Auto Update 2024/12/12 06:32:18

This commit is contained in:
motikan2010-bot 2024-12-12 15:32:18 +09:00
parent 5c545dcd89
commit 71f089358d
33 changed files with 205 additions and 109 deletions

View file

@ -14,19 +14,19 @@
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
"fork": false,
"created_at": "2021-06-05T18:59:28Z",
"updated_at": "2024-12-08T10:20:00Z",
"updated_at": "2024-12-12T01:33:29Z",
"pushed_at": "2021-06-06T09:41:51Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 57,
"forks": 6,
"watchers": 58,
"score": 0,
"subscribers_count": 4
},
@ -45,19 +45,19 @@
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240.",
"fork": false,
"created_at": "2022-01-26T05:59:52Z",
"updated_at": "2024-09-18T08:13:57Z",
"updated_at": "2024-12-12T01:34:39Z",
"pushed_at": "2022-01-26T06:47:31Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"forks": 4,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -1197,10 +1197,10 @@
"description": "Shellshock exploit + vulnerable environment",
"fork": false,
"created_at": "2016-12-07T23:38:50Z",
"updated_at": "2024-11-08T10:07:56Z",
"updated_at": "2024-12-12T05:34:07Z",
"pushed_at": "2023-05-11T02:12:25Z",
"stargazers_count": 204,
"watchers_count": 204,
"stargazers_count": 205,
"watchers_count": 205,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -1216,7 +1216,7 @@
],
"visibility": "public",
"forks": 56,
"watchers": 204,
"watchers": 205,
"score": 0,
"subscribers_count": 5
},

View file

@ -462,10 +462,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-12-11T20:44:31Z",
"updated_at": "2024-12-12T05:15:53Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 865,
"watchers_count": 865,
"stargazers_count": 866,
"watchers_count": 866,
"has_discussions": false,
"forks_count": 426,
"allow_forking": true,
@ -478,7 +478,7 @@
],
"visibility": "public",
"forks": 426,
"watchers": 865,
"watchers": 866,
"score": 0,
"subscribers_count": 9
},

View file

@ -355,10 +355,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-12-09T08:01:15Z",
"updated_at": "2024-12-12T04:06:53Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 206,
"watchers_count": 206,
"stargazers_count": 207,
"watchers_count": 207,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -367,7 +367,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 206,
"watchers": 207,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018",
"fork": false,
"created_at": "2018-08-08T14:41:20Z",
"updated_at": "2024-12-05T01:24:39Z",
"updated_at": "2024-12-12T01:51:35Z",
"pushed_at": "2024-02-07T23:51:49Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 180,
"watchers_count": 180,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 181,
"watchers": 180,
"score": 0,
"subscribers_count": 12
}

View file

@ -76,10 +76,10 @@
"description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets",
"fork": false,
"created_at": "2024-08-05T16:55:40Z",
"updated_at": "2024-12-09T06:35:04Z",
"updated_at": "2024-12-12T06:07:39Z",
"pushed_at": "2024-08-05T18:31:16Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
}

View file

@ -424,10 +424,10 @@
"description": "cve-2020-1472 复现利用及其exp",
"fork": false,
"created_at": "2020-09-16T03:40:47Z",
"updated_at": "2024-10-13T05:56:43Z",
"updated_at": "2024-12-12T02:02:00Z",
"pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -436,7 +436,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 106,
"watchers": 107,
"score": 0,
"subscribers_count": 3
},

View file

@ -888,10 +888,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-12-09T08:01:15Z",
"updated_at": "2024-12-12T04:06:53Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 206,
"watchers_count": 206,
"stargazers_count": 207,
"watchers_count": 207,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -900,7 +900,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 206,
"watchers": 207,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2021-04-29T17:59:59Z",
"updated_at": "2023-06-17T08:04:54Z",
"updated_at": "2024-12-12T05:42:53Z",
"pushed_at": "2021-04-30T15:01:38Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.",
"fork": false,
"created_at": "2023-11-04T11:45:55Z",
"updated_at": "2024-10-25T10:30:06Z",
"updated_at": "2024-12-12T05:48:46Z",
"pushed_at": "2024-07-07T18:39:45Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 2
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 65,
"score": 0,
"subscribers_count": 5

View file

@ -107,10 +107,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2024-12-11T23:56:20Z",
"updated_at": "2024-12-12T01:49:21Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1093,
"watchers_count": 1093,
"stargazers_count": 1094,
"watchers_count": 1094,
"has_discussions": false,
"forks_count": 218,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 218,
"watchers": 1093,
"watchers": 1094,
"score": 0,
"subscribers_count": 17
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-11T15:04:51Z",
"updated_at": "2024-11-27T03:27:39Z",
"updated_at": "2024-12-12T02:23:56Z",
"pushed_at": "2024-01-09T21:11:58Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-22894",
"fork": false,
"created_at": "2023-04-24T23:26:13Z",
"updated_at": "2024-11-18T02:00:29Z",
"updated_at": "2024-12-12T01:55:23Z",
"pushed_at": "2023-04-24T23:38:15Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "Proof of Concept Exploit for PaperCut CVE-2023-27350",
"fork": false,
"created_at": "2023-04-22T21:34:06Z",
"updated_at": "2024-11-08T23:46:27Z",
"updated_at": "2024-12-12T04:39:28Z",
"pushed_at": "2023-05-01T19:31:20Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 4
},

View file

@ -249,5 +249,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 901723317,
"name": "CVE-2023-3460_FIX",
"full_name": "TranKuBao\/CVE-2023-3460_FIX",
"owner": {
"login": "TranKuBao",
"id": 116043533,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116043533?v=4",
"html_url": "https:\/\/github.com\/TranKuBao",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TranKuBao\/CVE-2023-3460_FIX",
"description": "Cái này dựng lên với mục đích cho ae tham khảo, chê thì đừng có xem. :))))",
"fork": false,
"created_at": "2024-12-11T07:38:22Z",
"updated_at": "2024-12-12T01:40:38Z",
"pushed_at": "2024-12-12T01:40:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -281,6 +281,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,19 +14,19 @@
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
"fork": false,
"created_at": "2024-11-29T06:13:36Z",
"updated_at": "2024-12-11T22:04:10Z",
"updated_at": "2024-12-12T06:01:40Z",
"pushed_at": "2024-12-04T01:01:28Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 39,
"forks": 8,
"watchers": 41,
"score": 0,
"subscribers_count": 1
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-30090 - LPE PoC",
"fork": false,
"created_at": "2024-10-17T08:38:47Z",
"updated_at": "2024-11-29T15:03:00Z",
"updated_at": "2024-12-12T04:35:49Z",
"pushed_at": "2024-10-17T09:53:33Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 99,
"watchers": 100,
"score": 0,
"subscribers_count": 3
}

View file

@ -2014,6 +2014,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -207,10 +207,10 @@
"description": "GeoServer Remote Code Execution",
"fork": false,
"created_at": "2024-07-30T18:43:40Z",
"updated_at": "2024-12-06T23:50:17Z",
"updated_at": "2024-12-12T06:28:21Z",
"pushed_at": "2024-08-02T14:57:26Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -219,7 +219,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 74,
"watchers": 75,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"forks": 22,
"watchers": 35,
"score": 0,
"subscribers_count": 0

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-40711-exp",
"fork": false,
"created_at": "2024-10-16T05:02:27Z",
"updated_at": "2024-12-11T22:25:02Z",
"updated_at": "2024-12-12T05:04:10Z",
"pushed_at": "2024-10-17T01:06:42Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 30,
"watchers": 33,
"score": 0,
"subscribers_count": 1
},

View file

@ -122,5 +122,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 902138431,
"name": "CVE-2024-42327",
"full_name": "igorbf495\/CVE-2024-42327",
"owner": {
"login": "igorbf495",
"id": 113364443,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113364443?v=4",
"html_url": "https:\/\/github.com\/igorbf495",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/igorbf495\/CVE-2024-42327",
"description": "writeup cve-2024-42327",
"fork": false,
"created_at": "2024-12-12T01:32:26Z",
"updated_at": "2024-12-12T04:09:28Z",
"pushed_at": "2024-12-12T04:09:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -169,10 +169,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-12-06T23:49:58Z",
"updated_at": "2024-12-12T06:28:25Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 240,
"watchers_count": 240,
"stargazers_count": 241,
"watchers_count": 241,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 240,
"watchers": 241,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2024-48990",
"fork": false,
"created_at": "2024-11-20T18:41:25Z",
"updated_at": "2024-12-09T08:38:49Z",
"updated_at": "2024-12-12T04:14:49Z",
"pushed_at": "2024-11-20T18:49:33Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 87,
"watchers": 88,
"score": 0,
"subscribers_count": 1
},

View file

@ -522,5 +522,36 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 902177937,
"name": "cve-2024-4956",
"full_name": "XiaomingX\/cve-2024-4956",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-4956",
"description": "CVE-2024-4956 Python exploitation utility",
"fork": false,
"created_at": "2024-12-12T04:05:10Z",
"updated_at": "2024-12-12T04:15:46Z",
"pushed_at": "2024-12-12T04:07:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,19 +14,19 @@
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
"fork": false,
"created_at": "2024-12-11T14:19:55Z",
"updated_at": "2024-12-11T19:45:47Z",
"updated_at": "2024-12-12T06:19:46Z",
"pushed_at": "2024-12-11T14:23:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 0
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -2211,10 +2211,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-12-10T08:51:15Z",
"updated_at": "2024-12-12T00:56:32Z",
"pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -2223,7 +2223,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 57,
"watchers": 58,
"score": 0,
"subscribers_count": 2
},

View file

@ -121,6 +121,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1111,6 +1111,7 @@
- [JolyIrsb/CVE-2024-4956](https://github.com/JolyIrsb/CVE-2024-4956)
- [UMASANKAR-MG/Path-Traversal-CVE-2024-4956](https://github.com/UMASANKAR-MG/Path-Traversal-CVE-2024-4956)
- [An00bRektn/shirocrack](https://github.com/An00bRektn/shirocrack)
- [XiaomingX/cve-2024-4956](https://github.com/XiaomingX/cve-2024-4956)
### CVE-2024-5009 (2024-06-25)
@ -6138,6 +6139,7 @@
- [compr00t/CVE-2024-42327](https://github.com/compr00t/CVE-2024-42327)
- [depers-rus/CVE-2024-42327](https://github.com/depers-rus/CVE-2024-42327)
- [watchdog1337/CVE-2024-42327_Zabbix_SQLI](https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI)
- [igorbf495/CVE-2024-42327](https://github.com/igorbf495/CVE-2024-42327)
### CVE-2024-42346 (2024-09-20)
@ -8126,6 +8128,7 @@
- [Rajneeshkarya/CVE-2023-3460](https://github.com/Rajneeshkarya/CVE-2023-3460)
- [DiMarcoSK/CVE-2023-3460_POC](https://github.com/DiMarcoSK/CVE-2023-3460_POC)
- [julienbrs/exploit-CVE-2023-3460](https://github.com/julienbrs/exploit-CVE-2023-3460)
- [TranKuBao/CVE-2023-3460_FIX](https://github.com/TranKuBao/CVE-2023-3460_FIX)
### CVE-2023-3519 (2023-07-19)