Auto Update 2025/01/05 18:31:44

This commit is contained in:
motikan2010-bot 2025-01-06 03:31:44 +09:00
parent 33b37994b6
commit 36fb76d460
30 changed files with 213 additions and 132 deletions

View file

@ -181,8 +181,8 @@
"description": "Test code for poodle attack (CVE-2014-3566)", "description": "Test code for poodle attack (CVE-2014-3566)",
"fork": false, "fork": false,
"created_at": "2024-11-14T04:35:59Z", "created_at": "2024-11-14T04:35:59Z",
"updated_at": "2025-01-01T15:43:07Z", "updated_at": "2025-01-05T15:26:10Z",
"pushed_at": "2025-01-01T15:42:06Z", "pushed_at": "2025-01-05T17:52:11Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -76,10 +76,10 @@
"description": "Unsigned driver loader using CVE-2018-19320", "description": "Unsigned driver loader using CVE-2018-19320",
"fork": false, "fork": false,
"created_at": "2022-11-12T05:48:13Z", "created_at": "2022-11-12T05:48:13Z",
"updated_at": "2025-01-02T03:01:47Z", "updated_at": "2025-01-05T16:26:29Z",
"pushed_at": "2023-04-09T13:50:29Z", "pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 217, "stargazers_count": 218,
"watchers_count": 217, "watchers_count": 218,
"has_discussions": false, "has_discussions": false,
"forks_count": 58, "forks_count": 58,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 58, "forks": 58,
"watchers": 217, "watchers": 218,
"score": 0, "score": 0,
"subscribers_count": 10 "subscribers_count": 10
} }

View file

@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -14,10 +14,10 @@
"description": "Root your MediaTek device with CVE-2020-0069", "description": "Root your MediaTek device with CVE-2020-0069",
"fork": false, "fork": false,
"created_at": "2019-09-06T12:12:48Z", "created_at": "2019-09-06T12:12:48Z",
"updated_at": "2024-12-20T01:17:39Z", "updated_at": "2025-01-05T16:29:27Z",
"pushed_at": "2023-02-06T19:18:56Z", "pushed_at": "2023-02-06T19:18:56Z",
"stargazers_count": 153, "stargazers_count": 154,
"watchers_count": 153, "watchers_count": 154,
"has_discussions": false, "has_discussions": false,
"forks_count": 24, "forks_count": 24,
"allow_forking": true, "allow_forking": true,
@ -31,7 +31,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 24, "forks": 24,
"watchers": 153, "watchers": 154,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },

View file

@ -76,7 +76,7 @@
"description": "poc-cve-2020-25223", "description": "poc-cve-2020-25223",
"fork": false, "fork": false,
"created_at": "2025-01-05T03:34:33Z", "created_at": "2025-01-05T03:34:33Z",
"updated_at": "2025-01-05T03:40:15Z", "updated_at": "2025-01-05T17:28:34Z",
"pushed_at": "2025-01-05T03:40:12Z", "pushed_at": "2025-01-05T03:40:12Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
@ -85,7 +85,12 @@
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [
"cve-2020-25223",
"poc",
"poc-cve-2020-25223",
"rce"
],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,

View file

@ -14,10 +14,10 @@
"description": "Recursive MMIO VM Escape PoC", "description": "Recursive MMIO VM Escape PoC",
"fork": false, "fork": false,
"created_at": "2022-05-13T05:33:28Z", "created_at": "2022-05-13T05:33:28Z",
"updated_at": "2024-12-20T00:07:19Z", "updated_at": "2025-01-05T18:08:29Z",
"pushed_at": "2022-05-13T05:37:41Z", "pushed_at": "2022-05-13T05:37:41Z",
"stargazers_count": 170, "stargazers_count": 171,
"watchers_count": 170, "watchers_count": 171,
"has_discussions": false, "has_discussions": false,
"forks_count": 24, "forks_count": 24,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 24, "forks": 24,
"watchers": 170, "watchers": 171,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7
} }

View file

@ -231,10 +231,10 @@
"description": "CVE-2021-40444 PoC", "description": "CVE-2021-40444 PoC",
"fork": false, "fork": false,
"created_at": "2021-09-10T16:55:53Z", "created_at": "2021-09-10T16:55:53Z",
"updated_at": "2025-01-04T01:28:08Z", "updated_at": "2025-01-05T14:16:19Z",
"pushed_at": "2021-12-25T18:31:02Z", "pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1605, "stargazers_count": 1606,
"watchers_count": 1605, "watchers_count": 1606,
"has_discussions": false, "has_discussions": false,
"forks_count": 483, "forks_count": 483,
"allow_forking": true, "allow_forking": true,
@ -243,7 +243,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 483, "forks": 483,
"watchers": 1605, "watchers": 1606,
"score": 0, "score": 0,
"subscribers_count": 28 "subscribers_count": 28
}, },

View file

@ -14,10 +14,10 @@
"description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera", "description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
"fork": false, "fork": false,
"created_at": "2021-11-15T14:48:14Z", "created_at": "2021-11-15T14:48:14Z",
"updated_at": "2025-01-04T15:32:04Z", "updated_at": "2025-01-05T16:37:14Z",
"pushed_at": "2024-10-31T18:50:48Z", "pushed_at": "2024-10-31T18:50:48Z",
"stargazers_count": 77, "stargazers_count": 78,
"watchers_count": 77, "watchers_count": 78,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 77, "watchers": 78,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -14,10 +14,10 @@
"description": "POC for CVE-2021-41091", "description": "POC for CVE-2021-41091",
"fork": false, "fork": false,
"created_at": "2023-05-02T07:25:13Z", "created_at": "2023-05-02T07:25:13Z",
"updated_at": "2024-09-12T10:27:44Z", "updated_at": "2025-01-05T16:21:20Z",
"pushed_at": "2023-05-20T09:16:34Z", "pushed_at": "2023-05-20T09:16:34Z",
"stargazers_count": 65, "stargazers_count": 64,
"watchers_count": 65, "watchers_count": 64,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 65, "watchers": 64,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

33
2021/CVE-2021-44967.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 912395761,
"name": "LimeSurvey-RCE",
"full_name": "D3Ext\/LimeSurvey-RCE",
"owner": {
"login": "D3Ext",
"id": 67125397,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67125397?v=4",
"html_url": "https:\/\/github.com\/D3Ext",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D3Ext\/LimeSurvey-RCE",
"description": "POC exploit for CVE-2021-44967",
"fork": false,
"created_at": "2025-01-05T13:12:07Z",
"updated_at": "2025-01-05T13:13:21Z",
"pushed_at": "2025-01-05T13:13:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -29,36 +29,5 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 448040948,
"name": "CVE-2021-45745",
"full_name": "plsanu\/CVE-2021-45745",
"owner": {
"login": "plsanu",
"id": 61007700,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
"html_url": "https:\/\/github.com\/plsanu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/plsanu\/CVE-2021-45745",
"description": "CVE-2021-45745 - A Stored Cross Site Scripting (XSS) vulnerability exists in Bludit 3.13.1 via the About Plugin in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.",
"fork": false,
"created_at": "2022-01-14T16:52:08Z",
"updated_at": "2023-12-30T08:24:27Z",
"pushed_at": "2022-01-14T16:52:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
} }
] ]

View file

@ -64,7 +64,7 @@
"description": "test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC ", "description": "test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC ",
"fork": false, "fork": false,
"created_at": "2022-01-21T05:07:59Z", "created_at": "2022-01-21T05:07:59Z",
"updated_at": "2022-11-05T22:58:02Z", "updated_at": "2025-01-05T13:55:52Z",
"pushed_at": "2022-01-21T05:21:25Z", "pushed_at": "2022-01-21T05:21:25Z",
"stargazers_count": 5, "stargazers_count": 5,
"watchers_count": 5, "watchers_count": 5,

View file

@ -14,10 +14,10 @@
"description": "CVE-2022-25375 - Demo exploit of RNDIS USB Gadget", "description": "CVE-2022-25375 - Demo exploit of RNDIS USB Gadget",
"fork": false, "fork": false,
"created_at": "2022-02-17T14:02:58Z", "created_at": "2022-02-17T14:02:58Z",
"updated_at": "2025-01-05T05:53:23Z", "updated_at": "2025-01-05T14:13:23Z",
"pushed_at": "2022-02-20T19:56:48Z", "pushed_at": "2022-02-20T19:56:48Z",
"stargazers_count": 6, "stargazers_count": 7,
"watchers_count": 6, "watchers_count": 7,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 6, "watchers": 7,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -336,10 +336,10 @@
"description": "iOS customization app powered by CVE-2022-46689. No jailbreak required.", "description": "iOS customization app powered by CVE-2022-46689. No jailbreak required.",
"fork": false, "fork": false,
"created_at": "2023-02-12T01:33:45Z", "created_at": "2023-02-12T01:33:45Z",
"updated_at": "2025-01-05T04:38:44Z", "updated_at": "2025-01-05T16:49:42Z",
"pushed_at": "2023-02-12T01:33:48Z", "pushed_at": "2023-02-12T01:33:48Z",
"stargazers_count": 18, "stargazers_count": 17,
"watchers_count": 18, "watchers_count": 17,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -348,7 +348,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 18, "watchers": 17,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -45,10 +45,10 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)", "description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false, "fork": false,
"created_at": "2023-02-24T13:54:42Z", "created_at": "2023-02-24T13:54:42Z",
"updated_at": "2025-01-05T05:24:23Z", "updated_at": "2025-01-05T12:47:00Z",
"pushed_at": "2023-02-24T13:29:38Z", "pushed_at": "2023-02-24T13:29:38Z",
"stargazers_count": 64, "stargazers_count": 65,
"watchers_count": 64, "watchers_count": 65,
"has_discussions": false, "has_discussions": false,
"forks_count": 108, "forks_count": 108,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 108, "forks": 108,
"watchers": 64, "watchers": 65,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -209,10 +209,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-07-10T06:38:14Z", "created_at": "2023-07-10T06:38:14Z",
"updated_at": "2024-10-26T17:02:01Z", "updated_at": "2025-01-05T17:10:39Z",
"pushed_at": "2023-07-13T06:20:19Z", "pushed_at": "2023-07-13T06:20:19Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -221,7 +221,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 5, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,10 +14,10 @@
"description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE", "description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE",
"fork": false, "fork": false,
"created_at": "2023-03-27T08:53:04Z", "created_at": "2023-03-27T08:53:04Z",
"updated_at": "2024-11-21T06:22:45Z", "updated_at": "2025-01-05T17:25:07Z",
"pushed_at": "2023-04-04T05:26:59Z", "pushed_at": "2023-04-04T05:26:59Z",
"stargazers_count": 307, "stargazers_count": 308,
"watchers_count": 307, "watchers_count": 308,
"has_discussions": false, "has_discussions": false,
"forks_count": 38, "forks_count": 38,
"allow_forking": true, "allow_forking": true,
@ -29,7 +29,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 38, "forks": 38,
"watchers": 307, "watchers": 308,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
} }

View file

@ -14,19 +14,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-05T11:09:21Z", "updated_at": "2025-01-05T17:27:45Z",
"pushed_at": "2024-08-18T08:26:46Z", "pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1357, "stargazers_count": 1358,
"watchers_count": 1357, "watchers_count": 1358,
"has_discussions": false, "has_discussions": false,
"forks_count": 228, "forks_count": 229,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 228, "forks": 229,
"watchers": 1357, "watchers": 1358,
"score": 0, "score": 0,
"subscribers_count": 21 "subscribers_count": 21
}, },

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-6319 proof of concept", "description": "CVE-2023-6319 proof of concept",
"fork": false, "fork": false,
"created_at": "2024-04-11T18:58:17Z", "created_at": "2024-04-11T18:58:17Z",
"updated_at": "2025-01-03T09:17:30Z", "updated_at": "2025-01-05T15:56:13Z",
"pushed_at": "2024-10-17T11:18:46Z", "pushed_at": "2024-10-17T11:18:46Z",
"stargazers_count": 39, "stargazers_count": 40,
"watchers_count": 39, "watchers_count": 40,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -31,7 +31,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 39, "watchers": 40,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
} }

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false, "fork": false,
"created_at": "2024-03-20T21:16:41Z", "created_at": "2024-03-20T21:16:41Z",
"updated_at": "2025-01-03T15:13:52Z", "updated_at": "2025-01-05T13:37:59Z",
"pushed_at": "2024-04-17T16:09:54Z", "pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2318, "stargazers_count": 2319,
"watchers_count": 2318, "watchers_count": 2319,
"has_discussions": false, "has_discussions": false,
"forks_count": 300, "forks_count": 300,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 300, "forks": 300,
"watchers": 2318, "watchers": 2319,
"score": 0, "score": 0,
"subscribers_count": 26 "subscribers_count": 26
}, },

View file

@ -29,5 +29,36 @@
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 912431927,
"name": "CVE-2024-2667-Poc",
"full_name": "Nxploited\/CVE-2024-2667-Poc",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-2667-Poc",
"description": null,
"fork": false,
"created_at": "2025-01-05T15:03:50Z",
"updated_at": "2025-01-05T16:21:03Z",
"pushed_at": "2025-01-05T16:21:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -14,10 +14,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-06-24T10:37:26Z", "created_at": "2024-06-24T10:37:26Z",
"updated_at": "2025-01-05T01:29:42Z", "updated_at": "2025-01-05T12:50:13Z",
"pushed_at": "2024-07-31T19:11:55Z", "pushed_at": "2024-07-31T19:11:55Z",
"stargazers_count": 245, "stargazers_count": 246,
"watchers_count": 245, "watchers_count": 246,
"has_discussions": false, "has_discussions": false,
"forks_count": 54, "forks_count": 54,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 54, "forks": 54,
"watchers": 245, "watchers": 246,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -200,19 +200,19 @@
"description": "Zabbix CVE-2024-42327 PoC", "description": "Zabbix CVE-2024-42327 PoC",
"fork": false, "fork": false,
"created_at": "2025-01-01T18:25:44Z", "created_at": "2025-01-01T18:25:44Z",
"updated_at": "2025-01-05T07:51:36Z", "updated_at": "2025-01-05T14:59:02Z",
"pushed_at": "2025-01-03T13:49:03Z", "pushed_at": "2025-01-03T13:49:03Z",
"stargazers_count": 5, "stargazers_count": 8,
"watchers_count": 5, "watchers_count": 8,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 3,
"watchers": 5, "watchers": 8,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -324,5 +324,40 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 912425407,
"name": "WEAPONIZING-CVE-2024-4367",
"full_name": "exfil0\/WEAPONIZING-CVE-2024-4367",
"owner": {
"login": "exfil0",
"id": 84948741,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84948741?v=4",
"html_url": "https:\/\/github.com\/exfil0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/exfil0\/WEAPONIZING-CVE-2024-4367",
"description": "CVE-2024-4367 is a critical vulnerability (CVSS 9.8) in PDF.js, allowing arbitrary JavaScript code execution due to insufficient type checks on the FontMatrix object within PDF files.",
"fork": false,
"created_at": "2025-01-05T14:44:01Z",
"updated_at": "2025-01-05T15:09:38Z",
"pushed_at": "2025-01-05T15:09:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-4367",
"spyware",
"weaponized"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -14,10 +14,10 @@
"description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability", "description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability",
"fork": false, "fork": false,
"created_at": "2024-09-13T00:41:32Z", "created_at": "2024-09-13T00:41:32Z",
"updated_at": "2024-12-20T01:07:07Z", "updated_at": "2025-01-05T15:43:39Z",
"pushed_at": "2024-10-01T00:57:03Z", "pushed_at": "2024-10-01T00:57:03Z",
"stargazers_count": 54, "stargazers_count": 55,
"watchers_count": 54, "watchers_count": 55,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 54, "watchers": 55,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -14,19 +14,19 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false, "fork": false,
"created_at": "2025-01-01T15:48:38Z", "created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-05T09:22:19Z", "updated_at": "2025-01-05T14:27:28Z",
"pushed_at": "2025-01-02T16:07:23Z", "pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 340, "stargazers_count": 344,
"watchers_count": 340, "watchers_count": 344,
"has_discussions": false, "has_discussions": false,
"forks_count": 78, "forks_count": 79,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 78, "forks": 79,
"watchers": 340, "watchers": 344,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6s upgrademysqlstatus endpoint, bypassing CSRF protections.", "description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6s upgrademysqlstatus endpoint, bypassing CSRF protections.",
"fork": false, "fork": false,
"created_at": "2024-10-31T21:55:57Z", "created_at": "2024-10-31T21:55:57Z",
"updated_at": "2024-12-11T09:00:00Z", "updated_at": "2025-01-05T16:12:36Z",
"pushed_at": "2024-11-01T10:48:42Z", "pushed_at": "2024-11-01T10:48:42Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -29,7 +29,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 3, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -653,10 +653,10 @@
"description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.", "description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.",
"fork": false, "fork": false,
"created_at": "2024-07-02T06:53:35Z", "created_at": "2024-07-02T06:53:35Z",
"updated_at": "2024-12-17T12:52:05Z", "updated_at": "2025-01-05T15:46:06Z",
"pushed_at": "2024-07-04T20:04:30Z", "pushed_at": "2024-07-04T20:04:30Z",
"stargazers_count": 34, "stargazers_count": 35,
"watchers_count": 34, "watchers_count": 35,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -665,7 +665,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 34, "watchers": 35,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -1159,10 +1159,10 @@
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.", "description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
"fork": false, "fork": false,
"created_at": "2024-07-02T14:41:43Z", "created_at": "2024-07-02T14:41:43Z",
"updated_at": "2024-12-26T06:26:46Z", "updated_at": "2025-01-05T15:39:31Z",
"pushed_at": "2024-07-02T15:16:04Z", "pushed_at": "2024-07-02T15:16:04Z",
"stargazers_count": 31, "stargazers_count": 32,
"watchers_count": 31, "watchers_count": 32,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -1181,7 +1181,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 31, "watchers": 32,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -14,10 +14,10 @@
"description": "This repository contains an exploit for CVE-2024-7703 in the ARMember WordPress plugin. It allows attackers with Subscriber-level access or higher to upload SVG files with malicious JavaScript, leading to Stored XSS attacks. This can result in executing scripts when the file is accessed, potentially compromising user sessions or data.", "description": "This repository contains an exploit for CVE-2024-7703 in the ARMember WordPress plugin. It allows attackers with Subscriber-level access or higher to upload SVG files with malicious JavaScript, leading to Stored XSS attacks. This can result in executing scripts when the file is accessed, potentially compromising user sessions or data.",
"fork": false, "fork": false,
"created_at": "2024-08-17T14:44:08Z", "created_at": "2024-08-17T14:44:08Z",
"updated_at": "2024-08-22T02:30:08Z", "updated_at": "2025-01-05T14:30:25Z",
"pushed_at": "2024-08-17T14:51:10Z", "pushed_at": "2024-08-17T14:51:10Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -571,6 +571,7 @@
</code> </code>
- [Puvipavan/CVE-2024-2667](https://github.com/Puvipavan/CVE-2024-2667) - [Puvipavan/CVE-2024-2667](https://github.com/Puvipavan/CVE-2024-2667)
- [Nxploited/CVE-2024-2667-Poc](https://github.com/Nxploited/CVE-2024-2667-Poc)
### CVE-2024-2876 (2024-05-02) ### CVE-2024-2876 (2024-05-02)
@ -970,6 +971,7 @@
- [UnHackerEnCapital/PDFernetRemotelo](https://github.com/UnHackerEnCapital/PDFernetRemotelo) - [UnHackerEnCapital/PDFernetRemotelo](https://github.com/UnHackerEnCapital/PDFernetRemotelo)
- [Masamuneee/CVE-2024-4367-Analysis](https://github.com/Masamuneee/CVE-2024-4367-Analysis) - [Masamuneee/CVE-2024-4367-Analysis](https://github.com/Masamuneee/CVE-2024-4367-Analysis)
- [pedrochalegre7/CVE-2024-4367-pdf-sample](https://github.com/pedrochalegre7/CVE-2024-4367-pdf-sample) - [pedrochalegre7/CVE-2024-4367-pdf-sample](https://github.com/pedrochalegre7/CVE-2024-4367-pdf-sample)
- [exfil0/WEAPONIZING-CVE-2024-4367](https://github.com/exfil0/WEAPONIZING-CVE-2024-4367)
### CVE-2024-4406 (2024-05-02) ### CVE-2024-4406 (2024-05-02)
@ -29497,6 +29499,13 @@
### CVE-2021-44910 ### CVE-2021-44910
- [W000i/CVE-2021-44910_SpringBlade](https://github.com/W000i/CVE-2021-44910_SpringBlade) - [W000i/CVE-2021-44910_SpringBlade](https://github.com/W000i/CVE-2021-44910_SpringBlade)
### CVE-2021-44967 (2022-02-22)
<code>A Remote Code Execution (RCE) vulnerabilty exists in LimeSurvey 5.2.4 via the upload and install plugins function, which could let a remote malicious user upload an arbitrary PHP code file.
</code>
- [D3Ext/LimeSurvey-RCE](https://github.com/D3Ext/LimeSurvey-RCE)
### CVE-2021-45007 (2022-02-20) ### CVE-2021-45007 (2022-02-20)
<code>Plesk 18.0.37 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows an attacker to insert data on the user and admin panel. NOTE: the vendor states that this is only a site-specific problem on websites of one or more Plesk users <code>Plesk 18.0.37 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows an attacker to insert data on the user and admin panel. NOTE: the vendor states that this is only a site-specific problem on websites of one or more Plesk users
@ -29636,7 +29645,6 @@
</code> </code>
- [plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS) - [plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS)
- [plsanu/CVE-2021-45745](https://github.com/plsanu/CVE-2021-45745)
### CVE-2021-45897 (2022-01-28) ### CVE-2021-45897 (2022-01-28)