Auto Update 2024/10/08 18:31:24

This commit is contained in:
motikan2010-bot 2024-10-09 03:31:24 +09:00
parent f69acedba7
commit 693ef75ce4
41 changed files with 209 additions and 178 deletions

View file

@ -13,10 +13,10 @@
"description": "This Python script helps to detect the Etherleak (CVE-2003-0001) vulnerability on a target host by analyzing the padding data in network packets. The script uses Scapy to send various types of requests (ICMP, ARP, or TCP) and checks if the responses contain any padding data that could potentially leak sensitive memory contents.",
"fork": false,
"created_at": "2024-10-01T14:03:30Z",
"updated_at": "2024-10-04T06:24:00Z",
"updated_at": "2024-10-08T15:25:48Z",
"pushed_at": "2024-10-01T14:12:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -78,7 +78,7 @@
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 51,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -91,7 +91,7 @@
"vulnerable-container"
],
"visibility": "public",
"forks": 51,
"forks": 52,
"watchers": 129,
"score": 0,
"subscribers_count": 3

View file

@ -27,6 +27,6 @@
"forks": 17,
"watchers": 57,
"score": 0,
"subscribers_count": 2
"subscribers_count": 0
}
]

View file

@ -27,7 +27,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 739621837,

File diff suppressed because one or more lines are too long

View file

@ -18,7 +18,7 @@
"stargazers_count": 224,
"watchers_count": 224,
"has_discussions": false,
"forks_count": 71,
"forks_count": 65,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"exploitation"
],
"visibility": "public",
"forks": 71,
"forks": 65,
"watchers": 224,
"score": 0,
"subscribers_count": 15

View file

@ -1006,10 +1006,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2024-10-02T20:22:09Z",
"updated_at": "2024-10-08T12:14:06Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1298,
"watchers_count": 1298,
"stargazers_count": 1297,
"watchers_count": 1297,
"has_discussions": false,
"forks_count": 344,
"allow_forking": true,
@ -1024,7 +1024,7 @@
],
"visibility": "public",
"forks": 344,
"watchers": 1298,
"watchers": 1297,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "A proof-of-concept for CVE-2020-12753",
"fork": false,
"created_at": "2020-06-01T21:58:42Z",
"updated_at": "2024-02-25T10:41:32Z",
"updated_at": "2024-10-08T13:52:59Z",
"pushed_at": "2020-06-01T22:55:46Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 6
}

View file

@ -43,10 +43,10 @@
"description": "Cockpit CMS 0.11.1 NoSQL Injection to Remote Code Execution",
"fork": false,
"created_at": "2021-08-05T18:48:52Z",
"updated_at": "2023-07-11T15:19:07Z",
"updated_at": "2024-10-08T14:37:47Z",
"pushed_at": "2021-08-06T14:00:14Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -299,36 +299,6 @@
"score": 0,
"subscribers_count": 5
},
{
"id": 444978473,
"name": "testanull-CVE-2021-22005.py",
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-22005.py",
"owner": {
"login": "timb-machine-mirrors",
"id": 49810875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
},
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-22005.py",
"description": "Clone from gist",
"fork": false,
"created_at": "2022-01-05T23:22:08Z",
"updated_at": "2023-04-08T20:15:10Z",
"pushed_at": "2022-01-05T23:22:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 505737586,
"name": "cve-2021-22005",

View file

@ -13,10 +13,10 @@
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
"fork": false,
"created_at": "2021-06-05T15:05:01Z",
"updated_at": "2024-08-12T20:13:39Z",
"updated_at": "2024-10-08T14:38:28Z",
"pushed_at": "2023-06-11T08:47:04Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 2
},

View file

@ -28,5 +28,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 869670698,
"name": "FlaskCache_CVE-2021-33026_POC",
"full_name": "Agilevatester\/FlaskCache_CVE-2021-33026_POC",
"owner": {
"login": "Agilevatester",
"id": 170657414,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170657414?v=4",
"html_url": "https:\/\/github.com\/Agilevatester"
},
"html_url": "https:\/\/github.com\/Agilevatester\/FlaskCache_CVE-2021-33026_POC",
"description": null,
"fork": false,
"created_at": "2024-10-08T17:27:56Z",
"updated_at": "2024-10-08T18:00:09Z",
"pushed_at": "2024-10-08T18:00:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -296,7 +296,7 @@
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -309,7 +309,7 @@
"pwnkit"
],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 26,
"score": 0,
"subscribers_count": 3

View file

@ -29,36 +29,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 444977303,
"name": "testanull-CVE-2021-42321_poc.py",
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-42321_poc.py",
"owner": {
"login": "timb-machine-mirrors",
"id": 49810875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
},
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-42321_poc.py",
"description": "Clone from gist",
"fork": false,
"created_at": "2022-01-05T23:15:55Z",
"updated_at": "2023-04-08T20:14:09Z",
"pushed_at": "2022-01-05T23:16:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 535520694,
"name": "cve-2021-42321",

View file

@ -12390,5 +12390,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 869690102,
"name": "TPASLog4ShellPoC",
"full_name": "Carlos-Mesquita\/TPASLog4ShellPoC",
"owner": {
"login": "Carlos-Mesquita",
"id": 75860783,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75860783?v=4",
"html_url": "https:\/\/github.com\/Carlos-Mesquita"
},
"html_url": "https:\/\/github.com\/Carlos-Mesquita\/TPASLog4ShellPoC",
"description": "Proof of Concept (PoC) for the Log4Shell vulnerability (CVE-2021-44228), developed as part of the coursework for the curricular unit TPAS in the Master's degree in Information Security at FCUP.",
"fork": false,
"created_at": "2024-10-08T18:07:21Z",
"updated_at": "2024-10-08T18:07:26Z",
"pushed_at": "2024-10-08T18:07:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "A proof of concept exploit for SQLPad RCE (CVE-2022-0944).",
"fork": false,
"created_at": "2024-09-08T23:39:24Z",
"updated_at": "2024-09-21T23:32:34Z",
"updated_at": "2024-10-08T15:51:27Z",
"pushed_at": "2024-09-08T23:57:27Z",
"stargazers_count": 5,
"watchers_count": 5,

View file

@ -13,12 +13,12 @@
"description": "Attacks against QUIC (CVE-2022-30591)",
"fork": false,
"created_at": "2022-06-30T18:25:23Z",
"updated_at": "2024-06-12T06:29:42Z",
"updated_at": "2024-10-08T17:40:45Z",
"pushed_at": "2022-12-31T01:55:15Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 7,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"vulnerabilities"
],
"visibility": "public",
"forks": 7,
"watchers": 18,
"forks": 6,
"watchers": 19,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Major Security Vulnerability on PrestaShop Websites - CVE-2022-31101",
"fork": false,
"created_at": "2022-07-24T21:50:13Z",
"updated_at": "2024-10-04T20:46:37Z",
"updated_at": "2024-10-08T15:47:28Z",
"pushed_at": "2022-08-01T09:12:50Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-10-07T17:07:05Z",
"updated_at": "2024-10-08T13:31:03Z",
"pushed_at": "2024-08-01T15:09:15Z",
"stargazers_count": 265,
"watchers_count": 265,
"stargazers_count": 266,
"watchers_count": 266,
"has_discussions": true,
"forks_count": 39,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 265,
"watchers": 266,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2024-10-03T13:30:00Z",
"updated_at": "2024-10-08T17:11:05Z",
"pushed_at": "2023-07-10T16:35:49Z",
"stargazers_count": 472,
"watchers_count": 472,
"stargazers_count": 473,
"watchers_count": 473,
"has_discussions": false,
"forks_count": 162,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 472,
"watchers": 473,
"score": 0,
"subscribers_count": 10
},

View file

@ -676,8 +676,8 @@
"description": "CVE-2023-22527 | RCE using SSTI in Confluence",
"fork": false,
"created_at": "2024-10-06T15:16:04Z",
"updated_at": "2024-10-06T19:48:58Z",
"pushed_at": "2024-10-06T19:48:55Z",
"updated_at": "2024-10-08T14:45:52Z",
"pushed_at": "2024-10-08T14:45:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -193,10 +193,10 @@
"description": "Mass Scaning vulnerability in Cpanel [XSS] ",
"fork": false,
"created_at": "2023-05-17T20:46:59Z",
"updated_at": "2024-09-13T07:21:27Z",
"updated_at": "2024-10-08T14:28:45Z",
"pushed_at": "2024-08-25T00:34:47Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},

View file

@ -258,7 +258,7 @@
"fork": false,
"created_at": "2023-09-04T11:18:28Z",
"updated_at": "2024-07-27T09:06:16Z",
"pushed_at": "2024-10-04T15:40:01Z",
"pushed_at": "2024-10-08T15:44:23Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,

View file

@ -18,13 +18,13 @@
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 21,
"score": 0,
"subscribers_count": 1

View file

@ -168,13 +168,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -287,19 +287,19 @@
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
"fork": false,
"created_at": "2024-09-27T09:02:08Z",
"updated_at": "2024-10-08T11:37:28Z",
"updated_at": "2024-10-08T17:35:31Z",
"pushed_at": "2024-09-30T12:48:08Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 46,
"forks": 5,
"watchers": 50,
"score": 0,
"subscribers_count": 3
}

View file

@ -73,7 +73,7 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-10-08T07:04:45Z",
"updated_at": "2024-10-08T14:47:27Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 486,
"watchers_count": 486,

View file

@ -13,10 +13,10 @@
"description": "D-Link NAS CVE-2024-3273 Exploit Tool",
"fork": false,
"created_at": "2024-04-07T03:09:13Z",
"updated_at": "2024-10-05T10:34:02Z",
"updated_at": "2024-10-08T14:44:15Z",
"pushed_at": "2024-04-07T04:41:26Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 87,
"watchers": 88,
"score": 0,
"subscribers_count": 4
},

View file

@ -592,5 +592,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 869658204,
"name": "magento-cve-2024-34102-exploit-cosmicstring",
"full_name": "bka\/magento-cve-2024-34102-exploit-cosmicstring",
"owner": {
"login": "bka",
"id": 584644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/584644?v=4",
"html_url": "https:\/\/github.com\/bka"
},
"html_url": "https:\/\/github.com\/bka\/magento-cve-2024-34102-exploit-cosmicstring",
"description": null,
"fork": false,
"created_at": "2024-10-08T17:02:11Z",
"updated_at": "2024-10-08T17:05:44Z",
"pushed_at": "2024-10-08T17:05:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -256,10 +256,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-10-06T04:19:08Z",
"updated_at": "2024-10-08T18:22:46Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 606,
"watchers_count": 606,
"stargazers_count": 605,
"watchers_count": 605,
"has_discussions": false,
"forks_count": 110,
"allow_forking": true,
@ -268,7 +268,7 @@
"topics": [],
"visibility": "public",
"forks": 110,
"watchers": 606,
"watchers": 605,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,7 +13,7 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-10-07T14:19:14Z",
"updated_at": "2024-10-08T14:32:50Z",
"pushed_at": "2024-06-07T03:28:00Z",
"stargazers_count": 118,
"watchers_count": 118,

View file

@ -13,10 +13,10 @@
"description": "WBW Product Table Pro <= 1.9.4 - Unauthenticated Arbitrary SQL Execution to RCE",
"fork": false,
"created_at": "2024-09-24T05:50:03Z",
"updated_at": "2024-09-26T18:48:28Z",
"updated_at": "2024-10-08T13:47:15Z",
"pushed_at": "2024-09-24T05:52:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Hacking Windows through iTunes - Local Privilege Escalation 0-day",
"fork": false,
"created_at": "2024-10-04T14:20:15Z",
"updated_at": "2024-10-08T11:56:57Z",
"updated_at": "2024-10-08T16:50:04Z",
"pushed_at": "2024-10-04T14:59:50Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 45,
"watchers": 51,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "Ruby-SAML \/ GitLab Authentication Bypass (CVE-2024-45409) exploit",
"fork": false,
"created_at": "2024-10-07T09:24:46Z",
"updated_at": "2024-10-08T12:13:05Z",
"updated_at": "2024-10-08T17:51:39Z",
"pushed_at": "2024-10-07T11:50:17Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 3,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 32,
"forks": 6,
"watchers": 37,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,19 +73,19 @@
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
"fork": false,
"created_at": "2024-10-05T00:15:18Z",
"updated_at": "2024-10-08T10:50:16Z",
"updated_at": "2024-10-08T16:23:07Z",
"pushed_at": "2024-10-05T00:18:49Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 65,
"forks": 15,
"watchers": 68,
"score": 0,
"subscribers_count": 2
}

View file

@ -493,10 +493,10 @@
"description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
"fork": false,
"created_at": "2024-06-08T12:23:35Z",
"updated_at": "2024-10-06T08:59:01Z",
"updated_at": "2024-10-08T13:16:09Z",
"pushed_at": "2024-06-19T16:19:57Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -512,7 +512,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-46310 For FXServer version's v9601 and prior, Incorrect Access Control in FXServer version's v9601 and prior, for CFX.re FiveM, allows unauthenticated users to modify and read userdata via exposed api endpoint",
"fork": false,
"created_at": "2024-08-28T19:36:52Z",
"updated_at": "2024-10-07T13:10:08Z",
"updated_at": "2024-10-08T17:08:01Z",
"pushed_at": "2024-10-07T13:09:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -297,10 +297,10 @@
"description": "A simple scanner for identifying vulnerable cups-browsed instances on your network",
"fork": false,
"created_at": "2024-10-07T07:25:18Z",
"updated_at": "2024-10-08T10:55:53Z",
"updated_at": "2024-10-08T16:14:21Z",
"pushed_at": "2024-10-07T16:59:47Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -309,7 +309,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},

View file

@ -2208,13 +2208,13 @@
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 28,
"score": 0,
"subscribers_count": 2

View file

@ -82,10 +82,10 @@
"description": " A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-10-08T10:04:08Z",
"updated_at": "2024-10-08T10:08:11Z",
"updated_at": "2024-10-08T14:25:34Z",
"pushed_at": "2024-10-08T10:08:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -94,7 +94,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -3973,6 +3973,7 @@
- [wubinworks/magento2-cosmic-sting-patch](https://github.com/wubinworks/magento2-cosmic-sting-patch)
- [EQSTLab/CVE-2024-34102](https://github.com/EQSTLab/CVE-2024-34102)
- [Jhonsonwannaa/CVE-2024-34102](https://github.com/Jhonsonwannaa/CVE-2024-34102)
- [bka/magento-cve-2024-34102-exploit-cosmicstring](https://github.com/bka/magento-cve-2024-34102-exploit-cosmicstring)
### CVE-2024-34144 (2024-05-02)
@ -22012,7 +22013,6 @@
- [tiagob0b/CVE-2021-22005](https://github.com/tiagob0b/CVE-2021-22005)
- [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005)
- [shmilylty/cve-2021-22005-exp](https://github.com/shmilylty/cve-2021-22005-exp)
- [timb-machine-mirrors/testanull-CVE-2021-22005.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py)
- [InventorMAO/cve-2021-22005](https://github.com/InventorMAO/cve-2021-22005)
### CVE-2021-22006 (2021-09-23)
@ -23724,6 +23724,7 @@
</code>
- [CarlosG13/CVE-2021-33026](https://github.com/CarlosG13/CVE-2021-33026)
- [Agilevatester/FlaskCache_CVE-2021-33026_POC](https://github.com/Agilevatester/FlaskCache_CVE-2021-33026_POC)
### CVE-2021-33034 (2021-05-14)
@ -25481,7 +25482,6 @@
</code>
- [DarkSprings/CVE-2021-42321](https://github.com/DarkSprings/CVE-2021-42321)
- [timb-machine-mirrors/testanull-CVE-2021-42321_poc.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-42321_poc.py)
- [xnyuq/cve-2021-42321](https://github.com/xnyuq/cve-2021-42321)
- [7BitsTeam/exch_CVE-2021-42321](https://github.com/7BitsTeam/exch_CVE-2021-42321)
@ -26462,6 +26462,7 @@
- [asd58584388/CVE-2021-44228](https://github.com/asd58584388/CVE-2021-44228)
- [OtisSymbos/CVE-2021-44228-Log4Shell-](https://github.com/OtisSymbos/CVE-2021-44228-Log4Shell-)
- [safeer-accuknox/log4j-shell-poc](https://github.com/safeer-accuknox/log4j-shell-poc)
- [Carlos-Mesquita/TPASLog4ShellPoC](https://github.com/Carlos-Mesquita/TPASLog4ShellPoC)
### CVE-2021-44255 (2022-01-31)