Auto Update 2024/03/23 12:27:00

This commit is contained in:
motikan2010-bot 2024-03-23 21:27:00 +09:00
parent 0155c55a1e
commit 35c9fb4010
28 changed files with 151 additions and 352 deletions

View file

@ -73,10 +73,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-03-18T16:52:46Z",
"updated_at": "2024-03-23T09:21:24Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 131,
"watchers_count": 131,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 130,
"watchers": 131,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2024-03-22T01:51:57Z",
"updated_at": "2024-03-23T10:28:11Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1779,
"watchers_count": 1779,
"stargazers_count": 1780,
"watchers_count": 1780,
"has_discussions": false,
"forks_count": 259,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 259,
"watchers": 1779,
"watchers": 1780,
"score": 0,
"subscribers_count": 37
},

View file

@ -13,10 +13,10 @@
"description": "POC scanner for the Grafana vulnerability CVE-2019-15043",
"fork": false,
"created_at": "2020-08-01T21:31:46Z",
"updated_at": "2023-02-08T07:03:20Z",
"updated_at": "2024-03-23T10:55:23Z",
"pushed_at": "2022-12-08T11:19:45Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -108,13 +108,13 @@
"stargazers_count": 1127,
"watchers_count": 1127,
"has_discussions": false,
"forks_count": 283,
"forks_count": 284,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 283,
"forks": 284,
"watchers": 1127,
"score": 0,
"subscribers_count": 35

View file

@ -198,13 +198,13 @@
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 19,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"forks": 18,
"watchers": 48,
"score": 0,
"subscribers_count": 3

View file

@ -43,19 +43,19 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2024-03-20T10:22:40Z",
"updated_at": "2024-03-23T08:56:09Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 225,
"watchers_count": 225,
"stargazers_count": 227,
"watchers_count": 227,
"has_discussions": false,
"forks_count": 73,
"forks_count": 72,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 73,
"watchers": 225,
"forks": 72,
"watchers": 227,
"score": 0,
"subscribers_count": 5
},
@ -133,12 +133,12 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2024-03-06T17:18:36Z",
"updated_at": "2024-03-23T08:06:00Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 118,
"watchers_count": 118,
"stargazers_count": 119,
"watchers_count": 119,
"has_discussions": false,
"forks_count": 22,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -147,8 +147,8 @@
"exploit"
],
"visibility": "public",
"forks": 22,
"watchers": 118,
"forks": 23,
"watchers": 119,
"score": 0,
"subscribers_count": 2
},

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-03-22T10:34:44Z",
"updated_at": "2024-03-23T09:33:21Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1727,
"watchers_count": 1727,
"stargazers_count": 1728,
"watchers_count": 1728,
"has_discussions": false,
"forks_count": 516,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 516,
"watchers": 1727,
"watchers": 1728,
"score": 0,
"subscribers_count": 28
},
@ -12533,13 +12533,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -1185,10 +1185,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2024-03-21T08:10:31Z",
"updated_at": "2024-03-23T07:58:01Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 495,
"watchers_count": 495,
"stargazers_count": 496,
"watchers_count": 496,
"has_discussions": false,
"forks_count": 134,
"allow_forking": true,
@ -1197,7 +1197,7 @@
"topics": [],
"visibility": "public",
"forks": 134,
"watchers": 495,
"watchers": 496,
"score": 0,
"subscribers_count": 15
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-02-28T02:08:59Z",
"updated_at": "2024-03-07T19:41:19Z",
"updated_at": "2024-03-23T10:03:02Z",
"pushed_at": "2023-03-09T16:25:57Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -380,10 +380,10 @@
"description": "Exploit and Check Script for CVE 2022-1388",
"fork": false,
"created_at": "2022-05-09T11:30:09Z",
"updated_at": "2024-02-16T05:41:36Z",
"updated_at": "2024-03-23T09:30:02Z",
"pushed_at": "2022-05-26T23:51:01Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -392,7 +392,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 58,
"watchers": 57,
"score": 0,
"subscribers_count": 3
},
@ -410,19 +410,19 @@
"description": "POC for CVE-2022-1388",
"fork": false,
"created_at": "2022-05-09T11:46:45Z",
"updated_at": "2024-03-09T16:24:09Z",
"updated_at": "2024-03-23T11:48:53Z",
"pushed_at": "2022-05-09T20:52:07Z",
"stargazers_count": 233,
"watchers_count": 233,
"stargazers_count": 234,
"watchers_count": 234,
"has_discussions": false,
"forks_count": 42,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 233,
"forks": 41,
"watchers": 234,
"score": 0,
"subscribers_count": 6
},
@ -1036,10 +1036,10 @@
"description": "CVE-2022-1388 Scanner",
"fork": false,
"created_at": "2022-05-11T19:33:37Z",
"updated_at": "2023-01-26T20:22:15Z",
"updated_at": "2024-03-23T10:55:01Z",
"pushed_at": "2023-01-22T02:08:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1048,7 +1048,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -1916,19 +1916,19 @@
"description": "PoC for CVE-2022-1388 affecting F5 BIG-IP.",
"fork": false,
"created_at": "2024-01-09T19:52:36Z",
"updated_at": "2024-01-09T20:13:12Z",
"updated_at": "2024-03-23T10:44:09Z",
"pushed_at": "2024-01-12T22:42:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-03-20T15:37:22Z",
"updated_at": "2024-03-23T07:51:01Z",
"pushed_at": "2024-02-23T14:48:26Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": true,
"forks_count": 23,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 181,
"watchers": 182,
"score": 0,
"subscribers_count": 7
}

View file

@ -138,7 +138,7 @@
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -156,7 +156,7 @@
"ssrf"
],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 88,
"score": 0,
"subscribers_count": 2

View file

@ -142,10 +142,10 @@
"description": "CVE-2023-22515 - Broken Access Control Vulnerability in Confluence Data Center and Server",
"fork": false,
"created_at": "2023-10-11T11:21:47Z",
"updated_at": "2024-02-07T08:37:21Z",
"updated_at": "2024-03-23T07:01:04Z",
"pushed_at": "2023-10-13T15:31:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -166,7 +166,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2024-03-18T11:13:00Z",
"updated_at": "2024-03-23T11:15:48Z",
"pushed_at": "2023-08-17T19:26:55Z",
"stargazers_count": 618,
"watchers_count": 618,
"stargazers_count": 619,
"watchers_count": 619,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 618,
"watchers": 619,
"score": 0,
"subscribers_count": 10
},

40
2023/CVE-2023-33580.json Normal file
View file

@ -0,0 +1,40 @@
[
{
"id": 649283835,
"name": "My-CVE",
"full_name": "sudovivek\/My-CVE",
"owner": {
"login": "sudovivek",
"id": 132650634,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132650634?v=4",
"html_url": "https:\/\/github.com\/sudovivek"
},
"html_url": "https:\/\/github.com\/sudovivek\/My-CVE",
"description": "Explore CVE-2023-33580 (XSS) & CVE-2023-33584 (SQLI) discovered by me. Dive into vulnerabilities and exploits for insights.",
"fork": false,
"created_at": "2023-06-04T11:27:20Z",
"updated_at": "2024-03-23T06:34:16Z",
"pushed_at": "2024-03-23T06:27:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2023-33580",
"cve-2023-33584",
"exploit",
"mitre",
"sqli",
"xss"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -352,10 +352,10 @@
"description": "Citrix ADC RCE CVE-2023-3519",
"fork": false,
"created_at": "2023-08-24T12:24:24Z",
"updated_at": "2023-12-19T11:40:11Z",
"updated_at": "2024-03-23T09:21:09Z",
"pushed_at": "2023-08-30T15:47:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -364,7 +364,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,19 +13,19 @@
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
"fork": false,
"created_at": "2024-03-21T21:39:24Z",
"updated_at": "2024-03-23T02:25:17Z",
"updated_at": "2024-03-23T11:18:27Z",
"pushed_at": "2024-03-22T06:45:43Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 44,
"forks": 16,
"watchers": 45,
"score": 0,
"subscribers_count": 1
}

View file

@ -393,10 +393,10 @@
"description": "Metabase Pre-auth RCE (CVE-2023-38646)",
"fork": false,
"created_at": "2023-08-19T11:47:08Z",
"updated_at": "2023-12-10T21:28:59Z",
"updated_at": "2024-03-23T07:01:23Z",
"pushed_at": "2023-08-19T12:18:45Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -420,7 +420,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,12 +43,12 @@
"description": "exploit for f5-big-ip RCE cve-2023-46747",
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
"updated_at": "2024-03-22T07:00:04Z",
"updated_at": "2024-03-23T12:18:20Z",
"pushed_at": "2024-01-20T02:27:51Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 173,
"watchers_count": 173,
"has_discussions": false,
"forks_count": 44,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -60,8 +60,8 @@
"redteam"
],
"visibility": "public",
"forks": 44,
"watchers": 171,
"forks": 45,
"watchers": 173,
"score": 0,
"subscribers_count": 2
},

View file

@ -93,36 +93,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 744452699,
"name": "Check-Vulns-Script",
"full_name": "TheRedDevil1\/Check-Vulns-Script",
"owner": {
"login": "TheRedDevil1",
"id": 156904848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4",
"html_url": "https:\/\/github.com\/TheRedDevil1"
},
"html_url": "https:\/\/github.com\/TheRedDevil1\/Check-Vulns-Script",
"description": "Here is a script to check vulns CVE-2023-46805 and CVE-2024-21887",
"fork": false,
"created_at": "2024-01-17T10:29:02Z",
"updated_at": "2024-03-18T04:20:06Z",
"pushed_at": "2024-01-17T10:35:15Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 745015590,
"name": "CVE-2023-46805_CVE-2024-21887",

View file

@ -1,34 +1,4 @@
[
{
"id": 773611669,
"name": "CVE-2023-48788",
"full_name": "TheRedDevil1\/CVE-2023-48788",
"owner": {
"login": "TheRedDevil1",
"id": 156904848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4",
"html_url": "https:\/\/github.com\/TheRedDevil1"
},
"html_url": "https:\/\/github.com\/TheRedDevil1\/CVE-2023-48788",
"description": "CVE-2023-48788 is a SQLi vulnerability which leads to unauthenticated remote code executing in fortinet's FortiClientEMS.",
"fork": false,
"created_at": "2024-03-18T04:25:48Z",
"updated_at": "2024-03-22T23:34:47Z",
"pushed_at": "2024-03-18T04:38:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 774039594,
"name": "CVE-2023-48788",
@ -58,35 +28,5 @@
"watchers": 15,
"score": 0,
"subscribers_count": 4
},
{
"id": 776211113,
"name": "CVE-2023-48788-exploit",
"full_name": "TheRedDevil1\/CVE-2023-48788-exploit",
"owner": {
"login": "TheRedDevil1",
"id": 156904848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4",
"html_url": "https:\/\/github.com\/TheRedDevil1"
},
"html_url": "https:\/\/github.com\/TheRedDevil1\/CVE-2023-48788-exploit",
"description": "A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.",
"fork": false,
"created_at": "2024-03-22T22:53:50Z",
"updated_at": "2024-03-22T23:34:49Z",
"pushed_at": "2024-03-22T22:58:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -185,36 +185,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 745917291,
"name": "CVE-2023-7028",
"full_name": "TheRedDevil1\/CVE-2023-7028",
"owner": {
"login": "TheRedDevil1",
"id": 156904848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4",
"html_url": "https:\/\/github.com\/TheRedDevil1"
},
"html_url": "https:\/\/github.com\/TheRedDevil1\/CVE-2023-7028",
"description": "Exploit of account take-over in Gitlab",
"fork": false,
"created_at": "2024-01-20T14:44:14Z",
"updated_at": "2024-03-18T04:20:06Z",
"pushed_at": "2024-01-20T14:46:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 747135442,
"name": "CVE-2023-7028-Account-Take-Over-Gitlab",

View file

@ -13,10 +13,10 @@
"description": "MobSF Remote code execution (via CVE-2024-21633)",
"fork": false,
"created_at": "2024-01-07T21:34:09Z",
"updated_at": "2024-03-21T17:36:45Z",
"updated_at": "2024-03-23T10:44:28Z",
"pushed_at": "2024-01-07T21:34:51Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 67,
"watchers": 68,
"score": 0,
"subscribers_count": 1
}

View file

@ -149,66 +149,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 772797917,
"name": "CVE-2024-21762_POC",
"full_name": "vorotilovaawex\/CVE-2024-21762_POC",
"owner": {
"login": "vorotilovaawex",
"id": 154236393,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154236393?v=4",
"html_url": "https:\/\/github.com\/vorotilovaawex"
},
"html_url": "https:\/\/github.com\/vorotilovaawex\/CVE-2024-21762_POC",
"description": "Fortinet CVE 2024",
"fork": false,
"created_at": "2024-03-15T23:27:32Z",
"updated_at": "2024-03-18T07:57:09Z",
"pushed_at": "2024-03-15T23:30:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 773176691,
"name": "CVE-2024-21762",
"full_name": "TheRedDevil1\/CVE-2024-21762",
"owner": {
"login": "TheRedDevil1",
"id": 156904848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4",
"html_url": "https:\/\/github.com\/TheRedDevil1"
},
"html_url": "https:\/\/github.com\/TheRedDevil1\/CVE-2024-21762",
"description": null,
"fork": false,
"created_at": "2024-03-17T00:04:20Z",
"updated_at": "2024-03-18T04:02:18Z",
"pushed_at": "2024-03-22T23:39:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 773292574,
"name": "CVE-2024-21762",

View file

@ -89,36 +89,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 744452699,
"name": "Check-Vulns-Script",
"full_name": "TheRedDevil1\/Check-Vulns-Script",
"owner": {
"login": "TheRedDevil1",
"id": 156904848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4",
"html_url": "https:\/\/github.com\/TheRedDevil1"
},
"html_url": "https:\/\/github.com\/TheRedDevil1\/Check-Vulns-Script",
"description": "Here is a script to check vulns CVE-2023-46805 and CVE-2024-21887",
"fork": false,
"created_at": "2024-01-17T10:29:02Z",
"updated_at": "2024-03-18T04:20:06Z",
"pushed_at": "2024-01-17T10:35:15Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 745015590,
"name": "CVE-2023-46805_CVE-2024-21887",

View file

@ -755,35 +755,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 773607956,
"name": "CVE-2024-23897",
"full_name": "TheRedDevil1\/CVE-2024-23897",
"owner": {
"login": "TheRedDevil1",
"id": 156904848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4",
"html_url": "https:\/\/github.com\/TheRedDevil1"
},
"html_url": "https:\/\/github.com\/TheRedDevil1\/CVE-2024-23897",
"description": null,
"fork": false,
"created_at": "2024-03-18T04:11:14Z",
"updated_at": "2024-03-18T04:20:02Z",
"pushed_at": "2024-03-18T04:18:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-14T17:48:49Z",
"updated_at": "2024-03-23T01:03:06Z",
"updated_at": "2024-03-23T10:24:49Z",
"pushed_at": "2024-03-14T17:49:48Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 1
}

View file

@ -284,8 +284,6 @@
- [cleverg0d/CVE-2024-21762-Checker](https://github.com/cleverg0d/CVE-2024-21762-Checker)
- [h4x0r-dz/CVE-2024-21762](https://github.com/h4x0r-dz/CVE-2024-21762)
- [r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check](https://github.com/r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check)
- [vorotilovaawex/CVE-2024-21762_POC](https://github.com/vorotilovaawex/CVE-2024-21762_POC)
- [TheRedDevil1/CVE-2024-21762](https://github.com/TheRedDevil1/CVE-2024-21762)
- [d0rb/CVE-2024-21762](https://github.com/d0rb/CVE-2024-21762)
### CVE-2024-21887 (2024-01-12)
@ -296,7 +294,6 @@
- [oways/ivanti-CVE-2024-21887](https://github.com/oways/ivanti-CVE-2024-21887)
- [duy-31/CVE-2023-46805_CVE-2024-21887](https://github.com/duy-31/CVE-2023-46805_CVE-2024-21887)
- [Chocapikk/CVE-2024-21887](https://github.com/Chocapikk/CVE-2024-21887)
- [TheRedDevil1/Check-Vulns-Script](https://github.com/TheRedDevil1/Check-Vulns-Script)
- [raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887](https://github.com/raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887)
- [seajaysec/Ivanti-Connect-Around-Scan](https://github.com/seajaysec/Ivanti-Connect-Around-Scan)
- [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped)
@ -568,7 +565,6 @@
- [pulentoski/CVE-2024-23897-Arbitrary-file-read](https://github.com/pulentoski/CVE-2024-23897-Arbitrary-file-read)
- [Nebian/CVE-2024-23897](https://github.com/Nebian/CVE-2024-23897)
- [Abo5/CVE-2024-23897](https://github.com/Abo5/CVE-2024-23897)
- [TheRedDevil1/CVE-2024-23897](https://github.com/TheRedDevil1/CVE-2024-23897)
### CVE-2024-24034 (2024-02-08)
@ -2222,7 +2218,6 @@
- [Vozec/CVE-2023-7028](https://github.com/Vozec/CVE-2023-7028)
- [yoryio/CVE-2023-7028](https://github.com/yoryio/CVE-2023-7028)
- [Esonhugh/gitlab_honeypot](https://github.com/Esonhugh/gitlab_honeypot)
- [TheRedDevil1/CVE-2023-7028](https://github.com/TheRedDevil1/CVE-2023-7028)
- [Shimon03/CVE-2023-7028-Account-Take-Over-Gitlab](https://github.com/Shimon03/CVE-2023-7028-Account-Take-Over-Gitlab)
- [thanhlam-attt/CVE-2023-7028](https://github.com/thanhlam-attt/CVE-2023-7028)
- [Trackflaw/CVE-2023-7028-Docker](https://github.com/Trackflaw/CVE-2023-7028-Docker)
@ -4686,6 +4681,13 @@
- [wushigudan/CVE-2023-33517](https://github.com/wushigudan/CVE-2023-33517)
### CVE-2023-33580 (2023-06-26)
<code>Phpgurukul Student Study Center Management System V1.0 is vulnerable to Cross Site Scripting (XSS) in the &quot;Admin Name&quot; field on Admin Profile page.
</code>
- [sudovivek/My-CVE](https://github.com/sudovivek/My-CVE)
### CVE-2023-33592 (2023-06-28)
<code>Lost and Found Information System v1.0 was discovered to contain a SQL injection vulnerability via the component /php-lfis/admin/?page=system_info/contact_information.
@ -7315,7 +7317,6 @@
- [yoryio/CVE-2023-46805](https://github.com/yoryio/CVE-2023-46805)
- [cbeek-r7/CVE-2023-46805](https://github.com/cbeek-r7/CVE-2023-46805)
- [duy-31/CVE-2023-46805_CVE-2024-21887](https://github.com/duy-31/CVE-2023-46805_CVE-2024-21887)
- [TheRedDevil1/Check-Vulns-Script](https://github.com/TheRedDevil1/Check-Vulns-Script)
- [raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887](https://github.com/raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887)
- [seajaysec/Ivanti-Connect-Around-Scan](https://github.com/seajaysec/Ivanti-Connect-Around-Scan)
- [Chocapikk/CVE-2023-46805](https://github.com/Chocapikk/CVE-2023-46805)
@ -7613,9 +7614,7 @@
- [AkuCyberSec/Elementor-3.18.0-Upload-Path-Traversal-RCE-CVE-2023-48777](https://github.com/AkuCyberSec/Elementor-3.18.0-Upload-Path-Traversal-RCE-CVE-2023-48777)
### CVE-2023-48788
- [TheRedDevil1/CVE-2023-48788](https://github.com/TheRedDevil1/CVE-2023-48788)
- [horizon3ai/CVE-2023-48788](https://github.com/horizon3ai/CVE-2023-48788)
- [TheRedDevil1/CVE-2023-48788-exploit](https://github.com/TheRedDevil1/CVE-2023-48788-exploit)
### CVE-2023-48842 (2023-12-01)