Auto Update 2025/01/01 18:31:48

This commit is contained in:
motikan2010-bot 2025-01-02 03:31:48 +09:00
parent 2266fb2416
commit 6e13226640
32 changed files with 255 additions and 123 deletions

View file

@ -165,5 +165,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 888255027,
"name": "poodle-attack-sandbox",
"full_name": "GoRuGoo\/poodle-attack-sandbox",
"owner": {
"login": "GoRuGoo",
"id": 89027827,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89027827?v=4",
"html_url": "https:\/\/github.com\/GoRuGoo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/GoRuGoo\/poodle-attack-sandbox",
"description": "Test code for poodle attack (CVE-2014-3566)",
"fork": false,
"created_at": "2024-11-14T04:35:59Z",
"updated_at": "2025-01-01T15:43:07Z",
"pushed_at": "2025-01-01T15:42:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-28T15:02:24Z",
"updated_at": "2025-01-01T16:33:30Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2014,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
},

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-28T15:02:24Z",
"updated_at": "2025-01-01T16:33:30Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2014,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
},

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-28T15:02:24Z",
"updated_at": "2025-01-01T16:33:30Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2014,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
},

View file

@ -392,10 +392,10 @@
"description": "Exploit CVE-2017-7494 for Net Security course final Assignment. This would reveal the vulnerability of services that run in administrative priority on Linux.",
"fork": false,
"created_at": "2021-05-15T06:52:23Z",
"updated_at": "2022-12-10T03:15:39Z",
"updated_at": "2025-01-01T14:40:00Z",
"pushed_at": "2021-05-18T06:35:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -404,7 +404,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},

View file

@ -576,10 +576,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-28T15:02:24Z",
"updated_at": "2025-01-01T16:33:30Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -609,7 +609,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2014,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
},

View file

@ -63,7 +63,7 @@
"forks": 191,
"watchers": 495,
"score": 0,
"subscribers_count": 22
"subscribers_count": 23
},
{
"id": 136113184,

View file

@ -59,7 +59,7 @@
"forks": 53,
"watchers": 121,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
},
{
"id": 195813761,

View file

@ -28,7 +28,7 @@
"forks": 52,
"watchers": 128,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
},
{
"id": 230396639,

View file

@ -200,10 +200,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-28T15:02:24Z",
"updated_at": "2025-01-01T16:33:30Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -233,7 +233,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2014,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
}

View file

@ -1039,10 +1039,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2024-12-14T21:15:38Z",
"updated_at": "2025-01-01T17:53:11Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1303,
"watchers_count": 1303,
"stargazers_count": 1304,
"watchers_count": 1304,
"has_discussions": false,
"forks_count": 343,
"allow_forking": true,
@ -1057,7 +1057,7 @@
],
"visibility": "public",
"forks": 343,
"watchers": 1303,
"watchers": 1304,
"score": 0,
"subscribers_count": 34
},

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-28T15:02:24Z",
"updated_at": "2025-01-01T16:33:30Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2014,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
},

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-31T07:49:37Z",
"updated_at": "2025-01-01T16:33:13Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1360,
"watchers_count": 1360,
"stargazers_count": 1359,
"watchers_count": 1359,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 1360,
"watchers": 1359,
"score": 0,
"subscribers_count": 15
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2021-02-15T14:41:25Z",
"updated_at": "2024-08-12T20:10:24Z",
"updated_at": "2025-01-01T14:14:42Z",
"pushed_at": "2021-02-15T15:11:00Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 69,
"watchers": 70,
"score": 0,
"subscribers_count": 3
}

33
2021/CVE-2021-27285.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 910803128,
"name": "CVE-2021-27285",
"full_name": "fjh1997\/CVE-2021-27285",
"owner": {
"login": "fjh1997",
"id": 25281816,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25281816?v=4",
"html_url": "https:\/\/github.com\/fjh1997",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/fjh1997\/CVE-2021-27285",
"description": null,
"fork": false,
"created_at": "2025-01-01T13:31:09Z",
"updated_at": "2025-01-01T13:38:50Z",
"pushed_at": "2025-01-01T13:38:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -113,10 +113,10 @@
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
"fork": false,
"created_at": "2021-07-03T15:15:12Z",
"updated_at": "2025-01-01T02:11:25Z",
"updated_at": "2025-01-01T16:39:02Z",
"pushed_at": "2021-09-13T12:12:17Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -132,7 +132,7 @@
],
"visibility": "public",
"forks": 40,
"watchers": 129,
"watchers": 130,
"score": 0,
"subscribers_count": 7
},

View file

@ -10710,37 +10710,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 447404470,
"name": "log4shell",
"full_name": "jxerome\/log4shell",
"owner": {
"login": "jxerome",
"id": 1355634,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1355634?v=4",
"html_url": "https:\/\/github.com\/jxerome",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jxerome\/log4shell",
"description": "Démo du fonctionnement de log4shell (CVE-2021-44228)",
"fork": false,
"created_at": "2022-01-12T23:44:20Z",
"updated_at": "2022-01-12T23:59:13Z",
"pushed_at": "2022-01-14T14:03:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 447754863,
"name": "log4j_github_repository",

View file

@ -14,10 +14,10 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
"updated_at": "2024-12-18T09:33:56Z",
"updated_at": "2025-01-01T14:03:35Z",
"pushed_at": "2023-05-27T15:39:41Z",
"stargazers_count": 236,
"watchers_count": 236,
"stargazers_count": 237,
"watchers_count": 237,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 236,
"watchers": 237,
"score": 0,
"subscribers_count": 7
}

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-31T07:49:37Z",
"updated_at": "2025-01-01T16:33:13Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1360,
"watchers_count": 1360,
"stargazers_count": 1359,
"watchers_count": 1359,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 1360,
"watchers": 1359,
"score": 0,
"subscribers_count": 15
}

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-12-30T07:59:35Z",
"updated_at": "2025-01-01T16:34:14Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1173,
"watchers_count": 1173,
"stargazers_count": 1172,
"watchers_count": 1172,
"has_discussions": true,
"forks_count": 188,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 188,
"watchers": 1173,
"watchers": 1172,
"score": 0,
"subscribers_count": 19
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 26,
"score": 0,
"subscribers_count": 1

View file

@ -14,19 +14,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-01T00:46:14Z",
"updated_at": "2025-01-01T16:26:11Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1314,
"watchers_count": 1314,
"stargazers_count": 1315,
"watchers_count": 1315,
"has_discussions": false,
"forks_count": 224,
"forks_count": 225,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 224,
"watchers": 1314,
"forks": 225,
"watchers": 1315,
"score": 0,
"subscribers_count": 21
},

View file

@ -14,10 +14,10 @@
"description": "ownCloud exploits for CVE-2023-49105",
"fork": false,
"created_at": "2023-12-05T11:35:12Z",
"updated_at": "2024-11-29T16:20:34Z",
"updated_at": "2025-01-01T17:45:00Z",
"pushed_at": "2023-12-05T11:35:19Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 2
}

View file

@ -110,19 +110,19 @@
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T18:29:27Z",
"updated_at": "2024-12-01T17:17:34Z",
"updated_at": "2025-01-01T17:53:49Z",
"pushed_at": "2024-01-13T13:50:20Z",
"stargazers_count": 237,
"watchers_count": 237,
"stargazers_count": 238,
"watchers_count": 238,
"has_discussions": false,
"forks_count": 41,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 237,
"forks": 42,
"watchers": 238,
"score": 0,
"subscribers_count": 6
},

View file

@ -14,10 +14,10 @@
"description": "Missing Authorization (CWE-862)",
"fork": false,
"created_at": "2024-12-25T18:38:46Z",
"updated_at": "2024-12-25T18:52:39Z",
"updated_at": "2025-01-01T12:59:02Z",
"pushed_at": "2024-12-25T18:49:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 2
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 26,
"score": 0,
"subscribers_count": 1

View file

@ -184,5 +184,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 910901711,
"name": "Zabbix-CVE-2024-42327",
"full_name": "BridgerAlderson\/Zabbix-CVE-2024-42327",
"owner": {
"login": "BridgerAlderson",
"id": 139403792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139403792?v=4",
"html_url": "https:\/\/github.com\/BridgerAlderson",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BridgerAlderson\/Zabbix-CVE-2024-42327",
"description": null,
"fork": false,
"created_at": "2025-01-01T18:25:44Z",
"updated_at": "2025-01-01T18:25:48Z",
"pushed_at": "2025-01-01T18:25:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -60,5 +60,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 910842302,
"name": "CVE-2024-49112",
"full_name": "SafeBreach-Labs\/CVE-2024-49112",
"owner": {
"login": "SafeBreach-Labs",
"id": 19378730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19378730?v=4",
"html_url": "https:\/\/github.com\/SafeBreach-Labs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SafeBreach-Labs\/CVE-2024-49112",
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49112",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-01T18:16:48Z",
"pushed_at": "2025-01-01T18:15:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -82,10 +82,10 @@
"description": "Cleo 远程代码执行漏洞批量检测脚本CVE-2024-50623",
"fork": false,
"created_at": "2024-12-31T07:43:48Z",
"updated_at": "2024-12-31T16:32:22Z",
"updated_at": "2025-01-01T16:04:39Z",
"pushed_at": "2024-12-31T07:46:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -94,7 +94,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection",
"fork": false,
"created_at": "2024-09-16T15:33:46Z",
"updated_at": "2024-11-26T23:19:35Z",
"updated_at": "2025-01-01T13:11:11Z",
"pushed_at": "2024-09-16T15:43:44Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 5
}

View file

@ -60,5 +60,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 910842598,
"name": "CVE-2024-9593-Exploit",
"full_name": "Nxploited\/CVE-2024-9593-Exploit",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-9593-Exploit",
"description": null,
"fork": false,
"created_at": "2025-01-01T15:49:36Z",
"updated_at": "2025-01-01T16:01:25Z",
"pushed_at": "2025-01-01T16:01:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1946,6 +1946,7 @@
- [RandomRobbieBF/CVE-2024-9593](https://github.com/RandomRobbieBF/CVE-2024-9593)
- [0x4f5da2-venom/CVE-2024-9593-EXP](https://github.com/0x4f5da2-venom/CVE-2024-9593-EXP)
- [Nxploited/CVE-2024-9593-Exploit](https://github.com/Nxploited/CVE-2024-9593-Exploit)
### CVE-2024-9680 (2024-10-09)
@ -6317,6 +6318,7 @@
- [watchdog1337/CVE-2024-42327_Zabbix_SQLI](https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI)
- [itform-fr/Zabbix---CVE-2024-42327](https://github.com/itform-fr/Zabbix---CVE-2024-42327)
- [igorbf495/CVE-2024-42327](https://github.com/igorbf495/CVE-2024-42327)
- [BridgerAlderson/Zabbix-CVE-2024-42327](https://github.com/BridgerAlderson/Zabbix-CVE-2024-42327)
### CVE-2024-42346 (2024-09-20)
@ -7115,6 +7117,7 @@
- [tnkr/poc_monitor](https://github.com/tnkr/poc_monitor)
- [BOl1o/CVE-2024-49112-PoC](https://github.com/BOl1o/CVE-2024-49112-PoC)
- [SafeBreach-Labs/CVE-2024-49112](https://github.com/SafeBreach-Labs/CVE-2024-49112)
### CVE-2024-49117 (2024-12-10)
@ -25811,6 +25814,9 @@
- [synacktiv/CVE-2021-27246_Pwn2Own2020](https://github.com/synacktiv/CVE-2021-27246_Pwn2Own2020)
### CVE-2021-27285
- [fjh1997/CVE-2021-27285](https://github.com/fjh1997/CVE-2021-27285)
### CVE-2021-27328 (2021-02-19)
<code>Yeastar NeoGate TG400 91.3.0.3 devices are affected by Directory Traversal. An authenticated user can decrypt firmware and can read sensitive information, such as a password or decryption key.
@ -29233,7 +29239,6 @@
- [Vulnmachines/log4jshell_CVE-2021-44228](https://github.com/Vulnmachines/log4jshell_CVE-2021-44228)
- [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer)
- [mebibite/log4jhound](https://github.com/mebibite/log4jhound)
- [jxerome/log4shell](https://github.com/jxerome/log4shell)
- [sdogancesur/log4j_github_repository](https://github.com/sdogancesur/log4j_github_repository)
- [jrocia/Search-log4Jvuln-AppScanSTD](https://github.com/jrocia/Search-log4Jvuln-AppScanSTD)
- [aajuvonen/log4stdin](https://github.com/aajuvonen/log4stdin)
@ -47690,6 +47695,7 @@
- [cloudpassage/mangy-beast](https://github.com/cloudpassage/mangy-beast)
- [mpgn/poodle-PoC](https://github.com/mpgn/poodle-PoC)
- [uthrasri/openssl_g2.5_CVE-2014-3566](https://github.com/uthrasri/openssl_g2.5_CVE-2014-3566)
- [GoRuGoo/poodle-attack-sandbox](https://github.com/GoRuGoo/poodle-attack-sandbox)
### CVE-2014-3570 (2015-01-09)