Auto Update 2024/10/29 00:31:27

This commit is contained in:
motikan2010-bot 2024-10-29 09:31:27 +09:00
parent 8776966d6e
commit 7578730fb1
41 changed files with 368 additions and 128 deletions

33
2013/CVE-2013-3827.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 674938712,
"name": "CVE-2013-3827",
"full_name": "thistehneisen\/CVE-2013-3827",
"owner": {
"login": "thistehneisen",
"id": 6432992,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6432992?v=4",
"html_url": "https:\/\/github.com\/thistehneisen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/thistehneisen\/CVE-2013-3827",
"description": "Quick PoC checker for common configurations that might be available via directory traversal due to CVE-2013-3827",
"fork": false,
"created_at": "2023-08-05T08:26:22Z",
"updated_at": "2023-08-05T08:29:17Z",
"pushed_at": "2023-08-05T08:29:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-25T03:27:36Z",
"updated_at": "2024-10-28T18:17:56Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2001,
"watchers_count": 2001,
"stargazers_count": 2002,
"watchers_count": 2002,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2001,
"watchers": 2002,
"score": 0,
"subscribers_count": 37
},

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-25T03:27:36Z",
"updated_at": "2024-10-28T18:17:56Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2001,
"watchers_count": 2001,
"stargazers_count": 2002,
"watchers_count": 2002,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2001,
"watchers": 2002,
"score": 0,
"subscribers_count": 37
},

View file

@ -14,10 +14,10 @@
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2016-12-26T13:39:03Z",
"updated_at": "2024-10-20T05:38:19Z",
"updated_at": "2024-10-28T18:32:14Z",
"pushed_at": "2023-02-27T06:48:09Z",
"stargazers_count": 403,
"watchers_count": 403,
"stargazers_count": 404,
"watchers_count": 404,
"has_discussions": false,
"forks_count": 148,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 148,
"watchers": 403,
"watchers": 404,
"score": 0,
"subscribers_count": 26
},

View file

@ -14,10 +14,10 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2024-10-18T12:17:05Z",
"updated_at": "2024-10-28T18:13:55Z",
"pushed_at": "2024-07-31T13:54:45Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 322,
"watchers_count": 322,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 321,
"watchers": 322,
"score": 0,
"subscribers_count": 22
},

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-25T03:27:36Z",
"updated_at": "2024-10-28T18:17:56Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2001,
"watchers_count": 2001,
"stargazers_count": 2002,
"watchers_count": 2002,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2001,
"watchers": 2002,
"score": 0,
"subscribers_count": 37
},

View file

@ -175,10 +175,10 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2024-08-12T19:30:22Z",
"updated_at": "2024-10-28T18:13:54Z",
"pushed_at": "2021-03-09T09:12:55Z",
"stargazers_count": 255,
"watchers_count": 255,
"stargazers_count": 256,
"watchers_count": 256,
"has_discussions": false,
"forks_count": 80,
"allow_forking": true,
@ -187,7 +187,7 @@
"topics": [],
"visibility": "public",
"forks": 80,
"watchers": 255,
"watchers": 256,
"score": 0,
"subscribers_count": 14
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2018-13382",
"fork": false,
"created_at": "2019-08-11T11:13:44Z",
"updated_at": "2024-08-26T04:25:26Z",
"updated_at": "2024-10-28T18:14:11Z",
"pushed_at": "2019-08-13T15:06:28Z",
"stargazers_count": 145,
"watchers_count": 145,
"stargazers_count": 146,
"watchers_count": 146,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 145,
"watchers": 146,
"score": 0,
"subscribers_count": 7
},

View file

@ -576,10 +576,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-25T03:27:36Z",
"updated_at": "2024-10-28T18:17:56Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2001,
"watchers_count": 2001,
"stargazers_count": 2002,
"watchers_count": 2002,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -609,7 +609,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2001,
"watchers": 2002,
"score": 0,
"subscribers_count": 37
},

View file

@ -137,5 +137,36 @@
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 674981101,
"name": "CVE-2018-6789-Python3",
"full_name": "thistehneisen\/CVE-2018-6789-Python3",
"owner": {
"login": "thistehneisen",
"id": 6432992,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6432992?v=4",
"html_url": "https:\/\/github.com\/thistehneisen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/thistehneisen\/CVE-2018-6789-Python3",
"description": "Exim < 4.90.1 RCE Vulnerability remake for Python3 with arguments passed from CLI",
"fork": false,
"created_at": "2023-08-05T11:28:49Z",
"updated_at": "2023-08-05T11:29:43Z",
"pushed_at": "2023-08-05T11:30:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -83,10 +83,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2024-10-01T13:21:08Z",
"updated_at": "2024-10-28T18:14:02Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 578,
"watchers_count": 578,
"stargazers_count": 579,
"watchers_count": 579,
"has_discussions": false,
"forks_count": 173,
"allow_forking": true,
@ -105,7 +105,7 @@
],
"visibility": "public",
"forks": 173,
"watchers": 578,
"watchers": 579,
"score": 0,
"subscribers_count": 23
},

View file

@ -200,10 +200,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-25T03:27:36Z",
"updated_at": "2024-10-28T18:17:56Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2001,
"watchers_count": 2001,
"stargazers_count": 2002,
"watchers_count": 2002,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -233,7 +233,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2001,
"watchers": 2002,
"score": 0,
"subscribers_count": 37
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-25T03:27:36Z",
"updated_at": "2024-10-28T18:17:56Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2001,
"watchers_count": 2001,
"stargazers_count": 2002,
"watchers_count": 2002,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2001,
"watchers": 2002,
"score": 0,
"subscribers_count": 37
},

View file

@ -14,10 +14,10 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
"updated_at": "2024-10-26T01:47:24Z",
"updated_at": "2024-10-28T21:35:03Z",
"pushed_at": "2021-10-13T22:32:36Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 125,
"watchers": 126,
"score": 0,
"subscribers_count": 8
},

View file

@ -82,10 +82,10 @@
"description": null,
"fork": false,
"created_at": "2021-07-02T12:10:49Z",
"updated_at": "2024-10-28T03:33:04Z",
"updated_at": "2024-10-28T20:47:31Z",
"pushed_at": "2021-07-02T12:17:50Z",
"stargazers_count": 252,
"watchers_count": 252,
"stargazers_count": 253,
"watchers_count": 253,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -94,7 +94,7 @@
"topics": [],
"visibility": "public",
"forks": 67,
"watchers": 252,
"watchers": 253,
"score": 0,
"subscribers_count": 10
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2024-10-28T18:14:25Z",
"updated_at": "2024-10-28T20:58:27Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1333,
"watchers_count": 1333,
"stargazers_count": 1334,
"watchers_count": 1334,
"has_discussions": false,
"forks_count": 321,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 321,
"watchers": 1333,
"watchers": 1334,
"score": 0,
"subscribers_count": 27
},

View file

@ -76,19 +76,19 @@
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2024-10-15T07:31:22Z",
"updated_at": "2024-10-28T23:22:59Z",
"pushed_at": "2023-02-14T07:05:22Z",
"stargazers_count": 352,
"watchers_count": 352,
"stargazers_count": 353,
"watchers_count": 353,
"has_discussions": false,
"forks_count": 88,
"forks_count": 89,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 88,
"watchers": 352,
"forks": 89,
"watchers": 353,
"score": 0,
"subscribers_count": 7
},

View file

@ -14,10 +14,10 @@
"description": "Android kernel exploitation for CVE-2022-20409",
"fork": false,
"created_at": "2022-11-21T22:42:50Z",
"updated_at": "2024-10-25T19:06:16Z",
"updated_at": "2024-10-28T20:57:28Z",
"pushed_at": "2024-10-17T16:26:39Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 157,
"watchers": 158,
"score": 0,
"subscribers_count": 5
}

View file

@ -19,7 +19,7 @@
"stargazers_count": 291,
"watchers_count": 291,
"has_discussions": false,
"forks_count": 59,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"windows-boot"
],
"visibility": "public",
"forks": 59,
"forks": 60,
"watchers": 291,
"score": 0,
"subscribers_count": 12

View file

@ -14,10 +14,10 @@
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2024-10-21T10:38:32Z",
"updated_at": "2024-10-28T19:00:04Z",
"pushed_at": "2022-11-18T15:47:17Z",
"stargazers_count": 527,
"watchers_count": 527,
"stargazers_count": 528,
"watchers_count": 528,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 527,
"watchers": 528,
"score": 0,
"subscribers_count": 46
},

View file

@ -45,10 +45,10 @@
"description": "PoC for CVE-2023-4911",
"fork": false,
"created_at": "2023-10-04T14:12:16Z",
"updated_at": "2024-10-21T10:39:01Z",
"updated_at": "2024-10-28T23:01:13Z",
"pushed_at": "2023-10-04T14:16:36Z",
"stargazers_count": 378,
"watchers_count": 378,
"stargazers_count": 379,
"watchers_count": 379,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 378,
"watchers": 379,
"score": 0,
"subscribers_count": 5
},
@ -297,10 +297,10 @@
"description": "Looney Tunables Local privilege escalation (CVE-2023-4911) workshop",
"fork": false,
"created_at": "2023-10-25T11:59:34Z",
"updated_at": "2024-10-01T08:39:18Z",
"updated_at": "2024-10-28T23:06:00Z",
"pushed_at": "2024-10-01T08:39:14Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -309,7 +309,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE).",
"fork": false,
"created_at": "2023-12-13T09:31:36Z",
"updated_at": "2024-10-07T09:57:25Z",
"updated_at": "2024-10-28T20:44:04Z",
"pushed_at": "2024-08-30T06:37:53Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 77,
"watchers": 78,
"score": 0,
"subscribers_count": 4
},

33
2024/CVE-2024-10448.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 879406614,
"name": "CVE-2024-10448",
"full_name": "bevennyamande\/CVE-2024-10448",
"owner": {
"login": "bevennyamande",
"id": 10162710,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10162710?v=4",
"html_url": "https:\/\/github.com\/bevennyamande",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bevennyamande\/CVE-2024-10448",
"description": "Blood bank CSRF Attack POC",
"fork": false,
"created_at": "2024-10-27T20:18:35Z",
"updated_at": "2024-10-28T18:48:37Z",
"pushed_at": "2024-10-27T22:12:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -107,10 +107,10 @@
"description": "CVE-2024-21413 PoC for THM Lab",
"fork": false,
"created_at": "2024-02-17T14:52:52Z",
"updated_at": "2024-10-26T22:06:05Z",
"updated_at": "2024-10-28T22:34:45Z",
"pushed_at": "2024-03-13T02:44:28Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Time Based SQL Injection in Zabbix Server Audit Log --> RCE",
"fork": false,
"created_at": "2024-05-20T03:29:09Z",
"updated_at": "2024-10-11T06:47:13Z",
"updated_at": "2024-10-28T22:02:30Z",
"pushed_at": "2024-05-21T10:30:49Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 111,
"watchers": 112,
"score": 0,
"subscribers_count": 1
},

View file

@ -936,6 +936,37 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 834942808,
"name": "CVE-2024-23897",
"full_name": "cc3305\/CVE-2024-23897",
"owner": {
"login": "cc3305",
"id": 103961201,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103961201?v=4",
"html_url": "https:\/\/github.com\/cc3305",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cc3305\/CVE-2024-23897",
"description": "CVE-2024-23897 exploit script",
"fork": false,
"created_at": "2024-07-28T19:16:13Z",
"updated_at": "2024-10-28T21:16:23Z",
"pushed_at": "2024-10-28T21:15:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 838662184,
"name": "CVE-2024-23897",

View file

@ -1703,5 +1703,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 879969031,
"name": "CVE-2024-24919_POC",
"full_name": "sar-3mar\/CVE-2024-24919_POC",
"owner": {
"login": "sar-3mar",
"id": 105809777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105809777?v=4",
"html_url": "https:\/\/github.com\/sar-3mar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sar-3mar\/CVE-2024-24919_POC",
"description": "It's Proof of Concept on CVE-2024-24919-POC , i made it after it's discoverd ",
"fork": false,
"created_at": "2024-10-28T21:54:41Z",
"updated_at": "2024-10-28T22:08:32Z",
"pushed_at": "2024-10-28T22:08:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Materials for CVE-2024-30052.",
"fork": false,
"created_at": "2024-10-04T19:09:45Z",
"updated_at": "2024-10-27T19:26:57Z",
"updated_at": "2024-10-28T19:44:45Z",
"pushed_at": "2024-10-04T20:28:39Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-30090 - LPE PoC",
"fork": false,
"created_at": "2024-10-17T08:38:47Z",
"updated_at": "2024-10-28T15:03:53Z",
"updated_at": "2024-10-28T22:43:22Z",
"pushed_at": "2024-10-17T09:53:33Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 78,
"watchers": 79,
"score": 0,
"subscribers_count": 2
}

View file

@ -169,10 +169,10 @@
"description": "CosmicSting (CVE-2024-34102)",
"fork": false,
"created_at": "2024-06-28T23:33:21Z",
"updated_at": "2024-10-04T21:20:04Z",
"updated_at": "2024-10-28T21:40:03Z",
"pushed_at": "2024-09-05T18:38:46Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,7 +14,7 @@
"description": "OpenSIS SQLi Injection",
"fork": false,
"created_at": "2024-10-14T17:24:01Z",
"updated_at": "2024-10-28T05:40:36Z",
"updated_at": "2024-10-28T19:27:47Z",
"pushed_at": "2024-10-14T17:42:11Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -14,10 +14,10 @@
"description": "This proof-of-concept script demonstrates how to exploit CVE-2024-4323, a memory corruption vulnerability in Fluent Bit, enabling remote code execution.",
"fork": false,
"created_at": "2024-05-20T15:04:13Z",
"updated_at": "2024-07-01T14:19:02Z",
"updated_at": "2024-10-28T19:41:49Z",
"pushed_at": "2024-05-20T15:28:07Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -1640,5 +1640,36 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 879955320,
"name": "CVE-2024-4577",
"full_name": "0xbd2\/CVE-2024-4577",
"owner": {
"login": "0xbd2",
"id": 186146694,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186146694?v=4",
"html_url": "https:\/\/github.com\/0xbd2",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xbd2\/CVE-2024-4577",
"description": null,
"fork": false,
"created_at": "2024-10-28T21:10:12Z",
"updated_at": "2024-10-28T21:10:46Z",
"pushed_at": "2024-10-28T21:10:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -379,8 +379,8 @@
"description": "CVE-2024-4956 Python exploitation utility",
"fork": false,
"created_at": "2024-06-05T15:37:39Z",
"updated_at": "2024-10-25T21:09:05Z",
"pushed_at": "2024-10-25T21:09:01Z",
"updated_at": "2024-10-28T19:41:35Z",
"pushed_at": "2024-10-28T19:41:31Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,

33
2024/CVE-2024-51435.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 878714460,
"name": "CVE-2024-51435",
"full_name": "bevennyamande\/CVE-2024-51435",
"owner": {
"login": "bevennyamande",
"id": 10162710,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10162710?v=4",
"html_url": "https:\/\/github.com\/bevennyamande",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bevennyamande\/CVE-2024-51435",
"description": "bloodbank POCs",
"fork": false,
"created_at": "2024-10-25T23:28:09Z",
"updated_at": "2024-10-28T18:47:29Z",
"pushed_at": "2024-10-25T23:50:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -87,10 +87,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-11T08:12:38Z",
"updated_at": "2024-10-11T08:32:58Z",
"updated_at": "2024-10-28T22:46:12Z",
"pushed_at": "2024-10-11T08:32:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -99,7 +99,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -269,10 +269,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-10-28T13:18:35Z",
"updated_at": "2024-10-28T22:01:48Z",
"pushed_at": "2024-09-24T19:18:56Z",
"stargazers_count": 451,
"watchers_count": 451,
"stargazers_count": 452,
"watchers_count": 452,
"has_discussions": false,
"forks_count": 85,
"allow_forking": true,
@ -287,7 +287,7 @@
],
"visibility": "public",
"forks": 85,
"watchers": 451,
"watchers": 452,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
"fork": false,
"created_at": "2024-09-10T06:27:59Z",
"updated_at": "2024-10-27T12:17:08Z",
"updated_at": "2024-10-28T21:00:39Z",
"pushed_at": "2024-10-17T05:12:29Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 76,
"watchers": 77,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)",
"fork": false,
"created_at": "2024-09-14T06:27:11Z",
"updated_at": "2024-10-23T21:42:39Z",
"updated_at": "2024-10-28T19:36:08Z",
"pushed_at": "2024-09-15T21:34:35Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 3
},

View file

@ -990,6 +990,7 @@
- [phirojshah/CVE-2024-4577](https://github.com/phirojshah/CVE-2024-4577)
- [JeninSutradhar/CVE-2024-4577-checker](https://github.com/JeninSutradhar/CVE-2024-4577-checker)
- [longhoangth18/CVE-2024-4577](https://github.com/longhoangth18/CVE-2024-4577)
- [0xbd2/CVE-2024-4577](https://github.com/0xbd2/CVE-2024-4577)
### CVE-2024-4701 (2024-05-10)
@ -1690,6 +1691,9 @@
### CVE-2024-10410
- [K1nako0/CVE-2024-10410](https://github.com/K1nako0/CVE-2024-10410)
### CVE-2024-10448
- [bevennyamande/CVE-2024-10448](https://github.com/bevennyamande/CVE-2024-10448)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -2527,6 +2531,7 @@
- [fullaw4ke/CVE-2024-23897-Jenkins-4.441](https://github.com/fullaw4ke/CVE-2024-23897-Jenkins-4.441)
- [Maalfer/CVE-2024-23897](https://github.com/Maalfer/CVE-2024-23897)
- [Surko888/Surko-Exploit-Jenkins-CVE-2024-23897](https://github.com/Surko888/Surko-Exploit-Jenkins-CVE-2024-23897)
- [cc3305/CVE-2024-23897](https://github.com/cc3305/CVE-2024-23897)
- [NoSpaceAvailable/CVE-2024-23897](https://github.com/NoSpaceAvailable/CVE-2024-23897)
- [BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety](https://github.com/BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety)
- [ShieldAuth-PHP/PBL05-CVE-Analsys](https://github.com/ShieldAuth-PHP/PBL05-CVE-Analsys)
@ -2844,6 +2849,7 @@
- [AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-](https://github.com/AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-)
- [geniuszlyy/CVE-2024-24919](https://github.com/geniuszlyy/CVE-2024-24919)
- [skyrowalker/CVE-2024-24919](https://github.com/skyrowalker/CVE-2024-24919)
- [sar-3mar/CVE-2024-24919_POC](https://github.com/sar-3mar/CVE-2024-24919_POC)
### CVE-2024-25092 (2024-06-09)
@ -5694,6 +5700,9 @@
### CVE-2024-49186
- [cyb3res3c/CVE-2024-49186](https://github.com/cyb3res3c/CVE-2024-49186)
### CVE-2024-51435
- [bevennyamande/CVE-2024-51435](https://github.com/bevennyamande/CVE-2024-51435)
### CVE-2024-1642470
- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)
@ -37825,6 +37834,7 @@
- [beraphin/CVE-2018-6789](https://github.com/beraphin/CVE-2018-6789)
- [synacktiv/Exim-CVE-2018-6789](https://github.com/synacktiv/Exim-CVE-2018-6789)
- [martinclauss/exim-rce-cve-2018-6789](https://github.com/martinclauss/exim-rce-cve-2018-6789)
- [thistehneisen/CVE-2018-6789-Python3](https://github.com/thistehneisen/CVE-2018-6789-Python3)
### CVE-2018-6791 (2018-02-07)
@ -45943,6 +45953,13 @@
- [defrancescojp/CVE-2013-3664_MAC](https://github.com/defrancescojp/CVE-2013-3664_MAC)
- [defrancescojp/CVE-2013-3664_BMP](https://github.com/defrancescojp/CVE-2013-3664_BMP)
### CVE-2013-3827 (2013-10-16)
<code>Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2; the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.3.0, 11.1.2.4.0, and 12.1.2.0.0; and the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Java Server Faces or Web Container.
</code>
- [thistehneisen/CVE-2013-3827](https://github.com/thistehneisen/CVE-2013-3827)
### CVE-2013-3900 (2013-12-11)
<code>The WinVerifyTrust function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly validate PE file digests during Authenticode signature verification, which allows remote attackers to execute arbitrary code via a crafted PE file, aka &quot;WinVerifyTrust Signature Validation Vulnerability.&quot;