Auto Update 2024/11/23 06:36:41

This commit is contained in:
motikan2010-bot 2024-11-23 15:36:41 +09:00
parent 16f04cae53
commit 6b92b365fe
53 changed files with 362 additions and 106 deletions

View file

@ -19,7 +19,7 @@
"stargazers_count": 670,
"watchers_count": 670,
"has_discussions": false,
"forks_count": 130,
"forks_count": 131,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 130,
"forks": 131,
"watchers": 670,
"score": 0,
"subscribers_count": 43

View file

@ -313,10 +313,10 @@
"description": "CVE-2020-1350 Proof-of-Concept",
"fork": false,
"created_at": "2020-07-17T05:41:19Z",
"updated_at": "2024-08-12T20:03:50Z",
"updated_at": "2024-11-23T01:56:27Z",
"pushed_at": "2020-07-27T16:20:06Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -325,7 +325,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 11,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},

View file

@ -76,10 +76,10 @@
"description": "CVE-2021-1675 Detection Info",
"fork": false,
"created_at": "2021-06-30T18:32:17Z",
"updated_at": "2024-08-12T20:14:21Z",
"updated_at": "2024-11-23T01:35:32Z",
"pushed_at": "2023-05-20T01:53:16Z",
"stargazers_count": 216,
"watchers_count": 216,
"stargazers_count": 215,
"watchers_count": 215,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 216,
"watchers": 215,
"score": 0,
"subscribers_count": 19
},

View file

@ -171,10 +171,10 @@
"description": "CVE-2021-22986 & F5 BIG-IP RCE",
"fork": false,
"created_at": "2021-03-22T07:13:50Z",
"updated_at": "2024-09-20T18:32:53Z",
"updated_at": "2024-11-23T01:54:42Z",
"pushed_at": "2021-04-03T12:56:37Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -186,7 +186,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 89,
"watchers": 88,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
"updated_at": "2024-11-06T11:55:26Z",
"updated_at": "2024-11-23T01:41:18Z",
"pushed_at": "2021-06-12T08:27:09Z",
"stargazers_count": 821,
"watchers_count": 821,
"stargazers_count": 820,
"watchers_count": 820,
"has_discussions": false,
"forks_count": 139,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 139,
"watchers": 821,
"watchers": 820,
"score": 0,
"subscribers_count": 23
},

View file

@ -424,10 +424,10 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2024-10-17T00:12:21Z",
"updated_at": "2024-11-23T01:56:23Z",
"pushed_at": "2022-04-14T11:51:18Z",
"stargazers_count": 432,
"watchers_count": 432,
"stargazers_count": 431,
"watchers_count": 431,
"has_discussions": false,
"forks_count": 110,
"allow_forking": true,
@ -436,7 +436,7 @@
"topics": [],
"visibility": "public",
"forks": 110,
"watchers": 432,
"watchers": 431,
"score": 0,
"subscribers_count": 9
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻‍💻",
"fork": false,
"created_at": "2021-03-26T01:09:25Z",
"updated_at": "2024-11-21T08:08:45Z",
"updated_at": "2024-11-23T01:54:09Z",
"pushed_at": "2021-08-25T01:00:49Z",
"stargazers_count": 225,
"watchers_count": 225,
"stargazers_count": 224,
"watchers_count": 224,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 42,
"watchers": 225,
"watchers": 224,
"score": 0,
"subscribers_count": 6
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2024-11-07T08:16:59Z",
"updated_at": "2024-11-23T01:33:31Z",
"pushed_at": "2023-07-10T16:41:49Z",
"stargazers_count": 296,
"watchers_count": 296,
"stargazers_count": 295,
"watchers_count": 295,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 296,
"watchers": 295,
"score": 0,
"subscribers_count": 8
},

View file

@ -2086,5 +2086,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 892945436,
"name": "CVE-2022-1388-poc",
"full_name": "XiaomingX\/CVE-2022-1388-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/CVE-2022-1388-poc",
"description": null,
"fork": false,
"created_at": "2024-11-23T05:39:26Z",
"updated_at": "2024-11-23T05:41:11Z",
"pushed_at": "2024-11-23T05:41:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false,
"created_at": "2022-08-09T15:53:48Z",
"updated_at": "2024-11-22T23:41:58Z",
"updated_at": "2024-11-23T02:34:57Z",
"pushed_at": "2023-09-27T06:44:27Z",
"stargazers_count": 305,
"watchers_count": 305,
"stargazers_count": 307,
"watchers_count": 307,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 60,
"watchers": 305,
"watchers": 307,
"score": 0,
"subscribers_count": 12
},

View file

@ -2127,5 +2127,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 892944519,
"name": "CVE-2022-26134-poc",
"full_name": "XiaomingX\/CVE-2022-26134-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/CVE-2022-26134-poc",
"description": null,
"fork": false,
"created_at": "2024-11-23T05:35:59Z",
"updated_at": "2024-11-23T05:38:13Z",
"pushed_at": "2024-11-23T05:38:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Major Security Vulnerability on PrestaShop Websites - CVE-2022-31101",
"fork": false,
"created_at": "2022-07-24T21:50:13Z",
"updated_at": "2024-10-10T07:30:03Z",
"updated_at": "2024-11-23T02:11:54Z",
"pushed_at": "2022-08-01T09:12:50Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 40,
"watchers": 41,
"score": 0,
"subscribers_count": 10
},

View file

@ -803,15 +803,15 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1159,6 +1159,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -97,5 +97,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 892941082,
"name": "cve-2023-47246-poc",
"full_name": "XiaomingX\/cve-2023-47246-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2023-47246-poc",
"description": null,
"fork": false,
"created_at": "2024-11-23T05:21:22Z",
"updated_at": "2024-11-23T05:24:10Z",
"pushed_at": "2024-11-23T05:24:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -152,7 +152,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 892650578,
@ -183,7 +183,7 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 892819901,
@ -214,6 +214,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-11-20T18:20:29Z",
"updated_at": "2024-11-23T03:06:02Z",
"pushed_at": "2024-07-25T18:12:57Z",
"stargazers_count": 255,
"watchers_count": 255,
"stargazers_count": 256,
"watchers_count": 256,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 255,
"watchers": 256,
"score": 0,
"subscribers_count": 7
},

View file

@ -45,10 +45,10 @@
"description": "POC - CVE-202410914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
"fork": false,
"created_at": "2024-11-10T12:01:21Z",
"updated_at": "2024-11-22T08:02:49Z",
"updated_at": "2024-11-23T01:10:50Z",
"pushed_at": "2024-11-10T12:13:16Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -65,7 +65,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -113,12 +113,12 @@
"description": "Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924).",
"fork": false,
"created_at": "2024-11-19T10:07:28Z",
"updated_at": "2024-11-22T23:55:25Z",
"updated_at": "2024-11-23T03:39:12Z",
"pushed_at": "2024-11-19T12:20:16Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -133,8 +133,8 @@
"wordpress"
],
"visibility": "public",
"forks": 8,
"watchers": 10,
"forks": 9,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,12 +14,12 @@
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
"fork": false,
"created_at": "2024-04-12T15:07:42Z",
"updated_at": "2024-11-15T17:16:22Z",
"updated_at": "2024-11-23T05:51:45Z",
"pushed_at": "2024-04-18T14:31:34Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 9,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,8 +29,8 @@
"cve-2024-20356"
],
"visibility": "public",
"forks": 9,
"watchers": 48,
"forks": 11,
"watchers": 49,
"score": 0,
"subscribers_count": 7
},

View file

@ -29,5 +29,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 892949211,
"name": "CVE-2024-21534-poc",
"full_name": "XiaomingX\/CVE-2024-21534-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/CVE-2024-21534-poc",
"description": null,
"fork": false,
"created_at": "2024-11-23T05:54:24Z",
"updated_at": "2024-11-23T05:57:38Z",
"pushed_at": "2024-11-23T05:57:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -431,6 +431,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -188,6 +188,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -313,5 +313,36 @@
"watchers": 30,
"score": 0,
"subscribers_count": 1
},
{
"id": 892922028,
"name": "CVE-2024-23692-poc",
"full_name": "XiaomingX\/CVE-2024-23692-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/CVE-2024-23692-poc",
"description": "CVE-2024-23692 是影响 Rejetto HTTP File ServerHFS2.3m 及之前版本的模板注入漏洞。该漏洞允许远程未授权的攻击者通过发送特制的 HTTP 请求,在受影响的系统上执行任意命令。",
"fork": false,
"created_at": "2024-11-23T03:59:13Z",
"updated_at": "2024-11-23T04:00:58Z",
"pushed_at": "2024-11-23T04:00:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Workaround for disabling the CLI to mitigate SECURITY-3314\/CVE-2024-23897 and SECURITY-3315\/CVE-2024-23898",
"fork": false,
"created_at": "2024-01-23T19:19:04Z",
"updated_at": "2024-09-08T23:05:41Z",
"updated_at": "2024-11-23T04:50:22Z",
"pushed_at": "2024-02-20T14:13:25Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 7,
"score": 0,
"subscribers_count": 6
},

View file

@ -169,6 +169,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 2,
"watchers": 35,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -1953,5 +1953,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 892923707,
"name": "CVE-2024-32002-poc",
"full_name": "XiaomingX\/CVE-2024-32002-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/CVE-2024-32002-poc",
"description": "CVE-2024-32002 是 Git 中的一个严重漏洞,允许攻击者在用户执行 git clone 操作时远程执行任意代码RCE。",
"fork": false,
"created_at": "2024-11-23T04:06:33Z",
"updated_at": "2024-11-23T04:07:07Z",
"pushed_at": "2024-11-23T04:07:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。) ",
"fork": false,
"created_at": "2024-10-25T10:06:09Z",
"updated_at": "2024-11-22T02:10:11Z",
"updated_at": "2024-11-23T02:44:01Z",
"pushed_at": "2024-10-21T04:15:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -438,7 +438,7 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 892655439,
@ -469,6 +469,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -157,6 +157,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -192,5 +192,36 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 892921079,
"name": "cve-2024-38856-poc",
"full_name": "XiaomingX\/cve-2024-38856-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-38856-poc",
"description": "CVE-2024-38856 是 Apache OFBiz 中的一个严重漏洞,允许未经身份验证的攻击者在受影响的系统上执行任意代码。 ",
"fork": false,
"created_at": "2024-11-23T03:54:28Z",
"updated_at": "2024-11-23T03:57:31Z",
"pushed_at": "2024-11-23T03:57:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -60,5 +60,36 @@
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
{
"id": 892922773,
"name": "CVE-2024-40711-poc",
"full_name": "XiaomingX\/CVE-2024-40711-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/CVE-2024-40711-poc",
"description": "CVE-2024-40711 是 Veeam Backup & Replication 软件中的一个严重漏洞,允许未经身份验证的攻击者远程执行代码。 ",
"fork": false,
"created_at": "2024-11-23T04:02:34Z",
"updated_at": "2024-11-23T04:03:03Z",
"pushed_at": "2024-11-23T04:02:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -59,7 +59,7 @@
"forks": 1,
"watchers": 8,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 803543826,

View file

@ -126,6 +126,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -121,6 +121,6 @@
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2024-48990",
"fork": false,
"created_at": "2024-11-20T18:41:25Z",
"updated_at": "2024-11-23T00:13:58Z",
"updated_at": "2024-11-23T05:19:56Z",
"pushed_at": "2024-11-20T18:49:33Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 30,
"watchers": 35,
"score": 0,
"subscribers_count": 1
},
@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-52940 - A zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.",
"fork": false,
"created_at": "2024-10-27T15:29:56Z",
"updated_at": "2024-11-22T22:25:10Z",
"updated_at": "2024-11-23T05:16:11Z",
"pushed_at": "2024-11-18T15:09:32Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": true,
"forks_count": 9,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 1
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -64,6 +64,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -34,6 +34,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -95,6 +95,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -2392,6 +2392,7 @@
</code>
- [pabloopez/CVE-2024-21534](https://github.com/pabloopez/CVE-2024-21534)
- [XiaomingX/CVE-2024-21534-poc](https://github.com/XiaomingX/CVE-2024-21534-poc)
### CVE-2024-21626 (2024-01-31)
@ -2839,6 +2840,7 @@
- [0x20c/CVE-2024-23692-EXP](https://github.com/0x20c/CVE-2024-23692-EXP)
- [pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692](https://github.com/pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692)
- [verylazytech/CVE-2024-23692](https://github.com/verylazytech/CVE-2024-23692)
- [XiaomingX/CVE-2024-23692-poc](https://github.com/XiaomingX/CVE-2024-23692-poc)
### CVE-2024-23708 (2024-05-07)
@ -4466,6 +4468,7 @@
- [th4s1s/CVE-2024-32002-PoC](https://github.com/th4s1s/CVE-2024-32002-PoC)
- [Julian-gmz/hook_CVE-2024-32002](https://github.com/Julian-gmz/hook_CVE-2024-32002)
- [grecosamuel/CVE-2024-32002](https://github.com/grecosamuel/CVE-2024-32002)
- [XiaomingX/CVE-2024-32002-poc](https://github.com/XiaomingX/CVE-2024-32002-poc)
### CVE-2024-32004 (2024-05-14)
@ -5491,6 +5494,7 @@
- [0x20c/CVE-2024-38856-EXP](https://github.com/0x20c/CVE-2024-38856-EXP)
- [emanueldosreis/CVE-2024-38856](https://github.com/emanueldosreis/CVE-2024-38856)
- [BBD-YZZ/CVE-2024-38856-RCE](https://github.com/BBD-YZZ/CVE-2024-38856-RCE)
- [XiaomingX/cve-2024-38856-poc](https://github.com/XiaomingX/cve-2024-38856-poc)
### CVE-2024-39031 (2024-07-09)
@ -5783,6 +5787,7 @@
- [watchtowrlabs/CVE-2024-40711](https://github.com/watchtowrlabs/CVE-2024-40711)
- [realstatus/CVE-2024-40711-Exp](https://github.com/realstatus/CVE-2024-40711-Exp)
- [XiaomingX/CVE-2024-40711-poc](https://github.com/XiaomingX/CVE-2024-40711-poc)
### CVE-2024-40725 (2024-07-18)
@ -14452,6 +14457,7 @@
- [W01fh4cker/CVE-2023-47246-EXP](https://github.com/W01fh4cker/CVE-2023-47246-EXP)
- [rainbowhatrkn/CVE-2023-47246](https://github.com/rainbowhatrkn/CVE-2023-47246)
- [tucommenceapousser/CVE-2023-47246](https://github.com/tucommenceapousser/CVE-2023-47246)
- [XiaomingX/cve-2023-47246-poc](https://github.com/XiaomingX/cve-2023-47246-poc)
### CVE-2023-47253 (2023-11-06)
@ -15976,6 +15982,7 @@
- [nico989/CVE-2022-1388](https://github.com/nico989/CVE-2022-1388)
- [gotr00t0day/CVE-2022-1388](https://github.com/gotr00t0day/CVE-2022-1388)
- [impost0r/CVE-2022-1388](https://github.com/impost0r/CVE-2022-1388)
- [XiaomingX/CVE-2022-1388-poc](https://github.com/XiaomingX/CVE-2022-1388-poc)
### CVE-2022-1421 (2022-06-06)
@ -18347,6 +18354,7 @@
- [BBD-YZZ/Confluence-RCE](https://github.com/BBD-YZZ/Confluence-RCE)
- [cc3305/CVE-2022-26134](https://github.com/cc3305/CVE-2022-26134)
- [Agentgilspy/CVE-2022-26134](https://github.com/Agentgilspy/CVE-2022-26134)
- [XiaomingX/CVE-2022-26134-poc](https://github.com/XiaomingX/CVE-2022-26134-poc)
### CVE-2022-26135 (2022-06-30)