Auto Update 2024/10/30 12:32:06

This commit is contained in:
motikan2010-bot 2024-10-30 21:32:06 +09:00
parent beffdc2975
commit 6a6b5d6fa0
47 changed files with 358 additions and 167 deletions

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-29T09:47:40Z",
"updated_at": "2024-10-30T07:28:07Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2003,
"watchers_count": 2003,
"stargazers_count": 2006,
"watchers_count": 2006,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2003,
"watchers": 2006,
"score": 0,
"subscribers_count": 37
},

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-29T09:47:40Z",
"updated_at": "2024-10-30T07:28:07Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2003,
"watchers_count": 2003,
"stargazers_count": 2006,
"watchers_count": 2006,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2003,
"watchers": 2006,
"score": 0,
"subscribers_count": 37
},

View file

@ -428,10 +428,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2024-10-29T15:35:08Z",
"updated_at": "2024-10-30T07:32:34Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 455,
"watchers_count": 455,
"stargazers_count": 456,
"watchers_count": 456,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -440,7 +440,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 455,
"watchers": 456,
"score": 0,
"subscribers_count": 9
},

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-29T09:47:40Z",
"updated_at": "2024-10-30T07:28:07Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2003,
"watchers_count": 2003,
"stargazers_count": 2006,
"watchers_count": 2006,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2003,
"watchers": 2006,
"score": 0,
"subscribers_count": 37
},

View file

@ -76,10 +76,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-10-29T03:31:49Z",
"updated_at": "2024-10-30T08:34:21Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 197,
"watchers_count": 197,
"stargazers_count": 198,
"watchers_count": 198,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 197,
"watchers": 198,
"score": 0,
"subscribers_count": 8
}

View file

@ -576,10 +576,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-29T09:47:40Z",
"updated_at": "2024-10-30T07:28:07Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2003,
"watchers_count": 2003,
"stargazers_count": 2006,
"watchers_count": 2006,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -609,7 +609,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2003,
"watchers": 2006,
"score": 0,
"subscribers_count": 37
},

View file

@ -107,10 +107,10 @@
"description": "php-fpm+Nginx RCE",
"fork": false,
"created_at": "2019-10-23T23:26:57Z",
"updated_at": "2024-10-15T22:00:08Z",
"updated_at": "2024-10-30T08:09:01Z",
"pushed_at": "2020-08-20T04:43:25Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 102,
"watchers": 101,
"score": 0,
"subscribers_count": 4
},

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-10-29T10:23:12Z",
"updated_at": "2024-10-30T07:42:04Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4113,
"watchers_count": 4113,
"stargazers_count": 4114,
"watchers_count": 4114,
"has_discussions": false,
"forks_count": 1097,
"allow_forking": true,
@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1097,
"watchers": 4113,
"watchers": 4114,
"score": 0,
"subscribers_count": 148
},

View file

@ -200,10 +200,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-29T09:47:40Z",
"updated_at": "2024-10-30T07:28:07Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2003,
"watchers_count": 2003,
"stargazers_count": 2006,
"watchers_count": 2006,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -233,7 +233,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2003,
"watchers": 2006,
"score": 0,
"subscribers_count": 37
}

View file

@ -14,10 +14,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2024-10-29T15:35:08Z",
"updated_at": "2024-10-30T07:32:34Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 455,
"watchers_count": 455,
"stargazers_count": 456,
"watchers_count": 456,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 455,
"watchers": 456,
"score": 0,
"subscribers_count": 9
},

View file

@ -14,10 +14,10 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2024-09-27T11:59:47Z",
"updated_at": "2024-10-30T07:25:46Z",
"pushed_at": "2023-09-28T18:58:28Z",
"stargazers_count": 668,
"watchers_count": 668,
"stargazers_count": 669,
"watchers_count": 669,
"has_discussions": false,
"forks_count": 130,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 130,
"watchers": 668,
"watchers": 669,
"score": 0,
"subscribers_count": 43
},

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-10-29T10:23:12Z",
"updated_at": "2024-10-30T07:42:04Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4113,
"watchers_count": 4113,
"stargazers_count": 4114,
"watchers_count": 4114,
"has_discussions": false,
"forks_count": 1097,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1097,
"watchers": 4113,
"watchers": 4114,
"score": 0,
"subscribers_count": 148
},

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-29T09:47:40Z",
"updated_at": "2024-10-30T07:28:07Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2003,
"watchers_count": 2003,
"stargazers_count": 2006,
"watchers_count": 2006,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2003,
"watchers": 2006,
"score": 0,
"subscribers_count": 37
},

View file

@ -14,10 +14,10 @@
"description": "Exploit to SYSTEM for CVE-2021-21551",
"fork": false,
"created_at": "2021-05-13T13:23:38Z",
"updated_at": "2024-10-15T17:04:11Z",
"updated_at": "2024-10-30T11:33:55Z",
"pushed_at": "2021-05-20T20:33:09Z",
"stargazers_count": 238,
"watchers_count": 238,
"stargazers_count": 237,
"watchers_count": 237,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 238,
"watchers": 237,
"score": 0,
"subscribers_count": 10
},

View file

@ -45,8 +45,8 @@
"description": "Results of my research I have done on CVE-2021-30481 and on wallhacks in the videogame Counter-Strike 2",
"fork": false,
"created_at": "2024-05-31T09:43:39Z",
"updated_at": "2024-06-12T08:40:18Z",
"pushed_at": "2024-06-04T06:18:46Z",
"updated_at": "2024-10-30T11:50:18Z",
"pushed_at": "2024-10-30T11:50:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -4168,10 +4168,10 @@
"description": "CVE-2021-4034 for single commcand",
"fork": false,
"created_at": "2022-05-21T05:42:01Z",
"updated_at": "2023-02-09T01:58:09Z",
"updated_at": "2024-10-30T07:16:18Z",
"pushed_at": "2022-05-31T11:56:20Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -4180,7 +4180,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2024-10-29T15:49:05Z",
"updated_at": "2024-10-30T11:32:55Z",
"pushed_at": "2021-11-11T17:09:56Z",
"stargazers_count": 462,
"watchers_count": 462,
"stargazers_count": 461,
"watchers_count": 461,
"has_discussions": false,
"forks_count": 91,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 91,
"watchers": 462,
"watchers": 461,
"score": 0,
"subscribers_count": 13
},

View file

@ -14,8 +14,8 @@
"description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
"fork": false,
"created_at": "2021-11-15T14:48:14Z",
"updated_at": "2024-10-15T00:55:39Z",
"pushed_at": "2024-09-17T14:27:11Z",
"updated_at": "2024-10-30T11:04:20Z",
"pushed_at": "2024-10-30T11:04:16Z",
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-10-26T19:36:59Z",
"updated_at": "2024-10-30T08:48:30Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 791,
"watchers_count": 791,
"stargazers_count": 792,
"watchers_count": 792,
"has_discussions": false,
"forks_count": 121,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 121,
"watchers": 791,
"watchers": 792,
"score": 0,
"subscribers_count": 13
},

View file

@ -815,8 +815,8 @@
"description": "A Java Agent that disables Apache Log4J's JNDI Lookup to mitigate CVE-2021-44228 (\"Log4Shell\").",
"fork": false,
"created_at": "2021-12-10T21:59:31Z",
"updated_at": "2024-08-12T20:18:44Z",
"pushed_at": "2024-05-15T11:27:40Z",
"updated_at": "2024-10-30T09:59:36Z",
"pushed_at": "2024-10-30T09:59:33Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
@ -7264,7 +7264,7 @@
"fork": false,
"created_at": "2021-12-15T21:09:00Z",
"updated_at": "2023-06-22T04:46:02Z",
"pushed_at": "2024-10-03T11:20:08Z",
"pushed_at": "2024-10-30T06:30:11Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -45,7 +45,7 @@
"description": null,
"fork": false,
"created_at": "2024-03-12T04:47:02Z",
"updated_at": "2024-03-22T03:55:01Z",
"updated_at": "2024-10-30T07:27:51Z",
"pushed_at": "2024-03-18T07:32:24Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -235,10 +235,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
"updated_at": "2024-10-28T07:24:10Z",
"updated_at": "2024-10-30T09:46:42Z",
"pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 312,
"watchers_count": 312,
"stargazers_count": 313,
"watchers_count": 313,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -251,7 +251,7 @@
],
"visibility": "public",
"forks": 46,
"watchers": 312,
"watchers": 313,
"score": 0,
"subscribers_count": 5
},

View file

@ -277,5 +277,43 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 880750787,
"name": "poc-cve-2023-21716",
"full_name": "n0s3ns33\/poc-cve-2023-21716",
"owner": {
"login": "n0s3ns33",
"id": 186808597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186808597?v=4",
"html_url": "https:\/\/github.com\/n0s3ns33",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/n0s3ns33\/poc-cve-2023-21716",
"description": "POC CVE 2023-21716",
"fork": false,
"created_at": "2024-10-30T09:38:36Z",
"updated_at": "2024-10-30T09:50:53Z",
"pushed_at": "2024-10-30T09:42:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-21716",
"exploit",
"poc",
"poc-cve-2023-21716",
"rce",
"rtf"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2024-10-17T12:26:30Z",
"updated_at": "2024-10-30T06:46:36Z",
"pushed_at": "2023-07-10T16:35:49Z",
"stargazers_count": 474,
"watchers_count": 474,
"stargazers_count": 475,
"watchers_count": 475,
"has_discussions": false,
"forks_count": 163,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 163,
"watchers": 474,
"watchers": 475,
"score": 0,
"subscribers_count": 10
},

View file

@ -81,10 +81,10 @@
"description": "PoC of CVE-2023-42793",
"fork": false,
"created_at": "2023-10-05T18:12:25Z",
"updated_at": "2024-05-15T00:29:40Z",
"updated_at": "2024-10-30T06:55:54Z",
"pushed_at": "2023-10-11T11:40:05Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -93,7 +93,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
@ -205,10 +205,10 @@
"description": "JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE), CVE-2023-42793",
"fork": false,
"created_at": "2024-04-24T16:33:20Z",
"updated_at": "2024-10-16T04:54:54Z",
"updated_at": "2024-10-30T06:55:28Z",
"pushed_at": "2024-04-24T23:10:27Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -227,7 +227,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-10-29T21:42:04Z",
"updated_at": "2024-10-30T07:44:53Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2270,
"watchers_count": 2270,
"stargazers_count": 2271,
"watchers_count": 2271,
"has_discussions": false,
"forks_count": 297,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 297,
"watchers": 2270,
"watchers": 2271,
"score": 0,
"subscribers_count": 23
},

33
2024/CVE-2024-21320.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 880686304,
"name": "CVE-2024-21320-POC",
"full_name": "sxyrxyy\/CVE-2024-21320-POC",
"owner": {
"login": "sxyrxyy",
"id": 125439203,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125439203?v=4",
"html_url": "https:\/\/github.com\/sxyrxyy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sxyrxyy\/CVE-2024-21320-POC",
"description": null,
"fork": false,
"created_at": "2024-10-30T06:58:19Z",
"updated_at": "2024-10-30T06:59:03Z",
"pushed_at": "2024-10-30T06:58:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the appid.sys driver",
"fork": false,
"created_at": "2024-04-23T19:09:22Z",
"updated_at": "2024-10-19T14:59:56Z",
"updated_at": "2024-10-30T11:35:28Z",
"pushed_at": "2024-04-23T19:13:53Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -265,10 +265,10 @@
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
"fork": false,
"created_at": "2024-01-27T19:34:48Z",
"updated_at": "2024-10-22T01:24:42Z",
"updated_at": "2024-10-30T10:29:36Z",
"pushed_at": "2024-03-16T07:55:41Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -281,7 +281,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 68,
"watchers": 69,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-10-28T16:38:54Z",
"updated_at": "2024-10-30T11:35:27Z",
"pushed_at": "2024-07-04T10:39:15Z",
"stargazers_count": 315,
"watchers_count": 315,
"stargazers_count": 316,
"watchers_count": 316,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 315,
"watchers": 316,
"score": 0,
"subscribers_count": 5
},

View file

@ -29,5 +29,36 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 880766464,
"name": "CVE-2024-27954",
"full_name": "Quantum-Hacker\/CVE-2024-27954",
"owner": {
"login": "Quantum-Hacker",
"id": 140636140,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140636140?v=4",
"html_url": "https:\/\/github.com\/Quantum-Hacker",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Quantum-Hacker\/CVE-2024-27954",
"description": null,
"fork": false,
"created_at": "2024-10-30T10:14:54Z",
"updated_at": "2024-10-30T10:33:37Z",
"pushed_at": "2024-10-30T10:32:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-3400",
"fork": false,
"created_at": "2024-04-13T14:00:31Z",
"updated_at": "2024-10-21T13:18:15Z",
"updated_at": "2024-10-30T11:19:32Z",
"pushed_at": "2024-04-18T07:11:17Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 58,
"watchers": 59,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-10-29T07:19:03Z",
"updated_at": "2024-10-30T11:28:51Z",
"pushed_at": "2024-10-17T18:36:54Z",
"stargazers_count": 186,
"watchers_count": 186,
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 186,
"watchers": 187,
"score": 0,
"subscribers_count": 5
},

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-37085 VMware ESXi RCE Vulnerability",
"fork": false,
"created_at": "2024-08-06T18:23:43Z",
"updated_at": "2024-10-29T01:26:47Z",
"updated_at": "2024-10-30T08:51:11Z",
"pushed_at": "2024-08-06T18:25:19Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Kernel pointers copied to output user mode buffer with ioctl 0x22A014 in the appid.sys driver.",
"fork": false,
"created_at": "2024-07-21T02:29:18Z",
"updated_at": "2024-10-23T08:58:37Z",
"updated_at": "2024-10-30T11:35:26Z",
"pushed_at": "2024-07-21T02:35:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-44000-LiteSpeed-Cache",
"fork": false,
"created_at": "2024-09-16T14:13:52Z",
"updated_at": "2024-10-07T09:37:53Z",
"updated_at": "2024-10-30T09:53:59Z",
"pushed_at": "2024-09-16T14:27:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Hacking Windows through iTunes - Local Privilege Escalation 0-day",
"fork": false,
"created_at": "2024-10-04T14:20:15Z",
"updated_at": "2024-10-29T14:47:35Z",
"updated_at": "2024-10-30T09:27:27Z",
"pushed_at": "2024-10-04T14:59:50Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 76,
"watchers": 77,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": "Pre-Authentication Heap Overflow in Xlight SFTP server <= 3.9.4.2",
"fork": false,
"created_at": "2024-10-18T11:46:14Z",
"updated_at": "2024-10-29T23:38:49Z",
"updated_at": "2024-10-30T11:38:04Z",
"pushed_at": "2024-10-18T12:29:36Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"forks": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Proof-of-Concept for CVE-2024-46538",
"fork": false,
"created_at": "2024-10-23T10:50:01Z",
"updated_at": "2024-10-30T04:05:05Z",
"updated_at": "2024-10-30T07:42:04Z",
"pushed_at": "2024-10-30T04:05:02Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2024-48914",
"fork": false,
"created_at": "2024-10-21T10:02:05Z",
"updated_at": "2024-10-21T15:18:51Z",
"updated_at": "2024-10-30T09:47:15Z",
"pushed_at": "2024-10-21T10:50:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-5124.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 880757168,
"name": "CVE-2024-5124",
"full_name": "gogo2464\/CVE-2024-5124",
"owner": {
"login": "gogo2464",
"id": 57051187,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57051187?v=4",
"html_url": "https:\/\/github.com\/gogo2464",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gogo2464\/CVE-2024-5124",
"description": null,
"fork": false,
"created_at": "2024-10-30T09:53:42Z",
"updated_at": "2024-10-30T09:55:14Z",
"pushed_at": "2024-10-30T09:55:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -11,21 +11,21 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/refr4g\/CVE-2024-51378",
"description": "Exploit for CyberPanel RCE via Command Injection",
"description": "Exploit for CyberPanel Pre-Auth RCE via Command Injection",
"fork": false,
"created_at": "2024-10-29T23:34:27Z",
"updated_at": "2024-10-30T04:07:56Z",
"pushed_at": "2024-10-30T04:07:52Z",
"updated_at": "2024-10-30T07:55:02Z",
"pushed_at": "2024-10-30T07:54:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-29T11:58:25Z",
"updated_at": "2024-09-30T13:21:04Z",
"updated_at": "2024-10-30T09:44:22Z",
"pushed_at": "2024-08-30T01:15:43Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 72,
"watchers": 73,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)",
"fork": false,
"created_at": "2024-08-29T16:40:49Z",
"updated_at": "2024-10-28T06:31:16Z",
"updated_at": "2024-10-30T11:27:03Z",
"pushed_at": "2024-09-29T21:58:19Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 48,
"watchers": 49,
"score": 0,
"subscribers_count": 2
}

33
2024/CVE-2024-6788.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 880775468,
"name": "CVE-2024-6788",
"full_name": "zetraxz\/CVE-2024-6788",
"owner": {
"login": "zetraxz",
"id": 186395163,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186395163?v=4",
"html_url": "https:\/\/github.com\/zetraxz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zetraxz\/CVE-2024-6788",
"description": null,
"fork": false,
"created_at": "2024-10-30T10:36:50Z",
"updated_at": "2024-10-30T10:46:28Z",
"pushed_at": "2024-10-30T10:46:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Exploit for Grafana arbitrary file-read (CVE-2024-9264)",
"fork": false,
"created_at": "2024-10-19T13:50:52Z",
"updated_at": "2024-10-28T12:35:08Z",
"updated_at": "2024-10-30T06:51:39Z",
"pushed_at": "2024-10-19T16:01:12Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 75,
"watchers": 76,
"score": 0,
"subscribers_count": 1
},
@ -57,10 +57,10 @@
"description": "File Read Proof of Concept for CVE-2024-9264",
"fork": false,
"created_at": "2024-10-20T01:13:37Z",
"updated_at": "2024-10-22T15:24:17Z",
"updated_at": "2024-10-30T09:41:01Z",
"pushed_at": "2024-10-20T11:46:34Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -1105,6 +1105,13 @@
- [k3lpi3b4nsh33/CVE-2024-5084](https://github.com/k3lpi3b4nsh33/CVE-2024-5084)
- [WOOOOONG/CVE-2024-5084](https://github.com/WOOOOONG/CVE-2024-5084)
### CVE-2024-5124 (2024-06-06)
<code>A timing attack vulnerability exists in the gaizhenbiao/chuanhuchatgpt repository, specifically within the password comparison logic. The vulnerability is present in version 20240310 of the software, where passwords are compared using the '=' operator in Python. This method of comparison allows an attacker to guess passwords based on the timing of each character's comparison. The issue arises from the code segment that checks a password for a particular username, which can lead to the exposure of sensitive information to an unauthorized actor. An attacker exploiting this vulnerability could potentially guess user passwords, compromising the security of the system.
</code>
- [gogo2464/CVE-2024-5124](https://github.com/gogo2464/CVE-2024-5124)
### CVE-2024-5246 (2024-05-23)
<code>NETGEAR ProSAFE Network Management System Tomcat Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the product installer. The issue results from the use of a vulnerable version of Apache Tomcat. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-22868.
@ -1428,6 +1435,13 @@
- [jdpsl/CVE-2024-6782](https://github.com/jdpsl/CVE-2024-6782)
- [R4idB0Y/CVE-2024-6782-PoC](https://github.com/R4idB0Y/CVE-2024-6782-PoC)
### CVE-2024-6788 (2024-08-13)
<code>A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.
</code>
- [zetraxz/CVE-2024-6788](https://github.com/zetraxz/CVE-2024-6788)
### CVE-2024-7029 (2024-08-02)
<code>Commands can be injected over the network and executed without authentication.
@ -1842,6 +1856,13 @@
- [d4rks1d33/C-PoC-for-CVE-2024-21306](https://github.com/d4rks1d33/C-PoC-for-CVE-2024-21306)
- [PhucHauDeveloper/BadBlue](https://github.com/PhucHauDeveloper/BadBlue)
### CVE-2024-21320 (2024-01-09)
<code>Windows Themes Spoofing Vulnerability
</code>
- [sxyrxyy/CVE-2024-21320-POC](https://github.com/sxyrxyy/CVE-2024-21320-POC)
### CVE-2024-21338 (2024-02-13)
<code>Windows Kernel Elevation of Privilege Vulnerability
@ -3338,6 +3359,7 @@
</code>
- [fa-rrel/CVE-2024-27954](https://github.com/fa-rrel/CVE-2024-27954)
- [Quantum-Hacker/CVE-2024-27954](https://github.com/Quantum-Hacker/CVE-2024-27954)
### CVE-2024-27956 (2024-03-21)
@ -7652,6 +7674,7 @@
- [JMousqueton/CVE-2023-21716](https://github.com/JMousqueton/CVE-2023-21716)
- [Lord-of-the-IoT/CVE-2023-21716](https://github.com/Lord-of-the-IoT/CVE-2023-21716)
- [MojithaR/CVE-2023-21716-EXPLOIT.py](https://github.com/MojithaR/CVE-2023-21716-EXPLOIT.py)
- [n0s3ns33/poc-cve-2023-21716](https://github.com/n0s3ns33/poc-cve-2023-21716)
### CVE-2023-21739 (2023-01-10)