Auto Update 2024/06/14 06:29:37

This commit is contained in:
motikan2010-bot 2024-06-14 15:29:37 +09:00
parent 8213e184bc
commit 48f12450b0
47 changed files with 302 additions and 193 deletions

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-06-08T02:22:57Z",
"updated_at": "2024-06-14T01:55:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1941,
"watchers_count": 1941,
"stargazers_count": 1942,
"watchers_count": 1942,
"has_discussions": true,
"forks_count": 334,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 334,
"watchers": 1941,
"watchers": 1942,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-06-08T02:22:57Z",
"updated_at": "2024-06-14T01:55:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1941,
"watchers_count": 1941,
"stargazers_count": 1942,
"watchers_count": 1942,
"has_discussions": true,
"forks_count": 334,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 334,
"watchers": 1941,
"watchers": 1942,
"score": 0,
"subscribers_count": 35
},

View file

@ -233,10 +233,10 @@
"description": "PoC for Dirty COW (CVE-2016-5195)",
"fork": false,
"created_at": "2016-10-22T15:25:34Z",
"updated_at": "2024-05-30T02:43:08Z",
"updated_at": "2024-06-14T02:34:42Z",
"pushed_at": "2022-03-16T12:08:54Z",
"stargazers_count": 481,
"watchers_count": 481,
"stargazers_count": 482,
"watchers_count": 482,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
@ -245,7 +245,7 @@
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 481,
"watchers": 482,
"score": 0,
"subscribers_count": 21
},

View file

@ -343,10 +343,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-06-12T22:34:05Z",
"updated_at": "2024-06-14T06:04:17Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 157,
"watchers": 158,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-06-08T02:22:57Z",
"updated_at": "2024-06-14T01:55:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1941,
"watchers_count": 1941,
"stargazers_count": 1942,
"watchers_count": 1942,
"has_discussions": true,
"forks_count": 334,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 334,
"watchers": 1941,
"watchers": 1942,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2024-06-12T07:51:56Z",
"updated_at": "2024-06-14T02:39:31Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 748,
"watchers_count": 748,
"stargazers_count": 749,
"watchers_count": 749,
"has_discussions": false,
"forks_count": 170,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 170,
"watchers": 748,
"watchers": 749,
"score": 0,
"subscribers_count": 41
},

View file

@ -13,10 +13,10 @@
"description": "Tool to exploit CVE-2018-13341 and recover hidden account password on Crestron devices",
"fork": false,
"created_at": "2019-12-13T01:27:36Z",
"updated_at": "2024-05-23T02:37:09Z",
"updated_at": "2024-06-14T00:37:55Z",
"pushed_at": "2019-12-13T01:36:08Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 5
},

View file

@ -557,10 +557,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-06-08T02:22:57Z",
"updated_at": "2024-06-14T01:55:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1941,
"watchers_count": 1941,
"stargazers_count": 1942,
"watchers_count": 1942,
"has_discussions": true,
"forks_count": 334,
"allow_forking": true,
@ -590,7 +590,7 @@
],
"visibility": "public",
"forks": 334,
"watchers": 1941,
"watchers": 1942,
"score": 0,
"subscribers_count": 35
},

32
2018/CVE-2018-7490.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 814936310,
"name": "uWSGI-CVE-2018-7490-POC",
"full_name": "qinzhu111\/uWSGI-CVE-2018-7490-POC",
"owner": {
"login": "qinzhu111",
"id": 170609894,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170609894?v=4",
"html_url": "https:\/\/github.com\/qinzhu111"
},
"html_url": "https:\/\/github.com\/qinzhu111\/uWSGI-CVE-2018-7490-POC",
"description": null,
"fork": false,
"created_at": "2024-06-14T02:50:35Z",
"updated_at": "2024-06-14T02:52:15Z",
"pushed_at": "2024-06-14T02:51:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -363,10 +363,10 @@
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
"fork": false,
"created_at": "2018-04-17T15:38:15Z",
"updated_at": "2024-06-10T19:00:59Z",
"updated_at": "2024-06-14T00:28:30Z",
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"has_discussions": false,
"forks_count": 64,
"allow_forking": true,
@ -375,7 +375,7 @@
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 122,
"watchers": 123,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal \/ Authenticated Arbitrary File Deletion in Python3",
"fork": false,
"created_at": "2023-02-24T10:58:53Z",
"updated_at": "2024-06-12T21:53:03Z",
"updated_at": "2024-06-14T04:13:27Z",
"pushed_at": "2023-02-27T16:32:59Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
"fork": false,
"created_at": "2019-10-04T14:43:57Z",
"updated_at": "2024-05-24T09:54:43Z",
"updated_at": "2024-06-14T04:55:11Z",
"pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 197,
"watchers_count": 197,
"stargazers_count": 198,
"watchers_count": 198,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 197,
"watchers": 198,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": "Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by march 2023. Uses CVE-2019-16253 as a payload to obtain a system shell. ",
"fork": false,
"created_at": "2023-01-19T19:47:13Z",
"updated_at": "2024-06-04T21:13:21Z",
"updated_at": "2024-06-14T03:20:19Z",
"pushed_at": "2024-03-20T19:12:39Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 73,
"watchers": 74,
"score": 0,
"subscribers_count": 11
}

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-06-08T02:22:57Z",
"updated_at": "2024-06-14T01:55:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1941,
"watchers_count": 1941,
"stargazers_count": 1942,
"watchers_count": 1942,
"has_discussions": true,
"forks_count": 334,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 334,
"watchers": 1941,
"watchers": 1942,
"score": 0,
"subscribers_count": 35
}

View file

@ -889,10 +889,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-06-12T22:34:05Z",
"updated_at": "2024-06-14T06:04:17Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -901,7 +901,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 157,
"watchers": 158,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-06-08T02:22:57Z",
"updated_at": "2024-06-14T01:55:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1941,
"watchers_count": 1941,
"stargazers_count": 1942,
"watchers_count": 1942,
"has_discussions": true,
"forks_count": 334,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 334,
"watchers": 1941,
"watchers": 1942,
"score": 0,
"subscribers_count": 35
},

View file

@ -509,10 +509,10 @@
"description": "PolicyKit CVE-2021-3560 Exploit (Authentication Agent)",
"fork": false,
"created_at": "2022-04-29T18:57:30Z",
"updated_at": "2024-01-04T17:08:11Z",
"updated_at": "2024-06-14T04:51:36Z",
"pushed_at": "2022-05-02T07:49:01Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -521,7 +521,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 114,
"watchers": 113,
"score": 0,
"subscribers_count": 3
},

View file

@ -79,10 +79,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2024-06-13T12:36:34Z",
"updated_at": "2024-06-14T02:53:58Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1926,
"watchers_count": 1926,
"stargazers_count": 1928,
"watchers_count": 1928,
"has_discussions": false,
"forks_count": 509,
"allow_forking": true,
@ -91,7 +91,7 @@
"topics": [],
"visibility": "public",
"forks": 509,
"watchers": 1926,
"watchers": 1928,
"score": 0,
"subscribers_count": 21
},
@ -169,10 +169,10 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2024-06-08T02:16:00Z",
"updated_at": "2024-06-14T05:52:14Z",
"pushed_at": "2023-05-04T19:24:39Z",
"stargazers_count": 1029,
"watchers_count": 1029,
"stargazers_count": 1030,
"watchers_count": 1030,
"has_discussions": false,
"forks_count": 308,
"allow_forking": true,
@ -185,7 +185,7 @@
],
"visibility": "public",
"forks": 308,
"watchers": 1029,
"watchers": 1030,
"score": 0,
"subscribers_count": 16
},
@ -943,7 +943,7 @@
"stargazers_count": 1007,
"watchers_count": 1007,
"has_discussions": false,
"forks_count": 178,
"forks_count": 179,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -951,7 +951,7 @@
"cve-2021-4034"
],
"visibility": "public",
"forks": 178,
"forks": 179,
"watchers": 1007,
"score": 0,
"subscribers_count": 14

View file

@ -1527,7 +1527,7 @@
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2024-04-29T17:48:37Z",
"pushed_at": "2024-06-13T01:46:54Z",
"pushed_at": "2024-06-14T01:49:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
@ -4705,7 +4705,7 @@
"forks": 5,
"watchers": 11,
"score": 0,
"subscribers_count": 14
"subscribers_count": 15
},
{
"id": 437960695,
@ -12648,8 +12648,8 @@
"description": "Objective: Demonstrate the exploitation of the Log4Shell vulnerability (CVE-2021-44228) within a simulated banking application environment.",
"fork": false,
"created_at": "2024-06-09T02:49:42Z",
"updated_at": "2024-06-12T21:19:44Z",
"pushed_at": "2024-06-12T21:19:41Z",
"updated_at": "2024-06-14T02:52:30Z",
"pushed_at": "2024-06-14T02:52:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -87,6 +87,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 264,
"watchers_count": 264,
"has_discussions": false,
"forks_count": 49,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 49,
"forks": 50,
"watchers": 264,
"score": 0,
"subscribers_count": 9

View file

@ -990,8 +990,8 @@
"description": null,
"fork": false,
"created_at": "2024-06-12T08:24:30Z",
"updated_at": "2024-06-12T09:38:26Z",
"pushed_at": "2024-06-12T09:38:23Z",
"updated_at": "2024-06-14T03:02:02Z",
"pushed_at": "2024-06-14T03:01:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
"fork": false,
"created_at": "2023-06-13T13:17:23Z",
"updated_at": "2024-06-11T17:56:51Z",
"updated_at": "2024-06-14T03:40:11Z",
"pushed_at": "2023-06-13T14:39:17Z",
"stargazers_count": 228,
"watchers_count": 228,
"stargazers_count": 229,
"watchers_count": 229,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 44,
"watchers": 228,
"watchers": 229,
"score": 0,
"subscribers_count": 4
},

View file

@ -73,10 +73,10 @@
"description": "GameOver(lay) Ubuntu Privilege Escalation",
"fork": false,
"created_at": "2023-10-09T22:02:42Z",
"updated_at": "2024-06-12T15:27:56Z",
"updated_at": "2024-06-14T06:02:32Z",
"pushed_at": "2023-10-09T22:44:21Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 103,
"watchers": 104,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 459,
"watchers_count": 459,
"has_discussions": false,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 39,
"forks": 40,
"watchers": 459,
"score": 0,
"subscribers_count": 15

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-15T12:14:18Z",
"updated_at": "2024-06-08T16:26:21Z",
"updated_at": "2024-06-14T04:12:09Z",
"pushed_at": "2024-03-08T12:57:53Z",
"stargazers_count": 187,
"watchers_count": 187,
"stargazers_count": 188,
"watchers_count": 188,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 187,
"watchers": 188,
"score": 0,
"subscribers_count": 10
},

View file

@ -92,6 +92,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,19 +43,19 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2024-05-18T21:38:08Z",
"updated_at": "2024-06-14T05:20:25Z",
"pushed_at": "2024-01-29T02:28:11Z",
"stargazers_count": 207,
"watchers_count": 207,
"stargazers_count": 208,
"watchers_count": 208,
"has_discussions": false,
"forks_count": 28,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 207,
"forks": 29,
"watchers": 208,
"score": 0,
"subscribers_count": 4
},

View file

@ -103,10 +103,10 @@
"description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")",
"fork": false,
"created_at": "2023-12-17T14:18:54Z",
"updated_at": "2024-05-14T15:21:41Z",
"updated_at": "2024-06-14T01:14:13Z",
"pushed_at": "2023-12-18T02:46:21Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": true,
"forks_count": 16,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-52251 There is a Remote Code Execution vulnerability provectus\/kafka-ui.",
"fork": false,
"created_at": "2024-01-06T11:07:36Z",
"updated_at": "2024-03-27T09:30:54Z",
"updated_at": "2024-06-14T02:52:13Z",
"pushed_at": "2024-01-23T19:06:14Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-06-13T08:09:52Z",
"updated_at": "2024-06-14T05:36:51Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2110,
"watchers_count": 2110,
"stargazers_count": 2113,
"watchers_count": 2113,
"has_discussions": false,
"forks_count": 269,
"forks_count": 270,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc"
],
"visibility": "public",
"forks": 269,
"watchers": 2110,
"forks": 270,
"watchers": 2113,
"score": 0,
"subscribers_count": 24
},

View file

@ -13,10 +13,10 @@
"description": "Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure",
"fork": false,
"created_at": "2024-02-09T14:31:56Z",
"updated_at": "2024-05-28T18:18:51Z",
"updated_at": "2024-06-14T03:34:24Z",
"pushed_at": "2024-02-09T15:14:03Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)",
"fork": false,
"created_at": "2024-06-13T06:00:24Z",
"updated_at": "2024-06-13T16:41:45Z",
"updated_at": "2024-06-14T03:05:11Z",
"pushed_at": "2024-06-13T07:00:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,9 +55,9 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 814570994,
@ -87,7 +87,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 814670168,
@ -117,6 +117,36 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 814916351,
"name": "CVE-2024-23692",
"full_name": "Mr-r00t11\/CVE-2024-23692",
"owner": {
"login": "Mr-r00t11",
"id": 68824333,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68824333?v=4",
"html_url": "https:\/\/github.com\/Mr-r00t11"
},
"html_url": "https:\/\/github.com\/Mr-r00t11\/CVE-2024-23692",
"description": null,
"fork": false,
"created_at": "2024-06-14T01:33:19Z",
"updated_at": "2024-06-14T01:47:48Z",
"pushed_at": "2024-06-14T01:47:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "Proof of concept for CVE-2024-24590",
"fork": false,
"created_at": "2024-06-11T22:30:26Z",
"updated_at": "2024-06-13T22:30:19Z",
"updated_at": "2024-06-14T02:24:46Z",
"pushed_at": "2024-06-13T11:33:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
@ -117,6 +117,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,21 +13,21 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-06-14T00:29:29Z",
"updated_at": "2024-06-14T06:17:08Z",
"pushed_at": "2024-06-10T17:17:44Z",
"stargazers_count": 174,
"watchers_count": 174,
"stargazers_count": 184,
"watchers_count": 184,
"has_discussions": false,
"forks_count": 35,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 174,
"forks": 37,
"watchers": 184,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 813503450,
@ -43,10 +43,10 @@
"description": "Windows LPE",
"fork": false,
"created_at": "2024-06-11T08:03:29Z",
"updated_at": "2024-06-13T14:22:33Z",
"updated_at": "2024-06-14T00:57:37Z",
"pushed_at": "2024-06-11T20:41:59Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 30,
"watchers": 32,
"score": 0,
"subscribers_count": 1
},
@ -73,20 +73,20 @@
"description": "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel",
"fork": false,
"created_at": "2024-06-12T11:11:16Z",
"updated_at": "2024-06-14T00:24:39Z",
"updated_at": "2024-06-14T06:27:53Z",
"pushed_at": "2024-06-13T07:30:48Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 4,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 37,
"forks": 7,
"watchers": 72,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2024-27130",
"fork": false,
"created_at": "2024-05-17T07:58:01Z",
"updated_at": "2024-06-12T14:52:37Z",
"updated_at": "2024-06-14T06:22:42Z",
"pushed_at": "2024-05-17T10:27:07Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 0
},

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-27804",
"fork": false,
"created_at": "2024-05-14T14:17:06Z",
"updated_at": "2024-06-12T08:52:06Z",
"updated_at": "2024-06-14T05:59:05Z",
"pushed_at": "2024-05-14T14:55:23Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 116,
"watchers": 117,
"score": 0,
"subscribers_count": 5
}

View file

@ -163,10 +163,10 @@
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
"fork": false,
"created_at": "2024-05-14T14:21:49Z",
"updated_at": "2024-06-12T10:56:17Z",
"updated_at": "2024-06-14T02:22:15Z",
"pushed_at": "2024-05-29T03:43:05Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -195,7 +195,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 77,
"watchers": 78,
"score": 0,
"subscribers_count": 3
},
@ -327,6 +327,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

32
2024/CVE-2024-28995.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 814960106,
"name": "CVE-2024-28995",
"full_name": "krypton-kry\/CVE-2024-28995",
"owner": {
"login": "krypton-kry",
"id": 66370436,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66370436?v=4",
"html_url": "https:\/\/github.com\/krypton-kry"
},
"html_url": "https:\/\/github.com\/krypton-kry\/CVE-2024-28995",
"description": "CVE-2024-28995 PoC",
"fork": false,
"created_at": "2024-06-14T04:06:58Z",
"updated_at": "2024-06-14T04:09:37Z",
"pushed_at": "2024-06-14T04:07:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -27,6 +27,6 @@
"forks": 11,
"watchers": 72,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,20 +13,20 @@
"description": "PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855",
"fork": false,
"created_at": "2024-06-13T08:32:55Z",
"updated_at": "2024-06-13T11:23:13Z",
"updated_at": "2024-06-14T04:05:30Z",
"pushed_at": "2024-06-13T11:23:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 0,
"forks": 4,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-06-11T20:06:10Z",
"updated_at": "2024-06-14T02:11:52Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3466,
"watchers_count": 3466,
"stargazers_count": 3465,
"watchers_count": 3465,
"has_discussions": false,
"forks_count": 234,
"allow_forking": true,
@ -1024,9 +1024,9 @@
"topics": [],
"visibility": "public",
"forks": 234,
"watchers": 3466,
"watchers": 3465,
"score": 0,
"subscribers_count": 39
"subscribers_count": 40
},
{
"id": 780480213,

View file

@ -78,7 +78,7 @@
"stargazers_count": 441,
"watchers_count": 441,
"has_discussions": false,
"forks_count": 121,
"forks_count": 122,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -89,7 +89,7 @@
"rce"
],
"visibility": "public",
"forks": 121,
"forks": 122,
"watchers": 441,
"score": 0,
"subscribers_count": 3

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-37051 poc and exploit",
"fork": false,
"created_at": "2024-06-11T16:01:13Z",
"updated_at": "2024-06-13T11:23:35Z",
"updated_at": "2024-06-14T05:14:00Z",
"pushed_at": "2024-06-11T19:02:40Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 14,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},
@ -61,6 +61,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-06-13T15:37:33Z",
"updated_at": "2024-06-14T05:55:18Z",
"pushed_at": "2024-06-07T03:28:00Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 61,
"watchers": 62,
"score": 0,
"subscribers_count": 2
},
@ -104,7 +104,7 @@
"fork": false,
"created_at": "2024-05-22T23:18:20Z",
"updated_at": "2024-06-12T16:35:44Z",
"pushed_at": "2024-06-12T16:35:41Z",
"pushed_at": "2024-06-14T02:21:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -193,6 +193,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -177,7 +177,7 @@
"forks": 29,
"watchers": 122,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 811787647,
@ -888,7 +888,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 814702003,
@ -918,6 +918,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1220,6 +1220,7 @@
- [jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS](https://github.com/jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS)
- [vanboomqi/CVE-2024-23692](https://github.com/vanboomqi/CVE-2024-23692)
- [WanLiChangChengWanLiChang/CVE-2024-23692-RCE](https://github.com/WanLiChangChengWanLiChang/CVE-2024-23692-RCE)
- [Mr-r00t11/CVE-2024-23692](https://github.com/Mr-r00t11/CVE-2024-23692)
### CVE-2024-23722 (2024-03-26)
@ -2052,6 +2053,13 @@
- [saurabh2088/expat_2_1_0_CVE-2024-28757](https://github.com/saurabh2088/expat_2_1_0_CVE-2024-28757)
- [saurabh2088/expat_2_1_1_CVE-2024-28757](https://github.com/saurabh2088/expat_2_1_1_CVE-2024-28757)
### CVE-2024-28995 (2024-06-06)
<code>\n\n\n\n\n\n\n\n\n\n\n\nSolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine. \n\n\n\n\n\n\n\n
</code>
- [krypton-kry/CVE-2024-28995](https://github.com/krypton-kry/CVE-2024-28995)
### CVE-2024-29059 (2024-03-22)
<code>.NET Framework Information Disclosure Vulnerability
@ -34234,6 +34242,13 @@
- [tafamace/CVE-2018-7489](https://github.com/tafamace/CVE-2018-7489)
### CVE-2018-7490 (2018-02-26)
<code>uWSGI before 2.0.17 mishandles a DOCUMENT_ROOT check during use of the --php-docroot option, allowing directory traversal.
</code>
- [qinzhu111/uWSGI-CVE-2018-7490-POC](https://github.com/qinzhu111/uWSGI-CVE-2018-7490-POC)
### CVE-2018-7600 (2018-03-29)
<code>Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.