Auto Update 2024/12/20 12:32:12

This commit is contained in:
motikan2010-bot 2024-12-20 21:32:12 +09:00
parent 16652733e9
commit 75c22ac747
54 changed files with 309 additions and 205 deletions

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-18T20:03:51Z",
"updated_at": "2024-12-20T11:54:30Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
},

View file

@ -14,10 +14,10 @@
"description": "Proof of concept for CVE-2015-7547",
"fork": false,
"created_at": "2016-02-10T21:13:54Z",
"updated_at": "2024-09-08T18:04:38Z",
"updated_at": "2024-12-20T06:31:13Z",
"pushed_at": "2016-02-20T07:57:58Z",
"stargazers_count": 542,
"watchers_count": 542,
"stargazers_count": 543,
"watchers_count": 543,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 166,
"watchers": 542,
"watchers": 543,
"score": 0,
"subscribers_count": 62
},

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-18T20:03:51Z",
"updated_at": "2024-12-20T11:54:30Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
},

View file

@ -64,15 +64,15 @@
{
"id": 201151172,
"name": "CVE-2017-11176",
"full_name": "HckEX\/CVE-2017-11176",
"full_name": "hckex\/CVE-2017-11176",
"owner": {
"login": "HckEX",
"login": "hckex",
"id": 33862757,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33862757?v=4",
"html_url": "https:\/\/github.com\/HckEX",
"html_url": "https:\/\/github.com\/hckex",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/HckEX\/CVE-2017-11176",
"html_url": "https:\/\/github.com\/hckex\/CVE-2017-11176",
"description": null,
"fork": false,
"created_at": "2019-08-08T01:02:52Z",

View file

@ -417,10 +417,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-20T02:04:42Z",
"updated_at": "2024-12-20T07:25:44Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 162,
"watchers_count": 162,
"stargazers_count": 163,
"watchers_count": 163,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 162,
"watchers": 163,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-18T20:03:51Z",
"updated_at": "2024-12-20T11:54:30Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
},

View file

@ -576,10 +576,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-18T20:03:51Z",
"updated_at": "2024-12-20T11:54:30Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -609,7 +609,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
},

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2024-12-03T02:45:50Z",
"updated_at": "2024-12-20T11:54:48Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1798,
"watchers_count": 1798,
"stargazers_count": 1799,
"watchers_count": 1799,
"has_discussions": false,
"forks_count": 249,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 249,
"watchers": 1798,
"watchers": 1799,
"score": 0,
"subscribers_count": 37
},

View file

@ -200,10 +200,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-18T20:03:51Z",
"updated_at": "2024-12-20T11:54:30Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -233,7 +233,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
}

View file

@ -45,10 +45,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-12-18T14:11:05Z",
"updated_at": "2024-12-20T11:54:53Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1742,
"watchers_count": 1742,
"stargazers_count": 1743,
"watchers_count": 1743,
"has_discussions": false,
"forks_count": 359,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 359,
"watchers": 1742,
"watchers": 1743,
"score": 0,
"subscribers_count": 86
},

View file

@ -981,10 +981,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-20T02:04:42Z",
"updated_at": "2024-12-20T07:25:44Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 162,
"watchers_count": 162,
"stargazers_count": 163,
"watchers_count": 163,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -1001,7 +1001,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 162,
"watchers": 163,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-18T20:03:51Z",
"updated_at": "2024-12-20T11:54:30Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2013,
"score": 0,
"subscribers_count": 37
},

View file

@ -45,10 +45,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2024-12-17T20:19:21Z",
"updated_at": "2024-12-20T11:54:42Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1846,
"watchers_count": 1846,
"stargazers_count": 1848,
"watchers_count": 1848,
"has_discussions": false,
"forks_count": 583,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 583,
"watchers": 1846,
"watchers": 1848,
"score": 0,
"subscribers_count": 43
},

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-19T07:38:05Z",
"updated_at": "2024-12-20T11:55:13Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1344,
"watchers_count": 1344,
"stargazers_count": 1345,
"watchers_count": 1345,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1344,
"watchers": 1345,
"score": 0,
"subscribers_count": 15
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2021-38003 exploits extracted from https:\/\/twitter.com\/WhichbufferArda\/status\/1609604183535284224",
"fork": false,
"created_at": "2023-01-07T06:09:14Z",
"updated_at": "2024-10-21T17:35:11Z",
"updated_at": "2024-12-20T08:30:11Z",
"pushed_at": "2023-01-07T19:41:36Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 4
}

View file

@ -49,10 +49,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2024-12-18T05:47:49Z",
"updated_at": "2024-12-20T11:54:31Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1974,
"watchers_count": 1974,
"stargazers_count": 1975,
"watchers_count": 1975,
"has_discussions": false,
"forks_count": 512,
"allow_forking": true,
@ -61,7 +61,7 @@
"topics": [],
"visibility": "public",
"forks": 512,
"watchers": 1974,
"watchers": 1975,
"score": 0,
"subscribers_count": 20
},
@ -967,10 +967,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-12-20T02:11:06Z",
"updated_at": "2024-12-20T11:33:35Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 1092,
"watchers_count": 1092,
"stargazers_count": 1093,
"watchers_count": 1093,
"has_discussions": false,
"forks_count": 190,
"allow_forking": true,
@ -981,7 +981,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 1092,
"watchers": 1093,
"score": 0,
"subscribers_count": 13
},

View file

@ -231,19 +231,19 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-12-19T09:48:48Z",
"updated_at": "2024-12-20T11:55:00Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1605,
"watchers_count": 1605,
"stargazers_count": 1606,
"watchers_count": 1606,
"has_discussions": false,
"forks_count": 482,
"forks_count": 484,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 482,
"watchers": 1605,
"forks": 484,
"watchers": 1606,
"score": 0,
"subscribers_count": 28
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2024-12-17T20:19:24Z",
"updated_at": "2024-12-20T11:55:12Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1345,
"watchers_count": 1345,
"stargazers_count": 1346,
"watchers_count": 1346,
"has_discussions": false,
"forks_count": 322,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 322,
"watchers": 1345,
"watchers": 1346,
"score": 0,
"subscribers_count": 27
},

View file

@ -3749,10 +3749,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2024-12-17T07:10:22Z",
"updated_at": "2024-12-20T11:54:12Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3406,
"watchers_count": 3406,
"stargazers_count": 3407,
"watchers_count": 3407,
"has_discussions": true,
"forks_count": 740,
"allow_forking": true,
@ -3761,7 +3761,7 @@
"topics": [],
"visibility": "public",
"forks": 740,
"watchers": 3406,
"watchers": 3407,
"score": 0,
"subscribers_count": 55
},
@ -10002,10 +10002,10 @@
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
"fork": false,
"created_at": "2021-12-24T13:18:49Z",
"updated_at": "2024-12-06T23:54:02Z",
"updated_at": "2024-12-20T08:39:55Z",
"pushed_at": "2024-01-04T17:12:05Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 144,
"watchers_count": 144,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -10014,7 +10014,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 143,
"watchers": 144,
"score": 0,
"subscribers_count": 6
},

View file

@ -175,8 +175,8 @@
"description": null,
"fork": false,
"created_at": "2024-10-11T16:57:20Z",
"updated_at": "2024-12-19T10:12:45Z",
"pushed_at": "2024-12-19T10:12:40Z",
"updated_at": "2024-12-20T10:58:12Z",
"pushed_at": "2024-12-20T10:58:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-19T07:38:05Z",
"updated_at": "2024-12-20T11:55:13Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1344,
"watchers_count": 1344,
"stargazers_count": 1345,
"watchers_count": 1345,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1344,
"watchers": 1345,
"score": 0,
"subscribers_count": 15
}

View file

@ -202,10 +202,10 @@
"description": null,
"fork": false,
"created_at": "2022-05-01T13:19:10Z",
"updated_at": "2024-12-09T01:44:40Z",
"updated_at": "2024-12-20T09:54:04Z",
"pushed_at": "2022-05-25T00:57:52Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -216,7 +216,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 60,
"watchers": 61,
"score": 0,
"subscribers_count": 8
},

View file

@ -803,13 +803,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 2

View file

@ -638,7 +638,7 @@
"fork": false,
"created_at": "2024-03-04T19:09:57Z",
"updated_at": "2024-10-31T13:25:33Z",
"pushed_at": "2024-12-06T08:36:53Z",
"pushed_at": "2024-12-20T08:56:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -19,7 +19,7 @@
"stargazers_count": 149,
"watchers_count": 149,
"has_discussions": false,
"forks_count": 36,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -34,7 +34,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 36,
"forks": 37,
"watchers": 149,
"score": 0,
"subscribers_count": 2

View file

@ -110,10 +110,10 @@
"description": "MinIO敏感信息泄露漏洞批量扫描poc&exp",
"fork": false,
"created_at": "2023-03-24T08:13:34Z",
"updated_at": "2024-12-11T02:23:30Z",
"updated_at": "2024-12-20T08:10:58Z",
"pushed_at": "2023-03-24T08:19:42Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -122,7 +122,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-19T12:17:40Z",
"updated_at": "2024-12-20T11:47:04Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 1
}

View file

@ -268,10 +268,10 @@
"description": "Repository to install CVE-2023-7028 vulnerable Gitlab instance",
"fork": false,
"created_at": "2024-01-25T09:56:00Z",
"updated_at": "2024-01-25T09:56:01Z",
"updated_at": "2024-12-20T10:17:56Z",
"pushed_at": "2024-01-25T10:18:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -280,7 +280,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-12-20T00:55:25Z",
"updated_at": "2024-12-20T11:54:25Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2304,
"watchers_count": 2304,
"stargazers_count": 2306,
"watchers_count": 2306,
"has_discussions": false,
"forks_count": 299,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 299,
"watchers": 2304,
"watchers": 2306,
"score": 0,
"subscribers_count": 26
},

View file

@ -14,7 +14,7 @@
"description": " PowerShell script that can help you automate updating the Windows Recovery Environment (WinRE) on deployed devices to address the security vulnerabilities in CVE-2024-20666.",
"fork": false,
"created_at": "2024-02-15T13:53:21Z",
"updated_at": "2024-10-20T07:23:08Z",
"updated_at": "2024-12-20T11:38:34Z",
"pushed_at": "2024-02-15T14:08:50Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -50,13 +50,13 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 7,
"score": 0,
"subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2024-23298",
"fork": false,
"created_at": "2024-12-18T18:12:10Z",
"updated_at": "2024-12-18T18:15:31Z",
"updated_at": "2024-12-20T08:39:25Z",
"pushed_at": "2024-12-18T18:15:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -527,19 +527,19 @@
"description": "CVE-2024-24919 exploit",
"fork": false,
"created_at": "2024-05-31T13:11:40Z",
"updated_at": "2024-12-19T23:51:58Z",
"updated_at": "2024-12-20T07:33:37Z",
"pushed_at": "2024-05-31T15:50:57Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 12,
"forks": 11,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -431,5 +431,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 906111399,
"name": "CVE-2024-27956-for-fscan",
"full_name": "7aRanchi\/CVE-2024-27956-for-fscan",
"owner": {
"login": "7aRanchi",
"id": 96373545,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96373545?v=4",
"html_url": "https:\/\/github.com\/7aRanchi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/7aRanchi\/CVE-2024-27956-for-fscan",
"description": "Yaml PoC rule for fscan.",
"fork": false,
"created_at": "2024-12-20T07:30:24Z",
"updated_at": "2024-12-20T08:09:11Z",
"pushed_at": "2024-12-20T08:09:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-12-16T10:41:35Z",
"updated_at": "2024-12-20T08:18:45Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 424,
"watchers_count": 424,
"stargazers_count": 425,
"watchers_count": 425,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 424,
"watchers": 425,
"score": 0,
"subscribers_count": 8
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 12,
"score": 0,
"subscribers_count": 1

View file

@ -81,7 +81,7 @@
"stargazers_count": 518,
"watchers_count": 518,
"has_discussions": false,
"forks_count": 146,
"forks_count": 144,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -92,7 +92,7 @@
"rce"
],
"visibility": "public",
"forks": 146,
"forks": 144,
"watchers": 518,
"score": 0,
"subscribers_count": 3

View file

@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-12-20T03:41:29Z",
"updated_at": "2024-12-20T11:19:12Z",
"pushed_at": "2024-11-29T16:56:23Z",
"stargazers_count": 242,
"watchers_count": 242,
"stargazers_count": 244,
"watchers_count": 244,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 242,
"watchers": 244,
"score": 0,
"subscribers_count": 6
},

View file

@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-19T12:17:40Z",
"updated_at": "2024-12-20T11:47:04Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 29,
"score": 0,
"subscribers_count": 3

View file

@ -29,5 +29,36 @@
"watchers": 27,
"score": 0,
"subscribers_count": 1
},
{
"id": 906162913,
"name": "Bazaar_poc",
"full_name": "NingXin2002\/Bazaar_poc",
"owner": {
"login": "NingXin2002",
"id": 138864342,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4",
"html_url": "https:\/\/github.com\/NingXin2002",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NingXin2002\/Bazaar_poc",
"description": "Bazaar v1.4.3 任意文件读取漏洞(CVE-2024-40348)",
"fork": false,
"created_at": "2024-12-20T09:47:12Z",
"updated_at": "2024-12-20T09:49:43Z",
"pushed_at": "2024-12-20T09:49:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "exploit CVE-2024-40725 (Apache httpd) with ",
"fork": false,
"created_at": "2024-12-18T15:09:38Z",
"updated_at": "2024-12-20T04:41:42Z",
"updated_at": "2024-12-20T10:19:49Z",
"pushed_at": "2024-12-18T15:12:31Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-41319.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 906156712,
"name": "TOTOLINK_poc",
"full_name": "NingXin2002\/TOTOLINK_poc",
"owner": {
"login": "NingXin2002",
"id": 138864342,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4",
"html_url": "https:\/\/github.com\/NingXin2002",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NingXin2002\/TOTOLINK_poc",
"description": "TOTOLINK A6000R 命令执行漏洞CVE-2024-41319",
"fork": false,
"created_at": "2024-12-20T09:31:58Z",
"updated_at": "2024-12-20T09:35:51Z",
"pushed_at": "2024-12-20T09:35:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,8 +14,8 @@
"description": "InVesalius discovered CVE. CVE-2024-42845, CVE-2024-44825",
"fork": false,
"created_at": "2024-08-23T13:43:27Z",
"updated_at": "2024-11-28T14:31:34Z",
"pushed_at": "2024-11-28T14:31:11Z",
"updated_at": "2024-12-20T09:48:56Z",
"pushed_at": "2024-12-20T09:48:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -169,10 +169,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-12-19T13:12:16Z",
"updated_at": "2024-12-20T09:02:13Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 243,
"watchers_count": 243,
"stargazers_count": 244,
"watchers_count": 244,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 243,
"watchers": 244,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-19T02:43:18Z",
"updated_at": "2024-12-19T02:43:18Z",
"updated_at": "2024-12-20T06:58:16Z",
"pushed_at": "2024-12-18T20:18:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
@ -45,19 +45,19 @@
"description": "Repositorio para alojar un template de Nuclei para probar el CVE-2024-50379 (en fase de prueba)",
"fork": false,
"created_at": "2024-12-20T03:43:47Z",
"updated_at": "2024-12-20T03:54:32Z",
"updated_at": "2024-12-20T07:55:38Z",
"pushed_at": "2024-12-20T03:54:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
@ -76,19 +76,19 @@
"description": "Apache TomcatCVE-2024-50379条件竞争致远程代码执行漏洞批量检测脚本",
"fork": false,
"created_at": "2024-12-20T05:24:10Z",
"updated_at": "2024-12-20T06:29:36Z",
"updated_at": "2024-12-20T07:49:45Z",
"pushed_at": "2024-12-20T05:41:23Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-52940 - A zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.",
"fork": false,
"created_at": "2024-10-27T15:29:56Z",
"updated_at": "2024-12-13T17:42:07Z",
"updated_at": "2024-12-20T11:42:38Z",
"pushed_at": "2024-11-18T15:09:32Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": true,
"forks_count": 9,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,19 +14,19 @@
"description": "TP-Link Archer AXE75 Authenticated Command Injection",
"fork": false,
"created_at": "2024-10-04T12:49:19Z",
"updated_at": "2024-12-19T09:34:37Z",
"updated_at": "2024-12-20T07:46:46Z",
"pushed_at": "2024-12-19T09:34:33Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"forks": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": "CyberPanel authenticated RCE < 2.3.8",
"fork": false,
"created_at": "2024-12-15T22:40:52Z",
"updated_at": "2024-12-19T09:37:02Z",
"updated_at": "2024-12-20T07:02:33Z",
"pushed_at": "2024-12-19T09:36:58Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,18 +45,18 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-20T02:25:52Z",
"pushed_at": "2024-12-19T03:23:02Z",
"updated_at": "2024-12-20T10:05:19Z",
"pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"forks": 26,
"watchers": 63,
"score": 0,
"subscribers_count": 3

View file

@ -14,19 +14,19 @@
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
"fork": false,
"created_at": "2024-12-20T03:34:01Z",
"updated_at": "2024-12-20T06:18:44Z",
"updated_at": "2024-12-20T10:53:27Z",
"pushed_at": "2024-12-20T04:26:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 0
}

View file

@ -4090,6 +4090,7 @@
- [cve-2024/CVE-2024-27956-RCE](https://github.com/cve-2024/CVE-2024-27956-RCE)
- [ThatNotEasy/CVE-2024-27956](https://github.com/ThatNotEasy/CVE-2024-27956)
- [CERTologists/EXPLOITING-CVE-2024-27956](https://github.com/CERTologists/EXPLOITING-CVE-2024-27956)
- [7aRanchi/CVE-2024-27956-for-fscan](https://github.com/7aRanchi/CVE-2024-27956-for-fscan)
### CVE-2024-27971 (2024-05-17)
@ -5965,6 +5966,7 @@
</code>
- [bigb0x/CVE-2024-40348](https://github.com/bigb0x/CVE-2024-40348)
- [NingXin2002/Bazaar_poc](https://github.com/NingXin2002/Bazaar_poc)
### CVE-2024-40422 (2024-07-24)
@ -6159,6 +6161,13 @@
### CVE-2024-41312
- [Amal264882/CVE-2024-41312.](https://github.com/Amal264882/CVE-2024-41312.)
### CVE-2024-41319 (2024-07-23)
<code>TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulnerability via the cmd parameter in the webcmd function.
</code>
- [NingXin2002/TOTOLINK_poc](https://github.com/NingXin2002/TOTOLINK_poc)
### CVE-2024-41570 (2024-08-09)
<code>An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server.
@ -43989,7 +43998,7 @@
- [lexfo/cve-2017-11176](https://github.com/lexfo/cve-2017-11176)
- [DoubleMice/cve-2017-11176](https://github.com/DoubleMice/cve-2017-11176)
- [HckEX/CVE-2017-11176](https://github.com/HckEX/CVE-2017-11176)
- [hckex/CVE-2017-11176](https://github.com/hckex/CVE-2017-11176)
- [leonardo1101/cve-2017-11176](https://github.com/leonardo1101/cve-2017-11176)
- [c3r34lk1ll3r/CVE-2017-11176](https://github.com/c3r34lk1ll3r/CVE-2017-11176)
- [Sama-Ayman-Mokhtar/CVE-2017-11176](https://github.com/Sama-Ayman-Mokhtar/CVE-2017-11176)