mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/12/20 12:32:12
This commit is contained in:
parent
16652733e9
commit
75c22ac747
54 changed files with 309 additions and 205 deletions
|
@ -45,10 +45,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-12-18T20:03:51Z",
|
||||
"updated_at": "2024-12-20T11:54:30Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2012,
|
||||
"watchers_count": 2012,
|
||||
"stargazers_count": 2013,
|
||||
"watchers_count": 2013,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -78,7 +78,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2012,
|
||||
"watchers": 2013,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof of concept for CVE-2015-7547",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-10T21:13:54Z",
|
||||
"updated_at": "2024-09-08T18:04:38Z",
|
||||
"updated_at": "2024-12-20T06:31:13Z",
|
||||
"pushed_at": "2016-02-20T07:57:58Z",
|
||||
"stargazers_count": 542,
|
||||
"watchers_count": 542,
|
||||
"stargazers_count": 543,
|
||||
"watchers_count": 543,
|
||||
"has_discussions": false,
|
||||
"forks_count": 166,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 166,
|
||||
"watchers": 542,
|
||||
"watchers": 543,
|
||||
"score": 0,
|
||||
"subscribers_count": 62
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-12-18T20:03:51Z",
|
||||
"updated_at": "2024-12-20T11:54:30Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2012,
|
||||
"watchers_count": 2012,
|
||||
"stargazers_count": 2013,
|
||||
"watchers_count": 2013,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -47,7 +47,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2012,
|
||||
"watchers": 2013,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
|
@ -64,15 +64,15 @@
|
|||
{
|
||||
"id": 201151172,
|
||||
"name": "CVE-2017-11176",
|
||||
"full_name": "HckEX\/CVE-2017-11176",
|
||||
"full_name": "hckex\/CVE-2017-11176",
|
||||
"owner": {
|
||||
"login": "HckEX",
|
||||
"login": "hckex",
|
||||
"id": 33862757,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33862757?v=4",
|
||||
"html_url": "https:\/\/github.com\/HckEX",
|
||||
"html_url": "https:\/\/github.com\/hckex",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HckEX\/CVE-2017-11176",
|
||||
"html_url": "https:\/\/github.com\/hckex\/CVE-2017-11176",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-08-08T01:02:52Z",
|
||||
|
|
|
@ -417,10 +417,10 @@
|
|||
"description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2024-12-20T02:04:42Z",
|
||||
"updated_at": "2024-12-20T07:25:44Z",
|
||||
"pushed_at": "2024-11-13T03:12:58Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -437,7 +437,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 162,
|
||||
"watchers": 163,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-12-18T20:03:51Z",
|
||||
"updated_at": "2024-12-20T11:54:30Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2012,
|
||||
"watchers_count": 2012,
|
||||
"stargazers_count": 2013,
|
||||
"watchers_count": 2013,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -78,7 +78,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2012,
|
||||
"watchers": 2013,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
|
@ -576,10 +576,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-12-18T20:03:51Z",
|
||||
"updated_at": "2024-12-20T11:54:30Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2012,
|
||||
"watchers_count": 2012,
|
||||
"stargazers_count": 2013,
|
||||
"watchers_count": 2013,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -609,7 +609,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2012,
|
||||
"watchers": 2013,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2024-12-03T02:45:50Z",
|
||||
"updated_at": "2024-12-20T11:54:48Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1798,
|
||||
"watchers_count": 1798,
|
||||
"stargazers_count": 1799,
|
||||
"watchers_count": 1799,
|
||||
"has_discussions": false,
|
||||
"forks_count": 249,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 249,
|
||||
"watchers": 1798,
|
||||
"watchers": 1799,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -200,10 +200,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-12-18T20:03:51Z",
|
||||
"updated_at": "2024-12-20T11:54:30Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2012,
|
||||
"watchers_count": 2012,
|
||||
"stargazers_count": 2013,
|
||||
"watchers_count": 2013,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -233,7 +233,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2012,
|
||||
"watchers": 2013,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2024-12-18T14:11:05Z",
|
||||
"updated_at": "2024-12-20T11:54:53Z",
|
||||
"pushed_at": "2023-07-20T10:51:42Z",
|
||||
"stargazers_count": 1742,
|
||||
"watchers_count": 1742,
|
||||
"stargazers_count": 1743,
|
||||
"watchers_count": 1743,
|
||||
"has_discussions": false,
|
||||
"forks_count": 359,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 359,
|
||||
"watchers": 1742,
|
||||
"watchers": 1743,
|
||||
"score": 0,
|
||||
"subscribers_count": 86
|
||||
},
|
||||
|
|
|
@ -981,10 +981,10 @@
|
|||
"description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2024-12-20T02:04:42Z",
|
||||
"updated_at": "2024-12-20T07:25:44Z",
|
||||
"pushed_at": "2024-11-13T03:12:58Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -1001,7 +1001,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 162,
|
||||
"watchers": 163,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-12-18T20:03:51Z",
|
||||
"updated_at": "2024-12-20T11:54:30Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2012,
|
||||
"watchers_count": 2012,
|
||||
"stargazers_count": 2013,
|
||||
"watchers_count": 2013,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -47,7 +47,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2012,
|
||||
"watchers": 2013,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2024-12-17T20:19:21Z",
|
||||
"updated_at": "2024-12-20T11:54:42Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1846,
|
||||
"watchers_count": 1846,
|
||||
"stargazers_count": 1848,
|
||||
"watchers_count": 1848,
|
||||
"has_discussions": false,
|
||||
"forks_count": 583,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 583,
|
||||
"watchers": 1846,
|
||||
"watchers": 1848,
|
||||
"score": 0,
|
||||
"subscribers_count": 43
|
||||
},
|
||||
|
|
|
@ -848,10 +848,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-12-19T07:38:05Z",
|
||||
"updated_at": "2024-12-20T11:55:13Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1344,
|
||||
"watchers_count": 1344,
|
||||
"stargazers_count": 1345,
|
||||
"watchers_count": 1345,
|
||||
"has_discussions": false,
|
||||
"forks_count": 166,
|
||||
"allow_forking": true,
|
||||
|
@ -867,7 +867,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 166,
|
||||
"watchers": 1344,
|
||||
"watchers": 1345,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2021-38003 exploits extracted from https:\/\/twitter.com\/WhichbufferArda\/status\/1609604183535284224",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-07T06:09:14Z",
|
||||
"updated_at": "2024-10-21T17:35:11Z",
|
||||
"updated_at": "2024-12-20T08:30:11Z",
|
||||
"pushed_at": "2023-01-07T19:41:36Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -49,10 +49,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2024-12-18T05:47:49Z",
|
||||
"updated_at": "2024-12-20T11:54:31Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1974,
|
||||
"watchers_count": 1974,
|
||||
"stargazers_count": 1975,
|
||||
"watchers_count": 1975,
|
||||
"has_discussions": false,
|
||||
"forks_count": 512,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 512,
|
||||
"watchers": 1974,
|
||||
"watchers": 1975,
|
||||
"score": 0,
|
||||
"subscribers_count": 20
|
||||
},
|
||||
|
@ -967,10 +967,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2024-12-20T02:11:06Z",
|
||||
"updated_at": "2024-12-20T11:33:35Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 1092,
|
||||
"watchers_count": 1092,
|
||||
"stargazers_count": 1093,
|
||||
"watchers_count": 1093,
|
||||
"has_discussions": false,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
|
@ -981,7 +981,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 190,
|
||||
"watchers": 1092,
|
||||
"watchers": 1093,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -231,19 +231,19 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2024-12-19T09:48:48Z",
|
||||
"updated_at": "2024-12-20T11:55:00Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1605,
|
||||
"watchers_count": 1605,
|
||||
"stargazers_count": 1606,
|
||||
"watchers_count": 1606,
|
||||
"has_discussions": false,
|
||||
"forks_count": 482,
|
||||
"forks_count": 484,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 482,
|
||||
"watchers": 1605,
|
||||
"forks": 484,
|
||||
"watchers": 1606,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2024-12-17T20:19:24Z",
|
||||
"updated_at": "2024-12-20T11:55:12Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1345,
|
||||
"watchers_count": 1345,
|
||||
"stargazers_count": 1346,
|
||||
"watchers_count": 1346,
|
||||
"has_discussions": false,
|
||||
"forks_count": 322,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 322,
|
||||
"watchers": 1345,
|
||||
"watchers": 1346,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -3749,10 +3749,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2024-12-17T07:10:22Z",
|
||||
"updated_at": "2024-12-20T11:54:12Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3406,
|
||||
"watchers_count": 3406,
|
||||
"stargazers_count": 3407,
|
||||
"watchers_count": 3407,
|
||||
"has_discussions": true,
|
||||
"forks_count": 740,
|
||||
"allow_forking": true,
|
||||
|
@ -3761,7 +3761,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 740,
|
||||
"watchers": 3406,
|
||||
"watchers": 3407,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
@ -10002,10 +10002,10 @@
|
|||
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-24T13:18:49Z",
|
||||
"updated_at": "2024-12-06T23:54:02Z",
|
||||
"updated_at": "2024-12-20T08:39:55Z",
|
||||
"pushed_at": "2024-01-04T17:12:05Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -10014,7 +10014,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -175,8 +175,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-11T16:57:20Z",
|
||||
"updated_at": "2024-12-19T10:12:45Z",
|
||||
"pushed_at": "2024-12-19T10:12:40Z",
|
||||
"updated_at": "2024-12-20T10:58:12Z",
|
||||
"pushed_at": "2024-12-20T10:58:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -792,10 +792,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-12-19T07:38:05Z",
|
||||
"updated_at": "2024-12-20T11:55:13Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1344,
|
||||
"watchers_count": 1344,
|
||||
"stargazers_count": 1345,
|
||||
"watchers_count": 1345,
|
||||
"has_discussions": false,
|
||||
"forks_count": 166,
|
||||
"allow_forking": true,
|
||||
|
@ -811,7 +811,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 166,
|
||||
"watchers": 1344,
|
||||
"watchers": 1345,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -202,10 +202,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-01T13:19:10Z",
|
||||
"updated_at": "2024-12-09T01:44:40Z",
|
||||
"updated_at": "2024-12-20T09:54:04Z",
|
||||
"pushed_at": "2022-05-25T00:57:52Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -216,7 +216,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -803,13 +803,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -638,7 +638,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-03-04T19:09:57Z",
|
||||
"updated_at": "2024-10-31T13:25:33Z",
|
||||
"pushed_at": "2024-12-06T08:36:53Z",
|
||||
"pushed_at": "2024-12-20T08:56:22Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -34,7 +34,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"forks": 37,
|
||||
"watchers": 149,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -110,10 +110,10 @@
|
|||
"description": "MinIO敏感信息泄露漏洞批量扫描poc&exp",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-24T08:13:34Z",
|
||||
"updated_at": "2024-12-11T02:23:30Z",
|
||||
"updated_at": "2024-12-20T08:10:58Z",
|
||||
"pushed_at": "2023-03-24T08:19:42Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -122,7 +122,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T20:32:45Z",
|
||||
"updated_at": "2024-12-19T12:17:40Z",
|
||||
"updated_at": "2024-12-20T11:47:04Z",
|
||||
"pushed_at": "2024-10-05T20:37:02Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -37,7 +37,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -268,10 +268,10 @@
|
|||
"description": "Repository to install CVE-2023-7028 vulnerable Gitlab instance",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-25T09:56:00Z",
|
||||
"updated_at": "2024-01-25T09:56:01Z",
|
||||
"updated_at": "2024-12-20T10:17:56Z",
|
||||
"pushed_at": "2024-01-25T10:18:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -280,7 +280,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-12-20T00:55:25Z",
|
||||
"updated_at": "2024-12-20T11:54:25Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2304,
|
||||
"watchers_count": 2304,
|
||||
"stargazers_count": 2306,
|
||||
"watchers_count": 2306,
|
||||
"has_discussions": false,
|
||||
"forks_count": 299,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 299,
|
||||
"watchers": 2304,
|
||||
"watchers": 2306,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": " PowerShell script that can help you automate updating the Windows Recovery Environment (WinRE) on deployed devices to address the security vulnerabilities in CVE-2024-20666.",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-15T13:53:21Z",
|
||||
"updated_at": "2024-10-20T07:23:08Z",
|
||||
"updated_at": "2024-12-20T11:38:34Z",
|
||||
"pushed_at": "2024-02-15T14:08:50Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for CVE-2024-23298",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-18T18:12:10Z",
|
||||
"updated_at": "2024-12-18T18:15:31Z",
|
||||
"updated_at": "2024-12-20T08:39:25Z",
|
||||
"pushed_at": "2024-12-18T18:15:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -527,19 +527,19 @@
|
|||
"description": "CVE-2024-24919 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-31T13:11:40Z",
|
||||
"updated_at": "2024-12-19T23:51:58Z",
|
||||
"updated_at": "2024-12-20T07:33:37Z",
|
||||
"pushed_at": "2024-05-31T15:50:57Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 12,
|
||||
"forks": 11,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -431,5 +431,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 906111399,
|
||||
"name": "CVE-2024-27956-for-fscan",
|
||||
"full_name": "7aRanchi\/CVE-2024-27956-for-fscan",
|
||||
"owner": {
|
||||
"login": "7aRanchi",
|
||||
"id": 96373545,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96373545?v=4",
|
||||
"html_url": "https:\/\/github.com\/7aRanchi",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/7aRanchi\/CVE-2024-27956-for-fscan",
|
||||
"description": "Yaml PoC rule for fscan.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-20T07:30:24Z",
|
||||
"updated_at": "2024-12-20T08:09:11Z",
|
||||
"pushed_at": "2024-12-20T08:09:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2024-12-16T10:41:35Z",
|
||||
"updated_at": "2024-12-20T08:18:45Z",
|
||||
"pushed_at": "2024-09-30T08:45:56Z",
|
||||
"stargazers_count": 424,
|
||||
"watchers_count": 424,
|
||||
"stargazers_count": 425,
|
||||
"watchers_count": 425,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 424,
|
||||
"watchers": 425,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -81,7 +81,7 @@
|
|||
"stargazers_count": 518,
|
||||
"watchers_count": 518,
|
||||
"has_discussions": false,
|
||||
"forks_count": 146,
|
||||
"forks_count": 144,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -92,7 +92,7 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 146,
|
||||
"forks": 144,
|
||||
"watchers": 518,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-13T19:30:20Z",
|
||||
"updated_at": "2024-12-20T03:41:29Z",
|
||||
"updated_at": "2024-12-20T11:19:12Z",
|
||||
"pushed_at": "2024-11-29T16:56:23Z",
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 242,
|
||||
"watchers": 244,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T20:32:45Z",
|
||||
"updated_at": "2024-12-19T12:17:40Z",
|
||||
"updated_at": "2024-12-20T11:47:04Z",
|
||||
"pushed_at": "2024-10-05T20:37:02Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -68,7 +68,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 906162913,
|
||||
"name": "Bazaar_poc",
|
||||
"full_name": "NingXin2002\/Bazaar_poc",
|
||||
"owner": {
|
||||
"login": "NingXin2002",
|
||||
"id": 138864342,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4",
|
||||
"html_url": "https:\/\/github.com\/NingXin2002",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NingXin2002\/Bazaar_poc",
|
||||
"description": "Bazaar v1.4.3 任意文件读取漏洞(CVE-2024-40348)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-20T09:47:12Z",
|
||||
"updated_at": "2024-12-20T09:49:43Z",
|
||||
"pushed_at": "2024-12-20T09:49:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -76,10 +76,10 @@
|
|||
"description": "exploit CVE-2024-40725 (Apache httpd) with ",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-18T15:09:38Z",
|
||||
"updated_at": "2024-12-20T04:41:42Z",
|
||||
"updated_at": "2024-12-20T10:19:49Z",
|
||||
"pushed_at": "2024-12-18T15:12:31Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
33
2024/CVE-2024-41319.json
Normal file
33
2024/CVE-2024-41319.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 906156712,
|
||||
"name": "TOTOLINK_poc",
|
||||
"full_name": "NingXin2002\/TOTOLINK_poc",
|
||||
"owner": {
|
||||
"login": "NingXin2002",
|
||||
"id": 138864342,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4",
|
||||
"html_url": "https:\/\/github.com\/NingXin2002",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NingXin2002\/TOTOLINK_poc",
|
||||
"description": "TOTOLINK A6000R 命令执行漏洞(CVE-2024-41319)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-20T09:31:58Z",
|
||||
"updated_at": "2024-12-20T09:35:51Z",
|
||||
"pushed_at": "2024-12-20T09:35:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,8 +14,8 @@
|
|||
"description": "InVesalius discovered CVE. CVE-2024-42845, CVE-2024-44825",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-23T13:43:27Z",
|
||||
"updated_at": "2024-11-28T14:31:34Z",
|
||||
"pushed_at": "2024-11-28T14:31:11Z",
|
||||
"updated_at": "2024-12-20T09:48:56Z",
|
||||
"pushed_at": "2024-12-20T09:48:52Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -169,10 +169,10 @@
|
|||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:52:54Z",
|
||||
"updated_at": "2024-12-19T13:12:16Z",
|
||||
"updated_at": "2024-12-20T09:02:13Z",
|
||||
"pushed_at": "2024-06-22T15:13:52Z",
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 243,
|
||||
"watchers": 244,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-19T02:43:18Z",
|
||||
"updated_at": "2024-12-19T02:43:18Z",
|
||||
"updated_at": "2024-12-20T06:58:16Z",
|
||||
"pushed_at": "2024-12-18T20:18:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -45,19 +45,19 @@
|
|||
"description": "Repositorio para alojar un template de Nuclei para probar el CVE-2024-50379 (en fase de prueba)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-20T03:43:47Z",
|
||||
"updated_at": "2024-12-20T03:54:32Z",
|
||||
"updated_at": "2024-12-20T07:55:38Z",
|
||||
"pushed_at": "2024-12-20T03:54:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -76,19 +76,19 @@
|
|||
"description": "Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-20T05:24:10Z",
|
||||
"updated_at": "2024-12-20T06:29:36Z",
|
||||
"updated_at": "2024-12-20T07:49:45Z",
|
||||
"pushed_at": "2024-12-20T05:41:23Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-52940 - A zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T15:29:56Z",
|
||||
"updated_at": "2024-12-13T17:42:07Z",
|
||||
"updated_at": "2024-12-20T11:42:38Z",
|
||||
"pushed_at": "2024-11-18T15:09:32Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": true,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -38,7 +38,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "TP-Link Archer AXE75 Authenticated Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-04T12:49:19Z",
|
||||
"updated_at": "2024-12-19T09:34:37Z",
|
||||
"updated_at": "2024-12-20T07:46:46Z",
|
||||
"pushed_at": "2024-12-19T09:34:33Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "CyberPanel authenticated RCE < 2.3.8",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-15T22:40:52Z",
|
||||
"updated_at": "2024-12-19T09:37:02Z",
|
||||
"updated_at": "2024-12-20T07:02:33Z",
|
||||
"pushed_at": "2024-12-19T09:36:58Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,18 +45,18 @@
|
|||
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T17:42:55Z",
|
||||
"updated_at": "2024-12-20T02:25:52Z",
|
||||
"pushed_at": "2024-12-19T03:23:02Z",
|
||||
"updated_at": "2024-12-20T10:05:19Z",
|
||||
"pushed_at": "2024-12-20T10:05:15Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"forks": 26,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-20T03:34:01Z",
|
||||
"updated_at": "2024-12-20T06:18:44Z",
|
||||
"updated_at": "2024-12-20T10:53:27Z",
|
||||
"pushed_at": "2024-12-20T04:26:44Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
11
README.md
11
README.md
|
@ -4090,6 +4090,7 @@
|
|||
- [cve-2024/CVE-2024-27956-RCE](https://github.com/cve-2024/CVE-2024-27956-RCE)
|
||||
- [ThatNotEasy/CVE-2024-27956](https://github.com/ThatNotEasy/CVE-2024-27956)
|
||||
- [CERTologists/EXPLOITING-CVE-2024-27956](https://github.com/CERTologists/EXPLOITING-CVE-2024-27956)
|
||||
- [7aRanchi/CVE-2024-27956-for-fscan](https://github.com/7aRanchi/CVE-2024-27956-for-fscan)
|
||||
|
||||
### CVE-2024-27971 (2024-05-17)
|
||||
|
||||
|
@ -5965,6 +5966,7 @@
|
|||
</code>
|
||||
|
||||
- [bigb0x/CVE-2024-40348](https://github.com/bigb0x/CVE-2024-40348)
|
||||
- [NingXin2002/Bazaar_poc](https://github.com/NingXin2002/Bazaar_poc)
|
||||
|
||||
### CVE-2024-40422 (2024-07-24)
|
||||
|
||||
|
@ -6159,6 +6161,13 @@
|
|||
### CVE-2024-41312
|
||||
- [Amal264882/CVE-2024-41312.](https://github.com/Amal264882/CVE-2024-41312.)
|
||||
|
||||
### CVE-2024-41319 (2024-07-23)
|
||||
|
||||
<code>TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulnerability via the cmd parameter in the webcmd function.
|
||||
</code>
|
||||
|
||||
- [NingXin2002/TOTOLINK_poc](https://github.com/NingXin2002/TOTOLINK_poc)
|
||||
|
||||
### CVE-2024-41570 (2024-08-09)
|
||||
|
||||
<code>An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server.
|
||||
|
@ -43989,7 +43998,7 @@
|
|||
|
||||
- [lexfo/cve-2017-11176](https://github.com/lexfo/cve-2017-11176)
|
||||
- [DoubleMice/cve-2017-11176](https://github.com/DoubleMice/cve-2017-11176)
|
||||
- [HckEX/CVE-2017-11176](https://github.com/HckEX/CVE-2017-11176)
|
||||
- [hckex/CVE-2017-11176](https://github.com/hckex/CVE-2017-11176)
|
||||
- [leonardo1101/cve-2017-11176](https://github.com/leonardo1101/cve-2017-11176)
|
||||
- [c3r34lk1ll3r/CVE-2017-11176](https://github.com/c3r34lk1ll3r/CVE-2017-11176)
|
||||
- [Sama-Ayman-Mokhtar/CVE-2017-11176](https://github.com/Sama-Ayman-Mokhtar/CVE-2017-11176)
|
||||
|
|
Loading…
Add table
Reference in a new issue