Auto Update 2024/12/19 12:33:24

This commit is contained in:
motikan2010-bot 2024-12-19 21:33:24 +09:00
parent 14a2cccec0
commit 330e877853
39 changed files with 243 additions and 140 deletions

View file

@ -231,10 +231,10 @@
"description": "Heartbleed (CVE-2014-0160) client exploit", "description": "Heartbleed (CVE-2014-0160) client exploit",
"fork": false, "fork": false,
"created_at": "2014-04-08T16:41:51Z", "created_at": "2014-04-08T16:41:51Z",
"updated_at": "2024-09-20T14:27:26Z", "updated_at": "2024-12-19T10:54:22Z",
"pushed_at": "2016-01-22T00:42:35Z", "pushed_at": "2016-01-22T00:42:35Z",
"stargazers_count": 319, "stargazers_count": 320,
"watchers_count": 319, "watchers_count": 320,
"has_discussions": false, "has_discussions": false,
"forks_count": 80, "forks_count": 80,
"allow_forking": true, "allow_forking": true,
@ -243,7 +243,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 80, "forks": 80,
"watchers": 319, "watchers": 320,
"score": 0, "score": 0,
"subscribers_count": 32 "subscribers_count": 32
}, },

View file

@ -355,10 +355,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false, "fork": false,
"created_at": "2022-11-13T11:01:41Z", "created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-12-12T04:06:53Z", "updated_at": "2024-12-19T07:25:22Z",
"pushed_at": "2022-11-15T09:05:50Z", "pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 207, "stargazers_count": 208,
"watchers_count": 207, "watchers_count": 208,
"has_discussions": false, "has_discussions": false,
"forks_count": 18, "forks_count": 18,
"allow_forking": true, "allow_forking": true,
@ -367,7 +367,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 18, "forks": 18,
"watchers": 207, "watchers": 208,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -14,10 +14,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2017-12-29T07:11:42Z", "created_at": "2017-12-29T07:11:42Z",
"updated_at": "2023-02-19T09:32:09Z", "updated_at": "2024-12-19T08:01:10Z",
"pushed_at": "2017-12-29T08:01:10Z", "pushed_at": "2017-12-29T08:01:10Z",
"stargazers_count": 14, "stargazers_count": 15,
"watchers_count": 14, "watchers_count": 15,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 14, "watchers": 15,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
}, },
@ -118,10 +118,10 @@
"description": "CVE-2017-13156-Janus复现", "description": "CVE-2017-13156-Janus复现",
"fork": false, "fork": false,
"created_at": "2020-09-03T09:28:31Z", "created_at": "2020-09-03T09:28:31Z",
"updated_at": "2023-11-01T06:47:19Z", "updated_at": "2024-12-19T08:02:52Z",
"pushed_at": "2020-09-07T07:06:50Z", "pushed_at": "2020-09-07T07:06:50Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -130,7 +130,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 9, "watchers": 10,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -14,10 +14,10 @@
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC", "description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
"fork": false, "fork": false,
"created_at": "2017-04-10T03:44:04Z", "created_at": "2017-04-10T03:44:04Z",
"updated_at": "2024-12-06T23:48:20Z", "updated_at": "2024-12-19T06:45:12Z",
"pushed_at": "2017-04-12T09:17:27Z", "pushed_at": "2017-04-12T09:17:27Z",
"stargazers_count": 207, "stargazers_count": 208,
"watchers_count": 207, "watchers_count": 208,
"has_discussions": false, "has_discussions": false,
"forks_count": 80, "forks_count": 80,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 80, "forks": 80,
"watchers": 207, "watchers": 208,
"score": 0, "score": 0,
"subscribers_count": 14 "subscribers_count": 14
}, },

View file

@ -46,7 +46,7 @@
"fork": false, "fork": false,
"created_at": "2024-01-04T21:44:21Z", "created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-12-06T19:44:48Z", "updated_at": "2024-12-06T19:44:48Z",
"pushed_at": "2024-12-06T19:44:46Z", "pushed_at": "2024-12-19T09:49:38Z",
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,

View file

@ -1047,5 +1047,36 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 905648216,
"name": "CVE-2019-15107",
"full_name": "MasterCode112\/CVE-2019-15107",
"owner": {
"login": "MasterCode112",
"id": 105772414,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105772414?v=4",
"html_url": "https:\/\/github.com\/MasterCode112",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MasterCode112\/CVE-2019-15107",
"description": "webmin or minisever RCE",
"fork": false,
"created_at": "2024-12-19T08:52:03Z",
"updated_at": "2024-12-19T08:54:10Z",
"pushed_at": "2024-12-19T08:54:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -888,10 +888,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false, "fork": false,
"created_at": "2022-11-13T11:01:41Z", "created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-12-12T04:06:53Z", "updated_at": "2024-12-19T07:25:22Z",
"pushed_at": "2022-11-15T09:05:50Z", "pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 207, "stargazers_count": 208,
"watchers_count": 207, "watchers_count": 208,
"has_discussions": false, "has_discussions": false,
"forks_count": 18, "forks_count": 18,
"allow_forking": true, "allow_forking": true,
@ -900,7 +900,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 18, "forks": 18,
"watchers": 207, "watchers": 208,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接", "description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false, "fork": false,
"created_at": "2022-10-04T03:39:27Z", "created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-19T03:07:49Z", "updated_at": "2024-12-19T07:38:05Z",
"pushed_at": "2024-04-25T06:09:38Z", "pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1343, "stargazers_count": 1344,
"watchers_count": 1343, "watchers_count": 1344,
"has_discussions": false, "has_discussions": false,
"forks_count": 166, "forks_count": 166,
"allow_forking": true, "allow_forking": true,
@ -867,7 +867,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 166, "forks": 166,
"watchers": 1343, "watchers": 1344,
"score": 0, "score": 0,
"subscribers_count": 15 "subscribers_count": 15
} }

View file

@ -14,10 +14,10 @@
"description": "Scanner for vScalation (CVE-2021-22015) a Local Privilege Escalation in VMWare vCenter", "description": "Scanner for vScalation (CVE-2021-22015) a Local Privilege Escalation in VMWare vCenter",
"fork": false, "fork": false,
"created_at": "2021-09-30T07:16:27Z", "created_at": "2021-09-30T07:16:27Z",
"updated_at": "2024-02-24T11:42:35Z", "updated_at": "2024-12-19T06:46:49Z",
"pushed_at": "2023-05-09T12:43:17Z", "pushed_at": "2023-05-09T12:43:17Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 5, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -231,10 +231,10 @@
"description": "CVE-2021-40444 PoC", "description": "CVE-2021-40444 PoC",
"fork": false, "fork": false,
"created_at": "2021-09-10T16:55:53Z", "created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-12-16T03:38:50Z", "updated_at": "2024-12-19T09:48:48Z",
"pushed_at": "2021-12-25T18:31:02Z", "pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1604, "stargazers_count": 1605,
"watchers_count": 1604, "watchers_count": 1605,
"has_discussions": false, "has_discussions": false,
"forks_count": 482, "forks_count": 482,
"allow_forking": true, "allow_forking": true,
@ -243,7 +243,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 482, "forks": 482,
"watchers": 1604, "watchers": 1605,
"score": 0, "score": 0,
"subscribers_count": 28 "subscribers_count": 28
}, },

View file

@ -1307,10 +1307,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false, "fork": false,
"created_at": "2021-12-11T07:19:11Z", "created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-12-19T04:27:55Z", "updated_at": "2024-12-19T06:51:26Z",
"pushed_at": "2023-06-13T09:17:54Z", "pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 804, "stargazers_count": 805,
"watchers_count": 804, "watchers_count": 805,
"has_discussions": false, "has_discussions": false,
"forks_count": 111, "forks_count": 111,
"allow_forking": true, "allow_forking": true,
@ -1324,7 +1324,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 111, "forks": 111,
"watchers": 804, "watchers": 805,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },

View file

@ -175,8 +175,8 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-10-11T16:57:20Z", "created_at": "2024-10-11T16:57:20Z",
"updated_at": "2024-12-06T18:31:25Z", "updated_at": "2024-12-19T10:12:45Z",
"pushed_at": "2024-12-06T18:31:21Z", "pushed_at": "2024-12-19T10:12:40Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -634,10 +634,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2022-03-07T15:12:45Z", "created_at": "2022-03-07T15:12:45Z",
"updated_at": "2022-11-30T04:44:51Z", "updated_at": "2024-12-19T09:46:33Z",
"pushed_at": "2022-03-07T15:28:16Z", "pushed_at": "2022-03-07T15:28:16Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -646,7 +646,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 5, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接", "description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false, "fork": false,
"created_at": "2022-10-04T03:39:27Z", "created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-19T03:07:49Z", "updated_at": "2024-12-19T07:38:05Z",
"pushed_at": "2024-04-25T06:09:38Z", "pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1343, "stargazers_count": 1344,
"watchers_count": 1343, "watchers_count": 1344,
"has_discussions": false, "has_discussions": false,
"forks_count": 166, "forks_count": 166,
"allow_forking": true, "allow_forking": true,
@ -811,7 +811,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 166, "forks": 166,
"watchers": 1343, "watchers": 1344,
"score": 0, "score": 0,
"subscribers_count": 15 "subscribers_count": 15
} }

View file

@ -426,10 +426,10 @@
"description": "This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-20273", "description": "This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-20273",
"fork": false, "fork": false,
"created_at": "2023-10-23T19:25:29Z", "created_at": "2023-10-23T19:25:29Z",
"updated_at": "2024-11-06T11:11:23Z", "updated_at": "2024-12-19T11:35:17Z",
"pushed_at": "2023-10-24T18:17:43Z", "pushed_at": "2023-10-24T18:17:43Z",
"stargazers_count": 30, "stargazers_count": 31,
"watchers_count": 30, "watchers_count": 31,
"has_discussions": true, "has_discussions": true,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -438,7 +438,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 30, "watchers": 31,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false, "fork": false,
"created_at": "2024-10-05T20:32:45Z", "created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-18T11:54:19Z", "updated_at": "2024-12-19T12:17:40Z",
"pushed_at": "2024-10-05T20:37:02Z", "pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 40, "stargazers_count": 43,
"watchers_count": 40, "watchers_count": 43,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -37,7 +37,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 40, "watchers": 43,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": "WonderCMS Authenticated RCE - CVE-2023-41425", "description": "WonderCMS Authenticated RCE - CVE-2023-41425",
"fork": false, "fork": false,
"created_at": "2023-11-05T15:06:43Z", "created_at": "2023-11-05T15:06:43Z",
"updated_at": "2024-11-28T18:38:05Z", "updated_at": "2024-12-19T10:18:36Z",
"pushed_at": "2023-11-06T18:56:53Z", "pushed_at": "2023-11-06T18:56:53Z",
"stargazers_count": 23, "stargazers_count": 24,
"watchers_count": 23, "watchers_count": 24,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 23, "watchers": 24,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,10 +14,10 @@
"description": "[漏洞复现] 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.", "description": "[漏洞复现] 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
"fork": false, "fork": false,
"created_at": "2023-11-17T10:32:31Z", "created_at": "2023-11-17T10:32:31Z",
"updated_at": "2024-12-06T10:52:35Z", "updated_at": "2024-12-19T09:49:49Z",
"pushed_at": "2023-11-21T10:45:58Z", "pushed_at": "2023-11-21T10:45:58Z",
"stargazers_count": 203, "stargazers_count": 204,
"watchers_count": 203, "watchers_count": 204,
"has_discussions": false, "has_discussions": false,
"forks_count": 34, "forks_count": 34,
"allow_forking": true, "allow_forking": true,
@ -28,7 +28,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 34, "forks": 34,
"watchers": 203, "watchers": 204,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -267,7 +267,7 @@
"stargazers_count": 5, "stargazers_count": 5,
"watchers_count": 5, "watchers_count": 5,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -277,7 +277,7 @@
"mobile-security" "mobile-security"
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 5, "watchers": 5,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false, "fork": false,
"created_at": "2024-03-20T21:16:41Z", "created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-12-17T20:19:30Z", "updated_at": "2024-12-19T09:58:05Z",
"pushed_at": "2024-04-17T16:09:54Z", "pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2301, "stargazers_count": 2302,
"watchers_count": 2301, "watchers_count": 2302,
"has_discussions": false, "has_discussions": false,
"forks_count": 299, "forks_count": 299,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 299, "forks": 299,
"watchers": 2301, "watchers": 2302,
"score": 0, "score": 0,
"subscribers_count": 26 "subscribers_count": 26
}, },

View file

@ -615,13 +615,13 @@
"stargazers_count": 19, "stargazers_count": 19,
"watchers_count": 19, "watchers_count": 19,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 4,
"watchers": 19, "watchers": 19,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -532,13 +532,13 @@
"stargazers_count": 11, "stargazers_count": 11,
"watchers_count": 11, "watchers_count": 11,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 9,
"watchers": 11, "watchers": 11,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -19,13 +19,13 @@
"stargazers_count": 239, "stargazers_count": 239,
"watchers_count": 239, "watchers_count": 239,
"has_discussions": false, "has_discussions": false,
"forks_count": 51, "forks_count": 53,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 51, "forks": 53,
"watchers": 239, "watchers": 239,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6

View file

@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false, "fork": false,
"created_at": "2024-10-05T20:32:45Z", "created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-18T11:54:19Z", "updated_at": "2024-12-19T12:17:40Z",
"pushed_at": "2024-10-05T20:37:02Z", "pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 40, "stargazers_count": 43,
"watchers_count": 40, "watchers_count": 43,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -68,7 +68,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 40, "watchers": 43,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-14T09:22:33Z", "created_at": "2024-12-14T09:22:33Z",
"updated_at": "2024-12-18T08:29:08Z", "updated_at": "2024-12-19T11:17:58Z",
"pushed_at": "2024-12-14T10:13:45Z", "pushed_at": "2024-12-14T10:13:45Z",
"stargazers_count": 27, "stargazers_count": 28,
"watchers_count": 27, "watchers_count": 28,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 27, "watchers": 28,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -278,7 +278,7 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-09-04T14:43:33Z", "created_at": "2024-09-04T14:43:33Z",
"updated_at": "2024-12-10T12:07:46Z", "updated_at": "2024-12-19T08:12:18Z",
"pushed_at": "2024-09-04T15:17:57Z", "pushed_at": "2024-09-04T15:17:57Z",
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,

View file

@ -14,8 +14,8 @@
"description": "How to \"recover\" a CloudPanel server affected by the CVE-2024-44765 vulnerability", "description": "How to \"recover\" a CloudPanel server affected by the CVE-2024-44765 vulnerability",
"fork": false, "fork": false,
"created_at": "2024-12-17T13:29:38Z", "created_at": "2024-12-17T13:29:38Z",
"updated_at": "2024-12-18T07:17:58Z", "updated_at": "2024-12-19T06:50:10Z",
"pushed_at": "2024-12-18T07:17:55Z", "pushed_at": "2024-12-19T06:50:07Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Proof of concept (POC) for CVE-2024-45337 ", "description": "Proof of concept (POC) for CVE-2024-45337 ",
"fork": false, "fork": false,
"created_at": "2024-12-17T22:07:53Z", "created_at": "2024-12-17T22:07:53Z",
"updated_at": "2024-12-19T03:53:11Z", "updated_at": "2024-12-19T08:35:28Z",
"pushed_at": "2024-12-17T22:27:03Z", "pushed_at": "2024-12-17T22:27:03Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -36,7 +36,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 3, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -138,10 +138,10 @@
"description": "Testing POC for use cases", "description": "Testing POC for use cases",
"fork": false, "fork": false,
"created_at": "2024-11-24T07:33:06Z", "created_at": "2024-11-24T07:33:06Z",
"updated_at": "2024-12-03T10:12:28Z", "updated_at": "2024-12-19T12:14:05Z",
"pushed_at": "2024-11-24T07:56:49Z", "pushed_at": "2024-11-24T07:56:49Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -150,7 +150,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 9, "watchers": 10,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,19 +14,19 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false, "fork": false,
"created_at": "2024-11-19T08:57:18Z", "created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-19T03:04:12Z", "updated_at": "2024-12-19T08:08:51Z",
"pushed_at": "2024-11-19T09:15:26Z", "pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 93, "stargazers_count": 94,
"watchers_count": 93, "watchers_count": 94,
"has_discussions": false, "has_discussions": false,
"forks_count": 20, "forks_count": 21,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 21,
"watchers": 93, "watchers": 94,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,19 +14,19 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-18T19:53:46Z", "created_at": "2024-12-18T19:53:46Z",
"updated_at": "2024-12-19T06:00:44Z", "updated_at": "2024-12-19T12:04:43Z",
"pushed_at": "2024-12-19T06:00:40Z", "pushed_at": "2024-12-19T06:00:40Z",
"stargazers_count": 3, "stargazers_count": 11,
"watchers_count": 3, "watchers_count": 11,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 3,
"watchers": 3, "watchers": 11,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": "TP-Link Archer AXE75 Authenticated Command Injection", "description": "TP-Link Archer AXE75 Authenticated Command Injection",
"fork": false, "fork": false,
"created_at": "2024-10-04T12:49:19Z", "created_at": "2024-10-04T12:49:19Z",
"updated_at": "2024-12-05T06:35:12Z", "updated_at": "2024-12-19T09:34:37Z",
"pushed_at": "2024-11-23T00:33:39Z", "pushed_at": "2024-12-19T09:34:33Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 3, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,8 +14,8 @@
"description": "CyberPanel authenticated RCE < 2.3.8", "description": "CyberPanel authenticated RCE < 2.3.8",
"fork": false, "fork": false,
"created_at": "2024-12-15T22:40:52Z", "created_at": "2024-12-15T22:40:52Z",
"updated_at": "2024-12-18T08:12:19Z", "updated_at": "2024-12-19T09:37:02Z",
"pushed_at": "2024-12-15T23:04:43Z", "pushed_at": "2024-12-19T09:36:58Z",
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,

View file

@ -45,7 +45,7 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false, "fork": false,
"created_at": "2024-12-13T17:42:55Z", "created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-19T03:41:08Z", "updated_at": "2024-12-19T08:53:55Z",
"pushed_at": "2024-12-19T03:23:02Z", "pushed_at": "2024-12-19T03:23:02Z",
"stargazers_count": 59, "stargazers_count": 59,
"watchers_count": 59, "watchers_count": 59,
@ -76,10 +76,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-17T02:22:38Z", "created_at": "2024-12-17T02:22:38Z",
"updated_at": "2024-12-17T15:20:06Z", "updated_at": "2024-12-19T11:52:08Z",
"pushed_at": "2024-12-17T08:52:36Z", "pushed_at": "2024-12-17T08:52:36Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 1, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE", "description": "CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE",
"fork": false, "fork": false,
"created_at": "2024-12-13T06:21:36Z", "created_at": "2024-12-13T06:21:36Z",
"updated_at": "2024-12-18T02:20:59Z", "updated_at": "2024-12-19T09:42:49Z",
"pushed_at": "2024-12-13T07:28:34Z", "pushed_at": "2024-12-13T07:28:34Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 3, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -76,10 +76,10 @@
"description": "MIRROR of the original 32-bit PoC for CVE-2024-6387 \"regreSSHion\" by 7etsuo\/cve-2024-6387-poc", "description": "MIRROR of the original 32-bit PoC for CVE-2024-6387 \"regreSSHion\" by 7etsuo\/cve-2024-6387-poc",
"fork": false, "fork": false,
"created_at": "2024-07-01T12:26:40Z", "created_at": "2024-07-01T12:26:40Z",
"updated_at": "2024-12-02T15:22:52Z", "updated_at": "2024-12-19T06:57:29Z",
"pushed_at": "2024-07-25T04:23:11Z", "pushed_at": "2024-07-25T04:23:11Z",
"stargazers_count": 109, "stargazers_count": 110,
"watchers_count": 109, "watchers_count": 110,
"has_discussions": false, "has_discussions": false,
"forks_count": 42, "forks_count": 42,
"allow_forking": true, "allow_forking": true,
@ -95,7 +95,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 42, "forks": 42,
"watchers": 109, "watchers": 110,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },
@ -1355,10 +1355,10 @@
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ", "description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ",
"fork": false, "fork": false,
"created_at": "2024-07-02T18:32:46Z", "created_at": "2024-07-02T18:32:46Z",
"updated_at": "2024-12-18T15:57:27Z", "updated_at": "2024-12-19T06:44:14Z",
"pushed_at": "2024-07-05T15:19:28Z", "pushed_at": "2024-07-05T15:19:28Z",
"stargazers_count": 69, "stargazers_count": 70,
"watchers_count": 69, "watchers_count": 70,
"has_discussions": false, "has_discussions": false,
"forks_count": 28, "forks_count": 28,
"allow_forking": true, "allow_forking": true,
@ -1376,7 +1376,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 28, "forks": 28,
"watchers": 69, "watchers": 70,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },
@ -2869,8 +2869,8 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-19T03:08:19Z", "created_at": "2024-12-19T03:08:19Z",
"updated_at": "2024-12-19T06:22:28Z", "updated_at": "2024-12-19T06:49:55Z",
"pushed_at": "2024-12-19T06:22:25Z", "pushed_at": "2024-12-19T06:49:52Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
@ -2884,5 +2884,36 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
},
{
"id": 905684125,
"name": "test_for6387",
"full_name": "awusan125\/test_for6387",
"owner": {
"login": "awusan125",
"id": 74240688,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74240688?v=4",
"html_url": "https:\/\/github.com\/awusan125",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/awusan125\/test_for6387",
"description": "test code for cve-2024-6387",
"fork": false,
"created_at": "2024-12-19T10:16:45Z",
"updated_at": "2024-12-19T11:21:31Z",
"pushed_at": "2024-12-19T11:21:28Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -14,10 +14,10 @@
"description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.", "description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.",
"fork": false, "fork": false,
"created_at": "2024-09-29T10:58:15Z", "created_at": "2024-09-29T10:58:15Z",
"updated_at": "2024-12-14T21:15:50Z", "updated_at": "2024-12-19T09:47:20Z",
"pushed_at": "2024-10-04T09:39:09Z", "pushed_at": "2024-10-04T09:39:09Z",
"stargazers_count": 129, "stargazers_count": 130,
"watchers_count": 129, "watchers_count": 130,
"has_discussions": false, "has_discussions": false,
"forks_count": 20, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 20,
"watchers": 129, "watchers": 130,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -29,5 +29,43 @@
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 905650504,
"name": "CVE-2024-9935",
"full_name": "verylazytech\/CVE-2024-9935",
"owner": {
"login": "verylazytech",
"id": 172168670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
"html_url": "https:\/\/github.com\/verylazytech",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-9935",
"description": "PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary File Download",
"fork": false,
"created_at": "2024-12-19T08:57:30Z",
"updated_at": "2024-12-19T09:56:40Z",
"pushed_at": "2024-12-19T09:43:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-9935",
"elementor-page-builder",
"lfi",
"lfi-exploitation",
"unauthenticated-arbitrary-file-download",
"wordpress-plugin"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -1433,6 +1433,7 @@
- [identity-threat-labs/Article-RegreSSHion-CVE-2024-6387](https://github.com/identity-threat-labs/Article-RegreSSHion-CVE-2024-6387) - [identity-threat-labs/Article-RegreSSHion-CVE-2024-6387](https://github.com/identity-threat-labs/Article-RegreSSHion-CVE-2024-6387)
- [YassDEV221608/CVE-2024-6387](https://github.com/YassDEV221608/CVE-2024-6387) - [YassDEV221608/CVE-2024-6387](https://github.com/YassDEV221608/CVE-2024-6387)
- [zql-gif/CVE-2024-6387](https://github.com/zql-gif/CVE-2024-6387) - [zql-gif/CVE-2024-6387](https://github.com/zql-gif/CVE-2024-6387)
- [awusan125/test_for6387](https://github.com/awusan125/test_for6387)
### CVE-2024-6473 (2024-09-03) ### CVE-2024-6473 (2024-09-03)
@ -1987,6 +1988,7 @@
</code> </code>
- [RandomRobbieBF/CVE-2024-9935](https://github.com/RandomRobbieBF/CVE-2024-9935) - [RandomRobbieBF/CVE-2024-9935](https://github.com/RandomRobbieBF/CVE-2024-9935)
- [verylazytech/CVE-2024-9935](https://github.com/verylazytech/CVE-2024-9935)
### CVE-2024-9955 (2024-10-15) ### CVE-2024-9955 (2024-10-15)
@ -37833,6 +37835,7 @@
- [0x4r2/Webmin-CVE-2019-15107](https://github.com/0x4r2/Webmin-CVE-2019-15107) - [0x4r2/Webmin-CVE-2019-15107](https://github.com/0x4r2/Webmin-CVE-2019-15107)
- [NasrallahBaadi/CVE-2019-15107](https://github.com/NasrallahBaadi/CVE-2019-15107) - [NasrallahBaadi/CVE-2019-15107](https://github.com/NasrallahBaadi/CVE-2019-15107)
- [grayorwhite/CVE-2019-15107](https://github.com/grayorwhite/CVE-2019-15107) - [grayorwhite/CVE-2019-15107](https://github.com/grayorwhite/CVE-2019-15107)
- [MasterCode112/CVE-2019-15107](https://github.com/MasterCode112/CVE-2019-15107)
### CVE-2019-15120 (2019-08-16) ### CVE-2019-15120 (2019-08-16)