Auto Update 2025/01/15 00:31:13

This commit is contained in:
motikan2010-bot 2025-01-15 09:31:13 +09:00
parent ca59258b41
commit 793493a75e
589 changed files with 110 additions and 35463 deletions

View file

@ -182,7 +182,7 @@
"fork": false,
"created_at": "2024-11-14T04:35:59Z",
"updated_at": "2025-01-05T15:26:10Z",
"pushed_at": "2025-01-14T12:58:33Z",
"pushed_at": "2025-01-14T23:24:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -1197,10 +1197,10 @@
"description": "Shellshock exploit + vulnerable environment",
"fork": false,
"created_at": "2016-12-07T23:38:50Z",
"updated_at": "2025-01-14T11:01:08Z",
"updated_at": "2025-01-14T21:31:10Z",
"pushed_at": "2023-05-11T02:12:25Z",
"stargazers_count": 206,
"watchers_count": 206,
"stargazers_count": 207,
"watchers_count": 207,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -1216,7 +1216,7 @@
],
"visibility": "public",
"forks": 56,
"watchers": 206,
"watchers": 207,
"score": 0,
"subscribers_count": 5
},

View file

@ -81,13 +81,13 @@
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 15,
"score": 0,
"subscribers_count": 4

View file

@ -45,10 +45,10 @@
"description": "Fortigate CVE-2018-13379 - Tool to search for vulnerable Fortigate hosts in Rapid7 Project Sonar data anonymously through The Tor network.",
"fork": false,
"created_at": "2019-08-18T19:24:48Z",
"updated_at": "2024-01-23T11:44:08Z",
"updated_at": "2025-01-14T19:50:00Z",
"pushed_at": "2024-01-23T11:44:08Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -64,7 +64,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -272,13 +272,13 @@
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 23,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"forks": 24,
"watchers": 50,
"score": 0,
"subscribers_count": 3

View file

@ -513,5 +513,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 916783216,
"name": "CVE-2018-16763",
"full_name": "Kz0x-337\/CVE-2018-16763",
"owner": {
"login": "Kz0x-337",
"id": 193463900,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193463900?v=4",
"html_url": "https:\/\/github.com\/Kz0x-337",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Kz0x-337\/CVE-2018-16763",
"description": null,
"fork": false,
"created_at": "2025-01-14T18:48:30Z",
"updated_at": "2025-01-14T21:50:00Z",
"pushed_at": "2025-01-14T21:49:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -19,7 +19,7 @@
"stargazers_count": 528,
"watchers_count": 528,
"has_discussions": false,
"forks_count": 55,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -32,7 +32,7 @@
"usb"
],
"visibility": "public",
"forks": 55,
"forks": 52,
"watchers": 528,
"score": 0,
"subscribers_count": 55

View file

@ -176,10 +176,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2025-01-03T07:40:54Z",
"updated_at": "2025-01-14T19:17:32Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 643,
"watchers_count": 643,
"stargazers_count": 644,
"watchers_count": 644,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
@ -188,7 +188,7 @@
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 643,
"watchers": 644,
"score": 0,
"subscribers_count": 12
},

View file

@ -725,10 +725,10 @@
"description": "Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527",
"fork": false,
"created_at": "2021-07-07T08:32:09Z",
"updated_at": "2024-08-24T16:04:57Z",
"updated_at": "2025-01-14T18:54:41Z",
"pushed_at": "2021-07-12T09:28:16Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -737,7 +737,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},

View file

@ -327,8 +327,8 @@
"description": "Exploit for CVE-2021-22204 (ExifTool) - Arbitrary Code Execution",
"fork": false,
"created_at": "2022-04-16T22:49:47Z",
"updated_at": "2024-10-02T07:11:43Z",
"pushed_at": "2022-06-07T23:09:29Z",
"updated_at": "2025-01-14T18:36:38Z",
"pushed_at": "2025-01-14T18:36:34Z",
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": true,

View file

@ -14,10 +14,10 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false,
"created_at": "2022-03-23T15:03:09Z",
"updated_at": "2025-01-04T05:44:42Z",
"updated_at": "2025-01-14T19:00:22Z",
"pushed_at": "2022-03-26T05:52:15Z",
"stargazers_count": 453,
"watchers_count": 453,
"stargazers_count": 454,
"watchers_count": 454,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 453,
"watchers": 454,
"score": 0,
"subscribers_count": 21
}

View file

@ -14,10 +14,10 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
"updated_at": "2024-12-13T21:06:58Z",
"updated_at": "2025-01-14T18:51:26Z",
"pushed_at": "2024-11-10T17:21:28Z",
"stargazers_count": 396,
"watchers_count": 396,
"stargazers_count": 397,
"watchers_count": 397,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 396,
"watchers": 397,
"score": 0,
"subscribers_count": 8
},

View file

@ -271,8 +271,8 @@
"description": "Parses the System Snapshot from an Ivanti Connect Secure applicance to identify possible IOCs related to CVE-2023-46805, CVE-2024-21887 and CVE-2025-0282.",
"fork": false,
"created_at": "2025-01-14T12:54:19Z",
"updated_at": "2025-01-14T13:36:46Z",
"pushed_at": "2025-01-14T13:36:43Z",
"updated_at": "2025-01-14T22:44:39Z",
"pushed_at": "2025-01-14T22:44:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -1,286 +0,0 @@
[
{
"id": 890817341,
"name": "palo-alto-panos-cve-2024-0012",
"full_name": "watchtowrlabs\/palo-alto-panos-cve-2024-0012",
"owner": {
"login": "watchtowrlabs",
"id": 99977116,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
"html_url": "https:\/\/github.com\/watchtowrlabs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/watchtowrlabs\/palo-alto-panos-cve-2024-0012",
"description": null,
"fork": false,
"created_at": "2024-11-19T08:29:32Z",
"updated_at": "2025-01-02T13:11:27Z",
"pushed_at": "2024-11-19T09:28:42Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},
{
"id": 890899855,
"name": "CVE-2024-0012-POC",
"full_name": "Sachinart\/CVE-2024-0012-POC",
"owner": {
"login": "Sachinart",
"id": 18497191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4",
"html_url": "https:\/\/github.com\/Sachinart",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-0012-POC",
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
"fork": false,
"created_at": "2024-11-19T11:30:25Z",
"updated_at": "2024-12-05T00:53:26Z",
"pushed_at": "2024-11-19T11:37:09Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},
{
"id": 891583314,
"name": "CVE-2024-0012",
"full_name": "greaselovely\/CVE-2024-0012",
"owner": {
"login": "greaselovely",
"id": 71092239,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71092239?v=4",
"html_url": "https:\/\/github.com\/greaselovely",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/greaselovely\/CVE-2024-0012",
"description": "PANW NGFW CVE-2024-0012",
"fork": false,
"created_at": "2024-11-20T15:35:29Z",
"updated_at": "2024-11-22T20:10:24Z",
"pushed_at": "2024-11-22T20:10:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 891832016,
"name": "CVE-2024-0012",
"full_name": "VegetableLasagne\/CVE-2024-0012",
"owner": {
"login": "VegetableLasagne",
"id": 118773543,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118773543?v=4",
"html_url": "https:\/\/github.com\/VegetableLasagne",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/VegetableLasagne\/CVE-2024-0012",
"description": "Palo Alto CVE-2024-0012 Exploit POC",
"fork": false,
"created_at": "2024-11-21T03:08:00Z",
"updated_at": "2024-11-21T03:08:47Z",
"pushed_at": "2024-11-21T03:08:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 892487345,
"name": "CVE-2024-0012-poc",
"full_name": "iSee857\/CVE-2024-0012-poc",
"owner": {
"login": "iSee857",
"id": 73977770,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4",
"html_url": "https:\/\/github.com\/iSee857",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/iSee857\/CVE-2024-0012-poc",
"description": "CVE-2024-0012批量检测脚本",
"fork": false,
"created_at": "2024-11-22T07:52:11Z",
"updated_at": "2024-11-26T07:38:23Z",
"pushed_at": "2024-11-26T07:38:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 892650578,
"name": "cve-2024-0012-poc",
"full_name": "XiaomingX\/cve-2024-0012-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-0012-poc",
"description": "CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面获取PAN-OS管理员权限从而执行管理操作、篡改配置或利用其他需要身份验证的特权提升漏洞如CVE-2024-9474 ",
"fork": false,
"created_at": "2024-11-22T14:11:56Z",
"updated_at": "2025-01-13T18:17:29Z",
"pushed_at": "2024-11-22T14:37:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 892819901,
"name": "Paloalto-CVE-2024-0012",
"full_name": "punitdarji\/Paloalto-CVE-2024-0012",
"owner": {
"login": "punitdarji",
"id": 38101321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4",
"html_url": "https:\/\/github.com\/punitdarji",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/punitdarji\/Paloalto-CVE-2024-0012",
"description": null,
"fork": false,
"created_at": "2024-11-22T20:58:17Z",
"updated_at": "2024-11-22T21:00:08Z",
"pushed_at": "2024-11-22T21:00:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 896532665,
"name": "CVE-2024-0012",
"full_name": "0xjessie21\/CVE-2024-0012",
"owner": {
"login": "0xjessie21",
"id": 2928054,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2928054?v=4",
"html_url": "https:\/\/github.com\/0xjessie21",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xjessie21\/CVE-2024-0012",
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
"fork": false,
"created_at": "2024-11-30T16:06:02Z",
"updated_at": "2024-12-02T02:33:44Z",
"pushed_at": "2024-12-02T02:33:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2024-0012",
"exploit",
"paloaltonetworks"
],
"visibility": "public",
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 902007048,
"name": "CVE-2024-0012_CVE-2024-9474_PoC",
"full_name": "TalatumLabs\/CVE-2024-0012_CVE-2024-9474_PoC",
"owner": {
"login": "TalatumLabs",
"id": 191394406,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191394406?v=4",
"html_url": "https:\/\/github.com\/TalatumLabs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TalatumLabs\/CVE-2024-0012_CVE-2024-9474_PoC",
"description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.",
"fork": false,
"created_at": "2024-12-11T18:13:32Z",
"updated_at": "2024-12-14T02:34:33Z",
"pushed_at": "2024-12-12T15:48:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,35 +1,4 @@
[
{
"id": 835151018,
"name": "G3_Frameworks_av_CVE-2024-0023",
"full_name": "AbrarKhan\/G3_Frameworks_av_CVE-2024-0023",
"owner": {
"login": "AbrarKhan",
"id": 3054615,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3054615?v=4",
"html_url": "https:\/\/github.com\/AbrarKhan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AbrarKhan\/G3_Frameworks_av_CVE-2024-0023",
"description": null,
"fork": false,
"created_at": "2024-07-29T09:06:34Z",
"updated_at": "2024-07-29T10:47:59Z",
"pushed_at": "2024-07-29T10:48:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 851627563,
"name": "frameworks_av_android10_r33_CVE-2024-0023",

View file

@ -1,33 +0,0 @@
[
{
"id": 840219760,
"name": "system_bt_CVE-2024-0030",
"full_name": "uthrasri\/system_bt_CVE-2024-0030",
"owner": {
"login": "uthrasri",
"id": 145666390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
"html_url": "https:\/\/github.com\/uthrasri",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/uthrasri\/system_bt_CVE-2024-0030",
"description": null,
"fork": false,
"created_at": "2024-08-09T08:17:31Z",
"updated_at": "2024-08-09T08:54:42Z",
"pushed_at": "2024-08-09T08:18:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,64 +0,0 @@
[
{
"id": 835214655,
"name": "frameworks_av_AOSP10_r33_CVE-2024-0040",
"full_name": "nidhihcl75\/frameworks_av_AOSP10_r33_CVE-2024-0040",
"owner": {
"login": "nidhihcl75",
"id": 176363052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176363052?v=4",
"html_url": "https:\/\/github.com\/nidhihcl75",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nidhihcl75\/frameworks_av_AOSP10_r33_CVE-2024-0040",
"description": null,
"fork": false,
"created_at": "2024-07-29T11:45:41Z",
"updated_at": "2024-07-29T11:48:59Z",
"pushed_at": "2024-07-29T11:48:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 838678998,
"name": "frameworks_av_CVE-2024-0040",
"full_name": "uthrasri\/frameworks_av_CVE-2024-0040",
"owner": {
"login": "uthrasri",
"id": 145666390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
"html_url": "https:\/\/github.com\/uthrasri",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/uthrasri\/frameworks_av_CVE-2024-0040",
"description": null,
"fork": false,
"created_at": "2024-08-06T06:13:59Z",
"updated_at": "2024-08-08T06:18:28Z",
"pushed_at": "2024-08-08T06:18:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -92,161 +92,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 827491098,
"name": "c-CVE-2024-0044",
"full_name": "007CRIPTOGRAFIA\/c-CVE-2024-0044",
"owner": {
"login": "007CRIPTOGRAFIA",
"id": 122584002,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122584002?v=4",
"html_url": "https:\/\/github.com\/007CRIPTOGRAFIA",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/007CRIPTOGRAFIA\/c-CVE-2024-0044",
"description": "CVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo \"executar como qualquer aplicativo\" que afeta as versões 12 e 13 do Android",
"fork": false,
"created_at": "2024-07-11T18:46:45Z",
"updated_at": "2024-12-21T23:23:38Z",
"pushed_at": "2024-07-11T18:51:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 828846934,
"name": "CVE-2024-0044-EXP",
"full_name": "Kai2er\/CVE-2024-0044-EXP",
"owner": {
"login": "Kai2er",
"id": 40434718,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40434718?v=4",
"html_url": "https:\/\/github.com\/Kai2er",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Kai2er\/CVE-2024-0044-EXP",
"description": "利用CVE-2024-0044 在Android12、13 没有root'下进行数据备份 用法.\/CVE-2024-0044-EXP.sh <package_name>",
"fork": false,
"created_at": "2024-07-15T08:45:44Z",
"updated_at": "2024-07-15T13:20:04Z",
"pushed_at": "2024-07-15T09:00:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 836910059,
"name": "cve_2024_0044",
"full_name": "hunter24x24\/cve_2024_0044",
"owner": {
"login": "hunter24x24",
"id": 117602676,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117602676?v=4",
"html_url": "https:\/\/github.com\/hunter24x24",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hunter24x24\/cve_2024_0044",
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-08-01T20:14:22Z",
"updated_at": "2024-08-09T00:09:24Z",
"pushed_at": "2024-08-01T20:18:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 837927961,
"name": "EvilDroid",
"full_name": "nexussecelite\/EvilDroid",
"owner": {
"login": "nexussecelite",
"id": 92028299,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92028299?v=4",
"html_url": "https:\/\/github.com\/nexussecelite",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nexussecelite\/EvilDroid",
"description": "EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It features automated ADB connection checks, APK pushing, UID extraction, payload generation, and real-time progress updates, providing a seamless and professional user experience.",
"fork": false,
"created_at": "2024-08-04T13:14:10Z",
"updated_at": "2024-12-21T23:23:19Z",
"pushed_at": "2024-08-05T14:13:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 842052431,
"name": "CVE-2024-0044",
"full_name": "nahid0x1\/CVE-2024-0044",
"owner": {
"login": "nahid0x1",
"id": 76641588,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76641588?v=4",
"html_url": "https:\/\/github.com\/nahid0x1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nahid0x1\/CVE-2024-0044",
"description": "a vulnerability affecting Android version 12 & 13",
"fork": false,
"created_at": "2024-08-13T15:15:47Z",
"updated_at": "2024-12-21T23:23:45Z",
"pushed_at": "2024-08-13T15:20:44Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 844326639,
"name": "cve-2024-0044",
@ -312,36 +157,5 @@
"watchers": 133,
"score": 0,
"subscribers_count": 3
},
{
"id": 900948558,
"name": "CVE-2024-0044-",
"full_name": "Dit-Developers\/CVE-2024-0044-",
"owner": {
"login": "Dit-Developers",
"id": 173141993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173141993?v=4",
"html_url": "https:\/\/github.com\/Dit-Developers",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Dit-Developers\/CVE-2024-0044-",
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-12-09T19:05:57Z",
"updated_at": "2024-12-09T19:16:22Z",
"pushed_at": "2024-12-09T19:16:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,35 +1,4 @@
[
{
"id": 835201651,
"name": "frameworks_av_AOSP10_r33_CVE-2024-0049",
"full_name": "nidhihcl75\/frameworks_av_AOSP10_r33_CVE-2024-0049",
"owner": {
"login": "nidhihcl75",
"id": 176363052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176363052?v=4",
"html_url": "https:\/\/github.com\/nidhihcl75",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nidhihcl75\/frameworks_av_AOSP10_r33_CVE-2024-0049",
"description": null,
"fork": false,
"created_at": "2024-07-29T11:12:32Z",
"updated_at": "2024-07-29T11:15:32Z",
"pushed_at": "2024-07-29T11:15:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 851611620,
"name": "frameworks_av_android10_r33_CVE-2024-0049",

View file

@ -1,33 +0,0 @@
[
{
"id": 880277050,
"name": "CVE-2024-0311",
"full_name": "calligraf0\/CVE-2024-0311",
"owner": {
"login": "calligraf0",
"id": 115566010,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115566010?v=4",
"html_url": "https:\/\/github.com\/calligraf0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/calligraf0\/CVE-2024-0311",
"description": "Exploit for CVE-2024-0311",
"fork": false,
"created_at": "2024-10-29T12:47:18Z",
"updated_at": "2025-01-12T17:02:00Z",
"pushed_at": "2024-10-30T16:07:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -91,81 +91,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 866966019,
"name": "CVE-2024-0582",
"full_name": "geniuszly\/CVE-2024-0582",
"owner": {
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-0582",
"description": "is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)",
"fork": false,
"created_at": "2024-10-03T07:56:36Z",
"updated_at": "2024-12-30T14:40:46Z",
"pushed_at": "2024-10-03T07:58:47Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"buffer-overflow",
"cve",
"cve-2024-0582",
"ethical-hacking",
"exploit",
"exploit-development",
"iouring",
"iouring-exploit",
"poc",
"security",
"vuln",
"vulnerability",
"vulnerability-research"
],
"visibility": "public",
"forks": 1,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 903915508,
"name": "CVE-2024-0582",
"full_name": "101010zyl\/CVE-2024-0582",
"owner": {
"login": "101010zyl",
"id": 64526492,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64526492?v=4",
"html_url": "https:\/\/github.com\/101010zyl",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/101010zyl\/CVE-2024-0582",
"description": "A data-only attack based on CVE-2024-0582",
"fork": false,
"created_at": "2024-12-15T21:56:41Z",
"updated_at": "2024-12-15T22:21:17Z",
"pushed_at": "2024-12-15T22:21:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 841296829,
"name": "Firefox-ANGLE-CVE-2024-0741",
"full_name": "HyHy100\/Firefox-ANGLE-CVE-2024-0741",
"owner": {
"login": "HyHy100",
"id": 21271840,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21271840?v=4",
"html_url": "https:\/\/github.com\/HyHy100",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/HyHy100\/Firefox-ANGLE-CVE-2024-0741",
"description": "PoC for an OOB write vulnerability I reported to Mozilla in ANGLE Translator (aka WebGL Shader Compiler).",
"fork": false,
"created_at": "2024-08-12T05:57:34Z",
"updated_at": "2024-09-11T13:40:15Z",
"pushed_at": "2024-08-12T07:26:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 890490572,
"name": "CVE-2024-10015",
"full_name": "windz3r0day\/CVE-2024-10015",
"owner": {
"login": "windz3r0day",
"id": 179751303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4",
"html_url": "https:\/\/github.com\/windz3r0day",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-10015",
"description": "CVE-2024-10015 poc exploit",
"fork": false,
"created_at": "2024-11-18T16:53:43Z",
"updated_at": "2024-11-24T07:51:55Z",
"pushed_at": "2024-11-18T19:56:03Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,64 +0,0 @@
[
{
"id": 902440180,
"name": "CVE-2024-10124",
"full_name": "RandomRobbieBF\/CVE-2024-10124",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10124",
"description": "Vayu Blocks Gutenberg Blocks for WordPress & WooCommerce <= 1.1.1 - Missing Authorization to Unauthenticated Arbitrary Plugin Installation\/Activation",
"fork": false,
"created_at": "2024-12-12T15:13:30Z",
"updated_at": "2024-12-13T10:33:26Z",
"pushed_at": "2024-12-12T15:14:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 912532095,
"name": "CVE-2024-10124-Poc",
"full_name": "Nxploited\/CVE-2024-10124-Poc",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-10124-Poc",
"description": null,
"fork": false,
"created_at": "2025-01-05T20:42:10Z",
"updated_at": "2025-01-05T21:12:38Z",
"pushed_at": "2025-01-05T21:12:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 875667904,
"name": "CVE-2024-10140",
"full_name": "holypryx\/CVE-2024-10140",
"owner": {
"login": "holypryx",
"id": 182792867,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/182792867?v=4",
"html_url": "https:\/\/github.com\/holypryx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/holypryx\/CVE-2024-10140",
"description": null,
"fork": false,
"created_at": "2024-10-20T15:29:14Z",
"updated_at": "2024-10-22T10:02:17Z",
"pushed_at": "2024-10-20T15:31:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,157 +0,0 @@
[
{
"id": 891905563,
"name": "CVE-2024-10220-githooks",
"full_name": "mochizuki875\/CVE-2024-10220-githooks",
"owner": {
"login": "mochizuki875",
"id": 37737691,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37737691?v=4",
"html_url": "https:\/\/github.com\/mochizuki875",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mochizuki875\/CVE-2024-10220-githooks",
"description": "CVE-2024-10220 Test repo",
"fork": false,
"created_at": "2024-11-21T06:59:21Z",
"updated_at": "2024-11-21T08:25:57Z",
"pushed_at": "2024-11-21T07:28:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 895963991,
"name": "cve-2024-10220",
"full_name": "any2sec\/cve-2024-10220",
"owner": {
"login": "any2sec",
"id": 43882657,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43882657?v=4",
"html_url": "https:\/\/github.com\/any2sec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/any2sec\/cve-2024-10220",
"description": null,
"fork": false,
"created_at": "2024-11-29T09:20:30Z",
"updated_at": "2024-11-29T11:24:03Z",
"pushed_at": "2024-11-29T11:24:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 896713036,
"name": "cve-2024-10220-githooks",
"full_name": "XiaomingX\/cve-2024-10220-githooks",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-10220-githooks",
"description": "CVE-2024-10220 Test repo",
"fork": false,
"created_at": "2024-12-01T05:15:25Z",
"updated_at": "2025-01-13T18:16:22Z",
"pushed_at": "2024-12-01T05:18:39Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 903715059,
"name": "CVE-2024-10220",
"full_name": "filipzag\/CVE-2024-10220",
"owner": {
"login": "filipzag",
"id": 35038922,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35038922?v=4",
"html_url": "https:\/\/github.com\/filipzag",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/filipzag\/CVE-2024-10220",
"description": null,
"fork": false,
"created_at": "2024-12-15T11:25:42Z",
"updated_at": "2024-12-15T11:34:25Z",
"pushed_at": "2024-12-15T11:34:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 904610222,
"name": "poc-CVE-2024-10220",
"full_name": "candranapits\/poc-CVE-2024-10220",
"owner": {
"login": "candranapits",
"id": 6848647,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6848647?v=4",
"html_url": "https:\/\/github.com\/candranapits",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/candranapits\/poc-CVE-2024-10220",
"description": "CVE-2024-10220 POC",
"fork": false,
"created_at": "2024-12-17T08:17:58Z",
"updated_at": "2024-12-17T08:22:35Z",
"pushed_at": "2024-12-17T08:19:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 889946220,
"name": "CVE-2024-10245",
"full_name": "RandomRobbieBF\/CVE-2024-10245",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10245",
"description": "Relais 2FA <= 1.0 - Authentication Bypass",
"fork": false,
"created_at": "2024-11-17T16:34:28Z",
"updated_at": "2024-11-17T16:35:09Z",
"pushed_at": "2024-11-17T16:35:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 877188085,
"name": "CVE-2024-10354",
"full_name": "K1nakoo\/CVE-2024-10354",
"owner": {
"login": "K1nakoo",
"id": 105909793,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105909793?v=4",
"html_url": "https:\/\/github.com\/K1nakoo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/K1nakoo\/CVE-2024-10354",
"description": null,
"fork": false,
"created_at": "2024-10-23T08:37:18Z",
"updated_at": "2024-10-26T13:50:18Z",
"pushed_at": "2024-10-23T08:37:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 877198778,
"name": "CVE-2024-10355",
"full_name": "K1nakoo\/CVE-2024-10355",
"owner": {
"login": "K1nakoo",
"id": 105909793,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105909793?v=4",
"html_url": "https:\/\/github.com\/K1nakoo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/K1nakoo\/CVE-2024-10355",
"description": null,
"fork": false,
"created_at": "2024-10-23T08:59:51Z",
"updated_at": "2024-10-26T13:50:29Z",
"pushed_at": "2024-10-23T09:00:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,36 +0,0 @@
[
{
"id": 910972988,
"name": "CVE-2024-10400",
"full_name": "k0ns0l\/CVE-2024-10400",
"owner": {
"login": "k0ns0l",
"id": 55334728,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55334728?v=4",
"html_url": "https:\/\/github.com\/k0ns0l",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/k0ns0l\/CVE-2024-10400",
"description": "[POC][Exploit] CVE-2024-10400",
"fork": false,
"created_at": "2025-01-02T00:12:53Z",
"updated_at": "2025-01-07T10:09:30Z",
"pushed_at": "2025-01-02T00:31:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"tutor-lms",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 878506568,
"name": "CVE-2024-10410",
"full_name": "K1nakoo\/CVE-2024-10410",
"owner": {
"login": "K1nakoo",
"id": 105909793,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105909793?v=4",
"html_url": "https:\/\/github.com\/K1nakoo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/K1nakoo\/CVE-2024-10410",
"description": null,
"fork": false,
"created_at": "2024-10-25T14:15:56Z",
"updated_at": "2024-10-26T13:44:39Z",
"pushed_at": "2024-10-25T14:16:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 879406614,
"name": "CVE-2024-10448",
"full_name": "bevennyamande\/CVE-2024-10448",
"owner": {
"login": "bevennyamande",
"id": 10162710,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10162710?v=4",
"html_url": "https:\/\/github.com\/bevennyamande",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bevennyamande\/CVE-2024-10448",
"description": "Blood bank CSRF Attack POC",
"fork": false,
"created_at": "2024-10-27T20:18:35Z",
"updated_at": "2024-10-28T18:48:37Z",
"pushed_at": "2024-10-27T22:12:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 883977165,
"name": "CVE-2024-10449-patch",
"full_name": "g-u-i-d\/CVE-2024-10449-patch",
"owner": {
"login": "g-u-i-d",
"id": 3040892,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3040892?v=4",
"html_url": "https:\/\/github.com\/g-u-i-d",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/g-u-i-d\/CVE-2024-10449-patch",
"description": null,
"fork": false,
"created_at": "2024-11-05T23:06:49Z",
"updated_at": "2024-11-05T23:15:23Z",
"pushed_at": "2024-11-05T23:15:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,64 +0,0 @@
[
{
"id": 885543843,
"name": "CVE-2024-10470",
"full_name": "RandomRobbieBF\/CVE-2024-10470",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10470",
"description": "WPLMS Learning Management System for WordPress <= 4.962 Unauthenticated Arbitrary File Read and Deletion",
"fork": false,
"created_at": "2024-11-08T19:47:34Z",
"updated_at": "2024-11-08T19:50:12Z",
"pushed_at": "2024-11-08T19:50:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 896308178,
"name": "CVE-2024-10470",
"full_name": "0xshoriful\/CVE-2024-10470",
"owner": {
"login": "0xshoriful",
"id": 167082207,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167082207?v=4",
"html_url": "https:\/\/github.com\/0xshoriful",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xshoriful\/CVE-2024-10470",
"description": null,
"fork": false,
"created_at": "2024-11-30T02:45:52Z",
"updated_at": "2024-11-30T02:46:38Z",
"pushed_at": "2024-11-30T02:46:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,76 +0,0 @@
[
{
"id": 890697251,
"name": "CVE-2024-10508",
"full_name": "ubaii\/CVE-2024-10508",
"owner": {
"login": "ubaii",
"id": 31325580,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31325580?v=4",
"html_url": "https:\/\/github.com\/ubaii",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ubaii\/CVE-2024-10508",
"description": null,
"fork": false,
"created_at": "2024-11-19T02:47:59Z",
"updated_at": "2024-11-19T02:50:12Z",
"pushed_at": "2024-11-19T02:50:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 891857006,
"name": "CVE-2024-10508",
"full_name": "Jenderal92\/CVE-2024-10508",
"owner": {
"login": "Jenderal92",
"id": 59664965,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4",
"html_url": "https:\/\/github.com\/Jenderal92",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jenderal92\/CVE-2024-10508",
"description": "This tool scans WordPress sites for vulnerabilities in the \"RegistrationMagic\" plugin (CVE-2024-10508). It checks for the presence of a specific version (`6.0.2.6`) and marks the site as vulnerable if found. The results are saved in a file (`vuln.txt`) for further analysis.",
"fork": false,
"created_at": "2024-11-21T04:32:19Z",
"updated_at": "2024-12-07T21:27:48Z",
"pushed_at": "2024-11-21T04:39:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-10508",
"cve-scanner",
"plugin-security",
"python",
"registrationmagic",
"security-tools",
"vulnerability",
"vulnerability-detection",
"vulnerability-scanner",
"wordpress",
"wordpress-security"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 908003038,
"name": "CVE-2024-10511",
"full_name": "revengsmK\/CVE-2024-10511",
"owner": {
"login": "revengsmK",
"id": 95986479,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95986479?v=4",
"html_url": "https:\/\/github.com\/revengsmK",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/revengsmK\/CVE-2024-10511",
"description": "Schneider Electric PowerChute Serial Shutdown vulnerability.",
"fork": false,
"created_at": "2024-12-24T20:50:20Z",
"updated_at": "2024-12-24T20:59:13Z",
"pushed_at": "2024-12-24T20:54:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 899490028,
"name": "CVE-2024-10516",
"full_name": "RandomRobbieBF\/CVE-2024-10516",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10516",
"description": "Swift Performance Lite <= 2.3.7.1 - Unauthenticated Local PHP File Inclusion via 'ajaxify'",
"fork": false,
"created_at": "2024-12-06T11:24:19Z",
"updated_at": "2024-12-06T15:42:17Z",
"pushed_at": "2024-12-06T11:25:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 894757253,
"name": "CVE-2024-10542",
"full_name": "ubaii\/CVE-2024-10542",
"owner": {
"login": "ubaii",
"id": 31325580,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31325580?v=4",
"html_url": "https:\/\/github.com\/ubaii",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ubaii\/CVE-2024-10542",
"description": "WordPress Spam protection, AntiSpam, FireWall by CleanTalk Plugin <= 6.43.2 is vulnerable to Unauthenticated Arbitrary Plugin Installation",
"fork": false,
"created_at": "2024-11-26T23:47:17Z",
"updated_at": "2024-11-28T11:51:19Z",
"pushed_at": "2024-11-26T23:49:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 879936174,
"name": "CVE-2024-10557",
"full_name": "bevennyamande\/CVE-2024-10557",
"owner": {
"login": "bevennyamande",
"id": 10162710,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10162710?v=4",
"html_url": "https:\/\/github.com\/bevennyamande",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bevennyamande\/CVE-2024-10557",
"description": "A CSRF POC for Updating the Profile of a Hospital leading to Account Takeover",
"fork": false,
"created_at": "2024-10-28T20:14:45Z",
"updated_at": "2024-10-30T21:38:18Z",
"pushed_at": "2024-10-28T20:40:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 916037793,
"name": "CVE-2024-10571",
"full_name": "RandomRobbieBF\/CVE-2024-10571",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10571",
"description": "Chartify WordPress Chart Plugin <= 2.9.5 - Unauthenticated Local File Inclusion via source",
"fork": false,
"created_at": "2025-01-13T10:38:31Z",
"updated_at": "2025-01-14T12:39:22Z",
"pushed_at": "2025-01-13T10:38:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,64 +0,0 @@
[
{
"id": 886165127,
"name": "CVE-2024-10586",
"full_name": "RandomRobbieBF\/CVE-2024-10586",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10586",
"description": "Debug Tool <= 2.2 - Unauthenticated Arbitrary File Creation",
"fork": false,
"created_at": "2024-11-10T11:30:05Z",
"updated_at": "2024-11-15T13:24:00Z",
"pushed_at": "2024-11-10T11:30:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 915504134,
"name": "CVE-2024-10586-Poc",
"full_name": "Nxploited\/CVE-2024-10586-Poc",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-10586-Poc",
"description": null,
"fork": false,
"created_at": "2025-01-12T02:41:24Z",
"updated_at": "2025-01-12T03:10:42Z",
"pushed_at": "2025-01-12T03:10:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 890584132,
"name": "CVE-2024-10592",
"full_name": "windz3r0day\/CVE-2024-10592",
"owner": {
"login": "windz3r0day",
"id": 179751303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4",
"html_url": "https:\/\/github.com\/windz3r0day",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-10592",
"description": "CVE-2024-10592 poc exploit ",
"fork": false,
"created_at": "2024-11-18T20:34:38Z",
"updated_at": "2024-11-18T20:51:34Z",
"pushed_at": "2024-11-18T20:39:29Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 881099968,
"name": "CVE-2024-10605",
"full_name": "bevennyamande\/CVE-2024-10605",
"owner": {
"login": "bevennyamande",
"id": 10162710,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10162710?v=4",
"html_url": "https:\/\/github.com\/bevennyamande",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bevennyamande\/CVE-2024-10605",
"description": null,
"fork": false,
"created_at": "2024-10-30T22:56:24Z",
"updated_at": "2024-11-03T23:41:01Z",
"pushed_at": "2024-10-30T23:06:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 887379678,
"name": "CVE-2024-10629",
"full_name": "RandomRobbieBF\/CVE-2024-10629",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10629",
"description": "GPX Viewer <= 2.2.8 - Authenticated (Subscriber+) Arbitrary File Creation",
"fork": false,
"created_at": "2024-11-12T16:36:20Z",
"updated_at": "2024-11-12T16:38:23Z",
"pushed_at": "2024-11-12T16:38:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 881183952,
"name": "IoT_vuln",
"full_name": "c0nyy\/IoT_vuln",
"owner": {
"login": "c0nyy",
"id": 146458543,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146458543?v=4",
"html_url": "https:\/\/github.com\/c0nyy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/c0nyy\/IoT_vuln",
"description": "POC CVE-2024-10654",
"fork": false,
"created_at": "2024-10-31T03:48:22Z",
"updated_at": "2024-11-01T14:25:39Z",
"pushed_at": "2024-11-01T14:18:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -184,36 +184,5 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 881948753,
"name": "CVE-2024-1071-PoC-Script",
"full_name": "Spid3heX\/CVE-2024-1071-PoC-Script",
"owner": {
"login": "Spid3heX",
"id": 183846301,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/183846301?v=4",
"html_url": "https:\/\/github.com\/Spid3heX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Spid3heX\/CVE-2024-1071-PoC-Script",
"description": "wp\/ultimate-member - SQL Injection Vulnerability Exploit Script.",
"fork": false,
"created_at": "2024-11-01T14:57:34Z",
"updated_at": "2024-11-03T03:53:40Z",
"pushed_at": "2024-11-01T18:14:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 889424362,
"name": "CVE-2024-10728",
"full_name": "RandomRobbieBF\/CVE-2024-10728",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10728",
"description": "PostX <= 4.1.16 - Missing Authorization to Arbitrary Plugin Installation\/Activation",
"fork": false,
"created_at": "2024-11-16T10:51:56Z",
"updated_at": "2024-11-16T11:00:46Z",
"pushed_at": "2024-11-16T11:00:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,64 +0,0 @@
[
{
"id": 889993152,
"name": "CVE-2024-10793",
"full_name": "windz3r0day\/CVE-2024-10793",
"owner": {
"login": "windz3r0day",
"id": 179751303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4",
"html_url": "https:\/\/github.com\/windz3r0day",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-10793",
"description": "CVE-2024-10793 poc exploit",
"fork": false,
"created_at": "2024-11-17T18:44:53Z",
"updated_at": "2025-01-03T14:51:08Z",
"pushed_at": "2024-11-17T19:51:53Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 905828907,
"name": "CVE-2024-10793",
"full_name": "MAHajian\/CVE-2024-10793",
"owner": {
"login": "MAHajian",
"id": 139576061,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139576061?v=4",
"html_url": "https:\/\/github.com\/MAHajian",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MAHajian\/CVE-2024-10793",
"description": null,
"fork": false,
"created_at": "2024-12-19T15:50:53Z",
"updated_at": "2024-12-19T16:38:19Z",
"pushed_at": "2024-12-19T16:38:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -159,67 +159,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824093061,
"name": "CVE-2024-1086",
"full_name": "xzx482\/CVE-2024-1086",
"owner": {
"login": "xzx482",
"id": 46856523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46856523?v=4",
"html_url": "https:\/\/github.com\/xzx482",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xzx482\/CVE-2024-1086",
"description": null,
"fork": false,
"created_at": "2024-07-04T10:51:35Z",
"updated_at": "2024-07-04T10:54:26Z",
"pushed_at": "2024-07-04T10:54:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 904336421,
"name": "CVE-2024-1086",
"full_name": "LLfam\/CVE-2024-1086",
"owner": {
"login": "LLfam",
"id": 43279891,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43279891?v=4",
"html_url": "https:\/\/github.com\/LLfam",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LLfam\/CVE-2024-1086",
"description": null,
"fork": false,
"created_at": "2024-12-16T17:33:13Z",
"updated_at": "2025-01-12T18:35:09Z",
"pushed_at": "2024-12-16T17:38:23Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,331 +0,0 @@
[
{
"id": 885936481,
"name": "CVE-2024-10914",
"full_name": "imnotcha0s\/CVE-2024-10914",
"owner": {
"login": "imnotcha0s",
"id": 64480742,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64480742?v=4",
"html_url": "https:\/\/github.com\/imnotcha0s",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/imnotcha0s\/CVE-2024-10914",
"description": "Exploit for cve-2024-10914: D-Link DNS-320, DNS-320LW, DNS-325, DNS-340L Version 1.00, Version 1.01.0914.2012, Version 1.01, Version 1.02, Version 1.08 Command Injection",
"fork": false,
"created_at": "2024-11-09T19:30:39Z",
"updated_at": "2024-11-27T14:57:29Z",
"pushed_at": "2024-11-09T19:31:42Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},
{
"id": 886174538,
"name": "CVE-2024-10914",
"full_name": "verylazytech\/CVE-2024-10914",
"owner": {
"login": "verylazytech",
"id": 172168670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
"html_url": "https:\/\/github.com\/verylazytech",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-10914",
"description": "POC - CVE-202410914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
"fork": false,
"created_at": "2024-11-10T12:01:21Z",
"updated_at": "2025-01-13T09:55:07Z",
"pushed_at": "2024-11-27T08:26:29Z",
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-10914",
"d-link-nas",
"lfi",
"lfi-exploitation",
"poc",
"rce-exploit",
"unauthenticated-rce"
],
"visibility": "public",
"forks": 12,
"watchers": 43,
"score": 0,
"subscribers_count": 1
},
{
"id": 887759528,
"name": "CVE-2024-10914",
"full_name": "Egi08\/CVE-2024-10914",
"owner": {
"login": "Egi08",
"id": 60685799,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60685799?v=4",
"html_url": "https:\/\/github.com\/Egi08",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Egi08\/CVE-2024-10914",
"description": "CVE-2024-10914_Manual testing with burpsuite ",
"fork": false,
"created_at": "2024-11-13T08:33:16Z",
"updated_at": "2024-11-16T04:27:57Z",
"pushed_at": "2024-11-13T09:39:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 888892906,
"name": "D-Link-NAS-CVE-2024-10914-",
"full_name": "Bu0uCat\/D-Link-NAS-CVE-2024-10914-",
"owner": {
"login": "Bu0uCat",
"id": 169526025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169526025?v=4",
"html_url": "https:\/\/github.com\/Bu0uCat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Bu0uCat\/D-Link-NAS-CVE-2024-10914-",
"description": "这是一个D-Link rce漏洞 检测程序",
"fork": false,
"created_at": "2024-11-15T07:56:21Z",
"updated_at": "2024-11-15T07:59:44Z",
"pushed_at": "2024-11-15T07:59:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 889560261,
"name": "CVE-2024-10914",
"full_name": "ThemeHackers\/CVE-2024-10914",
"owner": {
"login": "ThemeHackers",
"id": 107047730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4",
"html_url": "https:\/\/github.com\/ThemeHackers",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-10914",
"description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.",
"fork": false,
"created_at": "2024-11-16T16:32:05Z",
"updated_at": "2025-01-02T08:18:01Z",
"pushed_at": "2025-01-02T08:17:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 895213023,
"name": "cve-2024-10914-port",
"full_name": "retuci0\/cve-2024-10914-port",
"owner": {
"login": "retuci0",
"id": 165311393,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165311393?v=4",
"html_url": "https:\/\/github.com\/retuci0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/retuci0\/cve-2024-10914-port",
"description": "dlink vulnerability thing in python and rust",
"fork": false,
"created_at": "2024-11-27T19:11:55Z",
"updated_at": "2024-11-27T19:12:49Z",
"pushed_at": "2024-11-27T19:12:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 895284938,
"name": "CVE-2024-10914-EXPLOIT",
"full_name": "K3ysTr0K3R\/CVE-2024-10914-EXPLOIT",
"owner": {
"login": "K3ysTr0K3R",
"id": 70909693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
"html_url": "https:\/\/github.com\/K3ysTr0K3R",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2024-10914-EXPLOIT",
"description": "A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-11-27T23:10:20Z",
"updated_at": "2024-11-27T23:33:14Z",
"pushed_at": "2024-11-27T23:31:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-10914",
"ethical-hacking",
"exploit",
"exploitation",
"hacking",
"proof-of-concept"
],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 898276056,
"name": "CVE-2024-10914-Exploit",
"full_name": "jahithoque\/CVE-2024-10914-Exploit",
"owner": {
"login": "jahithoque",
"id": 61009126,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61009126?v=4",
"html_url": "https:\/\/github.com\/jahithoque",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jahithoque\/CVE-2024-10914-Exploit",
"description": "CVE-2024-10914 is a critical vulnerability affecting the D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L up to version 20241028. The function cgi_user_add in the file \/cgi-bin\/account_mgr.cgi?cmd=cgi_user_add is the culprit, allowing attackers to inject operating system commands remotely.",
"fork": false,
"created_at": "2024-12-04T05:27:36Z",
"updated_at": "2024-12-04T05:31:27Z",
"pushed_at": "2024-12-04T05:31:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 899673788,
"name": "D-Link",
"full_name": "redspy-sec\/D-Link",
"owner": {
"login": "redspy-sec",
"id": 142095788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142095788?v=4",
"html_url": "https:\/\/github.com\/redspy-sec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/redspy-sec\/D-Link",
"description": "CVE-2024-10914 D-Link Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-12-06T19:03:34Z",
"updated_at": "2025-01-12T18:34:06Z",
"pushed_at": "2024-12-07T07:32:30Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024",
"poc",
"rce-exploit"
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 907765018,
"name": "CVE-2024-10914",
"full_name": "dragonXZH\/CVE-2024-10914",
"owner": {
"login": "dragonXZH",
"id": 191017577,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191017577?v=4",
"html_url": "https:\/\/github.com\/dragonXZH",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dragonXZH\/CVE-2024-10914",
"description": "A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-12-24T10:32:48Z",
"updated_at": "2024-12-24T10:42:23Z",
"pushed_at": "2024-12-24T10:42:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,344 +0,0 @@
[
{
"id": 888592127,
"name": "CVE-2024-10924",
"full_name": "RandomRobbieBF\/CVE-2024-10924",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10924",
"description": " Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 9.1.1.1 Authentication Bypass",
"fork": false,
"created_at": "2024-11-14T16:59:52Z",
"updated_at": "2025-01-12T18:31:17Z",
"pushed_at": "2024-11-14T17:00:59Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 890585149,
"name": "wordpress-really-simple-security-authn-bypass-vulnerable-application",
"full_name": "m3ssap0\/wordpress-really-simple-security-authn-bypass-vulnerable-application",
"owner": {
"login": "m3ssap0",
"id": 705120,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4",
"html_url": "https:\/\/github.com\/m3ssap0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/m3ssap0\/wordpress-really-simple-security-authn-bypass-vulnerable-application",
"description": "WARNING: This is a vulnerable application to test the exploit for the Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924). Run it at your own risk!",
"fork": false,
"created_at": "2024-11-18T20:37:07Z",
"updated_at": "2024-11-25T19:14:25Z",
"pushed_at": "2024-11-19T12:19:36Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"authentication-bypass",
"cve-2024-10924",
"really-simple-security",
"vulnerable-application",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 890703149,
"name": "CVE-2024-10924",
"full_name": "MattJButler\/CVE-2024-10924",
"owner": {
"login": "MattJButler",
"id": 90148954,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90148954?v=4",
"html_url": "https:\/\/github.com\/MattJButler",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MattJButler\/CVE-2024-10924",
"description": "Simple Python script",
"fork": false,
"created_at": "2024-11-19T03:06:49Z",
"updated_at": "2024-11-19T03:08:57Z",
"pushed_at": "2024-11-19T03:08:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 890862229,
"name": "wordpress-really-simple-security-authn-bypass-exploit",
"full_name": "m3ssap0\/wordpress-really-simple-security-authn-bypass-exploit",
"owner": {
"login": "m3ssap0",
"id": 705120,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4",
"html_url": "https:\/\/github.com\/m3ssap0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/m3ssap0\/wordpress-really-simple-security-authn-bypass-exploit",
"description": "Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924).",
"fork": false,
"created_at": "2024-11-19T10:07:28Z",
"updated_at": "2025-01-05T19:08:18Z",
"pushed_at": "2024-11-19T12:20:16Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-10924",
"exploit",
"really-simple-security",
"security",
"security-tools",
"vulnerability",
"vulnerability-scan",
"wordpress"
],
"visibility": "public",
"forks": 14,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},
{
"id": 891508423,
"name": "CVE-2024-10924",
"full_name": "julesbsz\/CVE-2024-10924",
"owner": {
"login": "julesbsz",
"id": 38622433,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38622433?v=4",
"html_url": "https:\/\/github.com\/julesbsz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/julesbsz\/CVE-2024-10924",
"description": "POC for CVE-2024-10924 written in Python",
"fork": false,
"created_at": "2024-11-20T13:13:15Z",
"updated_at": "2024-11-20T19:40:44Z",
"pushed_at": "2024-11-20T14:00:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-10924",
"python",
"really-simple-security",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 891621160,
"name": "CVE-2024-10924-Wordpress-Docker",
"full_name": "Trackflaw\/CVE-2024-10924-Wordpress-Docker",
"owner": {
"login": "Trackflaw",
"id": 78696986,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4",
"html_url": "https:\/\/github.com\/Trackflaw",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Trackflaw\/CVE-2024-10924-Wordpress-Docker",
"description": "Vulnerable docker container for Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 9.1.1.1 Authentication Bypass CVE-2023-50164",
"fork": false,
"created_at": "2024-11-20T16:50:24Z",
"updated_at": "2024-11-25T19:41:23Z",
"pushed_at": "2024-11-22T09:28:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 894993174,
"name": "CVE-2024-10924-PoC",
"full_name": "Maalfer\/CVE-2024-10924-PoC",
"owner": {
"login": "Maalfer",
"id": 96432001,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4",
"html_url": "https:\/\/github.com\/Maalfer",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Maalfer\/CVE-2024-10924-PoC",
"description": "Bypass del MFA en WordPress con el plugin Really Simple Security instalado entre las versiones 9.0.0 9.1.1.1.",
"fork": false,
"created_at": "2024-11-27T11:19:47Z",
"updated_at": "2024-11-30T06:27:28Z",
"pushed_at": "2024-11-27T14:13:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 896883913,
"name": "CVE-2024-10924-Bypass-MFA-Wordpress-LAB",
"full_name": "D1se0\/CVE-2024-10924-Bypass-MFA-Wordpress-LAB",
"owner": {
"login": "D1se0",
"id": 164921056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4",
"html_url": "https:\/\/github.com\/D1se0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D1se0\/CVE-2024-10924-Bypass-MFA-Wordpress-LAB",
"description": null,
"fork": false,
"created_at": "2024-12-01T14:43:16Z",
"updated_at": "2024-12-04T11:29:31Z",
"pushed_at": "2024-12-02T08:32:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bypass",
"bypass-mfa",
"bypass-wordpress",
"cibersecurity",
"cve",
"cve-2024-10924",
"exploit",
"hacking",
"hacking-etico",
"really-simple-security",
"wordpress"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 897912004,
"name": "CVE-2024-10924-PoC",
"full_name": "Hunt3r850\/CVE-2024-10924-PoC",
"owner": {
"login": "Hunt3r850",
"id": 108004077,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108004077?v=4",
"html_url": "https:\/\/github.com\/Hunt3r850",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Hunt3r850\/CVE-2024-10924-PoC",
"description": null,
"fork": false,
"created_at": "2024-12-03T13:09:46Z",
"updated_at": "2024-12-03T13:13:07Z",
"pushed_at": "2024-12-03T13:10:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 897913649,
"name": "CVE-2024-10924-Wordpress-Docker",
"full_name": "Hunt3r850\/CVE-2024-10924-Wordpress-Docker",
"owner": {
"login": "Hunt3r850",
"id": 108004077,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108004077?v=4",
"html_url": "https:\/\/github.com\/Hunt3r850",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Hunt3r850\/CVE-2024-10924-Wordpress-Docker",
"description": null,
"fork": false,
"created_at": "2024-12-03T13:12:58Z",
"updated_at": "2024-12-03T13:18:30Z",
"pushed_at": "2024-12-03T13:14:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 886253464,
"name": "CVE-2024-10958-WPPA-Exploit",
"full_name": "reinh3rz\/CVE-2024-10958-WPPA-Exploit",
"owner": {
"login": "reinh3rz",
"id": 144375735,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144375735?v=4",
"html_url": "https:\/\/github.com\/reinh3rz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/reinh3rz\/CVE-2024-10958-WPPA-Exploit",
"description": null,
"fork": false,
"created_at": "2024-11-10T15:43:14Z",
"updated_at": "2024-11-11T11:53:02Z",
"pushed_at": "2024-11-10T16:41:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 895398083,
"name": "CVE-2024-11003-PoC",
"full_name": "unknown-user-from\/CVE-2024-11003-PoC",
"owner": {
"login": "unknown-user-from",
"id": 51774599,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51774599?v=4",
"html_url": "https:\/\/github.com\/unknown-user-from",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/unknown-user-from\/CVE-2024-11003-PoC",
"description": "CVE-2024-11003 Perl Poc",
"fork": false,
"created_at": "2024-11-28T06:13:42Z",
"updated_at": "2024-11-28T06:22:35Z",
"pushed_at": "2024-11-28T06:22:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 837931543,
"name": "CVE-2024-1112",
"full_name": "enessakircolak\/CVE-2024-1112",
"owner": {
"login": "enessakircolak",
"id": 69612461,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69612461?v=4",
"html_url": "https:\/\/github.com\/enessakircolak",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/enessakircolak\/CVE-2024-1112",
"description": null,
"fork": false,
"created_at": "2024-08-04T13:26:46Z",
"updated_at": "2024-08-13T18:12:30Z",
"pushed_at": "2024-08-13T18:12:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 893229030,
"name": "CVE-2024-11199",
"full_name": "windz3r0day\/CVE-2024-11199",
"owner": {
"login": "windz3r0day",
"id": 179751303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4",
"html_url": "https:\/\/github.com\/windz3r0day",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11199",
"description": "CVE-2024-11199 poc exploit",
"fork": false,
"created_at": "2024-11-23T21:43:20Z",
"updated_at": "2024-11-23T21:52:42Z",
"pushed_at": "2024-11-23T21:44:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 892997604,
"name": "CVE-2024-11201",
"full_name": "NSQAQ\/CVE-2024-11201",
"owner": {
"login": "NSQAQ",
"id": 41403864,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41403864?v=4",
"html_url": "https:\/\/github.com\/NSQAQ",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NSQAQ\/CVE-2024-11201",
"description": "TEST",
"fork": false,
"created_at": "2024-11-23T09:00:58Z",
"updated_at": "2024-11-23T09:01:02Z",
"pushed_at": "2024-11-23T09:00:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 896497712,
"name": "CVE-2024-11252-Sassy-Social-Share-XSS",
"full_name": "reinh3rz\/CVE-2024-11252-Sassy-Social-Share-XSS",
"owner": {
"login": "reinh3rz",
"id": 144375735,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144375735?v=4",
"html_url": "https:\/\/github.com\/reinh3rz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/reinh3rz\/CVE-2024-11252-Sassy-Social-Share-XSS",
"description": null,
"fork": false,
"created_at": "2024-11-30T14:20:57Z",
"updated_at": "2024-11-30T14:30:34Z",
"pushed_at": "2024-11-30T14:30:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 908326183,
"name": "CVE-2024-11281",
"full_name": "McTavishSue\/CVE-2024-11281",
"owner": {
"login": "McTavishSue",
"id": 186207823,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186207823?v=4",
"html_url": "https:\/\/github.com\/McTavishSue",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/McTavishSue\/CVE-2024-11281",
"description": "Missing Authorization (CWE-862)",
"fork": false,
"created_at": "2024-12-25T18:38:46Z",
"updated_at": "2025-01-03T05:35:27Z",
"pushed_at": "2024-12-25T18:49:41Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 896840057,
"name": "CVE-2024-11320",
"full_name": "mhaskar\/CVE-2024-11320",
"owner": {
"login": "mhaskar",
"id": 6861215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
"html_url": "https:\/\/github.com\/mhaskar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2024-11320",
"description": "Exploit for Pandora FMS Remote Code Execution CVE-2024-11320",
"fork": false,
"created_at": "2024-12-01T12:39:49Z",
"updated_at": "2025-01-06T14:55:16Z",
"pushed_at": "2024-12-01T12:48:08Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 892726115,
"name": "CVE-2024-11381",
"full_name": "windz3r0day\/CVE-2024-11381",
"owner": {
"login": "windz3r0day",
"id": 179751303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4",
"html_url": "https:\/\/github.com\/windz3r0day",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11381",
"description": "CVE-2024-11381 poc exploit ",
"fork": false,
"created_at": "2024-11-22T16:53:14Z",
"updated_at": "2024-11-22T17:22:38Z",
"pushed_at": "2024-11-22T16:54:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 893617166,
"name": "CVE-2024-11387",
"full_name": "windz3r0day\/CVE-2024-11387",
"owner": {
"login": "windz3r0day",
"id": 179751303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4",
"html_url": "https:\/\/github.com\/windz3r0day",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11387",
"description": "CVE-2024-11387 poc exploit",
"fork": false,
"created_at": "2024-11-24T22:14:03Z",
"updated_at": "2024-11-25T08:04:10Z",
"pushed_at": "2024-11-24T22:15:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 892723947,
"name": "CVE-2024-11388",
"full_name": "windz3r0day\/CVE-2024-11388",
"owner": {
"login": "windz3r0day",
"id": 179751303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4",
"html_url": "https:\/\/github.com\/windz3r0day",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11388",
"description": "CVE-2024-11388 poc exploit ",
"fork": false,
"created_at": "2024-11-22T16:48:21Z",
"updated_at": "2024-11-22T17:22:12Z",
"pushed_at": "2024-11-22T16:49:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 899915043,
"name": "CVE-2024-11392",
"full_name": "Piyush-Bhor\/CVE-2024-11392",
"owner": {
"login": "Piyush-Bhor",
"id": 131725874,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131725874?v=4",
"html_url": "https:\/\/github.com\/Piyush-Bhor",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Piyush-Bhor\/CVE-2024-11392",
"description": "Technical Details and Exploit for CVE-2024-11392",
"fork": false,
"created_at": "2024-12-07T11:14:21Z",
"updated_at": "2024-12-07T11:23:00Z",
"pushed_at": "2024-12-07T11:22:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 899917856,
"name": "CVE-2024-11393",
"full_name": "Piyush-Bhor\/CVE-2024-11393",
"owner": {
"login": "Piyush-Bhor",
"id": 131725874,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131725874?v=4",
"html_url": "https:\/\/github.com\/Piyush-Bhor",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Piyush-Bhor\/CVE-2024-11393",
"description": "Technical Details and Exploit for CVE-2024-11393",
"fork": false,
"created_at": "2024-12-07T11:24:06Z",
"updated_at": "2024-12-10T04:18:23Z",
"pushed_at": "2024-12-08T00:31:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 899918238,
"name": "CVE-2024-11394",
"full_name": "Piyush-Bhor\/CVE-2024-11394",
"owner": {
"login": "Piyush-Bhor",
"id": 131725874,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131725874?v=4",
"html_url": "https:\/\/github.com\/Piyush-Bhor",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Piyush-Bhor\/CVE-2024-11394",
"description": "Technical Details and Exploit for CVE-2024-11394",
"fork": false,
"created_at": "2024-12-07T11:25:32Z",
"updated_at": "2024-12-08T00:46:49Z",
"pushed_at": "2024-12-08T00:46:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 916075937,
"name": "CVE-2024-11396",
"full_name": "RandomRobbieBF\/CVE-2024-11396",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-11396",
"description": "Event monster <= 1.4.3 - Information Exposure Via Visitors List Export",
"fork": false,
"created_at": "2025-01-13T12:12:12Z",
"updated_at": "2025-01-14T12:38:39Z",
"pushed_at": "2025-01-13T12:12:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 892724705,
"name": "CVE-2024-11412",
"full_name": "windz3r0day\/CVE-2024-11412",
"owner": {
"login": "windz3r0day",
"id": 179751303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4",
"html_url": "https:\/\/github.com\/windz3r0day",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11412",
"description": "CVE-2024-11412 poc exploit ",
"fork": false,
"created_at": "2024-11-22T16:50:08Z",
"updated_at": "2024-11-22T17:22:26Z",
"pushed_at": "2024-11-22T16:51:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,35 +0,0 @@
[
{
"id": 913693077,
"name": "CVE-2024-11423",
"full_name": "RandomRobbieBF\/CVE-2024-11423",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-11423",
"description": "Ultimate Gift Cards for WooCommerce <= 3.0.6 - Missing Authorization to Infinite Money Glitch",
"fork": false,
"created_at": "2025-01-08T07:12:08Z",
"updated_at": "2025-01-09T10:06:03Z",
"pushed_at": "2025-01-08T07:12:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-11423"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 892725472,
"name": "CVE-2024-11428",
"full_name": "windz3r0day\/CVE-2024-11428",
"owner": {
"login": "windz3r0day",
"id": 179751303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4",
"html_url": "https:\/\/github.com\/windz3r0day",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11428",
"description": "CVE-2024-11428 poc exploit ",
"fork": false,
"created_at": "2024-11-22T16:51:47Z",
"updated_at": "2024-11-22T17:22:29Z",
"pushed_at": "2024-11-22T16:52:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 892723142,
"name": "CVE-2024-11432",
"full_name": "windz3r0day\/CVE-2024-11432",
"owner": {
"login": "windz3r0day",
"id": 179751303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4",
"html_url": "https:\/\/github.com\/windz3r0day",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11432",
"description": "CVE-2024-11432 poc exploit ",
"fork": false,
"created_at": "2024-11-22T16:46:24Z",
"updated_at": "2024-11-22T17:22:05Z",
"pushed_at": "2024-11-22T16:47:38Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 895895052,
"name": "cve-2024-11477-writeup",
"full_name": "TheN00bBuilder\/cve-2024-11477-writeup",
"owner": {
"login": "TheN00bBuilder",
"id": 41171807,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41171807?v=4",
"html_url": "https:\/\/github.com\/TheN00bBuilder",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TheN00bBuilder\/cve-2024-11477-writeup",
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
"fork": false,
"created_at": "2024-11-29T06:13:36Z",
"updated_at": "2025-01-10T12:44:00Z",
"pushed_at": "2024-12-04T01:01:28Z",
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 49,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 913765661,
"name": "CVE-2024-11613-wp-file-upload",
"full_name": "Sachinart\/CVE-2024-11613-wp-file-upload",
"owner": {
"login": "Sachinart",
"id": 18497191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4",
"html_url": "https:\/\/github.com\/Sachinart",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-11613-wp-file-upload",
"description": "Exploit by Chirag Artani for CVE-2024-11613 in WordPress File Upload",
"fork": false,
"created_at": "2025-01-08T10:06:00Z",
"updated_at": "2025-01-08T10:15:52Z",
"pushed_at": "2025-01-08T10:15:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 909318592,
"name": "CVE-2024-11616",
"full_name": "inb1ts\/CVE-2024-11616",
"owner": {
"login": "inb1ts",
"id": 87979502,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87979502?v=4",
"html_url": "https:\/\/github.com\/inb1ts",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/inb1ts\/CVE-2024-11616",
"description": "Crash PoC for exploiting Netskope Endpoint DLP double-fetch.",
"fork": false,
"created_at": "2024-12-28T10:48:23Z",
"updated_at": "2025-01-02T14:47:02Z",
"pushed_at": "2024-12-28T11:39:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,36 +0,0 @@
[
{
"id": 898924664,
"name": "CVE-2024-11643",
"full_name": "RandomRobbieBF\/CVE-2024-11643",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-11643",
"description": "Accessibility by AllAccessible <= 1.3.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Option Update",
"fork": false,
"created_at": "2024-12-05T09:47:31Z",
"updated_at": "2025-01-06T13:39:02Z",
"pushed_at": "2024-12-05T09:49:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-11643",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 898635585,
"name": "CVE-2024-11680_PoC_Exploit",
"full_name": "D3N14LD15K\/CVE-2024-11680_PoC_Exploit",
"owner": {
"login": "D3N14LD15K",
"id": 155617205,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155617205?v=4",
"html_url": "https:\/\/github.com\/D3N14LD15K",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D3N14LD15K\/CVE-2024-11680_PoC_Exploit",
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.",
"fork": false,
"created_at": "2024-12-04T18:42:43Z",
"updated_at": "2025-01-09T08:12:50Z",
"pushed_at": "2024-12-11T23:45:31Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 901848070,
"name": "CVE-2024-11728",
"full_name": "samogod\/CVE-2024-11728",
"owner": {
"login": "samogod",
"id": 81412659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81412659?v=4",
"html_url": "https:\/\/github.com\/samogod",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/samogod\/CVE-2024-11728",
"description": "KiviCare Clinic & Patient Management System (EHR) WordPress Plugin Unauthenticated SQL Injection PoC",
"fork": false,
"created_at": "2024-12-11T12:33:46Z",
"updated_at": "2024-12-11T15:11:30Z",
"pushed_at": "2024-12-11T15:11:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 903941456,
"name": "exploit-CVE-2024-11972",
"full_name": "JunTakemura\/exploit-CVE-2024-11972",
"owner": {
"login": "JunTakemura",
"id": 76585599,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76585599?v=4",
"html_url": "https:\/\/github.com\/JunTakemura",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JunTakemura\/exploit-CVE-2024-11972",
"description": "Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthenticated Plugin Installation",
"fork": false,
"created_at": "2024-12-15T23:54:15Z",
"updated_at": "2025-01-13T16:55:26Z",
"pushed_at": "2024-12-28T16:44:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 905785373,
"name": "CVE-2024-12025",
"full_name": "RandomRobbieBF\/CVE-2024-12025",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12025",
"description": "Collapsing Categories <= 3.0.8 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2024-12-19T14:15:29Z",
"updated_at": "2024-12-31T06:46:57Z",
"pushed_at": "2024-12-19T14:16:35Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 869417848,
"name": "CVE-2024-1207",
"full_name": "sahar042\/CVE-2024-1207",
"owner": {
"login": "sahar042",
"id": 49879157,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49879157?v=4",
"html_url": "https:\/\/github.com\/sahar042",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sahar042\/CVE-2024-1207",
"description": "The WP Booking Calendar plugin for WordPress is vulnerable to SQL Injection via the 'calendar_request_params[dates_ddmmyy_csv]' parameter in all versions up to, and including, 9.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attac",
"fork": false,
"created_at": "2024-10-08T09:05:16Z",
"updated_at": "2024-10-08T09:16:33Z",
"pushed_at": "2024-10-08T09:08:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -60,36 +60,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 908236253,
"name": "Exploiting-RCE-Cyber_Project_CVE-2024-1212",
"full_name": "Rehan07-Human\/Exploiting-RCE-Cyber_Project_CVE-2024-1212",
"owner": {
"login": "Rehan07-Human",
"id": 192799473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192799473?v=4",
"html_url": "https:\/\/github.com\/Rehan07-Human",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Rehan07-Human\/Exploiting-RCE-Cyber_Project_CVE-2024-1212",
"description": "Demonstrating the exploitation of the Remote Code Execution (RCE) vulnerability in Kemp LoadMaster (CVE-2024-1212). This project covers reconnaissance, vulnerability scanning using Nuclei, and exploitation processes, while also highlighting mitigation strategies to secure affected systems",
"fork": false,
"created_at": "2024-12-25T14:33:25Z",
"updated_at": "2024-12-26T16:22:14Z",
"pushed_at": "2024-12-25T14:39:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 899528238,
"name": "CVE-2024-12155",
"full_name": "McTavishSue\/CVE-2024-12155",
"owner": {
"login": "McTavishSue",
"id": 186207823,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186207823?v=4",
"html_url": "https:\/\/github.com\/McTavishSue",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/McTavishSue\/CVE-2024-12155",
"description": "CVE-2024-12155 Missing Authorization (CWE-862)",
"fork": false,
"created_at": "2024-12-06T13:03:09Z",
"updated_at": "2024-12-14T20:28:42Z",
"pushed_at": "2024-12-06T13:13:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 913334922,
"name": "CVE-2024-12157",
"full_name": "RandomRobbieBF\/CVE-2024-12157",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12157",
"description": "Popup MailChimp, GetResponse and ActiveCampaign Intergrations <= 3.2.6 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2025-01-07T13:40:05Z",
"updated_at": "2025-01-14T12:42:29Z",
"pushed_at": "2025-01-07T13:41:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,36 +0,0 @@
[
{
"id": 904457773,
"name": "CVE-2024-12172",
"full_name": "RandomRobbieBF\/CVE-2024-12172",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12172",
"description": "WP Courses LMS Online Courses Builder, eLearning Courses, Courses Solution, Education Courses <= 3.2.21 - Missing Authorization to Authenticated (Subscriber+) Arbitrary User Meta Update",
"fork": false,
"created_at": "2024-12-16T23:39:17Z",
"updated_at": "2025-01-06T13:18:45Z",
"pushed_at": "2024-12-16T23:40:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-12172",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,64 +0,0 @@
[
{
"id": 900744942,
"name": "CVE-2024-12209",
"full_name": "RandomRobbieBF\/CVE-2024-12209",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12209",
"description": "WP Umbrella: Update Backup Restore & Monitoring <= 2.17.0 - Unauthenticated Local File Inclusion",
"fork": false,
"created_at": "2024-12-09T11:51:10Z",
"updated_at": "2024-12-11T03:22:18Z",
"pushed_at": "2024-12-09T11:52:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 907641379,
"name": "CVE-2024-12209",
"full_name": "Nxploited\/CVE-2024-12209",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-12209",
"description": "Unauthenticated Local File Inclusion",
"fork": false,
"created_at": "2024-12-24T03:59:15Z",
"updated_at": "2025-01-01T02:56:57Z",
"pushed_at": "2024-12-24T04:19:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 913410162,
"name": "CVE-2024-12252",
"full_name": "RandomRobbieBF\/CVE-2024-12252",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12252",
"description": "SEO LAT Auto Post <= 2.2.1 - Missing Authorization to File Overwrite\/Upload (Remote Code Execution)",
"fork": false,
"created_at": "2025-01-07T16:22:35Z",
"updated_at": "2025-01-14T12:42:05Z",
"pushed_at": "2025-01-07T16:28:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 900786065,
"name": "CVE-2024-12270",
"full_name": "RandomRobbieBF\/CVE-2024-12270",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12270",
"description": "Beautiful Taxonomy Filters <= 2.4.3 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2024-12-09T13:22:10Z",
"updated_at": "2024-12-09T17:13:59Z",
"pushed_at": "2024-12-09T13:24:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 896006811,
"name": "CVE-2024-12345-POC",
"full_name": "RoyaRadin\/CVE-2024-12345-POC",
"owner": {
"login": "RoyaRadin",
"id": 190079804,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/190079804?v=4",
"html_url": "https:\/\/github.com\/RoyaRadin",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RoyaRadin\/CVE-2024-12345-POC",
"description": null,
"fork": false,
"created_at": "2024-11-29T11:04:57Z",
"updated_at": "2024-11-29T11:04:58Z",
"pushed_at": "2024-11-29T11:04:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 914905137,
"name": "CVE-2024-12404",
"full_name": "RandomRobbieBF\/CVE-2024-12404",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12404",
"description": "CF Internal Link Shortcode <= 1.1.0 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2025-01-10T14:52:22Z",
"updated_at": "2025-01-14T12:41:00Z",
"pushed_at": "2025-01-10T14:53:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 913357660,
"name": "CVE-2024-12471",
"full_name": "RandomRobbieBF\/CVE-2024-12471",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12471",
"description": "Post Saint: ChatGPT, GPT4, DALL-E, Stable Diffusion, Pexels, Dezgo AI Text & Image Generator <= 1.3.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary File Upload",
"fork": false,
"created_at": "2025-01-07T14:30:08Z",
"updated_at": "2025-01-10T13:56:26Z",
"pushed_at": "2025-01-07T14:31:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 900580012,
"name": "CVE-2024-12484",
"full_name": "LiChaser\/CVE-2024-12484",
"owner": {
"login": "LiChaser",
"id": 127033061,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127033061?v=4",
"html_url": "https:\/\/github.com\/LiChaser",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LiChaser\/CVE-2024-12484",
"description": "CVE-poc",
"fork": false,
"created_at": "2024-12-09T04:42:19Z",
"updated_at": "2024-12-24T08:49:04Z",
"pushed_at": "2024-12-09T05:56:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 913375484,
"name": "CVE-2024-12535",
"full_name": "RandomRobbieBF\/CVE-2024-12535",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12535",
"description": "Host PHP Info <= 1.0.4 - Missing Authorization to Unauthenticated Sensitive Information Disclosure",
"fork": false,
"created_at": "2025-01-07T15:08:14Z",
"updated_at": "2025-01-14T12:42:19Z",
"pushed_at": "2025-01-07T15:09:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 914772395,
"name": "CVE-2024-12542",
"full_name": "RandomRobbieBF\/CVE-2024-12542",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12542",
"description": "linkID <= 0.1.2 - Missing Authorization to Unauthenticated Sensitive Information Exposure",
"fork": false,
"created_at": "2025-01-10T09:23:18Z",
"updated_at": "2025-01-10T09:24:17Z",
"pushed_at": "2025-01-10T09:24:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,64 +0,0 @@
[
{
"id": 912762940,
"name": "CVE-2024-12558",
"full_name": "RandomRobbieBF\/CVE-2024-12558",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12558",
"description": "WP BASE Booking of Appointments, Services and Events <= 4.9.2 - Missing Authorization to Authenticated (Subscriber+) Sensitive Information Exposure via app_export_db",
"fork": false,
"created_at": "2025-01-06T10:45:29Z",
"updated_at": "2025-01-10T13:55:30Z",
"pushed_at": "2025-01-06T10:47:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 915119296,
"name": "CVE-2024-12558-exploit",
"full_name": "Nxploited\/CVE-2024-12558-exploit",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-12558-exploit",
"description": null,
"fork": false,
"created_at": "2025-01-11T02:50:14Z",
"updated_at": "2025-01-11T05:05:09Z",
"pushed_at": "2025-01-11T05:05:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 912770578,
"name": "CVE-2024-12594",
"full_name": "RandomRobbieBF\/CVE-2024-12594",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12594",
"description": "ALL In One Custom Login Page <= 7.1.1 - Missing Authorization to Authenticated (Subscriber+)Privilege Escalation",
"fork": false,
"created_at": "2025-01-06T11:05:21Z",
"updated_at": "2025-01-10T13:55:51Z",
"pushed_at": "2025-01-06T11:06:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,64 +0,0 @@
[
{
"id": 913331319,
"name": "CVE-2024-12849",
"full_name": "RandomRobbieBF\/CVE-2024-12849",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12849",
"description": "Error Log Viewer By WP Guru <= 1.0.1.3 - Missing Authorization to Unauthenticated Arbitrary File Read",
"fork": false,
"created_at": "2025-01-07T13:32:30Z",
"updated_at": "2025-01-07T13:33:13Z",
"pushed_at": "2025-01-07T13:33:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 913426666,
"name": "CVE-2024-12849-Poc",
"full_name": "Nxploited\/CVE-2024-12849-Poc",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-12849-Poc",
"description": null,
"fork": false,
"created_at": "2025-01-07T16:57:48Z",
"updated_at": "2025-01-08T06:46:21Z",
"pushed_at": "2025-01-08T06:46:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 915391325,
"name": "CVE-2024-12856",
"full_name": "nu113d\/CVE-2024-12856",
"owner": {
"login": "nu113d",
"id": 103531438,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103531438?v=4",
"html_url": "https:\/\/github.com\/nu113d",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nu113d\/CVE-2024-12856",
"description": "An exploit for Four-Faith routers to get a reverse shell",
"fork": false,
"created_at": "2025-01-11T18:14:03Z",
"updated_at": "2025-01-11T18:14:08Z",
"pushed_at": "2025-01-11T18:14:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 911569071,
"name": "CVE-2024-12970",
"full_name": "osmancanvural\/CVE-2024-12970",
"owner": {
"login": "osmancanvural",
"id": 123651825,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123651825?v=4",
"html_url": "https:\/\/github.com\/osmancanvural",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/osmancanvural\/CVE-2024-12970",
"description": "Pardus My Computer Os Command Injection",
"fork": false,
"created_at": "2025-01-03T10:23:44Z",
"updated_at": "2025-01-13T22:41:32Z",
"pushed_at": "2025-01-13T22:27:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 912059429,
"name": "CVE-2024-12986",
"full_name": "Aether-0\/CVE-2024-12986",
"owner": {
"login": "Aether-0",
"id": 143575444,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143575444?v=4",
"html_url": "https:\/\/github.com\/Aether-0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Aether-0\/CVE-2024-12986",
"description": null,
"fork": false,
"created_at": "2025-01-04T14:47:09Z",
"updated_at": "2025-01-07T00:35:54Z",
"pushed_at": "2025-01-04T14:58:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -29,67 +29,5 @@
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 872446949,
"name": "CVE-2024-1698",
"full_name": "shanglyu\/CVE-2024-1698",
"owner": {
"login": "shanglyu",
"id": 62023200,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62023200?v=4",
"html_url": "https:\/\/github.com\/shanglyu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/shanglyu\/CVE-2024-1698",
"description": null,
"fork": false,
"created_at": "2024-10-14T13:02:26Z",
"updated_at": "2024-10-14T13:09:39Z",
"pushed_at": "2024-10-14T13:09:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 889535406,
"name": "WordPress-NotificationX-CVE-2024-1698",
"full_name": "jesicatjan\/WordPress-NotificationX-CVE-2024-1698",
"owner": {
"login": "jesicatjan",
"id": 122602674,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122602674?v=4",
"html_url": "https:\/\/github.com\/jesicatjan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jesicatjan\/WordPress-NotificationX-CVE-2024-1698",
"description": null,
"fork": false,
"created_at": "2024-11-16T15:21:24Z",
"updated_at": "2024-11-20T03:35:53Z",
"pushed_at": "2024-11-19T05:06:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -162,36 +162,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 873464505,
"name": "Mass-CVE-2024-1709",
"full_name": "AMRICHASFUCK\/Mass-CVE-2024-1709",
"owner": {
"login": "AMRICHASFUCK",
"id": 92443330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92443330?v=4",
"html_url": "https:\/\/github.com\/AMRICHASFUCK",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AMRICHASFUCK\/Mass-CVE-2024-1709",
"description": "ScreenConnect AuthBypass Mass RCE",
"fork": false,
"created_at": "2024-10-16T08:05:35Z",
"updated_at": "2024-10-18T16:53:30Z",
"pushed_at": "2024-10-16T08:38:05Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

Some files were not shown because too many files have changed in this diff Show more