Auto Update 2024/11/11 06:31:29

This commit is contained in:
motikan2010-bot 2024-11-11 15:31:29 +09:00
parent 7f7a5e557c
commit 5c180066ec
46 changed files with 179 additions and 143 deletions

View file

@ -14,10 +14,10 @@
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
"fork": false,
"created_at": "2015-03-28T10:28:16Z",
"updated_at": "2024-11-06T20:57:38Z",
"updated_at": "2024-11-11T05:37:21Z",
"pushed_at": "2019-01-30T21:36:22Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 30,
"watchers": 71,
"watchers": 72,
"score": 0,
"subscribers_count": 7
}

View file

@ -45,7 +45,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-11-06T09:55:44Z",
"updated_at": "2024-11-11T05:58:06Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2008,
"watchers_count": 2008,

View file

@ -14,7 +14,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-11-06T09:55:44Z",
"updated_at": "2024-11-11T05:58:06Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2008,
"watchers_count": 2008,

View file

@ -417,10 +417,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-11-10T15:08:46Z",
"updated_at": "2024-11-11T04:03:01Z",
"pushed_at": "2024-09-09T07:42:24Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 103,
"watchers": 106,
"score": 0,
"subscribers_count": 2
}

View file

@ -45,7 +45,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-11-06T09:55:44Z",
"updated_at": "2024-11-11T05:58:06Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2008,
"watchers_count": 2008,

View file

@ -576,7 +576,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-11-06T09:55:44Z",
"updated_at": "2024-11-11T05:58:06Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2008,
"watchers_count": 2008,

View file

@ -14,10 +14,10 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2024-10-23T06:30:25Z",
"updated_at": "2024-11-11T00:55:12Z",
"pushed_at": "2020-06-13T17:40:14Z",
"stargazers_count": 617,
"watchers_count": 617,
"stargazers_count": 618,
"watchers_count": 618,
"has_discussions": false,
"forks_count": 81,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 81,
"watchers": 617,
"watchers": 618,
"score": 0,
"subscribers_count": 19
}

View file

@ -200,7 +200,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-11-06T09:55:44Z",
"updated_at": "2024-11-11T05:58:06Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2008,
"watchers_count": 2008,

View file

@ -14,10 +14,10 @@
"description": "Programa ideal para robar toda la información de un dispositivo remotamente a través de la aplicación AirDroid. [CVE-2019-9599] (https:\/\/www.exploit-db.com\/exploits\/46337)",
"fork": false,
"created_at": "2019-02-09T02:18:37Z",
"updated_at": "2024-11-10T07:09:42Z",
"updated_at": "2024-11-11T05:05:35Z",
"pushed_at": "2019-11-03T17:29:56Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 55,
"watchers": 56,
"score": 0,
"subscribers_count": 2
}

View file

@ -981,10 +981,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-11-10T15:08:46Z",
"updated_at": "2024-11-11T04:03:01Z",
"pushed_at": "2024-09-09T07:42:24Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -1001,7 +1001,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 103,
"watchers": 106,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,7 +14,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-11-06T09:55:44Z",
"updated_at": "2024-11-11T05:58:06Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2008,
"watchers_count": 2008,

View file

@ -155,6 +155,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -157,10 +157,10 @@
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
"fork": false,
"created_at": "2021-02-24T16:31:34Z",
"updated_at": "2024-11-02T20:25:44Z",
"updated_at": "2024-11-11T03:13:39Z",
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 251,
"watchers_count": 251,
"stargazers_count": 252,
"watchers_count": 252,
"has_discussions": false,
"forks_count": 87,
"allow_forking": true,
@ -169,7 +169,7 @@
"topics": [],
"visibility": "public",
"forks": 87,
"watchers": 251,
"watchers": 252,
"score": 0,
"subscribers_count": 9
},

View file

@ -14,10 +14,10 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
"updated_at": "2024-11-02T22:06:18Z",
"updated_at": "2024-11-11T05:58:13Z",
"pushed_at": "2021-10-13T22:32:36Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 128,
"watchers": 130,
"score": 0,
"subscribers_count": 7
},

View file

@ -541,10 +541,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2024-11-06T08:13:58Z",
"updated_at": "2024-11-11T02:10:31Z",
"pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 799,
"watchers_count": 799,
"stargazers_count": 800,
"watchers_count": 800,
"has_discussions": false,
"forks_count": 169,
"allow_forking": true,
@ -560,7 +560,7 @@
],
"visibility": "public",
"forks": 169,
"watchers": 799,
"watchers": 800,
"score": 0,
"subscribers_count": 18
},

View file

@ -14,10 +14,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2024-10-21T20:24:07Z",
"updated_at": "2024-11-11T00:54:36Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 981,
"watchers_count": 981,
"stargazers_count": 982,
"watchers_count": 982,
"has_discussions": false,
"forks_count": 189,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 189,
"watchers": 981,
"watchers": 982,
"score": 0,
"subscribers_count": 25
},

View file

@ -7264,7 +7264,7 @@
"fork": false,
"created_at": "2021-12-15T21:09:00Z",
"updated_at": "2023-06-22T04:46:02Z",
"pushed_at": "2024-10-30T06:30:11Z",
"pushed_at": "2024-11-11T06:14:52Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
@ -12781,6 +12781,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -179,10 +179,10 @@
"description": "Exploit for CVE-202225765 (pdfkit) - Command Injection",
"fork": false,
"created_at": "2023-02-10T00:50:35Z",
"updated_at": "2024-09-18T16:40:58Z",
"updated_at": "2024-11-11T01:50:23Z",
"pushed_at": "2024-05-20T00:34:48Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -205,7 +205,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},

View file

@ -107,20 +107,20 @@
"description": "CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!",
"fork": false,
"created_at": "2024-11-07T13:06:44Z",
"updated_at": "2024-11-10T15:24:37Z",
"updated_at": "2024-11-11T06:08:52Z",
"pushed_at": "2024-11-07T13:38:18Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 7,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 41,
"forks": 9,
"watchers": 52,
"score": 0,
"subscribers_count": 1
"subscribers_count": 3
}
]

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-11-10T08:41:35Z",
"updated_at": "2024-11-11T01:46:29Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1166,
"watchers_count": 1166,
"stargazers_count": 1167,
"watchers_count": 1167,
"has_discussions": true,
"forks_count": 190,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 1166,
"watchers": 1167,
"score": 0,
"subscribers_count": 19
},
@ -727,10 +727,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-07T09:19:02Z",
"updated_at": "2024-10-02T08:25:37Z",
"updated_at": "2024-11-11T03:33:36Z",
"pushed_at": "2022-06-07T10:35:18Z",
"stargazers_count": 332,
"watchers_count": 332,
"stargazers_count": 333,
"watchers_count": 333,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -739,7 +739,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 332,
"watchers": 333,
"score": 0,
"subscribers_count": 7
},

View file

@ -14,10 +14,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-11-09T11:27:49Z",
"updated_at": "2024-11-11T01:29:04Z",
"pushed_at": "2024-08-01T15:09:15Z",
"stargazers_count": 287,
"watchers_count": 287,
"stargazers_count": 288,
"watchers_count": 288,
"has_discussions": true,
"forks_count": 40,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 40,
"watchers": 287,
"watchers": 288,
"score": 0,
"subscribers_count": 6
},

View file

@ -14,10 +14,10 @@
"description": "[PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)",
"fork": false,
"created_at": "2022-12-09T22:48:38Z",
"updated_at": "2024-08-12T20:28:48Z",
"updated_at": "2024-11-11T01:49:48Z",
"pushed_at": "2022-12-11T13:37:22Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 88,
"watchers": 89,
"score": 0,
"subscribers_count": 1
},

View file

@ -107,10 +107,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2024-11-07T03:09:18Z",
"updated_at": "2024-11-11T05:43:48Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 884,
"watchers_count": 884,
"stargazers_count": 886,
"watchers_count": 886,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 884,
"watchers": 886,
"score": 0,
"subscribers_count": 25
},

View file

@ -284,6 +284,6 @@
"forks": 10,
"watchers": 36,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -50,7 +50,7 @@
"stargazers_count": 778,
"watchers_count": 778,
"has_discussions": false,
"forks_count": 138,
"forks_count": 139,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -60,7 +60,7 @@
"exploit"
],
"visibility": "public",
"forks": 138,
"forks": 139,
"watchers": 778,
"score": 0,
"subscribers_count": 9
@ -211,10 +211,10 @@
"description": "Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.",
"fork": false,
"created_at": "2023-08-28T08:56:16Z",
"updated_at": "2024-10-21T10:21:32Z",
"updated_at": "2024-11-11T04:58:57Z",
"pushed_at": "2023-08-31T07:40:12Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -223,9 +223,9 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 684145331,
@ -1426,7 +1426,7 @@
"fork": false,
"created_at": "2024-08-06T13:21:27Z",
"updated_at": "2024-08-06T14:44:37Z",
"pushed_at": "2024-10-21T03:58:45Z",
"pushed_at": "2024-11-11T03:19:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -623,6 +623,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-6319 proof of concept",
"fork": false,
"created_at": "2024-04-11T18:58:17Z",
"updated_at": "2024-10-17T11:18:50Z",
"updated_at": "2024-11-11T02:15:11Z",
"pushed_at": "2024-10-17T11:18:46Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 4
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Exploit for cve-2024-10914: D-Link DNS-320, DNS-320LW, DNS-325, DNS-340L Version 1.00, Version 1.01.0914.2012, Version 1.01, Version 1.02, Version 1.08 Command Injection",
"fork": false,
"created_at": "2024-11-09T19:30:39Z",
"updated_at": "2024-11-10T17:02:52Z",
"updated_at": "2024-11-11T01:13:07Z",
"pushed_at": "2024-11-09T19:31:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
@ -45,12 +45,12 @@
"description": "POC - CVE-202410914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
"fork": false,
"created_at": "2024-11-10T12:01:21Z",
"updated_at": "2024-11-10T17:01:19Z",
"updated_at": "2024-11-11T03:31:40Z",
"pushed_at": "2024-11-10T12:13:16Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -64,9 +64,9 @@
"unauthenticated-rce"
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -889,10 +889,10 @@
"description": "Poc para explotar la vulnerabilidad CVE-2024-23897 en versiones 2.441 y anteriores de Jenkins, mediante la cual podremos leer archivos internos del sistema sin estar autenticados",
"fork": false,
"created_at": "2024-05-16T09:32:51Z",
"updated_at": "2024-10-21T10:21:23Z",
"updated_at": "2024-11-11T04:57:17Z",
"pushed_at": "2024-05-17T11:54:26Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -901,9 +901,9 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 806068547,
@ -1097,5 +1097,36 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 886447560,
"name": "Jenkins-Args4j-CVE-2024-23897-POC",
"full_name": "safeer-accuknox\/Jenkins-Args4j-CVE-2024-23897-POC",
"owner": {
"login": "safeer-accuknox",
"id": 180378107,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180378107?v=4",
"html_url": "https:\/\/github.com\/safeer-accuknox",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/safeer-accuknox\/Jenkins-Args4j-CVE-2024-23897-POC",
"description": "Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability Leading to RCE",
"fork": false,
"created_at": "2024-11-11T01:43:18Z",
"updated_at": "2024-11-11T04:55:50Z",
"pushed_at": "2024-11-11T04:55:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Arbitrary file read exploit for CVE-2024-2928 in mlflow ",
"fork": false,
"created_at": "2024-11-08T03:55:08Z",
"updated_at": "2024-11-08T04:11:11Z",
"updated_at": "2024-11-11T04:01:25Z",
"pushed_at": "2024-11-08T04:11:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 197,
"watchers_count": 197,
"has_discussions": false,
"forks_count": 43,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 43,
"forks": 44,
"watchers": 197,
"score": 0,
"subscribers_count": 6

View file

@ -14,10 +14,10 @@
"description": "PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution",
"fork": false,
"created_at": "2024-06-16T09:43:46Z",
"updated_at": "2024-09-01T12:13:11Z",
"updated_at": "2024-11-11T03:07:31Z",
"pushed_at": "2024-06-16T09:51:05Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 2
}

View file

@ -19,7 +19,7 @@
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"rce"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 12,
"score": 0,
"subscribers_count": 1

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,7 +28,7 @@
"forks": 6,
"watchers": 10,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 853354116,
@ -90,7 +90,7 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 870756822,
@ -121,6 +121,6 @@
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -14,10 +14,10 @@
"description": "Proof-of-Concept for CVE-2024-46538",
"fork": false,
"created_at": "2024-10-23T10:50:01Z",
"updated_at": "2024-11-09T18:10:57Z",
"updated_at": "2024-11-11T00:51:33Z",
"pushed_at": "2024-11-06T10:56:41Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 1
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -105,6 +105,6 @@
"forks": 1,
"watchers": 10,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -289,7 +289,7 @@
"forks": 88,
"watchers": 458,
"score": 0,
"subscribers_count": 6
"subscribers_count": 7
},
{
"id": 822792125,
@ -684,10 +684,10 @@
"description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.",
"fork": false,
"created_at": "2024-07-02T06:53:35Z",
"updated_at": "2024-11-04T16:14:01Z",
"updated_at": "2024-11-11T04:00:50Z",
"pushed_at": "2024-07-04T20:04:30Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -696,7 +696,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.",
"fork": false,
"created_at": "2024-09-16T19:04:57Z",
"updated_at": "2024-11-05T07:38:46Z",
"updated_at": "2024-11-11T03:52:10Z",
"pushed_at": "2024-09-16T19:44:54Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 5
}

View file

@ -2806,6 +2806,7 @@
- [BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety](https://github.com/BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety)
- [ShieldAuth-PHP/PBL05-CVE-Analsys](https://github.com/ShieldAuth-PHP/PBL05-CVE-Analsys)
- [verylazytech/CVE-2024-23897](https://github.com/verylazytech/CVE-2024-23897)
- [safeer-accuknox/Jenkins-Args4j-CVE-2024-23897-POC](https://github.com/safeer-accuknox/Jenkins-Args4j-CVE-2024-23897-POC)
### CVE-2024-23995 (2024-04-29)
@ -5682,7 +5683,11 @@
- [OrangeJuiceHU/CVE-2024-41958-PoC](https://github.com/OrangeJuiceHU/CVE-2024-41958-PoC)
### CVE-2024-41992
### CVE-2024-41992 (2024-11-11)
<code>Wi-Fi Alliance wfa_dut (in Wi-Fi Test Suite) through 9.0.0 allows OS command injection via 802.11x frames because the system() library function is used. For example, on Arcadyan FMIMG51AX000J devices, this leads to wfaTGSendPing remote code execution as root via traffic to TCP port 8000 or 8080 on a LAN interface. On other devices, this may be exploitable over a WAN interface.
</code>
- [fj016/CVE-2024-41992-PoC](https://github.com/fj016/CVE-2024-41992-PoC)
### CVE-2024-42461 (2024-08-02)