Auto Update 2024/09/13 06:30:06

This commit is contained in:
motikan2010-bot 2024-09-13 15:30:06 +09:00
parent 031c02ff2f
commit 57d5e2d8b3
42 changed files with 201 additions and 139 deletions

View file

@ -13,10 +13,10 @@
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
"fork": false,
"created_at": "2015-03-28T10:28:16Z",
"updated_at": "2024-08-12T19:16:51Z",
"updated_at": "2024-09-13T04:32:23Z",
"pushed_at": "2019-01-30T21:36:22Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 30,
"watchers": 67,
"watchers": 68,
"score": 0,
"subscribers_count": 7
}

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2016-1000027",
"fork": false,
"created_at": "2021-02-01T19:46:51Z",
"updated_at": "2024-07-30T08:47:51Z",
"updated_at": "2024-09-13T03:50:46Z",
"pushed_at": "2021-03-05T21:52:06Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},

View file

@ -403,10 +403,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-09-12T02:43:30Z",
"updated_at": "2024-09-13T00:36:57Z",
"pushed_at": "2024-09-09T07:42:24Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -423,7 +423,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-01-11T10:20:27Z",
"updated_at": "2024-08-01T05:44:39Z",
"pushed_at": "2024-08-01T05:44:43Z",
"pushed_at": "2024-09-13T05:41:46Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,

View file

@ -80,10 +80,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2024-09-05T05:42:59Z",
"updated_at": "2024-09-13T03:02:00Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 574,
"watchers_count": 574,
"stargazers_count": 575,
"watchers_count": 575,
"has_discussions": false,
"forks_count": 174,
"allow_forking": true,
@ -102,7 +102,7 @@
],
"visibility": "public",
"forks": 174,
"watchers": 574,
"watchers": 575,
"score": 0,
"subscribers_count": 23
},

View file

@ -919,10 +919,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-09-12T02:43:30Z",
"updated_at": "2024-09-13T00:36:57Z",
"pushed_at": "2024-09-09T07:42:24Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -939,7 +939,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 1
}

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-09-12T08:43:29Z",
"updated_at": "2024-09-13T02:34:20Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1306,
"watchers_count": 1306,
"stargazers_count": 1307,
"watchers_count": 1307,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 165,
"watchers": 1306,
"watchers": 1307,
"score": 0,
"subscribers_count": 15
}

View file

@ -2211,5 +2211,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 856715099,
"name": "CVE-2021-3156",
"full_name": "acidburn2049\/CVE-2021-3156",
"owner": {
"login": "acidburn2049",
"id": 181438567,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181438567?v=4",
"html_url": "https:\/\/github.com\/acidburn2049"
},
"html_url": "https:\/\/github.com\/acidburn2049\/CVE-2021-3156",
"description": null,
"fork": false,
"created_at": "2024-09-13T04:20:36Z",
"updated_at": "2024-09-13T04:20:37Z",
"pushed_at": "2024-09-13T04:20:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,34 +1,4 @@
[
{
"id": 444140549,
"name": "cve-2021-43858",
"full_name": "0rx1\/cve-2021-43858",
"owner": {
"login": "0rx1",
"id": 12779060,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12779060?v=4",
"html_url": "https:\/\/github.com\/0rx1"
},
"html_url": "https:\/\/github.com\/0rx1\/cve-2021-43858",
"description": null,
"fork": false,
"created_at": "2022-01-03T17:11:54Z",
"updated_at": "2023-11-18T03:11:06Z",
"pushed_at": "2022-01-03T14:15:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
{
"id": 626802613,
"name": "CVE-2021-43858-MinIO",

View file

@ -13,10 +13,10 @@
"description": "Apache Log4j 远程代码执行",
"fork": false,
"created_at": "2021-12-09T15:27:38Z",
"updated_at": "2024-08-24T16:05:18Z",
"updated_at": "2024-09-13T03:18:29Z",
"pushed_at": "2023-05-14T04:54:32Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 2
},

View file

@ -2020,6 +2020,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2024-09-10T12:29:40Z",
"updated_at": "2024-09-13T04:28:04Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 756,
"watchers_count": 756,
"stargazers_count": 757,
"watchers_count": 757,
"has_discussions": false,
"forks_count": 157,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 157,
"watchers": 756,
"watchers": 757,
"score": 0,
"subscribers_count": 16
}

View file

@ -1314,10 +1314,10 @@
"description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行CVE-2022-22947 注入哥斯拉内存马",
"fork": false,
"created_at": "2022-05-16T15:27:41Z",
"updated_at": "2024-08-23T00:20:16Z",
"updated_at": "2024-09-13T02:59:32Z",
"pushed_at": "2022-05-16T15:33:37Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -1326,7 +1326,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 51,
"watchers": 52,
"score": 0,
"subscribers_count": 1
},

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-09-12T08:43:29Z",
"updated_at": "2024-09-13T02:34:20Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1306,
"watchers_count": 1306,
"stargazers_count": 1307,
"watchers_count": 1307,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 165,
"watchers": 1306,
"watchers": 1307,
"score": 0,
"subscribers_count": 15
},

View file

@ -13,7 +13,7 @@
"description": "PoC Script for CVE-2022-36267: Exploits an unauthenticated remote command injection vulnerability in Airspan AirSpot 5410 antenna.",
"fork": false,
"created_at": "2024-01-08T22:23:57Z",
"updated_at": "2024-02-03T23:46:44Z",
"updated_at": "2024-09-13T01:20:33Z",
"pushed_at": "2024-01-08T22:37:55Z",
"stargazers_count": 8,
"watchers_count": 8,

View file

@ -48,13 +48,13 @@
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 35,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 35,
"forks": 34,
"watchers": 87,
"score": 0,
"subscribers_count": 3

View file

@ -69,6 +69,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -18,7 +18,7 @@
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 35,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 35,
"forks": 36,
"watchers": 147,
"score": 0,
"subscribers_count": 3

View file

@ -13,10 +13,10 @@
"description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
"fork": false,
"created_at": "2023-11-16T23:41:27Z",
"updated_at": "2024-09-02T09:37:59Z",
"updated_at": "2024-09-13T02:33:35Z",
"pushed_at": "2023-11-23T18:37:18Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 86,
"watchers": 87,
"score": 0,
"subscribers_count": 7
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -184,6 +184,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/vpxuser"
},
"html_url": "https:\/\/github.com\/vpxuser\/CVE-2023-3710-POC",
"description": null,
"description": "Honeywell PM43工控打印机管理后台username参数RCE漏洞证明POC",
"fork": false,
"created_at": "2023-07-03T01:14:02Z",
"updated_at": "2024-08-12T09:51:53Z",
"updated_at": "2024-09-13T00:33:35Z",
"pushed_at": "2023-09-27T01:11:00Z",
"stargazers_count": 5,
"watchers_count": 5,

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/vpxuser"
},
"html_url": "https:\/\/github.com\/vpxuser\/CVE-2023-3711-POC",
"description": null,
"description": "Honeywell PM43工控打印机管理后台XSS漏洞证明POC",
"fork": false,
"created_at": "2023-07-03T02:10:42Z",
"updated_at": "2023-10-13T05:59:27Z",
"updated_at": "2024-09-13T00:32:54Z",
"pushed_at": "2023-09-27T01:09:51Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/vpxuser"
},
"html_url": "https:\/\/github.com\/vpxuser\/CVE-2023-3712-POC",
"description": null,
"description": "Honeywell PM43工控打印机管理后台userpassword参数RCE漏洞证明POC",
"fork": false,
"created_at": "2023-07-03T01:51:11Z",
"updated_at": "2024-01-26T19:00:11Z",
"updated_at": "2024-09-13T00:33:59Z",
"pushed_at": "2023-09-27T01:11:18Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -141,10 +141,10 @@
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
"fork": false,
"created_at": "2023-10-13T23:55:32Z",
"updated_at": "2024-09-10T07:45:49Z",
"updated_at": "2024-09-13T01:52:08Z",
"pushed_at": "2023-10-30T20:22:37Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -153,7 +153,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 53,
"watchers": 54,
"score": 0,
"subscribers_count": 4
},

View file

@ -645,8 +645,8 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 回显利用工具",
"fork": false,
"created_at": "2024-03-05T07:09:21Z",
"updated_at": "2024-08-13T15:41:00Z",
"pushed_at": "2024-03-05T09:16:50Z",
"updated_at": "2024-09-13T05:35:28Z",
"pushed_at": "2024-09-13T05:35:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,

View file

@ -223,10 +223,10 @@
"description": null,
"fork": false,
"created_at": "2023-12-18T23:12:25Z",
"updated_at": "2024-08-27T22:26:30Z",
"updated_at": "2024-09-13T04:48:20Z",
"pushed_at": "2024-05-13T17:40:58Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 3
},

View file

@ -156,6 +156,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "PoC and Detection for CVE-2024-21626",
"fork": false,
"created_at": "2024-02-01T15:28:37Z",
"updated_at": "2024-08-20T08:38:22Z",
"updated_at": "2024-09-13T05:50:44Z",
"pushed_at": "2024-02-06T16:09:05Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 69,
"watchers": 70,
"score": 0,
"subscribers_count": 3
},

View file

@ -73,10 +73,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-09-11T15:30:00Z",
"updated_at": "2024-09-13T05:11:52Z",
"pushed_at": "2024-09-11T15:29:33Z",
"stargazers_count": 364,
"watchers_count": 364,
"stargazers_count": 365,
"watchers_count": 365,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 364,
"watchers": 365,
"score": 0,
"subscribers_count": 7
},

View file

@ -103,10 +103,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-09-12T21:35:31Z",
"updated_at": "2024-09-13T04:19:13Z",
"pushed_at": "2024-09-08T21:23:34Z",
"stargazers_count": 352,
"watchers_count": 352,
"stargazers_count": 353,
"watchers_count": 353,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 352,
"watchers": 353,
"score": 0,
"subscribers_count": 18
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "Spring Cloud Remote Code Execution",
"fork": false,
"created_at": "2024-09-11T14:09:50Z",
"updated_at": "2024-09-11T14:15:01Z",
"updated_at": "2024-09-13T03:21:50Z",
"pushed_at": "2024-09-11T14:12:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,19 +43,19 @@
"description": "RDL的堆溢出导致的RCE",
"fork": false,
"created_at": "2024-08-09T05:00:44Z",
"updated_at": "2024-09-12T09:04:33Z",
"updated_at": "2024-09-13T02:06:05Z",
"pushed_at": "2024-08-14T04:43:05Z",
"stargazers_count": 194,
"watchers_count": 194,
"stargazers_count": 195,
"watchers_count": 195,
"has_discussions": false,
"forks_count": 82,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 194,
"forks": 83,
"watchers": 195,
"score": 0,
"subscribers_count": 5
},

View file

@ -1527,7 +1527,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 856557928,
@ -1557,6 +1557,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -268,5 +268,35 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 856665318,
"name": "CVE-2024-4879",
"full_name": "0xWhoami35\/CVE-2024-4879",
"owner": {
"login": "0xWhoami35",
"id": 107396843,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107396843?v=4",
"html_url": "https:\/\/github.com\/0xWhoami35"
},
"html_url": "https:\/\/github.com\/0xWhoami35\/CVE-2024-4879",
"description": null,
"fork": false,
"created_at": "2024-09-13T01:20:34Z",
"updated_at": "2024-09-13T01:33:09Z",
"pushed_at": "2024-09-13T01:33:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1,4 +1,34 @@
[
{
"id": 845461331,
"name": "CVE-2024-5932-PoC",
"full_name": "0xb0mb3r\/CVE-2024-5932-PoC",
"owner": {
"login": "0xb0mb3r",
"id": 177725137,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177725137?v=4",
"html_url": "https:\/\/github.com\/0xb0mb3r"
},
"html_url": "https:\/\/github.com\/0xb0mb3r\/CVE-2024-5932-PoC",
"description": "Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection ",
"fork": false,
"created_at": "2024-08-21T09:51:21Z",
"updated_at": "2024-09-13T01:58:46Z",
"pushed_at": "2024-08-22T15:20:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 847287273,
"name": "CVE-2024-5932",

View file

@ -1403,10 +1403,10 @@
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ",
"fork": false,
"created_at": "2024-07-02T18:32:46Z",
"updated_at": "2024-09-12T16:00:31Z",
"updated_at": "2024-09-13T03:47:57Z",
"pushed_at": "2024-07-05T15:19:28Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -1424,7 +1424,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 51,
"watchers": 54,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2024-08-30T07:58:27Z",
"updated_at": "2024-09-12T11:00:00Z",
"updated_at": "2024-09-13T05:13:04Z",
"pushed_at": "2024-08-29T17:41:35Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 0
},

View file

@ -33,6 +33,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -973,6 +973,7 @@
- [NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning](https://github.com/NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning)
- [jdusane/CVE-2024-4879](https://github.com/jdusane/CVE-2024-4879)
- [fa-rrel/CVE-2024-4879](https://github.com/fa-rrel/CVE-2024-4879)
- [0xWhoami35/CVE-2024-4879](https://github.com/0xWhoami35/CVE-2024-4879)
### CVE-2024-4883 (2024-06-25)
@ -1118,6 +1119,7 @@
<code>The GiveWP Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files.
</code>
- [0xb0mb3r/CVE-2024-5932-PoC](https://github.com/0xb0mb3r/CVE-2024-5932-PoC)
- [EQSTLab/CVE-2024-5932](https://github.com/EQSTLab/CVE-2024-5932)
### CVE-2024-5947 (2024-06-13)
@ -20567,6 +20569,7 @@
- [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156)
- [lypd0/CVE-2021-3156-checker](https://github.com/lypd0/CVE-2021-3156-checker)
- [Typical0day/CVE-2021-3156](https://github.com/Typical0day/CVE-2021-3156)
- [acidburn2049/CVE-2021-3156](https://github.com/acidburn2049/CVE-2021-3156)
### CVE-2021-3157
- [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)
@ -25402,7 +25405,6 @@
<code>MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.
</code>
- [0rx1/cve-2021-43858](https://github.com/0rx1/cve-2021-43858)
- [khuntor/CVE-2021-43858-MinIO](https://github.com/khuntor/CVE-2021-43858-MinIO)
### CVE-2021-43883 (2021-12-15)