Auto Update 2024/12/01 18:31:35

This commit is contained in:
motikan2010-bot 2024-12-02 03:31:35 +09:00
parent d0be535bd4
commit 53f1b77c3e
44 changed files with 347 additions and 189 deletions

View file

@ -28,7 +28,7 @@
"forks": 9,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
},
{
"id": 62456741,

View file

@ -45,12 +45,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-11-28T15:07:29Z",
"updated_at": "2024-12-01T15:55:44Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2015,
"watchers_count": 2015,
"has_discussions": true,
"forks_count": 339,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -77,8 +77,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 339,
"watchers": 2014,
"forks": 340,
"watchers": 2015,
"score": 0,
"subscribers_count": 37
},

View file

@ -14,12 +14,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-11-28T15:07:29Z",
"updated_at": "2024-12-01T15:55:44Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2015,
"watchers_count": 2015,
"has_discussions": true,
"forks_count": 339,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -46,8 +46,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 339,
"watchers": 2014,
"forks": 340,
"watchers": 2015,
"score": 0,
"subscribers_count": 37
},

View file

@ -45,12 +45,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-11-28T15:07:29Z",
"updated_at": "2024-12-01T15:55:44Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2015,
"watchers_count": 2015,
"has_discussions": true,
"forks_count": 339,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -77,8 +77,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 339,
"watchers": 2014,
"forks": 340,
"watchers": 2015,
"score": 0,
"subscribers_count": 37
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization",
"fork": false,
"created_at": "2017-08-04T01:12:47Z",
"updated_at": "2024-11-01T02:37:42Z",
"updated_at": "2024-12-01T14:42:55Z",
"pushed_at": "2018-11-18T11:14:20Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 91,
"watchers": 92,
"score": 0,
"subscribers_count": 2
},

View file

@ -173,10 +173,10 @@
"description": "Insecure Java Deserialization Lab",
"fork": false,
"created_at": "2020-04-22T07:48:19Z",
"updated_at": "2023-06-22T06:33:22Z",
"updated_at": "2024-12-01T14:44:19Z",
"pushed_at": "2024-02-05T16:50:30Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -192,7 +192,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}

View file

@ -231,10 +231,10 @@
"description": "CVE-2017-7529 | nginx on the range 0.5.6 - 1.13.2",
"fork": false,
"created_at": "2021-01-19T07:12:10Z",
"updated_at": "2023-12-26T17:34:28Z",
"updated_at": "2024-12-01T16:42:12Z",
"pushed_at": "2021-01-19T07:17:52Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -243,7 +243,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},

View file

@ -576,12 +576,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-11-28T15:07:29Z",
"updated_at": "2024-12-01T15:55:44Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2015,
"watchers_count": 2015,
"has_discussions": true,
"forks_count": 339,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -608,8 +608,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 339,
"watchers": 2014,
"forks": 340,
"watchers": 2015,
"score": 0,
"subscribers_count": 37
},

View file

@ -1618,19 +1618,19 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2024-11-15T02:04:17Z",
"updated_at": "2024-12-01T12:18:09Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 895,
"watchers_count": 895,
"stargazers_count": 896,
"watchers_count": 896,
"has_discussions": false,
"forks_count": 243,
"forks_count": 242,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 243,
"watchers": 895,
"forks": 242,
"watchers": 896,
"score": 0,
"subscribers_count": 55
},
@ -1902,10 +1902,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2024-10-31T00:43:46Z",
"updated_at": "2024-12-01T14:42:56Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1174,
"watchers_count": 1174,
"stargazers_count": 1175,
"watchers_count": 1175,
"has_discussions": false,
"forks_count": 345,
"allow_forking": true,
@ -1914,7 +1914,7 @@
"topics": [],
"visibility": "public",
"forks": 345,
"watchers": 1174,
"watchers": 1175,
"score": 0,
"subscribers_count": 68
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -50,7 +50,7 @@
"stargazers_count": 4135,
"watchers_count": 4135,
"has_discussions": false,
"forks_count": 1100,
"forks_count": 1099,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -76,7 +76,7 @@
"webshell"
],
"visibility": "public",
"forks": 1100,
"forks": 1099,
"watchers": 4135,
"score": 0,
"subscribers_count": 149

View file

@ -233,10 +233,10 @@
"description": "Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215",
"fork": false,
"created_at": "2020-06-07T15:03:07Z",
"updated_at": "2024-11-28T09:07:00Z",
"updated_at": "2024-12-01T16:37:55Z",
"pushed_at": "2022-09-04T14:16:50Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -250,7 +250,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 3
},

View file

@ -200,12 +200,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-11-28T15:07:29Z",
"updated_at": "2024-12-01T15:55:44Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2015,
"watchers_count": 2015,
"has_discussions": true,
"forks_count": 339,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -232,8 +232,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 339,
"watchers": 2014,
"forks": 340,
"watchers": 2015,
"score": 0,
"subscribers_count": 37
}

View file

@ -19,7 +19,7 @@
"stargazers_count": 4135,
"watchers_count": 4135,
"has_discussions": false,
"forks_count": 1100,
"forks_count": 1099,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -45,7 +45,7 @@
"webshell"
],
"visibility": "public",
"forks": 1100,
"forks": 1099,
"watchers": 4135,
"score": 0,
"subscribers_count": 149

View file

@ -143,7 +143,7 @@
"stargazers_count": 1079,
"watchers_count": 1079,
"has_discussions": false,
"forks_count": 319,
"forks_count": 318,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -153,7 +153,7 @@
"poc"
],
"visibility": "public",
"forks": 319,
"forks": 318,
"watchers": 1079,
"score": 0,
"subscribers_count": 36

View file

@ -14,12 +14,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-11-28T15:07:29Z",
"updated_at": "2024-12-01T15:55:44Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2015,
"watchers_count": 2015,
"has_discussions": true,
"forks_count": 339,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -46,8 +46,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 339,
"watchers": 2014,
"forks": 340,
"watchers": 2015,
"score": 0,
"subscribers_count": 37
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2020-9992 - A design flaw in MobileDevice.framework\/Xcode and iOS\/iPadOS\/tvOS Development Tools allows an attacker in the same network to gain remote code execution on a target device",
"fork": false,
"created_at": "2020-09-16T23:35:22Z",
"updated_at": "2024-01-04T16:50:21Z",
"updated_at": "2024-12-01T14:46:30Z",
"pushed_at": "2020-09-23T14:52:06Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 65,
"watchers": 66,
"score": 0,
"subscribers_count": 7
}

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-11-29T07:54:41Z",
"updated_at": "2024-12-01T12:38:32Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1337,
"watchers_count": 1337,
"stargazers_count": 1338,
"watchers_count": 1338,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 165,
"watchers": 1337,
"watchers": 1338,
"score": 0,
"subscribers_count": 15
}

View file

@ -143,7 +143,7 @@
"stargazers_count": 1079,
"watchers_count": 1079,
"has_discussions": false,
"forks_count": 319,
"forks_count": 318,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -153,7 +153,7 @@
"poc"
],
"visibility": "public",
"forks": 319,
"forks": 318,
"watchers": 1079,
"score": 0,
"subscribers_count": 36

View file

@ -486,10 +486,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2024-11-26T09:51:32Z",
"updated_at": "2024-12-01T16:04:35Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 960,
"watchers_count": 960,
"stargazers_count": 961,
"watchers_count": 961,
"has_discussions": false,
"forks_count": 237,
"allow_forking": true,
@ -498,7 +498,7 @@
"topics": [],
"visibility": "public",
"forks": 237,
"watchers": 960,
"watchers": 961,
"score": 0,
"subscribers_count": 27
},

View file

@ -244,10 +244,10 @@
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2024-11-17T00:40:44Z",
"updated_at": "2024-12-01T14:07:15Z",
"pushed_at": "2024-05-19T16:25:52Z",
"stargazers_count": 784,
"watchers_count": 784,
"stargazers_count": 785,
"watchers_count": 785,
"has_discussions": false,
"forks_count": 121,
"allow_forking": true,
@ -256,7 +256,7 @@
"topics": [],
"visibility": "public",
"forks": 121,
"watchers": 784,
"watchers": 785,
"score": 0,
"subscribers_count": 10
},

View file

@ -49,10 +49,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2024-11-27T09:10:35Z",
"updated_at": "2024-12-01T16:43:06Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1968,
"watchers_count": 1968,
"stargazers_count": 1969,
"watchers_count": 1969,
"has_discussions": false,
"forks_count": 512,
"allow_forking": true,
@ -61,7 +61,7 @@
"topics": [],
"visibility": "public",
"forks": 512,
"watchers": 1968,
"watchers": 1969,
"score": 0,
"subscribers_count": 20
},

View file

@ -1202,10 +1202,10 @@
"description": "Grafana Decryptor for CVE-2021-43798",
"fork": false,
"created_at": "2024-07-02T08:43:45Z",
"updated_at": "2024-07-02T09:00:01Z",
"updated_at": "2024-12-01T14:24:31Z",
"pushed_at": "2024-07-02T08:45:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1221,7 +1221,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -381,10 +381,10 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2024-11-29T23:17:46Z",
"updated_at": "2024-12-01T17:27:18Z",
"pushed_at": "2024-04-26T03:16:26Z",
"stargazers_count": 1106,
"watchers_count": 1106,
"stargazers_count": 1107,
"watchers_count": 1107,
"has_discussions": false,
"forks_count": 536,
"allow_forking": true,
@ -395,7 +395,7 @@
],
"visibility": "public",
"forks": 536,
"watchers": 1106,
"watchers": 1107,
"score": 0,
"subscribers_count": 23
},

View file

@ -14,8 +14,8 @@
"description": "PoC of CVE-2022-20474",
"fork": false,
"created_at": "2024-11-14T08:48:59Z",
"updated_at": "2024-11-18T08:29:54Z",
"pushed_at": "2024-11-16T08:00:49Z",
"updated_at": "2024-12-01T14:56:17Z",
"pushed_at": "2024-12-01T14:56:14Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-11-29T07:54:41Z",
"updated_at": "2024-12-01T12:38:32Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1337,
"watchers_count": 1337,
"stargazers_count": 1338,
"watchers_count": 1338,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 165,
"watchers": 1337,
"watchers": 1338,
"score": 0,
"subscribers_count": 15
}

View file

@ -138,10 +138,10 @@
"description": "exploit by python",
"fork": false,
"created_at": "2024-11-26T13:03:38Z",
"updated_at": "2024-11-26T13:03:42Z",
"pushed_at": "2024-11-26T13:03:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-12-01T13:50:51Z",
"pushed_at": "2024-12-01T13:50:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina",
"fork": false,
"created_at": "2022-05-30T18:17:38Z",
"updated_at": "2024-12-01T07:51:20Z",
"updated_at": "2024-12-01T17:54:04Z",
"pushed_at": "2022-06-05T21:06:13Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 57,
"watchers": 155,
"watchers": 156,
"score": 0,
"subscribers_count": 4
},

39
2023/CVE-2023-28205.json Normal file
View file

@ -0,0 +1,39 @@
[
{
"id": 896459919,
"name": "uaf-2023-28205",
"full_name": "ntfargo\/uaf-2023-28205",
"owner": {
"login": "ntfargo",
"id": 32229490,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32229490?v=4",
"html_url": "https:\/\/github.com\/ntfargo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ntfargo\/uaf-2023-28205",
"description": "PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability",
"fork": false,
"created_at": "2024-11-30T12:25:47Z",
"updated_at": "2024-12-01T16:18:19Z",
"pushed_at": "2024-12-01T16:08:19Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apple",
"poc",
"use-after-free",
"vulnerability",
"webkit"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
"fork": false,
"created_at": "2024-01-29T17:08:05Z",
"updated_at": "2024-11-15T17:09:30Z",
"updated_at": "2024-12-01T16:49:21Z",
"pushed_at": "2024-01-30T05:58:08Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 2
}

View file

@ -306,10 +306,10 @@
"description": "Xss injection, WonderCMS 3.2.0 -3.4.2 ",
"fork": false,
"created_at": "2024-11-24T17:39:45Z",
"updated_at": "2024-11-25T17:21:22Z",
"updated_at": "2024-12-01T17:20:02Z",
"pushed_at": "2024-11-24T18:08:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -318,7 +318,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},

View file

@ -110,10 +110,10 @@
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T18:29:27Z",
"updated_at": "2024-11-13T18:00:51Z",
"updated_at": "2024-12-01T17:17:34Z",
"pushed_at": "2024-01-13T13:50:20Z",
"stargazers_count": 236,
"watchers_count": 236,
"stargazers_count": 237,
"watchers_count": 237,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -122,7 +122,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 236,
"watchers": 237,
"score": 0,
"subscribers_count": 6
},

View file

@ -235,5 +235,36 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 896883913,
"name": "CVE-2024-10924-Bypass-MFA-Wordpress-LAB",
"full_name": "D1se0\/CVE-2024-10924-Bypass-MFA-Wordpress-LAB",
"owner": {
"login": "D1se0",
"id": 164921056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4",
"html_url": "https:\/\/github.com\/D1se0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D1se0\/CVE-2024-10924-Bypass-MFA-Wordpress-LAB",
"description": null,
"fork": false,
"created_at": "2024-12-01T14:43:16Z",
"updated_at": "2024-12-01T17:52:27Z",
"pushed_at": "2024-12-01T17:52:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-11320.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 896840057,
"name": "CVE-2024-11320",
"full_name": "mhaskar\/CVE-2024-11320",
"owner": {
"login": "mhaskar",
"id": 6861215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
"html_url": "https:\/\/github.com\/mhaskar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2024-11320",
"description": "Exploit for Pandora FMS Remote Code Execution CVE-2024-11320",
"fork": false,
"created_at": "2024-12-01T12:39:49Z",
"updated_at": "2024-12-01T12:54:15Z",
"pushed_at": "2024-12-01T12:48:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,19 +14,19 @@
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
"fork": false,
"created_at": "2024-11-29T06:13:36Z",
"updated_at": "2024-12-01T08:35:41Z",
"updated_at": "2024-12-01T16:44:44Z",
"pushed_at": "2024-11-29T21:02:56Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 17,
"forks": 6,
"watchers": 21,
"score": 0,
"subscribers_count": 1
}

View file

@ -80,10 +80,10 @@
"description": "POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE) due to improper input sanitization",
"fork": false,
"created_at": "2024-11-28T17:47:53Z",
"updated_at": "2024-11-29T11:18:46Z",
"updated_at": "2024-12-01T14:49:28Z",
"pushed_at": "2024-11-28T18:07:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -99,7 +99,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-22734.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 896950815,
"name": "CVE-2024-22734",
"full_name": "securekomodo\/CVE-2024-22734",
"owner": {
"login": "securekomodo",
"id": 4809643,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4809643?v=4",
"html_url": "https:\/\/github.com\/securekomodo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/securekomodo\/CVE-2024-22734",
"description": "Exploit POC for CVE-2024-22734 affecting AMCS Trux Software",
"fork": false,
"created_at": "2024-12-01T17:47:16Z",
"updated_at": "2024-12-01T17:49:22Z",
"pushed_at": "2024-12-01T17:48:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-05-14T18:48:41Z",
"updated_at": "2024-10-19T08:32:52Z",
"updated_at": "2024-12-01T14:52:57Z",
"pushed_at": "2024-09-27T10:46:14Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Path traversal in Ollama with rogue registry server",
"fork": false,
"created_at": "2024-06-26T03:11:29Z",
"updated_at": "2024-09-17T07:31:08Z",
"updated_at": "2024-12-01T12:59:57Z",
"pushed_at": "2024-06-28T03:14:05Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},

View file

@ -185,10 +185,10 @@
"description": "PDF.js是由Mozilla维护的基于JavaScript的PDF查看器。此漏洞允许攻击者在打开恶意 PDF 文件后立即执行任意 JavaScript 代码。这会影响所有 Firefox 用户 <126因为 Firefox 使用 PDF.js 来显示 PDF 文件,但也严重影响了许多基于 Web 和 Electron 的应用程序,这些应用程序(间接)使用 PDF.js 进行预览功能。",
"fork": false,
"created_at": "2024-06-13T15:14:47Z",
"updated_at": "2024-11-04T10:45:50Z",
"updated_at": "2024-12-01T16:03:04Z",
"pushed_at": "2024-06-13T15:19:57Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -197,7 +197,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Makes IDA (most versions) to crash upon opening it. ",
"fork": false,
"created_at": "2024-08-25T12:33:14Z",
"updated_at": "2024-11-30T16:47:45Z",
"updated_at": "2024-12-01T16:41:12Z",
"pushed_at": "2024-08-30T09:58:12Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 68,
"watchers": 69,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-48359 PoC",
"fork": false,
"created_at": "2024-10-30T14:52:04Z",
"updated_at": "2024-11-12T08:54:14Z",
"updated_at": "2024-12-01T16:09:54Z",
"pushed_at": "2024-10-30T15:02:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -154,37 +154,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 893500783,
"name": "CVE-2024-48990-exploit",
"full_name": "r0xdeadbeef\/CVE-2024-48990-exploit",
"owner": {
"login": "r0xdeadbeef",
"id": 65211256,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
"html_url": "https:\/\/github.com\/r0xdeadbeef",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r0xdeadbeef\/CVE-2024-48990-exploit",
"description": "Needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.",
"fork": false,
"created_at": "2024-11-24T15:57:45Z",
"updated_at": "2024-11-29T05:10:42Z",
"pushed_at": "2024-11-24T17:47:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 893561658,
"name": "needrestart-vulnerability-poc",
@ -252,5 +221,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 896921908,
"name": "CVE-2024-48990-exploit",
"full_name": "r0xdeadbeef\/CVE-2024-48990-exploit",
"owner": {
"login": "r0xdeadbeef",
"id": 65211256,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
"html_url": "https:\/\/github.com\/r0xdeadbeef",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r0xdeadbeef\/CVE-2024-48990-exploit",
"description": "Needrestart, prior to version 3.8, contains a vulnerability that allows local attackers to execute arbitrary code with root privileges. This is achieved by manipulating the PYTHONPATH environment variable to trick needrestart into running the Python interpreter in an unsafe context.",
"fork": false,
"created_at": "2024-12-01T16:26:44Z",
"updated_at": "2024-12-01T16:27:50Z",
"pushed_at": "2024-12-01T16:27:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -2141,6 +2141,7 @@
- [julesbsz/CVE-2024-10924](https://github.com/julesbsz/CVE-2024-10924)
- [Trackflaw/CVE-2024-10924-Wordpress-Docker](https://github.com/Trackflaw/CVE-2024-10924-Wordpress-Docker)
- [Maalfer/CVE-2024-10924-PoC](https://github.com/Maalfer/CVE-2024-10924-PoC)
- [D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB](https://github.com/D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB)
### CVE-2024-10958 (2024-11-10)
@ -2180,6 +2181,13 @@
- [xthalach/CVE-2024-11318](https://github.com/xthalach/CVE-2024-11318)
### CVE-2024-11320 (2024-11-21)
<code>Arbitrary commands execution on the server by exploiting a command injection vulnerability in the LDAP authentication mechanism. This issue affects Pandora FMS: from 700 through &lt;=777.4
</code>
- [mhaskar/CVE-2024-11320](https://github.com/mhaskar/CVE-2024-11320)
### CVE-2024-11381 (2024-11-22)
<code>The Control horas plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ch_registro' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
@ -2752,6 +2760,13 @@
- [zunak/CVE-2024-22641](https://github.com/zunak/CVE-2024-22641)
### CVE-2024-22734 (2024-04-12)
<code>An issue was discovered in AMCS Group Trux Waste Management Software before version 7.19.0018.26912, allows local attackers to obtain sensitive information via a static, hard-coded AES Key-IV pair in the TxUtilities.dll and TruxUser.cfg components.
</code>
- [securekomodo/CVE-2024-22734](https://github.com/securekomodo/CVE-2024-22734)
### CVE-2024-22752 (2024-03-07)
<code>Insecure permissions issue in EaseUS MobiMover 6.0.5 Build 21620 allows attackers to gain escalated privileges via use of crafted executable launched from the application installation directory.
@ -6711,9 +6726,9 @@
- [felmoltor/CVE-2024-48990](https://github.com/felmoltor/CVE-2024-48990)
- [Cyb3rFr0g/CVE-2024-48990-PoC](https://github.com/Cyb3rFr0g/CVE-2024-48990-PoC)
- [pentestfunctions/CVE-2024-48990-PoC-Testing](https://github.com/pentestfunctions/CVE-2024-48990-PoC-Testing)
- [r0xdeadbeef/CVE-2024-48990-exploit](https://github.com/r0xdeadbeef/CVE-2024-48990-exploit)
- [njeru-codes/needrestart-vulnerability-poc](https://github.com/njeru-codes/needrestart-vulnerability-poc)
- [ally-petitt/CVE-2024-48990-Exploit](https://github.com/ally-petitt/CVE-2024-48990-Exploit)
- [r0xdeadbeef/CVE-2024-48990-exploit](https://github.com/r0xdeadbeef/CVE-2024-48990-exploit)
### CVE-2024-49039 (2024-11-12)
@ -10389,6 +10404,13 @@
- [spotlightishere/inputcontrol](https://github.com/spotlightishere/inputcontrol)
### CVE-2023-28205 (2023-04-10)
<code>A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
</code>
- [ntfargo/uaf-2023-28205](https://github.com/ntfargo/uaf-2023-28205)
### CVE-2023-28206 (2023-04-10)
<code>An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1, iOS 15.7.5 and iPadOS 15.7.5, macOS Big Sur 11.7.6. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.