Auto Update 2024/12/03 18:32:40

This commit is contained in:
motikan2010-bot 2024-12-04 03:32:40 +09:00
parent 88afbbc990
commit 312ff0c9f7
31 changed files with 269 additions and 137 deletions

View file

@ -169,10 +169,10 @@
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)", "description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
"fork": false, "fork": false,
"created_at": "2020-11-13T16:33:52Z", "created_at": "2020-11-13T16:33:52Z",
"updated_at": "2024-09-26T16:48:31Z", "updated_at": "2024-12-03T13:56:24Z",
"pushed_at": "2020-12-31T20:34:30Z", "pushed_at": "2020-12-31T20:34:30Z",
"stargazers_count": 48, "stargazers_count": 49,
"watchers_count": 48, "watchers_count": 49,
"has_discussions": false, "has_discussions": false,
"forks_count": 17, "forks_count": 17,
"allow_forking": true, "allow_forking": true,
@ -181,7 +181,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 17, "forks": 17,
"watchers": 48, "watchers": 49,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -107,10 +107,10 @@
"description": "arbitrary kernel read\/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority\/system", "description": "arbitrary kernel read\/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
"fork": false, "fork": false,
"created_at": "2021-05-30T10:15:10Z", "created_at": "2021-05-30T10:15:10Z",
"updated_at": "2024-10-21T16:00:11Z", "updated_at": "2024-12-03T17:29:40Z",
"pushed_at": "2021-11-16T17:34:11Z", "pushed_at": "2021-11-16T17:34:11Z",
"stargazers_count": 53, "stargazers_count": 54,
"watchers_count": 53, "watchers_count": 54,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -134,7 +134,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 53, "watchers": 54,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -486,5 +486,36 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 897935701,
"name": "demo-CVE-2021-29447-lezione",
"full_name": "specializzazione-cyber-security\/demo-CVE-2021-29447-lezione",
"owner": {
"login": "specializzazione-cyber-security",
"id": 185217436,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185217436?v=4",
"html_url": "https:\/\/github.com\/specializzazione-cyber-security",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/specializzazione-cyber-security\/demo-CVE-2021-29447-lezione",
"description": null,
"fork": false,
"created_at": "2024-12-03T13:56:00Z",
"updated_at": "2024-12-03T14:01:06Z",
"pushed_at": "2024-12-03T13:57:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -142,12 +142,12 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)", "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false, "fork": false,
"created_at": "2022-01-26T00:56:36Z", "created_at": "2022-01-26T00:56:36Z",
"updated_at": "2024-11-29T13:58:59Z", "updated_at": "2024-12-03T15:31:28Z",
"pushed_at": "2023-05-04T19:24:39Z", "pushed_at": "2023-05-04T19:24:39Z",
"stargazers_count": 1060, "stargazers_count": 1059,
"watchers_count": 1060, "watchers_count": 1059,
"has_discussions": false, "has_discussions": false,
"forks_count": 305, "forks_count": 306,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -157,8 +157,8 @@
"poc" "poc"
], ],
"visibility": "public", "visibility": "public",
"forks": 305, "forks": 306,
"watchers": 1060, "watchers": 1059,
"score": 0, "score": 0,
"subscribers_count": 15 "subscribers_count": 15
}, },

View file

@ -14,10 +14,10 @@
"description": "Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability ", "description": "Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability ",
"fork": false, "fork": false,
"created_at": "2021-12-13T17:26:49Z", "created_at": "2021-12-13T17:26:49Z",
"updated_at": "2024-10-16T10:54:23Z", "updated_at": "2024-12-03T17:57:23Z",
"pushed_at": "2024-03-16T08:25:52Z", "pushed_at": "2024-03-16T08:25:52Z",
"stargazers_count": 78, "stargazers_count": 79,
"watchers_count": 78, "watchers_count": 79,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
@ -38,7 +38,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 14,
"watchers": 78, "watchers": 79,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
} }

View file

@ -1574,7 +1574,7 @@
"fork": false, "fork": false,
"created_at": "2021-12-11T12:16:45Z", "created_at": "2021-12-11T12:16:45Z",
"updated_at": "2024-04-29T17:48:37Z", "updated_at": "2024-04-29T17:48:37Z",
"pushed_at": "2024-12-02T22:43:20Z", "pushed_at": "2024-12-03T17:41:41Z",
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,

View file

@ -219,37 +219,6 @@
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
}, },
{
"id": 444659919,
"name": "CVE-2021-45232-RCE",
"full_name": "GYLQ\/CVE-2021-45232-RCE",
"owner": {
"login": "GYLQ",
"id": 15842234,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15842234?v=4",
"html_url": "https:\/\/github.com\/GYLQ",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/GYLQ\/CVE-2021-45232-RCE",
"description": "CVE-2021-45232-RCE-多线程批量漏洞检测",
"fork": false,
"created_at": "2022-01-05T04:13:10Z",
"updated_at": "2024-11-06T23:16:26Z",
"pushed_at": "2022-01-13T05:12:49Z",
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 34,
"score": 0,
"subscribers_count": 0
},
{ {
"id": 444735399, "id": 444735399,
"name": "CVE-2021-45232-RCE", "name": "CVE-2021-45232-RCE",

View file

@ -82,10 +82,10 @@
"description": "CVE-2022-1292 OpenSSL c_rehash Vulnerability", "description": "CVE-2022-1292 OpenSSL c_rehash Vulnerability",
"fork": false, "fork": false,
"created_at": "2022-05-30T16:59:54Z", "created_at": "2022-05-30T16:59:54Z",
"updated_at": "2023-12-13T03:38:10Z", "updated_at": "2024-12-03T17:12:19Z",
"pushed_at": "2022-05-30T17:00:34Z", "pushed_at": "2022-05-30T17:00:34Z",
"stargazers_count": 4, "stargazers_count": 5,
"watchers_count": 4, "watchers_count": 5,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -94,7 +94,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 4, "watchers": 5,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,8 +14,8 @@
"description": "CVE-2022-38181 POC for FireTV 2nd gen Cube (raven)", "description": "CVE-2022-38181 POC for FireTV 2nd gen Cube (raven)",
"fork": false, "fork": false,
"created_at": "2023-04-13T13:19:04Z", "created_at": "2023-04-13T13:19:04Z",
"updated_at": "2024-05-30T04:17:12Z", "updated_at": "2024-12-03T17:45:19Z",
"pushed_at": "2023-06-15T17:08:34Z", "pushed_at": "2024-12-03T17:45:11Z",
"stargazers_count": 5, "stargazers_count": 5,
"watchers_count": 5, "watchers_count": 5,
"has_discussions": false, "has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692", "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false, "fork": false,
"created_at": "2023-06-10T08:31:26Z", "created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-11-30T03:11:06Z", "updated_at": "2024-12-03T16:24:58Z",
"pushed_at": "2024-08-01T15:09:15Z", "pushed_at": "2024-08-01T15:09:15Z",
"stargazers_count": 303, "stargazers_count": 304,
"watchers_count": 303, "watchers_count": 304,
"has_discussions": true, "has_discussions": true,
"forks_count": 44, "forks_count": 44,
"allow_forking": true, "allow_forking": true,
@ -29,7 +29,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 44, "forks": 44,
"watchers": 303, "watchers": 304,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
}, },

View file

@ -437,5 +437,36 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 897966381,
"name": "CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC",
"full_name": "threatlabindonesia\/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC",
"owner": {
"login": "threatlabindonesia",
"id": 89779121,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89779121?v=4",
"html_url": "https:\/\/github.com\/threatlabindonesia",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/threatlabindonesia\/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC",
"description": null,
"fork": false,
"created_at": "2024-12-03T14:54:21Z",
"updated_at": "2024-12-03T15:04:52Z",
"pushed_at": "2024-12-03T15:03:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-02T10:25:56Z", "updated_at": "2024-12-03T17:03:27Z",
"pushed_at": "2024-08-18T08:26:46Z", "pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1282, "stargazers_count": 1283,
"watchers_count": 1282, "watchers_count": 1283,
"has_discussions": false, "has_discussions": false,
"forks_count": 217, "forks_count": 217,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 217, "forks": 217,
"watchers": 1282, "watchers": 1283,
"score": 0, "score": 0,
"subscribers_count": 20 "subscribers_count": 20
}, },

View file

@ -188,15 +188,15 @@
{ {
"id": 892819901, "id": 892819901,
"name": "Paloalto-CVE-2024-0012", "name": "Paloalto-CVE-2024-0012",
"full_name": "PunitTailor55\/Paloalto-CVE-2024-0012", "full_name": "punitdarji\/Paloalto-CVE-2024-0012",
"owner": { "owner": {
"login": "PunitTailor55", "login": "punitdarji",
"id": 38101321, "id": 38101321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4",
"html_url": "https:\/\/github.com\/PunitTailor55", "html_url": "https:\/\/github.com\/punitdarji",
"user_view_type": "public" "user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/PunitTailor55\/Paloalto-CVE-2024-0012", "html_url": "https:\/\/github.com\/punitdarji\/Paloalto-CVE-2024-0012",
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-11-22T20:58:17Z", "created_at": "2024-11-22T20:58:17Z",

View file

@ -266,5 +266,67 @@
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 897912004,
"name": "CVE-2024-10924-PoC",
"full_name": "Hunt3r850\/CVE-2024-10924-PoC",
"owner": {
"login": "Hunt3r850",
"id": 108004077,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108004077?v=4",
"html_url": "https:\/\/github.com\/Hunt3r850",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Hunt3r850\/CVE-2024-10924-PoC",
"description": null,
"fork": false,
"created_at": "2024-12-03T13:09:46Z",
"updated_at": "2024-12-03T13:13:07Z",
"pushed_at": "2024-12-03T13:10:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 897913649,
"name": "CVE-2024-10924-Wordpress-Docker",
"full_name": "Hunt3r850\/CVE-2024-10924-Wordpress-Docker",
"owner": {
"login": "Hunt3r850",
"id": 108004077,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108004077?v=4",
"html_url": "https:\/\/github.com\/Hunt3r850",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Hunt3r850\/CVE-2024-10924-Wordpress-Docker",
"description": null,
"fork": false,
"created_at": "2024-12-03T13:12:58Z",
"updated_at": "2024-12-03T13:18:30Z",
"pushed_at": "2024-12-03T13:14:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -14,10 +14,10 @@
"description": "This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698.", "description": "This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698.",
"fork": false, "fork": false,
"created_at": "2024-03-29T04:11:06Z", "created_at": "2024-03-29T04:11:06Z",
"updated_at": "2024-09-28T13:23:52Z", "updated_at": "2024-12-03T18:17:19Z",
"pushed_at": "2024-03-29T04:31:31Z", "pushed_at": "2024-03-29T04:31:31Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 9, "watchers": 10,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,10 +14,10 @@
"description": "exploits for CVE-2024-20017", "description": "exploits for CVE-2024-20017",
"fork": false, "fork": false,
"created_at": "2024-08-30T05:54:36Z", "created_at": "2024-08-30T05:54:36Z",
"updated_at": "2024-12-02T18:47:15Z", "updated_at": "2024-12-03T14:32:42Z",
"pushed_at": "2024-09-07T10:11:22Z", "pushed_at": "2024-09-07T10:11:22Z",
"stargazers_count": 135, "stargazers_count": 136,
"watchers_count": 135, "watchers_count": 136,
"has_discussions": false, "has_discussions": false,
"forks_count": 32, "forks_count": 32,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 32, "forks": 32,
"watchers": 135, "watchers": 136,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
} }

View file

@ -45,10 +45,10 @@
"description": "jsonpath-plus 包(版本 <=10.0.7存在严重的远程代码执行RCE漏洞允许攻击者通过 Node.js 的 VM 模块执行任意代码。该漏洞由于输入验证不严格导致,影响版本为 10.0.7 以下CVSS 分数为 9.8(极其严重)。漏洞首次公开于 2024 年 10 月 11 日。", "description": "jsonpath-plus 包(版本 <=10.0.7存在严重的远程代码执行RCE漏洞允许攻击者通过 Node.js 的 VM 模块执行任意代码。该漏洞由于输入验证不严格导致,影响版本为 10.0.7 以下CVSS 分数为 9.8(极其严重)。漏洞首次公开于 2024 年 10 月 11 日。",
"fork": false, "fork": false,
"created_at": "2024-11-23T05:54:24Z", "created_at": "2024-11-23T05:54:24Z",
"updated_at": "2024-11-25T05:24:15Z", "updated_at": "2024-12-03T14:59:15Z",
"pushed_at": "2024-11-23T05:57:35Z", "pushed_at": "2024-11-23T05:57:35Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -61,7 +61,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -610,10 +610,10 @@
"description": "POC for CVE-2024-23897 Jenkins File-Read ", "description": "POC for CVE-2024-23897 Jenkins File-Read ",
"fork": false, "fork": false,
"created_at": "2024-02-16T07:16:04Z", "created_at": "2024-02-16T07:16:04Z",
"updated_at": "2024-11-24T05:22:57Z", "updated_at": "2024-12-03T15:06:34Z",
"pushed_at": "2024-02-17T16:39:19Z", "pushed_at": "2024-02-17T16:39:19Z",
"stargazers_count": 16, "stargazers_count": 17,
"watchers_count": 16, "watchers_count": 17,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -622,7 +622,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 16, "watchers": 17,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,10 +14,10 @@
"description": "Unauthenticated Remote Code Execution Bricks <= 1.9.6", "description": "Unauthenticated Remote Code Execution Bricks <= 1.9.6",
"fork": false, "fork": false,
"created_at": "2024-02-20T20:16:09Z", "created_at": "2024-02-20T20:16:09Z",
"updated_at": "2024-12-03T04:15:48Z", "updated_at": "2024-12-03T18:04:46Z",
"pushed_at": "2024-02-25T21:50:09Z", "pushed_at": "2024-02-25T21:50:09Z",
"stargazers_count": 150, "stargazers_count": 151,
"watchers_count": 150, "watchers_count": 151,
"has_discussions": false, "has_discussions": false,
"forks_count": 33, "forks_count": 33,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 33, "forks": 33,
"watchers": 150, "watchers": 151,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },
@ -76,10 +76,10 @@
"description": "This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands.", "description": "This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands.",
"fork": false, "fork": false,
"created_at": "2024-02-22T10:53:45Z", "created_at": "2024-02-22T10:53:45Z",
"updated_at": "2024-12-01T00:14:42Z", "updated_at": "2024-12-03T15:07:31Z",
"pushed_at": "2024-02-22T10:54:26Z", "pushed_at": "2024-02-22T10:54:26Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 5, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -107,10 +107,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088", "description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false, "fork": false,
"created_at": "2024-07-15T08:07:05Z", "created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-12-03T11:11:26Z", "updated_at": "2024-12-03T14:02:59Z",
"pushed_at": "2024-09-08T21:23:34Z", "pushed_at": "2024-09-08T21:23:34Z",
"stargazers_count": 421, "stargazers_count": 422,
"watchers_count": 421, "watchers_count": 422,
"has_discussions": false, "has_discussions": false,
"forks_count": 31, "forks_count": 31,
"allow_forking": true, "allow_forking": true,
@ -119,7 +119,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 31, "forks": 31,
"watchers": 421, "watchers": 422,
"score": 0, "score": 0,
"subscribers_count": 19 "subscribers_count": 19
}, },

View file

@ -305,13 +305,13 @@
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 3, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
@ -319,15 +319,15 @@
{ {
"id": 864563382, "id": 864563382,
"name": "GeoServer-CVE-2024-36401", "name": "GeoServer-CVE-2024-36401",
"full_name": "PunitTailor55\/GeoServer-CVE-2024-36401", "full_name": "punitdarji\/GeoServer-CVE-2024-36401",
"owner": { "owner": {
"login": "PunitTailor55", "login": "punitdarji",
"id": 38101321, "id": 38101321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4",
"html_url": "https:\/\/github.com\/PunitTailor55", "html_url": "https:\/\/github.com\/punitdarji",
"user_view_type": "public" "user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/PunitTailor55\/GeoServer-CVE-2024-36401", "html_url": "https:\/\/github.com\/punitdarji\/GeoServer-CVE-2024-36401",
"description": "GeoServer CVE-2024-36401: Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions", "description": "GeoServer CVE-2024-36401: Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions",
"fork": false, "fork": false,
"created_at": "2024-09-28T14:55:50Z", "created_at": "2024-09-28T14:55:50Z",

View file

@ -29,5 +29,36 @@
"watchers": 4, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 897899835,
"name": "CVE-2024-42327",
"full_name": "compr00t\/CVE-2024-42327",
"owner": {
"login": "compr00t",
"id": 11025516,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11025516?v=4",
"html_url": "https:\/\/github.com\/compr00t",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/compr00t\/CVE-2024-42327",
"description": "PoC for CVE-2024-42327 \/ ZBX-25623",
"fork": false,
"created_at": "2024-12-03T12:44:07Z",
"updated_at": "2024-12-03T17:54:13Z",
"pushed_at": "2024-12-03T12:56:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -19,13 +19,13 @@
"stargazers_count": 59, "stargazers_count": 59,
"watchers_count": 59, "watchers_count": 59,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 8,
"watchers": 59, "watchers": 59,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false, "fork": false,
"created_at": "2024-11-19T08:57:18Z", "created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-03T12:24:40Z", "updated_at": "2024-12-03T16:55:15Z",
"pushed_at": "2024-11-19T09:15:26Z", "pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 27, "stargazers_count": 32,
"watchers_count": 27, "watchers_count": 32,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 27, "watchers": 32,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-10-30T09:53:42Z", "created_at": "2024-10-30T09:53:42Z",
"updated_at": "2024-11-03T11:49:39Z", "updated_at": "2024-12-03T13:29:27Z",
"pushed_at": "2024-11-03T11:49:36Z", "pushed_at": "2024-11-03T11:49:36Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -45,10 +45,10 @@
"description": "CVE-2024-5124 poc", "description": "CVE-2024-5124 poc",
"fork": false, "fork": false,
"created_at": "2024-12-03T03:18:48Z", "created_at": "2024-12-03T03:18:48Z",
"updated_at": "2024-12-03T04:01:35Z", "updated_at": "2024-12-03T16:37:43Z",
"pushed_at": "2024-12-03T04:01:32Z", "pushed_at": "2024-12-03T04:01:32Z",
"stargazers_count": 1, "stargazers_count": 3,
"watchers_count": 1, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -57,8 +57,8 @@
"description": "AnySniff is a tool for monitoring TCP connections of processes like AnyDesk on Windows. It uses the CVE-2024-52940 vulnerability to track open connections and log IPs, ports, and other details.", "description": "AnySniff is a tool for monitoring TCP connections of processes like AnyDesk on Windows. It uses the CVE-2024-52940 vulnerability to track open connections and log IPs, ports, and other details.",
"fork": false, "fork": false,
"created_at": "2024-12-02T05:15:11Z", "created_at": "2024-12-02T05:15:11Z",
"updated_at": "2024-12-02T06:03:21Z", "updated_at": "2024-12-03T13:34:47Z",
"pushed_at": "2024-12-02T06:03:18Z", "pushed_at": "2024-12-03T13:31:34Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-7965是Google Chrome浏览器中V8 JavaScript引擎的一个高危漏洞。该漏洞源于V8引擎在处理特定JavaScript代码时实现不当导致堆内存损坏。攻击者可通过诱导用户访问包含特制JavaScript的恶意网页利用此漏洞在Chrome渲染器中执行任意代码。", "description": "CVE-2024-7965是Google Chrome浏览器中V8 JavaScript引擎的一个高危漏洞。该漏洞源于V8引擎在处理特定JavaScript代码时实现不当导致堆内存损坏。攻击者可通过诱导用户访问包含特制JavaScript的恶意网页利用此漏洞在Chrome渲染器中执行任意代码。",
"fork": false, "fork": false,
"created_at": "2024-11-22T02:55:33Z", "created_at": "2024-11-22T02:55:33Z",
"updated_at": "2024-11-22T03:42:13Z", "updated_at": "2024-12-03T14:59:16Z",
"pushed_at": "2024-11-22T02:58:00Z", "pushed_at": "2024-11-22T02:58:00Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -62,7 +62,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -19,13 +19,13 @@
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 3,
"watchers": 4, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -119,15 +119,15 @@
{ {
"id": 876056610, "id": 876056610,
"name": "Grafana-CVE-2024-9264", "name": "Grafana-CVE-2024-9264",
"full_name": "PunitTailor55\/Grafana-CVE-2024-9264", "full_name": "punitdarji\/Grafana-CVE-2024-9264",
"owner": { "owner": {
"login": "PunitTailor55", "login": "punitdarji",
"id": 38101321, "id": 38101321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4",
"html_url": "https:\/\/github.com\/PunitTailor55", "html_url": "https:\/\/github.com\/punitdarji",
"user_view_type": "public" "user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/PunitTailor55\/Grafana-CVE-2024-9264", "html_url": "https:\/\/github.com\/punitdarji\/Grafana-CVE-2024-9264",
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-10-21T10:25:27Z", "created_at": "2024-10-21T10:25:27Z",

View file

@ -76,10 +76,10 @@
"description": "Proof of Concept Exploit for CVE-2024-9465", "description": "Proof of Concept Exploit for CVE-2024-9465",
"fork": false, "fork": false,
"created_at": "2024-12-03T12:16:44Z", "created_at": "2024-12-03T12:16:44Z",
"updated_at": "2024-12-03T12:29:57Z", "updated_at": "2024-12-03T16:38:23Z",
"pushed_at": "2024-12-03T12:21:35Z", "pushed_at": "2024-12-03T12:21:35Z",
"stargazers_count": 1, "stargazers_count": 3,
"watchers_count": 1, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -12,7 +12,7 @@
- [VegetableLasagne/CVE-2024-0012](https://github.com/VegetableLasagne/CVE-2024-0012) - [VegetableLasagne/CVE-2024-0012](https://github.com/VegetableLasagne/CVE-2024-0012)
- [iSee857/CVE-2024-0012-poc](https://github.com/iSee857/CVE-2024-0012-poc) - [iSee857/CVE-2024-0012-poc](https://github.com/iSee857/CVE-2024-0012-poc)
- [XiaomingX/cve-2024-0012-poc](https://github.com/XiaomingX/cve-2024-0012-poc) - [XiaomingX/cve-2024-0012-poc](https://github.com/XiaomingX/cve-2024-0012-poc)
- [PunitTailor55/Paloalto-CVE-2024-0012](https://github.com/PunitTailor55/Paloalto-CVE-2024-0012) - [punitdarji/Paloalto-CVE-2024-0012](https://github.com/punitdarji/Paloalto-CVE-2024-0012)
- [0xjessie21/CVE-2024-0012](https://github.com/0xjessie21/CVE-2024-0012) - [0xjessie21/CVE-2024-0012](https://github.com/0xjessie21/CVE-2024-0012)
### CVE-2024-0015 (2024-02-16) ### CVE-2024-0015 (2024-02-16)
@ -1844,7 +1844,7 @@
- [nollium/CVE-2024-9264](https://github.com/nollium/CVE-2024-9264) - [nollium/CVE-2024-9264](https://github.com/nollium/CVE-2024-9264)
- [z3k0sec/File-Read-CVE-2024-9264](https://github.com/z3k0sec/File-Read-CVE-2024-9264) - [z3k0sec/File-Read-CVE-2024-9264](https://github.com/z3k0sec/File-Read-CVE-2024-9264)
- [z3k0sec/CVE-2024-9264-RCE-Exploit](https://github.com/z3k0sec/CVE-2024-9264-RCE-Exploit) - [z3k0sec/CVE-2024-9264-RCE-Exploit](https://github.com/z3k0sec/CVE-2024-9264-RCE-Exploit)
- [PunitTailor55/Grafana-CVE-2024-9264](https://github.com/PunitTailor55/Grafana-CVE-2024-9264) - [punitdarji/Grafana-CVE-2024-9264](https://github.com/punitdarji/Grafana-CVE-2024-9264)
### CVE-2024-9326 (2024-09-29) ### CVE-2024-9326 (2024-09-29)
@ -2151,6 +2151,8 @@
- [Trackflaw/CVE-2024-10924-Wordpress-Docker](https://github.com/Trackflaw/CVE-2024-10924-Wordpress-Docker) - [Trackflaw/CVE-2024-10924-Wordpress-Docker](https://github.com/Trackflaw/CVE-2024-10924-Wordpress-Docker)
- [Maalfer/CVE-2024-10924-PoC](https://github.com/Maalfer/CVE-2024-10924-PoC) - [Maalfer/CVE-2024-10924-PoC](https://github.com/Maalfer/CVE-2024-10924-PoC)
- [D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB](https://github.com/D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB) - [D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB](https://github.com/D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB)
- [Hunt3r850/CVE-2024-10924-PoC](https://github.com/Hunt3r850/CVE-2024-10924-PoC)
- [Hunt3r850/CVE-2024-10924-Wordpress-Docker](https://github.com/Hunt3r850/CVE-2024-10924-Wordpress-Docker)
### CVE-2024-10958 (2024-11-10) ### CVE-2024-10958 (2024-11-10)
@ -4168,7 +4170,11 @@
- [ally-petitt/CVE-2024-29399](https://github.com/ally-petitt/CVE-2024-29399) - [ally-petitt/CVE-2024-29399](https://github.com/ally-petitt/CVE-2024-29399)
### CVE-2024-29404 ### CVE-2024-29404 (2024-12-03)
<code>An issue in Razer Synapse 3 v.3.9.131.20813 and Synapse 3 App v.20240213 allows a local attacker to execute arbitrary code via the export parameter of the Chroma Effects function in the Profiles component.
</code>
- [mansk1es/CVE-2024-29404_Razer](https://github.com/mansk1es/CVE-2024-29404_Razer) - [mansk1es/CVE-2024-29404_Razer](https://github.com/mansk1es/CVE-2024-29404_Razer)
### CVE-2024-29415 (-) ### CVE-2024-29415 (-)
@ -5167,7 +5173,7 @@
- [yisas93/CVE-2024-36401-PoC](https://github.com/yisas93/CVE-2024-36401-PoC) - [yisas93/CVE-2024-36401-PoC](https://github.com/yisas93/CVE-2024-36401-PoC)
- [justin-p/geoexplorer](https://github.com/justin-p/geoexplorer) - [justin-p/geoexplorer](https://github.com/justin-p/geoexplorer)
- [daniellowrie/CVE-2024-36401-PoC](https://github.com/daniellowrie/CVE-2024-36401-PoC) - [daniellowrie/CVE-2024-36401-PoC](https://github.com/daniellowrie/CVE-2024-36401-PoC)
- [PunitTailor55/GeoServer-CVE-2024-36401](https://github.com/PunitTailor55/GeoServer-CVE-2024-36401) - [punitdarji/GeoServer-CVE-2024-36401](https://github.com/punitdarji/GeoServer-CVE-2024-36401)
- [netuseradministrator/CVE-2024-36401](https://github.com/netuseradministrator/CVE-2024-36401) - [netuseradministrator/CVE-2024-36401](https://github.com/netuseradministrator/CVE-2024-36401)
- [kkhackz0013/CVE-2024-36401](https://github.com/kkhackz0013/CVE-2024-36401) - [kkhackz0013/CVE-2024-36401](https://github.com/kkhackz0013/CVE-2024-36401)
- [thestar0/CVE-2024-36401-WoodpeckerPlugin](https://github.com/thestar0/CVE-2024-36401-WoodpeckerPlugin) - [thestar0/CVE-2024-36401-WoodpeckerPlugin](https://github.com/thestar0/CVE-2024-36401-WoodpeckerPlugin)
@ -6021,6 +6027,7 @@
</code> </code>
- [aramosf/cve-2024-42327](https://github.com/aramosf/cve-2024-42327) - [aramosf/cve-2024-42327](https://github.com/aramosf/cve-2024-42327)
- [compr00t/CVE-2024-42327](https://github.com/compr00t/CVE-2024-42327)
### CVE-2024-42346 (2024-09-20) ### CVE-2024-42346 (2024-09-20)
@ -14061,6 +14068,7 @@
- [sigridou/CVE-2023-44487-](https://github.com/sigridou/CVE-2023-44487-) - [sigridou/CVE-2023-44487-](https://github.com/sigridou/CVE-2023-44487-)
- [TYuan0816/cve-2023-44487](https://github.com/TYuan0816/cve-2023-44487) - [TYuan0816/cve-2023-44487](https://github.com/TYuan0816/cve-2023-44487)
- [sn130hk/CVE-2023-44487](https://github.com/sn130hk/CVE-2023-44487) - [sn130hk/CVE-2023-44487](https://github.com/sn130hk/CVE-2023-44487)
- [threatlabindonesia/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC](https://github.com/threatlabindonesia/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC)
### CVE-2023-44758 (2023-10-06) ### CVE-2023-44758 (2023-10-06)
@ -25426,6 +25434,7 @@
- [viardant/CVE-2021-29447](https://github.com/viardant/CVE-2021-29447) - [viardant/CVE-2021-29447](https://github.com/viardant/CVE-2021-29447)
- [0xRar/CVE-2021-29447-PoC](https://github.com/0xRar/CVE-2021-29447-PoC) - [0xRar/CVE-2021-29447-PoC](https://github.com/0xRar/CVE-2021-29447-PoC)
- [andyhsu024/CVE-2021-29447](https://github.com/andyhsu024/CVE-2021-29447) - [andyhsu024/CVE-2021-29447](https://github.com/andyhsu024/CVE-2021-29447)
- [specializzazione-cyber-security/demo-CVE-2021-29447-lezione](https://github.com/specializzazione-cyber-security/demo-CVE-2021-29447-lezione)
### CVE-2021-29505 (2021-05-28) ### CVE-2021-29505 (2021-05-28)
@ -28836,7 +28845,6 @@
- [jxpsx/CVE-2021-45232-RCE](https://github.com/jxpsx/CVE-2021-45232-RCE) - [jxpsx/CVE-2021-45232-RCE](https://github.com/jxpsx/CVE-2021-45232-RCE)
- [wuppp/cve-2021-45232-exp](https://github.com/wuppp/cve-2021-45232-exp) - [wuppp/cve-2021-45232-exp](https://github.com/wuppp/cve-2021-45232-exp)
- [dskho/CVE-2021-45232](https://github.com/dskho/CVE-2021-45232) - [dskho/CVE-2021-45232](https://github.com/dskho/CVE-2021-45232)
- [GYLQ/CVE-2021-45232-RCE](https://github.com/GYLQ/CVE-2021-45232-RCE)
- [fany0r/CVE-2021-45232-RCE](https://github.com/fany0r/CVE-2021-45232-RCE) - [fany0r/CVE-2021-45232-RCE](https://github.com/fany0r/CVE-2021-45232-RCE)
- [YutuSec/Apisix_Crack](https://github.com/YutuSec/Apisix_Crack) - [YutuSec/Apisix_Crack](https://github.com/YutuSec/Apisix_Crack)