Auto Update 2024/12/15 00:31:47

This commit is contained in:
motikan2010-bot 2024-12-15 09:31:47 +09:00
parent e863e6907c
commit 59436ed677
56 changed files with 230 additions and 190 deletions

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-10T17:34:52Z",
"updated_at": "2024-12-14T21:15:37Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2011,
"watchers_count": 2011,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2011,
"score": 0,
"subscribers_count": 37
},

View file

@ -174,13 +174,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -112,13 +112,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-10T17:34:52Z",
"updated_at": "2024-12-14T21:15:37Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2011,
"watchers_count": 2011,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2011,
"score": 0,
"subscribers_count": 37
},

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-10T17:34:52Z",
"updated_at": "2024-12-14T21:15:37Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2011,
"watchers_count": 2011,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2011,
"score": 0,
"subscribers_count": 37
},

View file

@ -576,10 +576,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-10T17:34:52Z",
"updated_at": "2024-12-14T21:15:37Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2011,
"watchers_count": 2011,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -609,7 +609,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2011,
"score": 0,
"subscribers_count": 37
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 350,
"watchers_count": 350,
"has_discussions": false,
"forks_count": 77,
"forks_count": 76,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 77,
"forks": 76,
"watchers": 350,
"score": 0,
"subscribers_count": 12

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-14T14:01:01Z",
"updated_at": "2024-12-14T21:15:38Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4143,
"watchers_count": 4143,
"stargazers_count": 4142,
"watchers_count": 4142,
"has_discussions": false,
"forks_count": 1100,
"allow_forking": true,
@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1100,
"watchers": 4143,
"watchers": 4142,
"score": 0,
"subscribers_count": 149
},

View file

@ -200,10 +200,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-10T17:34:52Z",
"updated_at": "2024-12-14T21:15:37Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2011,
"watchers_count": 2011,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -233,7 +233,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2011,
"score": 0,
"subscribers_count": 37
}

View file

@ -1039,10 +1039,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2024-12-04T06:56:00Z",
"updated_at": "2024-12-14T21:15:38Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1305,
"watchers_count": 1305,
"stargazers_count": 1303,
"watchers_count": 1303,
"has_discussions": false,
"forks_count": 344,
"allow_forking": true,
@ -1057,7 +1057,7 @@
],
"visibility": "public",
"forks": 344,
"watchers": 1305,
"watchers": 1303,
"score": 0,
"subscribers_count": 34
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2020-12-29T03:17:56Z",
"updated_at": "2021-01-16T07:53:53Z",
"updated_at": "2024-12-14T21:15:40Z",
"pushed_at": "2020-12-29T03:30:47Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-14T14:01:01Z",
"updated_at": "2024-12-14T21:15:38Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4143,
"watchers_count": 4143,
"stargazers_count": 4142,
"watchers_count": 4142,
"has_discussions": false,
"forks_count": 1100,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1100,
"watchers": 4143,
"watchers": 4142,
"score": 0,
"subscribers_count": 149
},

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-10T17:34:52Z",
"updated_at": "2024-12-14T21:15:37Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2011,
"watchers_count": 2011,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2011,
"score": 0,
"subscribers_count": 37
},

View file

@ -112,10 +112,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2024-12-03T02:31:30Z",
"updated_at": "2024-12-14T21:15:39Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 532,
"watchers_count": 532,
"stargazers_count": 530,
"watchers_count": 530,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -124,7 +124,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 532,
"watchers": 530,
"score": 0,
"subscribers_count": 8
},

View file

@ -113,10 +113,10 @@
"description": "POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!",
"fork": false,
"created_at": "2020-07-05T16:38:36Z",
"updated_at": "2024-08-12T20:03:24Z",
"updated_at": "2024-12-14T21:15:39Z",
"pushed_at": "2020-07-05T16:44:03Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -125,7 +125,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 13,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2024-12-12T08:10:38Z",
"updated_at": "2024-12-14T21:15:41Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1848,
"watchers_count": 1848,
"stargazers_count": 1847,
"watchers_count": 1847,
"has_discussions": false,
"forks_count": 583,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 583,
"watchers": 1848,
"watchers": 1847,
"score": 0,
"subscribers_count": 43
},

View file

@ -45,10 +45,10 @@
"description": "Pocsuite3 For CVE-2021-22205",
"fork": false,
"created_at": "2021-10-28T06:29:37Z",
"updated_at": "2024-08-12T20:17:36Z",
"updated_at": "2024-12-14T21:15:43Z",
"pushed_at": "2021-10-28T08:54:26Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 87,
"watchers": 86,
"score": 0,
"subscribers_count": 1
},

View file

@ -81,13 +81,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -2383,10 +2383,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2024-12-13T00:43:37Z",
"updated_at": "2024-12-14T22:41:12Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -2404,7 +2404,7 @@
],
"visibility": "public",
"forks": 34,
"watchers": 101,
"watchers": 102,
"score": 0,
"subscribers_count": 2
},

View file

@ -208,10 +208,10 @@
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
"updated_at": "2024-12-05T06:39:52Z",
"updated_at": "2024-12-14T21:15:43Z",
"pushed_at": "2024-07-12T14:17:27Z",
"stargazers_count": 246,
"watchers_count": 246,
"stargazers_count": 245,
"watchers_count": 245,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -224,7 +224,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 246,
"watchers": 245,
"score": 0,
"subscribers_count": 6
},
@ -1285,6 +1285,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -169,10 +169,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-29T07:32:30Z",
"updated_at": "2024-10-07T12:01:32Z",
"updated_at": "2024-12-14T21:15:43Z",
"pushed_at": "2021-12-31T08:30:33Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -184,7 +184,7 @@
],
"visibility": "public",
"forks": 31,
"watchers": 78,
"watchers": 77,
"score": 0,
"subscribers_count": 3
},

View file

@ -2453,20 +2453,20 @@
{
"id": 882127199,
"name": "Block-Spring4Shell",
"full_name": "BlackBird63030\/Block-Spring4Shell",
"full_name": "SkyM1raj\/Block-Spring4Shell",
"owner": {
"login": "BlackBird63030",
"login": "SkyM1raj",
"id": 141164867,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141164867?v=4",
"html_url": "https:\/\/github.com\/BlackBird63030",
"html_url": "https:\/\/github.com\/SkyM1raj",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BlackBird63030\/Block-Spring4Shell",
"html_url": "https:\/\/github.com\/SkyM1raj\/Block-Spring4Shell",
"description": "POC firewall with rules designed to detect and block Spring4Shell vulnerability (CVE-2022-22965) exploit",
"fork": false,
"created_at": "2024-11-02T00:26:02Z",
"updated_at": "2024-12-05T09:18:06Z",
"pushed_at": "2024-12-05T09:18:02Z",
"updated_at": "2024-12-15T00:16:07Z",
"pushed_at": "2024-12-15T00:16:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2024-11-18T20:38:59Z",
"updated_at": "2024-12-14T21:15:44Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 370,
"watchers_count": 370,
"stargazers_count": 369,
"watchers_count": 369,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 90,
"watchers": 370,
"watchers": 369,
"score": 0,
"subscribers_count": 8
},

View file

@ -19,7 +19,7 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"remote-code-execution"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -49,10 +49,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2024-12-13T21:40:02Z",
"updated_at": "2024-12-14T21:15:43Z",
"pushed_at": "2024-08-24T13:38:50Z",
"stargazers_count": 272,
"watchers_count": 272,
"stargazers_count": 273,
"watchers_count": 273,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -69,7 +69,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 272,
"watchers": 273,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-14T15:40:05Z",
"updated_at": "2024-12-14T21:37:35Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 18,
"watchers": 20,
"score": 0,
"subscribers_count": 1
}

View file

@ -126,13 +126,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -45,10 +45,10 @@
"description": "CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript)",
"fork": false,
"created_at": "2024-01-16T07:44:35Z",
"updated_at": "2024-10-03T14:16:35Z",
"updated_at": "2024-12-14T19:08:14Z",
"pushed_at": "2024-01-15T15:16:40Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 0
},

View file

@ -200,10 +200,10 @@
"description": "EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It features automated ADB connection checks, APK pushing, UID extraction, payload generation, and real-time progress updates, providing a seamless and professional user experience.",
"fork": false,
"created_at": "2024-08-04T13:14:10Z",
"updated_at": "2024-11-20T16:30:59Z",
"updated_at": "2024-12-14T20:46:44Z",
"pushed_at": "2024-08-05T14:13:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -182,13 +182,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@ -213,7 +213,7 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -226,7 +226,7 @@
"proof-of-concept"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -19,13 +19,13 @@
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 44,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-12155 Missing Authorization (CWE-862)",
"fork": false,
"created_at": "2024-12-06T13:03:09Z",
"updated_at": "2024-12-09T12:49:04Z",
"updated_at": "2024-12-14T20:28:42Z",
"pushed_at": "2024-12-06T13:13:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2024-20767 - Adobe ColdFusion",
"fork": false,
"created_at": "2024-03-26T06:51:08Z",
"updated_at": "2024-12-06T09:40:39Z",
"updated_at": "2024-12-14T21:15:49Z",
"pushed_at": "2024-03-26T15:52:49Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 32,
"watchers": 31,
"score": 0,
"subscribers_count": 1
},

View file

@ -85,7 +85,7 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -98,7 +98,7 @@
"sanitization"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1

View file

@ -138,10 +138,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-15T13:23:19Z",
"updated_at": "2024-11-29T16:24:07Z",
"updated_at": "2024-12-14T20:30:28Z",
"pushed_at": "2024-11-15T13:25:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -210,13 +210,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

33
2024/CVE-2024-23653.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 903010615,
"name": "CVE-2024-23653",
"full_name": "666asd\/CVE-2024-23653",
"owner": {
"login": "666asd",
"id": 16465586,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16465586?v=4",
"html_url": "https:\/\/github.com\/666asd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/666asd\/CVE-2024-23653",
"description": null,
"fork": false,
"created_at": "2024-12-13T18:27:39Z",
"updated_at": "2024-12-14T20:38:41Z",
"pushed_at": "2024-12-13T18:54:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -138,10 +138,10 @@
"description": "A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user",
"fork": false,
"created_at": "2024-08-04T17:40:51Z",
"updated_at": "2024-12-03T09:06:04Z",
"updated_at": "2024-12-14T19:10:57Z",
"pushed_at": "2024-08-15T10:48:05Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 2
},

View file

@ -79,10 +79,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
"fork": false,
"created_at": "2024-03-06T03:15:03Z",
"updated_at": "2024-12-08T12:52:01Z",
"updated_at": "2024-12-15T00:00:49Z",
"pushed_at": "2024-03-11T07:57:40Z",
"stargazers_count": 145,
"watchers_count": 145,
"stargazers_count": 146,
"watchers_count": 146,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -101,7 +101,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 145,
"watchers": 146,
"score": 0,
"subscribers_count": 3
},

View file

@ -107,10 +107,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-15T13:27:46Z",
"updated_at": "2024-11-29T16:24:07Z",
"updated_at": "2024-12-14T20:30:29Z",
"pushed_at": "2024-11-15T13:31:14Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2024-29847",
"fork": false,
"created_at": "2024-09-14T21:51:41Z",
"updated_at": "2024-12-04T06:22:57Z",
"updated_at": "2024-12-14T20:58:12Z",
"pushed_at": "2024-09-15T08:07:22Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
}

View file

@ -491,13 +491,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Path traversal in Ollama with rogue registry server",
"fork": false,
"created_at": "2024-06-26T03:11:29Z",
"updated_at": "2024-12-01T12:59:57Z",
"updated_at": "2024-12-14T21:15:50Z",
"pushed_at": "2024-06-28T03:14:05Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 21,
"watchers": 20,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-14T15:40:05Z",
"updated_at": "2024-12-14T21:37:35Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 18,
"watchers": 20,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-14T09:22:33Z",
"updated_at": "2024-12-14T17:39:48Z",
"updated_at": "2024-12-14T23:15:11Z",
"pushed_at": "2024-12-14T10:13:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-15T13:15:39Z",
"updated_at": "2024-11-29T16:24:07Z",
"updated_at": "2024-12-14T20:30:28Z",
"pushed_at": "2024-11-15T13:19:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-09-28T08:29:06Z",
"updated_at": "2024-11-05T02:40:56Z",
"updated_at": "2024-12-14T20:49:31Z",
"pushed_at": "2024-09-28T08:34:05Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 41,
"watchers": 42,
"score": 0,
"subscribers_count": 2
},

View file

@ -76,10 +76,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-15T13:19:33Z",
"updated_at": "2024-11-29T16:24:07Z",
"updated_at": "2024-12-14T20:30:28Z",
"pushed_at": "2024-11-15T18:56:01Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.",
"fork": false,
"created_at": "2024-09-29T10:58:15Z",
"updated_at": "2024-12-11T10:54:19Z",
"updated_at": "2024-12-14T21:15:50Z",
"pushed_at": "2024-10-04T09:39:09Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 130,
"watchers": 129,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -3016,6 +3016,13 @@
- [abian2/CVE-2024-23652](https://github.com/abian2/CVE-2024-23652)
### CVE-2024-23653 (2024-01-31)
<code>BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. \n
</code>
- [666asd/CVE-2024-23653](https://github.com/666asd/CVE-2024-23653)
### CVE-2024-23692 (2024-05-31)
<code>Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported.
@ -17888,7 +17895,7 @@
- [sohamsharma966/Spring4Shell-CVE-2022-22965](https://github.com/sohamsharma966/Spring4Shell-CVE-2022-22965)
- [LucasPDiniz/CVE-2022-22965](https://github.com/LucasPDiniz/CVE-2022-22965)
- [xsxtw/SpringFramework_CVE-2022-22965_RCE](https://github.com/xsxtw/SpringFramework_CVE-2022-22965_RCE)
- [BlackBird63030/Block-Spring4Shell](https://github.com/BlackBird63030/Block-Spring4Shell)
- [SkyM1raj/Block-Spring4Shell](https://github.com/SkyM1raj/Block-Spring4Shell)
- [guigui237/Expoitation-de-la-vuln-rabilit-CVE-2022-22965](https://github.com/guigui237/Expoitation-de-la-vuln-rabilit-CVE-2022-22965)
### CVE-2022-22966 (2022-04-14)