Auto Update 2024/10/31 18:32:18

This commit is contained in:
motikan2010-bot 2024-11-01 03:32:18 +09:00
parent cf917064d7
commit 395daa0d09
45 changed files with 247 additions and 425 deletions

View file

@ -1,39 +0,0 @@
[
{
"id": 873335341,
"name": "poc-cve-2001-1473",
"full_name": "p1ton3rr\/poc-cve-2001-1473",
"owner": {
"login": "p1ton3rr",
"id": 184847683,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184847683?v=4",
"html_url": "https:\/\/github.com\/p1ton3rr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/p1ton3rr\/poc-cve-2001-1473",
"description": "A novel approach to the old problem",
"fork": false,
"created_at": "2024-10-16T01:54:04Z",
"updated_at": "2024-10-21T17:53:31Z",
"pushed_at": "2024-10-16T01:55:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2001-1473",
"exploit",
"poc",
"poc-cve-2001-1473"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -462,10 +462,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-10-27T09:08:04Z",
"updated_at": "2024-10-31T15:26:44Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 857,
"watchers_count": 857,
"stargazers_count": 858,
"watchers_count": 858,
"has_discussions": false,
"forks_count": 428,
"allow_forking": true,
@ -478,7 +478,7 @@
],
"visibility": "public",
"forks": 428,
"watchers": 857,
"watchers": 858,
"score": 0,
"subscribers_count": 9
},

View file

@ -76,10 +76,10 @@
"description": null,
"fork": false,
"created_at": "2021-03-22T09:33:51Z",
"updated_at": "2024-10-15T10:22:37Z",
"updated_at": "2024-10-31T15:26:13Z",
"pushed_at": "2021-03-22T10:46:07Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -417,10 +417,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-10-30T14:39:53Z",
"updated_at": "2024-10-31T15:25:27Z",
"pushed_at": "2024-09-09T07:42:24Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 83,
"watchers": 85,
"score": 0,
"subscribers_count": 2
}

View file

@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
"fork": false,
"created_at": "2018-01-16T00:23:34Z",
"updated_at": "2024-08-12T19:35:32Z",
"updated_at": "2024-10-31T14:02:51Z",
"pushed_at": "2020-12-22T03:10:47Z",
"stargazers_count": 164,
"watchers_count": 164,
"stargazers_count": 165,
"watchers_count": 165,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 164,
"watchers": 165,
"score": 0,
"subscribers_count": 8
},

View file

@ -3721,5 +3721,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 881374390,
"name": "CVE-2019-0708-Check",
"full_name": "hualy13\/CVE-2019-0708-Check",
"owner": {
"login": "hualy13",
"id": 121297202,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121297202?v=4",
"html_url": "https:\/\/github.com\/hualy13",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hualy13\/CVE-2019-0708-Check",
"description": null,
"fork": false,
"created_at": "2024-10-31T12:57:09Z",
"updated_at": "2024-10-31T13:35:23Z",
"pushed_at": "2024-10-31T13:35:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 874821911,
"name": "poc-CVE-2019-11248",
"full_name": "nod3jzzz\/poc-CVE-2019-11248",
"owner": {
"login": "nod3jzzz",
"id": 184505515,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184505515?v=4",
"html_url": "https:\/\/github.com\/nod3jzzz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nod3jzzz\/poc-CVE-2019-11248",
"description": null,
"fork": false,
"created_at": "2024-10-18T14:21:10Z",
"updated_at": "2024-10-24T19:25:01Z",
"pushed_at": "2024-10-18T14:23:52Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-01T21:35:40Z",
"updated_at": "2024-07-09T07:08:41Z",
"updated_at": "2024-10-31T14:53:35Z",
"pushed_at": "2023-09-02T10:41:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "Proof of Concept for CVE-2019-18634",
"fork": false,
"created_at": "2020-02-07T18:07:03Z",
"updated_at": "2024-10-24T22:25:30Z",
"updated_at": "2024-10-31T18:08:46Z",
"pushed_at": "2021-09-12T02:55:24Z",
"stargazers_count": 208,
"watchers_count": 208,
"stargazers_count": 209,
"watchers_count": 209,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 208,
"watchers": 209,
"score": 0,
"subscribers_count": 3
},

View file

@ -527,13 +527,13 @@
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 2,
"watchers": 10,
"score": 0,
"subscribers_count": 2

View file

@ -50,13 +50,13 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 3,
"watchers": 7,
"score": 0,
"subscribers_count": 3

View file

@ -216,13 +216,13 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 2

View file

@ -950,10 +950,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-10-30T14:39:53Z",
"updated_at": "2024-10-31T15:25:27Z",
"pushed_at": "2024-09-09T07:42:24Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -970,46 +970,8 @@
],
"visibility": "public",
"forks": 6,
"watchers": 83,
"watchers": 85,
"score": 0,
"subscribers_count": 2
},
{
"id": 871443170,
"name": "poc-CVE-2020-1938",
"full_name": "s3nd3rjz\/poc-CVE-2020-1938",
"owner": {
"login": "s3nd3rjz",
"id": 184706008,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184706008?v=4",
"html_url": "https:\/\/github.com\/s3nd3rjz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/s3nd3rjz\/poc-CVE-2020-1938",
"description": "cve-2020-1938 POC, updated version",
"fork": false,
"created_at": "2024-10-12T01:46:15Z",
"updated_at": "2024-10-26T08:37:00Z",
"pushed_at": "2024-10-12T11:25:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-1938",
"exploit",
"poc",
"poc-cve-2020-1938",
"rce",
"rce-exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -139,42 +139,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 867830610,
"name": "poc-CVE-2020-35489",
"full_name": "aitech66\/poc-CVE-2020-35489",
"owner": {
"login": "aitech66",
"id": 183868709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/183868709?v=4",
"html_url": "https:\/\/github.com\/aitech66",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/aitech66\/poc-CVE-2020-35489",
"description": "POC for RCE with CVE-2020-35489",
"fork": false,
"created_at": "2024-10-04T20:04:51Z",
"updated_at": "2024-10-26T08:33:51Z",
"pushed_at": "2024-10-04T20:11:57Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2020-35489",
"exploit",
"rce",
"rce-exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -14,7 +14,7 @@
"description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false,
"created_at": "2021-03-22T11:53:57Z",
"updated_at": "2024-09-22T20:27:40Z",
"updated_at": "2024-10-31T16:32:19Z",
"pushed_at": "2021-03-22T18:24:20Z",
"stargazers_count": 165,
"watchers_count": 165,

View file

@ -45,12 +45,12 @@
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
"fork": false,
"created_at": "2022-06-30T04:39:58Z",
"updated_at": "2024-10-23T08:28:04Z",
"updated_at": "2024-10-31T17:31:11Z",
"pushed_at": "2023-11-12T16:29:03Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -59,8 +59,8 @@
"poc"
],
"visibility": "public",
"forks": 21,
"watchers": 97,
"forks": 22,
"watchers": 98,
"score": 0,
"subscribers_count": 3
},

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-10-30T08:48:30Z",
"updated_at": "2024-10-31T16:57:27Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 792,
"watchers_count": 792,
"stargazers_count": 793,
"watchers_count": 793,
"has_discussions": false,
"forks_count": 121,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 121,
"watchers": 792,
"watchers": 793,
"score": 0,
"subscribers_count": 13
},

View file

@ -884,7 +884,7 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2024-10-29T16:57:08Z",
"updated_at": "2024-10-31T16:32:21Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 933,
"watchers_count": 933,

View file

@ -14,7 +14,7 @@
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
"fork": false,
"created_at": "2022-03-19T08:10:46Z",
"updated_at": "2024-10-22T20:41:21Z",
"updated_at": "2024-10-31T16:32:16Z",
"pushed_at": "2022-09-04T17:28:56Z",
"stargazers_count": 328,
"watchers_count": 328,

View file

@ -626,10 +626,10 @@
"description": "Este es un código del exploit CVE-2022-46169, que recree utilizando Python3! Si por ahí estás haciendo una máquina de HTB, esto te puede ser útil... 🤞✨ ",
"fork": false,
"created_at": "2023-05-02T02:41:44Z",
"updated_at": "2024-10-17T19:40:03Z",
"updated_at": "2024-10-31T16:23:19Z",
"pushed_at": "2023-05-02T03:36:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -638,7 +638,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2024-10-28T18:14:30Z",
"updated_at": "2024-10-31T13:33:20Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 391,
"watchers_count": 391,
"stargazers_count": 392,
"watchers_count": 392,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 391,
"watchers": 392,
"score": 0,
"subscribers_count": 11
},
@ -107,10 +107,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2024-10-28T12:44:08Z",
"updated_at": "2024-10-31T13:33:13Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 881,
"watchers_count": 881,
"stargazers_count": 882,
"watchers_count": 882,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 881,
"watchers": 882,
"score": 0,
"subscribers_count": 25
},

View file

@ -612,10 +612,10 @@
"description": "CVE-2023-20198 Exploit PoC",
"fork": false,
"created_at": "2023-11-16T16:39:38Z",
"updated_at": "2024-09-12T06:33:33Z",
"updated_at": "2024-10-31T17:39:25Z",
"pushed_at": "2023-12-07T22:34:43Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -624,7 +624,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 1
},

View file

@ -637,8 +637,8 @@
"description": "Three go-exploits exploiting CVE-2023-22527 to execute arbitrary code in memory",
"fork": false,
"created_at": "2024-03-04T19:09:57Z",
"updated_at": "2024-10-30T14:50:49Z",
"pushed_at": "2024-10-31T08:40:21Z",
"updated_at": "2024-10-31T13:25:33Z",
"pushed_at": "2024-10-31T13:25:31Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -312,13 +312,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -76,10 +76,10 @@
"description": "CVE-2023-3824 PoC",
"fork": false,
"created_at": "2024-10-11T10:53:04Z",
"updated_at": "2024-10-24T21:25:34Z",
"updated_at": "2024-10-31T15:27:53Z",
"pushed_at": "2024-10-11T10:59:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -98,7 +98,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2

View file

@ -200,10 +200,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-27T09:32:08Z",
"updated_at": "2024-10-30T13:12:05Z",
"updated_at": "2024-10-31T18:06:58Z",
"pushed_at": "2024-10-30T13:12:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -231,10 +231,10 @@
"description": "CVE-2024-23113-Private-POC",
"fork": false,
"created_at": "2024-10-27T14:31:05Z",
"updated_at": "2024-10-28T17:58:57Z",
"pushed_at": "2024-10-28T17:56:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-10-31T18:13:04Z",
"pushed_at": "2024-10-31T17:52:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -243,7 +243,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -138,10 +138,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-27T09:43:54Z",
"updated_at": "2024-10-30T13:11:43Z",
"updated_at": "2024-10-31T18:06:56Z",
"pushed_at": "2024-10-30T13:11:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
@ -169,10 +169,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-27T14:31:40Z",
"updated_at": "2024-10-27T14:31:40Z",
"pushed_at": "2024-10-27T14:31:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-10-31T18:13:01Z",
"pushed_at": "2024-10-31T18:06:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-10-29T07:55:15Z",
"updated_at": "2024-10-31T16:43:24Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 406,
"watchers_count": 406,
"stargazers_count": 405,
"watchers_count": 405,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 406,
"watchers": 405,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-30090 - LPE PoC",
"fork": false,
"created_at": "2024-10-17T08:38:47Z",
"updated_at": "2024-10-30T14:18:42Z",
"updated_at": "2024-10-31T18:29:21Z",
"pushed_at": "2024-10-17T09:53:33Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 80,
"watchers": 81,
"score": 0,
"subscribers_count": 2
}

View file

@ -983,10 +983,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-10-29T16:57:53Z",
"updated_at": "2024-10-31T12:43:41Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3493,
"watchers_count": 3493,
"stargazers_count": 3492,
"watchers_count": 3492,
"has_discussions": false,
"forks_count": 238,
"allow_forking": true,
@ -995,7 +995,7 @@
"topics": [],
"visibility": "public",
"forks": 238,
"watchers": 3493,
"watchers": 3492,
"score": 0,
"subscribers_count": 38
},

View file

@ -76,10 +76,10 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-10-31T11:34:04Z",
"updated_at": "2024-10-31T14:02:37Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 501,
"watchers_count": 501,
"stargazers_count": 504,
"watchers_count": 504,
"has_discussions": false,
"forks_count": 144,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 144,
"watchers": 501,
"watchers": 504,
"score": 0,
"subscribers_count": 3
},
@ -243,10 +243,10 @@
"description": "CVE-2024-32002 RCE PoC",
"fork": false,
"created_at": "2024-05-18T15:05:28Z",
"updated_at": "2024-10-31T06:21:31Z",
"updated_at": "2024-10-31T14:24:27Z",
"pushed_at": "2024-05-18T15:12:59Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -259,7 +259,7 @@
],
"visibility": "public",
"forks": 25,
"watchers": 100,
"watchers": 101,
"score": 0,
"subscribers_count": 3
},

View file

@ -293,10 +293,10 @@
"description": "CosmicSting: critical unauthenticated XXE vulnerability in Adobe Commerce and Magento (CVE-2024-34102)",
"fork": false,
"created_at": "2024-07-01T08:19:28Z",
"updated_at": "2024-08-06T14:55:07Z",
"updated_at": "2024-10-31T14:52:42Z",
"pushed_at": "2024-07-05T09:26:02Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -305,7 +305,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-10-31T10:52:38Z",
"updated_at": "2024-10-31T14:32:33Z",
"pushed_at": "2024-10-17T18:36:54Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 190,
"watchers_count": 190,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 189,
"watchers": 190,
"score": 0,
"subscribers_count": 6
},

View file

@ -420,7 +420,7 @@
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
"fork": false,
"created_at": "2024-08-31T13:56:26Z",
"updated_at": "2024-10-30T15:52:09Z",
"updated_at": "2024-10-31T13:37:19Z",
"pushed_at": "2024-10-24T13:32:42Z",
"stargazers_count": 10,
"watchers_count": 10,

View file

@ -14,10 +14,10 @@
"description": "CVE PoC 2024-40457",
"fork": false,
"created_at": "2024-10-30T16:51:31Z",
"updated_at": "2024-10-30T20:39:20Z",
"updated_at": "2024-10-31T15:14:04Z",
"pushed_at": "2024-10-30T16:52:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,8 +45,39 @@
"description": null,
"fork": false,
"created_at": "2024-10-27T09:44:17Z",
"updated_at": "2024-10-30T13:11:22Z",
"updated_at": "2024-10-31T18:06:54Z",
"pushed_at": "2024-10-30T13:11:19Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 881512491,
"name": "CVE-2024-43532",
"full_name": "ShawtyTwo\/CVE-2024-43532",
"owner": {
"login": "ShawtyTwo",
"id": 186848728,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186848728?v=4",
"html_url": "https:\/\/github.com\/ShawtyTwo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ShawtyTwo\/CVE-2024-43532",
"description": null,
"fork": false,
"created_at": "2024-10-31T18:11:50Z",
"updated_at": "2024-10-31T18:12:54Z",
"pushed_at": "2024-10-31T18:12:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
@ -59,37 +90,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 879294248,
"name": "CVE-2024-43532",
"full_name": "hatvix1\/CVE-2024-43532",
"owner": {
"login": "hatvix1",
"id": 186392026,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186392026?v=4",
"html_url": "https:\/\/github.com\/hatvix1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hatvix1\/CVE-2024-43532",
"description": null,
"fork": false,
"created_at": "2024-10-27T14:31:51Z",
"updated_at": "2024-10-27T14:31:51Z",
"pushed_at": "2024-10-27T14:31:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-10-31T05:11:03Z",
"updated_at": "2024-10-31T14:22:01Z",
"pushed_at": "2024-06-07T03:28:00Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 127,
"watchers_count": 127,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 126,
"watchers": 127,
"score": 0,
"subscribers_count": 2
},

View file

@ -1,35 +1,4 @@
[
{
"id": 863248066,
"name": "CVE-2024-45519-PoC",
"full_name": "TOB1a3\/CVE-2024-45519-PoC",
"owner": {
"login": "TOB1a3",
"id": 182828768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/182828768?v=4",
"html_url": "https:\/\/github.com\/TOB1a3",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TOB1a3\/CVE-2024-45519-PoC",
"description": "CVE-2024-45519 unauthenticated OS commoand Injection in Zimbra prior to 8.8.15***.",
"fork": false,
"created_at": "2024-09-26T01:13:19Z",
"updated_at": "2024-10-04T09:26:48Z",
"pushed_at": "2024-09-26T01:34:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 864444203,
"name": "CVE-2024-45519",

View file

@ -14,12 +14,12 @@
"description": "Proof-of-Concept for CVE-2024-46538",
"fork": false,
"created_at": "2024-10-23T10:50:01Z",
"updated_at": "2024-10-31T09:52:46Z",
"updated_at": "2024-10-31T18:15:57Z",
"pushed_at": "2024-10-30T04:05:02Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -35,8 +35,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 7,
"watchers": 24,
"forks": 8,
"watchers": 25,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-27T08:24:35Z",
"updated_at": "2024-10-30T13:10:49Z",
"pushed_at": "2024-10-30T13:10:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"updated_at": "2024-10-31T18:12:39Z",
"pushed_at": "2024-10-31T17:59:52Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -107,10 +107,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-27T14:31:58Z",
"updated_at": "2024-10-27T14:31:58Z",
"pushed_at": "2024-10-27T14:31:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-10-31T18:13:02Z",
"pushed_at": "2024-10-31T18:01:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -215,5 +215,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 881511517,
"name": "CVE-2024-47575",
"full_name": "ShawtyTwo\/CVE-2024-47575",
"owner": {
"login": "ShawtyTwo",
"id": 186848728,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186848728?v=4",
"html_url": "https:\/\/github.com\/ShawtyTwo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ShawtyTwo\/CVE-2024-47575",
"description": null,
"fork": false,
"created_at": "2024-10-31T18:09:26Z",
"updated_at": "2024-10-31T18:12:51Z",
"pushed_at": "2024-10-31T18:10:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,40 +0,0 @@
[
{
"id": 869826420,
"name": "poc-CVE-2024-5057",
"full_name": "enter0x13\/poc-CVE-2024-5057",
"owner": {
"login": "enter0x13",
"id": 184323784,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184323784?v=4",
"html_url": "https:\/\/github.com\/enter0x13",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/enter0x13\/poc-CVE-2024-5057",
"description": "Let's try to inject, because it's CVE-2024-5057 ",
"fork": false,
"created_at": "2024-10-09T00:42:03Z",
"updated_at": "2024-10-16T21:48:43Z",
"pushed_at": "2024-10-09T01:46:27Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-5057",
"poc",
"poc-cve-2024-5057",
"wordpress",
"wp",
"wp-plugin"
],
"visibility": "public",
"forks": 4,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -2277,10 +2277,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-10-30T17:51:45Z",
"updated_at": "2024-10-31T15:25:58Z",
"pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -2289,7 +2289,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 2
},

View file

@ -1088,13 +1088,6 @@
- [sinsinology/CVE-2024-5009](https://github.com/sinsinology/CVE-2024-5009)
- [th3gokul/CVE-2024-5009](https://github.com/th3gokul/CVE-2024-5009)
### CVE-2024-5057 (2024-08-29)
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Easy Digital Downloads allows SQL Injection.This issue affects Easy Digital Downloads: from n/a through 3.2.12.
</code>
- [enter0x13/poc-CVE-2024-5057](https://github.com/enter0x13/poc-CVE-2024-5057)
### CVE-2024-5084 (2024-05-23)
<code>The Hash Form Drag &amp; Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
@ -5416,7 +5409,7 @@
### CVE-2024-43532
- [HazeLook/CVE-2024-43532](https://github.com/HazeLook/CVE-2024-43532)
- [Jaden1419/CVE-2024-43532](https://github.com/Jaden1419/CVE-2024-43532)
- [hatvix1/CVE-2024-43532](https://github.com/hatvix1/CVE-2024-43532)
- [ShawtyTwo/CVE-2024-43532](https://github.com/ShawtyTwo/CVE-2024-43532)
### CVE-2024-43582
- [jinxongwi/CVE-2024-43582-RCE](https://github.com/jinxongwi/CVE-2024-43582-RCE)
@ -5612,7 +5605,6 @@
- [Avento/CVE-2024-45507_Behinder_Webshell](https://github.com/Avento/CVE-2024-45507_Behinder_Webshell)
### CVE-2024-45519
- [TOB1a3/CVE-2024-45519-PoC](https://github.com/TOB1a3/CVE-2024-45519-PoC)
- [p33d/CVE-2024-45519](https://github.com/p33d/CVE-2024-45519)
- [Chocapikk/CVE-2024-45519](https://github.com/Chocapikk/CVE-2024-45519)
@ -5704,6 +5696,7 @@
- [hazesecurity/CVE-2024-47575](https://github.com/hazesecurity/CVE-2024-47575)
- [groshi/CVE-2024-47575-POC](https://github.com/groshi/CVE-2024-47575-POC)
- [zgimszhd61/CVE-2024-47575-POC](https://github.com/zgimszhd61/CVE-2024-47575-POC)
- [ShawtyTwo/CVE-2024-47575](https://github.com/ShawtyTwo/CVE-2024-47575)
### CVE-2024-47854
- [MarioTesoro/CVE-2024-47854](https://github.com/MarioTesoro/CVE-2024-47854)
@ -28475,7 +28468,6 @@
- [tpt11fb/AttackTomcat](https://github.com/tpt11fb/AttackTomcat)
- [Warelock/cve-2020-1938](https://github.com/Warelock/cve-2020-1938)
- [lizhianyuguangming/TomcatScanPro](https://github.com/lizhianyuguangming/TomcatScanPro)
- [s3nd3rjz/poc-CVE-2020-1938](https://github.com/s3nd3rjz/poc-CVE-2020-1938)
### CVE-2020-1947 (2020-03-11)
@ -32609,7 +32601,6 @@
- [X0UCYB3R/Check-WP-CVE-2020-35489](https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489)
- [reneoliveirajr/wp_CVE-2020-35489_checker](https://github.com/reneoliveirajr/wp_CVE-2020-35489_checker)
- [Cappricio-Securities/CVE-2020-35489](https://github.com/Cappricio-Securities/CVE-2020-35489)
- [aitech66/poc-CVE-2020-35489](https://github.com/aitech66/poc-CVE-2020-35489)
### CVE-2020-35498 (2021-02-11)
@ -33036,6 +33027,7 @@
- [rasan2001/Microsoft-Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708](https://github.com/rasan2001/Microsoft-Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708)
- [adyanamul/Remote-Code-Execution-RCE-Exploit-BlueKeep-CVE-2019-0708-PoC](https://github.com/adyanamul/Remote-Code-Execution-RCE-Exploit-BlueKeep-CVE-2019-0708-PoC)
- [DenuwanJayasekara/CVE-Exploitation-Reports](https://github.com/DenuwanJayasekara/CVE-Exploitation-Reports)
- [hualy13/CVE-2019-0708-Check](https://github.com/hualy13/CVE-2019-0708-Check)
### CVE-2019-0709 (2019-06-12)
@ -34813,13 +34805,6 @@
- [Insecurities/CVE-2019-11224](https://github.com/Insecurities/CVE-2019-11224)
### CVE-2019-11248 (2019-08-29)
<code>The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.
</code>
- [nod3jzzz/poc-CVE-2019-11248](https://github.com/nod3jzzz/poc-CVE-2019-11248)
### CVE-2019-11358 (2019-04-19)
<code>jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
@ -47779,13 +47764,6 @@
- [alt3kx/CVE-2001-1442](https://github.com/alt3kx/CVE-2001-1442)
### CVE-2001-1473 (2005-04-21)
<code>The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.
</code>
- [p1ton3rr/poc-cve-2001-1473](https://github.com/p1ton3rr/poc-cve-2001-1473)
### CVE-2001-3389
- [becrevex/Gaston](https://github.com/becrevex/Gaston)