!",
"fork": false,
"created_at": "2024-11-07T13:06:44Z",
"updated_at": "2024-11-12T01:48:40Z",
"updated_at": "2024-11-12T06:47:44Z",
"pushed_at": "2024-11-07T13:38:18Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 57,
"watchers": 58,
"score": 0,
"subscribers_count": 3
}

View file

@ -586,39 +586,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 500515749,
"name": "CVE-2022-26134",
"full_name": "CatAnnaDev\/CVE-2022-26134",
"owner": {
"login": "CatAnnaDev",
"id": 45910905,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45910905?v=4",
"html_url": "https:\/\/github.com\/CatAnnaDev",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CatAnnaDev\/CVE-2022-26134",
"description": null,
"fork": false,
"created_at": "2022-06-06T16:45:35Z",
"updated_at": "2022-06-08T13:29:12Z",
"pushed_at": "2022-06-06T20:20:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-26134"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 500659259,
"name": "CVE-2022-26134-Confluence",

View file

@ -852,10 +852,10 @@
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
"updated_at": "2024-10-17T03:22:06Z",
"updated_at": "2024-11-12T07:47:40Z",
"pushed_at": "2023-04-13T16:46:26Z",
"stargazers_count": 395,
"watchers_count": 395,
"stargazers_count": 396,
"watchers_count": 396,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -864,7 +864,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 395,
"watchers": 396,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-21T01:02:01Z",
"updated_at": "2024-10-21T10:38:37Z",
"updated_at": "2024-11-12T06:25:19Z",
"pushed_at": "2024-03-29T00:19:09Z",
"stargazers_count": 208,
"watchers_count": 208,
"stargazers_count": 209,
"watchers_count": 209,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 208,
"watchers": 209,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "Drag and Drop Multiple File Uploader PRO - Contact Form 7 v5.0.6.1 Path Traversal (CVE-2023-1112)",
"fork": false,
"created_at": "2023-02-04T03:03:05Z",
"updated_at": "2023-06-26T07:34:09Z",
"updated_at": "2024-11-12T11:51:38Z",
"pushed_at": "2023-03-07T01:31:57Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 1
}

33
2023/CVE-2023-1999.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 887214831,
"name": "webp_Android10_r33_CVE-2023-1999",
"full_name": "Pazhanivelmani\/webp_Android10_r33_CVE-2023-1999",
"owner": {
"login": "Pazhanivelmani",
"id": 178174306,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178174306?v=4",
"html_url": "https:\/\/github.com\/Pazhanivelmani",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Pazhanivelmani\/webp_Android10_r33_CVE-2023-1999",
"description": null,
"fork": false,
"created_at": "2024-11-12T11:12:23Z",
"updated_at": "2024-11-12T11:13:54Z",
"pushed_at": "2024-11-12T11:13:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2023-03-10T19:08:28Z",
"updated_at": "2024-11-11T10:12:54Z",
"updated_at": "2024-11-12T06:46:28Z",
"pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 176,
"watchers_count": 176,
"stargazers_count": 175,
"watchers_count": 175,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -96,7 +96,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 176,
"watchers": 175,
"score": 0,
"subscribers_count": 3
},

33
2023/CVE-2023-2603.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 887105666,
"name": "external_libcap-Android10_r33_CVE-2023-2603",
"full_name": "Pazhanivelmani\/external_libcap-Android10_r33_CVE-2023-2603",
"owner": {
"login": "Pazhanivelmani",
"id": 178174306,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178174306?v=4",
"html_url": "https:\/\/github.com\/Pazhanivelmani",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Pazhanivelmani\/external_libcap-Android10_r33_CVE-2023-2603",
"description": null,
"fork": false,
"created_at": "2024-11-12T07:12:16Z",
"updated_at": "2024-11-12T07:16:43Z",
"pushed_at": "2024-11-12T07:16:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "DedeCMS文件包含漏洞导致后台getshell(CVE-2023-2928)复现",
"fork": false,
"created_at": "2023-10-10T08:46:17Z",
"updated_at": "2024-10-10T01:49:17Z",
"updated_at": "2024-11-12T09:02:45Z",
"pushed_at": "2023-10-10T08:46:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "LPE exploit for CVE-2023-36802",
"fork": false,
"created_at": "2023-10-09T17:32:15Z",
"updated_at": "2024-11-06T05:20:32Z",
"updated_at": "2024-11-12T11:33:09Z",
"pushed_at": "2023-10-10T17:44:17Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 159,
"watchers_count": 159,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 158,
"watchers": 159,
"score": 0,
"subscribers_count": 5
},

View file

@ -89,10 +89,10 @@
"description": "WonderCMS RCE CVE-2023-41425",
"fork": false,
"created_at": "2024-08-12T06:16:17Z",
"updated_at": "2024-11-02T01:38:00Z",
"updated_at": "2024-11-12T07:54:22Z",
"pushed_at": "2024-08-12T06:55:30Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -101,7 +101,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2024-0311",
"fork": false,
"created_at": "2024-10-29T12:47:18Z",
"updated_at": "2024-11-02T04:26:42Z",
"updated_at": "2024-11-12T08:37:44Z",
"pushed_at": "2024-10-30T16:07:45Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}

View file

@ -45,12 +45,12 @@
"description": "POC - CVE-202410914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
"fork": false,
"created_at": "2024-11-10T12:01:21Z",
"updated_at": "2024-11-12T01:54:11Z",
"updated_at": "2024-11-12T07:38:56Z",
"pushed_at": "2024-11-10T12:13:16Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -64,8 +64,8 @@
"unauthenticated-rce"
],
"visibility": "public",
"forks": 5,
"watchers": 8,
"forks": 6,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -293,10 +293,10 @@
"description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ",
"fork": false,
"created_at": "2024-09-15T12:15:35Z",
"updated_at": "2024-11-10T14:14:15Z",
"updated_at": "2024-11-12T07:39:49Z",
"pushed_at": "2024-11-10T12:08:45Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -310,7 +310,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 1
}

View file

@ -1044,10 +1044,10 @@
"description": "POC - Jenkins File Read Vulnerability - CVE-2024-23897",
"fork": false,
"created_at": "2024-09-30T16:38:28Z",
"updated_at": "2024-11-10T14:14:16Z",
"updated_at": "2024-11-12T07:39:49Z",
"pushed_at": "2024-09-30T17:34:48Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1063,7 +1063,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -1381,10 +1381,10 @@
"description": "POC - CVE-202424919 - Check Point Security Gateways",
"fork": false,
"created_at": "2024-06-09T06:54:51Z",
"updated_at": "2024-11-10T14:14:21Z",
"updated_at": "2024-11-12T07:39:57Z",
"pushed_at": "2024-09-19T09:24:41Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1398,7 +1398,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,8 +14,8 @@
"description": "PoC for CVE-2024-25292",
"fork": false,
"created_at": "2024-09-06T06:16:29Z",
"updated_at": "2024-09-06T06:16:47Z",
"pushed_at": "2024-09-06T06:16:44Z",
"updated_at": "2024-11-12T12:21:48Z",
"pushed_at": "2024-11-12T12:21:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-14T16:20:38Z",
"updated_at": "2024-10-21T22:38:10Z",
"updated_at": "2024-11-12T11:20:56Z",
"pushed_at": "2024-09-05T23:21:00Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 100,
"watchers": 101,
"score": 0,
"subscribers_count": 2
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 229,
"watchers_count": 229,
"has_discussions": false,
"forks_count": 50,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 50,
"forks": 51,
"watchers": 229,
"score": 0,
"subscribers_count": 3

View file

@ -19,13 +19,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-11-12T04:04:45Z",
"updated_at": "2024-11-12T08:25:27Z",
"pushed_at": "2024-10-17T18:36:54Z",
"stargazers_count": 198,
"watchers_count": 198,
"stargazers_count": 199,
"watchers_count": 199,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 198,
"watchers": 199,
"score": 0,
"subscribers_count": 6
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 20,
"score": 0,
"subscribers_count": 2

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-11T09:00:22Z",
"updated_at": "2024-11-11T09:01:05Z",
"updated_at": "2024-11-12T08:52:37Z",
"pushed_at": "2024-11-11T09:01:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -138,10 +138,10 @@
"description": "Authentication Bypass Vulnerability — CVE-20244358 — Telerik Report Server 2024",
"fork": false,
"created_at": "2024-06-09T06:30:06Z",
"updated_at": "2024-11-10T14:14:20Z",
"updated_at": "2024-11-12T07:39:56Z",
"pushed_at": "2024-09-19T09:24:57Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -155,7 +155,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-44258",
"fork": false,
"created_at": "2024-10-29T09:45:03Z",
"updated_at": "2024-11-11T10:11:58Z",
"updated_at": "2024-11-12T08:59:07Z",
"pushed_at": "2024-11-02T19:20:44Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2024-09-19T12:43:48Z",
"updated_at": "2024-11-10T14:14:19Z",
"updated_at": "2024-11-12T07:39:53Z",
"pushed_at": "2024-09-19T14:38:05Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -64,7 +64,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-11T08:57:44Z",
"updated_at": "2024-11-11T08:58:22Z",
"updated_at": "2024-11-12T08:52:37Z",
"pushed_at": "2024-11-11T08:58:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,7 +14,7 @@
"description": "CVE-2024-48359 PoC",
"fork": false,
"created_at": "2024-10-30T14:52:04Z",
"updated_at": "2024-11-05T19:37:34Z",
"updated_at": "2024-11-12T08:54:14Z",
"pushed_at": "2024-10-30T15:02:47Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -410,10 +410,10 @@
"description": "POC - CVE-20244956 - Nexus Repository Manager 3 Unauthenticated Path Traversal",
"fork": false,
"created_at": "2024-06-09T10:57:29Z",
"updated_at": "2024-11-10T14:14:22Z",
"updated_at": "2024-11-12T07:39:58Z",
"pushed_at": "2024-09-19T09:24:18Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -426,7 +426,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

33
2024/CVE-2024-50251.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 887128999,
"name": "CVE-2024-50251-PoC",
"full_name": "slavin-ayu\/CVE-2024-50251-PoC",
"owner": {
"login": "slavin-ayu",
"id": 88360575,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88360575?v=4",
"html_url": "https:\/\/github.com\/slavin-ayu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/slavin-ayu\/CVE-2024-50251-PoC",
"description": "Just a local Dos bug in Linux kernel",
"fork": false,
"created_at": "2024-11-12T08:08:55Z",
"updated_at": "2024-11-12T08:14:44Z",
"pushed_at": "2024-11-12T08:14:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-06T21:24:43Z",
"updated_at": "2024-11-11T14:51:57Z",
"updated_at": "2024-11-12T09:40:20Z",
"pushed_at": "2024-11-08T16:39:57Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
"fork": false,
"created_at": "2024-09-10T06:27:59Z",
"updated_at": "2024-11-10T05:53:23Z",
"updated_at": "2024-11-12T08:35:46Z",
"pushed_at": "2024-10-17T05:12:29Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 80,
"watchers": 81,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-11T08:53:27Z",
"updated_at": "2024-11-11T08:56:13Z",
"updated_at": "2024-11-12T08:52:35Z",
"pushed_at": "2024-11-11T08:56:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -6299,6 +6299,13 @@
- [RandomRobbieBF/CVE-2024-49681](https://github.com/RandomRobbieBF/CVE-2024-49681)
### CVE-2024-50251 (2024-11-09)
<code>In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_payload: sanitize offset and length before calling skb_checksum()\n\nIf access to offset + length is larger than the skbuff length, then\nskb_checksum() triggers BUG_ON().\n\nskb_checksum() internally subtracts the length parameter while iterating\nover skbuff, BUG_ON(len) at the end of it checks that the expected\nlength to be included in the checksum calculation is fully consumed.
</code>
- [slavin-ayu/CVE-2024-50251-PoC](https://github.com/slavin-ayu/CVE-2024-50251-PoC)
### CVE-2024-50335 (2024-11-05)
<code>SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. The &quot;Publish Key&quot; field in SuiteCRM's Edit Profile page is vulnerable to Reflected Cross-Site Scripting (XSS), allowing an attacker to inject malicious JavaScript code. This can be exploited to steal CSRF tokens and perform unauthorized actions, such as creating new administrative users without proper authentication. The vulnerability arises due to insufficient input validation and sanitization of the Publish Key field within the SuiteCRM application. When an attacker injects a malicious script, it gets executed within the context of an authenticated user's session. The injected script (o.js) then leverages the captured CSRF token to forge requests that create new administrative users, effectively compromising the integrity and security of the CRM instance. This issue has been addressed in versions 7.14.6 and 8.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
@ -6826,6 +6833,13 @@
- [thomas-osgood/cve-2023-1874](https://github.com/thomas-osgood/cve-2023-1874)
### CVE-2023-1999 (2023-06-20)
<code>There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free. \n
</code>
- [Pazhanivelmani/webp_Android10_r33_CVE-2023-1999](https://github.com/Pazhanivelmani/webp_Android10_r33_CVE-2023-1999)
### CVE-2023-2002 (2023-05-26)
<code>A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.
@ -6961,6 +6975,13 @@
- [cainiao159357/CVE-2023-2598](https://github.com/cainiao159357/CVE-2023-2598)
- [LLfam/CVE-2023-2598](https://github.com/LLfam/CVE-2023-2598)
### CVE-2023-2603 (2023-06-06)
<code>A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.
</code>
- [Pazhanivelmani/external_libcap-Android10_r33_CVE-2023-2603](https://github.com/Pazhanivelmani/external_libcap-Android10_r33_CVE-2023-2603)
### CVE-2023-2636 (2023-07-17)
<code>The AN_GradeBook WordPress plugin through 5.0.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber
@ -17730,7 +17751,6 @@
- [hev0x/CVE-2022-26134](https://github.com/hev0x/CVE-2022-26134)
- [archanchoudhury/Confluence-CVE-2022-26134](https://github.com/archanchoudhury/Confluence-CVE-2022-26134)
- [SIFalcon/confluencePot](https://github.com/SIFalcon/confluencePot)
- [CatAnnaDev/CVE-2022-26134](https://github.com/CatAnnaDev/CVE-2022-26134)
- [vesperp/CVE-2022-26134-Confluence](https://github.com/vesperp/CVE-2022-26134-Confluence)
- [li8u99/CVE-2022-26134](https://github.com/li8u99/CVE-2022-26134)
- [reubensammut/cve-2022-26134](https://github.com/reubensammut/cve-2022-26134)
@ -32568,6 +32588,13 @@
- [darkvirus-7x/exploit-CVE-2020-24815](https://github.com/darkvirus-7x/exploit-CVE-2020-24815)
### CVE-2020-24881 (2020-11-02)
<code>SSRF exists in osTicket before 1.14.3, where an attacker can add malicious file to server or perform port scanning.
</code>
- [harshtech123/cve-2020-24881](https://github.com/harshtech123/cve-2020-24881)
### CVE-2020-24913 (2021-03-04)
<code>A SQL injection vulnerability in qcubed (all versions including 3.1.1) in profile.php via the strQuery parameter allows an unauthenticated attacker to access the database by injecting SQL code via a crafted POST request.
@ -44334,6 +44361,13 @@
- [kavgan/vuln_test_repo_public_ruby_gemfile_cve-2016-6317](https://github.com/kavgan/vuln_test_repo_public_ruby_gemfile_cve-2016-6317)
### CVE-2016-6328 (2018-10-31)
<code>A vulnerability was found in libexif. An integer overflow when parsing the MNOTE entry data of the input file. This can cause Denial-of-Service (DoS) and Information Disclosure (disclosing some critical heap chunk metadata, even other applications' private data).
</code>
- [Pazhanivelmani/libexif_Android10_r33_CVE-2016-6328](https://github.com/Pazhanivelmani/libexif_Android10_r33_CVE-2016-6328)
### CVE-2016-6366 (2016-08-18)
<code>Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON.