Auto Update 2024/10/17 12:31:32

This commit is contained in:
motikan2010-bot 2024-10-17 21:31:32 +09:00
parent 79fa7b3b06
commit 7aa142e2bc
56 changed files with 422 additions and 216 deletions

View file

@ -118,5 +118,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 874159698,
"name": "unreal_ircd_3281_backdoor_and_mitigation",
"full_name": "nwclasantha\/unreal_ircd_3281_backdoor_and_mitigation",
"owner": {
"login": "nwclasantha",
"id": 48653609,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48653609?v=4",
"html_url": "https:\/\/github.com\/nwclasantha"
},
"html_url": "https:\/\/github.com\/nwclasantha\/unreal_ircd_3281_backdoor_and_mitigation",
"description": "The UnrealIRCd 3.2.8.1 Backdoor is associated with CVE-2010-2075, a well-known vulnerability that was introduced when the source code of the UnrealIRCd software was compromised.",
"fork": false,
"created_at": "2024-10-17T10:59:25Z",
"updated_at": "2024-10-17T11:18:24Z",
"pushed_at": "2024-10-17T11:18:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -419,13 +419,13 @@
"stargazers_count": 454,
"watchers_count": 454,
"has_discussions": false,
"forks_count": 114,
"forks_count": 115,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 114,
"forks": 115,
"watchers": 454,
"score": 0,
"subscribers_count": 9

View file

@ -13,10 +13,10 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2024-10-04T14:04:36Z",
"updated_at": "2024-10-17T10:56:55Z",
"pushed_at": "2020-08-22T06:15:54Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 169,
"watchers_count": 169,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 168,
"watchers": 169,
"score": 0,
"subscribers_count": 9
},

View file

@ -1841,10 +1841,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2024-10-15T08:28:19Z",
"updated_at": "2024-10-17T07:59:43Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1172,
"watchers_count": 1172,
"stargazers_count": 1173,
"watchers_count": 1173,
"has_discussions": false,
"forks_count": 344,
"allow_forking": true,
@ -1853,7 +1853,7 @@
"topics": [],
"visibility": "public",
"forks": 344,
"watchers": 1172,
"watchers": 1173,
"score": 0,
"subscribers_count": 68
},

View file

@ -509,10 +509,10 @@
"description": "This repository provides a dockerized infrastructure and a python implementation of the CVE-2019-11043 exploit.",
"fork": false,
"created_at": "2020-05-05T09:43:44Z",
"updated_at": "2024-09-25T11:31:52Z",
"updated_at": "2024-10-17T06:49:45Z",
"pushed_at": "2020-05-25T05:53:56Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -521,7 +521,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -223,10 +223,10 @@
"description": null,
"fork": false,
"created_at": "2022-04-07T03:57:15Z",
"updated_at": "2022-04-07T03:58:02Z",
"updated_at": "2024-10-17T07:18:21Z",
"pushed_at": "2022-04-14T02:56:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2024-10-04T14:04:36Z",
"updated_at": "2024-10-17T10:56:55Z",
"pushed_at": "2020-08-22T06:15:54Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 169,
"watchers_count": 169,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 168,
"watchers": 169,
"score": 0,
"subscribers_count": 9
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 454,
"watchers_count": 454,
"has_discussions": false,
"forks_count": 114,
"forks_count": 115,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 114,
"forks": 115,
"watchers": 454,
"score": 0,
"subscribers_count": 9

View file

@ -13,10 +13,10 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2024-10-15T02:58:59Z",
"updated_at": "2024-10-17T07:07:29Z",
"pushed_at": "2021-08-07T16:48:55Z",
"stargazers_count": 405,
"watchers_count": 405,
"stargazers_count": 406,
"watchers_count": 406,
"has_discussions": false,
"forks_count": 64,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 405,
"watchers": 406,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#",
"fork": false,
"created_at": "2020-11-10T13:08:21Z",
"updated_at": "2024-10-02T16:16:44Z",
"updated_at": "2024-10-17T10:32:03Z",
"pushed_at": "2021-02-14T15:08:01Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 5
}

View file

@ -43,10 +43,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-10-15T08:27:46Z",
"updated_at": "2024-10-17T08:29:05Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1727,
"watchers_count": 1727,
"stargazers_count": 1728,
"watchers_count": 1728,
"has_discussions": false,
"forks_count": 359,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 359,
"watchers": 1727,
"watchers": 1728,
"score": 0,
"subscribers_count": 86
},

View file

@ -13,10 +13,10 @@
"description": "A Python program implementing and exploiting the Minsky Turing machine considered in the paper \"Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine\" as per CVE-2021-32471 (https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-32471)",
"fork": false,
"created_at": "2021-01-21T10:39:42Z",
"updated_at": "2024-10-10T13:49:17Z",
"updated_at": "2024-10-17T11:21:27Z",
"pushed_at": "2022-03-28T05:19:18Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 76,
"watchers": 75,
"score": 0,
"subscribers_count": 4
}

View file

@ -2049,10 +2049,10 @@
"description": "This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by require all denied and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013).",
"fork": false,
"created_at": "2021-11-09T02:38:13Z",
"updated_at": "2021-11-09T02:42:52Z",
"updated_at": "2024-10-17T08:07:25Z",
"pushed_at": "2021-11-09T02:39:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -2068,7 +2068,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-10-12T08:05:29Z",
"updated_at": "2024-10-17T10:19:33Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1798,
"watchers_count": 1798,
"stargazers_count": 1799,
"watchers_count": 1799,
"has_discussions": false,
"forks_count": 524,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 524,
"watchers": 1798,
"watchers": 1799,
"score": 0,
"subscribers_count": 27
},

View file

@ -128,10 +128,10 @@
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
"fork": false,
"created_at": "2022-03-31T00:24:28Z",
"updated_at": "2024-08-23T06:21:12Z",
"updated_at": "2024-10-17T09:52:09Z",
"pushed_at": "2022-08-04T18:26:18Z",
"stargazers_count": 312,
"watchers_count": 312,
"stargazers_count": 313,
"watchers_count": 313,
"has_discussions": false,
"forks_count": 233,
"allow_forking": true,
@ -140,7 +140,7 @@
"topics": [],
"visibility": "public",
"forks": 233,
"watchers": 312,
"watchers": 313,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,19 +13,19 @@
"description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ",
"fork": false,
"created_at": "2024-09-17T06:28:17Z",
"updated_at": "2024-10-17T06:19:31Z",
"updated_at": "2024-10-17T11:36:28Z",
"pushed_at": "2024-10-16T22:27:13Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 22,
"forks": 5,
"watchers": 25,
"score": 0,
"subscribers_count": 1
}

View file

@ -1185,10 +1185,10 @@
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated Remote code execution (RCE)",
"fork": false,
"created_at": "2022-07-05T04:30:42Z",
"updated_at": "2024-09-30T00:57:45Z",
"updated_at": "2024-10-17T11:52:02Z",
"pushed_at": "2024-08-23T18:52:52Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -1202,7 +1202,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 1
},

View file

@ -321,10 +321,10 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
"updated_at": "2024-10-08T09:59:50Z",
"updated_at": "2024-10-17T06:37:05Z",
"pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 376,
"watchers_count": 376,
"stargazers_count": 377,
"watchers_count": 377,
"has_discussions": false,
"forks_count": 77,
"allow_forking": true,
@ -333,7 +333,7 @@
"topics": [],
"visibility": "public",
"forks": 77,
"watchers": 376,
"watchers": 377,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-20963 PoC (Android WorkSource parcel\/unparcel logic mismatch)",
"fork": false,
"created_at": "2023-06-12T10:44:59Z",
"updated_at": "2024-10-08T08:23:44Z",
"updated_at": "2024-10-17T07:31:26Z",
"pushed_at": "2024-04-27T20:15:24Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 1
},

View file

@ -202,10 +202,10 @@
"description": null,
"fork": false,
"created_at": "2023-07-10T06:38:14Z",
"updated_at": "2024-07-21T09:14:51Z",
"updated_at": "2024-10-17T12:15:34Z",
"pushed_at": "2023-07-13T06:20:19Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -214,7 +214,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-09-24T21:59:23Z",
"updated_at": "2024-10-15T07:39:19Z",
"updated_at": "2024-10-17T06:29:39Z",
"pushed_at": "2023-10-12T19:18:32Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 139,
"watchers_count": 139,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 138,
"watchers": 139,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Apache RocketMQ Arbitrary File Write Vulnerability Exploit",
"fork": false,
"created_at": "2023-07-14T12:22:45Z",
"updated_at": "2024-06-28T05:42:21Z",
"updated_at": "2024-10-17T10:04:25Z",
"pushed_at": "2023-07-19T02:29:39Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 40,
"watchers": 41,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-10-16T23:50:57Z",
"updated_at": "2024-10-17T09:24:40Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1220,
"watchers_count": 1220,
"stargazers_count": 1222,
"watchers_count": 1222,
"has_discussions": false,
"forks_count": 204,
"forks_count": 205,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 204,
"watchers": 1220,
"forks": 205,
"watchers": 1222,
"score": 0,
"subscribers_count": 20
},

View file

@ -13,10 +13,10 @@
"description": "Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. ",
"fork": false,
"created_at": "2023-10-24T17:19:32Z",
"updated_at": "2024-10-07T12:59:19Z",
"updated_at": "2024-10-17T08:29:08Z",
"pushed_at": "2023-10-26T14:16:05Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 71,
"watchers": 72,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-6319 proof of concept",
"fork": false,
"created_at": "2024-04-11T18:58:17Z",
"updated_at": "2024-10-07T01:26:29Z",
"pushed_at": "2024-08-09T18:16:49Z",
"stargazers_count": 33,
"watchers_count": 33,
"updated_at": "2024-10-17T11:18:50Z",
"pushed_at": "2024-10-17T11:18:46Z",
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2024-09-29T14:29:26Z",
"updated_at": "2024-10-08T11:52:17Z",
"pushed_at": "2024-10-08T11:52:13Z",
"updated_at": "2024-10-17T12:09:18Z",
"pushed_at": "2024-10-17T12:09:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-10-15T08:58:29Z",
"updated_at": "2024-10-17T07:43:39Z",
"pushed_at": "2024-07-25T18:12:57Z",
"stargazers_count": 249,
"watchers_count": 249,
"stargazers_count": 250,
"watchers_count": 250,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 249,
"watchers": 250,
"score": 0,
"subscribers_count": 6
},
@ -73,10 +73,10 @@
"description": "利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。",
"fork": false,
"created_at": "2024-07-03T10:29:06Z",
"updated_at": "2024-09-07T13:25:31Z",
"updated_at": "2024-10-17T10:07:47Z",
"pushed_at": "2024-09-03T09:31:58Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -103,10 +103,10 @@
"description": "is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)",
"fork": false,
"created_at": "2024-10-03T07:56:36Z",
"updated_at": "2024-10-06T16:49:25Z",
"updated_at": "2024-10-17T07:35:10Z",
"pushed_at": "2024-10-03T07:58:47Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -129,7 +129,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -186,6 +186,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "一个验证对CVE-2024-21733",
"fork": false,
"created_at": "2024-08-15T09:47:32Z",
"updated_at": "2024-09-23T19:16:47Z",
"updated_at": "2024-10-17T07:19:39Z",
"pushed_at": "2024-08-16T05:52:08Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-16T18:48:58Z",
"updated_at": "2024-10-16T20:09:14Z",
"pushed_at": "2024-10-16T20:09:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"updated_at": "2024-10-17T10:11:21Z",
"pushed_at": "2024-10-17T08:44:35Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -85,9 +85,9 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 873829824,
@ -103,10 +103,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-16T19:41:27Z",
"updated_at": "2024-10-16T19:45:09Z",
"pushed_at": "2024-10-16T19:44:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"updated_at": "2024-10-17T10:11:20Z",
"pushed_at": "2024-10-17T08:44:13Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -115,8 +115,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -133,10 +133,10 @@
"description": "A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-03-01T09:28:08Z",
"updated_at": "2024-10-08T09:00:40Z",
"updated_at": "2024-10-17T07:01:45Z",
"pushed_at": "2024-03-01T09:46:56Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -163,7 +163,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,6 +27,6 @@
"forks": 28,
"watchers": 99,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-24T10:37:26Z",
"updated_at": "2024-10-16T17:56:42Z",
"updated_at": "2024-10-17T08:55:01Z",
"pushed_at": "2024-07-31T19:11:55Z",
"stargazers_count": 219,
"watchers_count": 219,
"stargazers_count": 220,
"watchers_count": 220,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 219,
"watchers": 220,
"score": 0,
"subscribers_count": 3
},
@ -73,10 +73,10 @@
"description": "该漏洞存在于 NtQueryInformationToken 函数中特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。",
"fork": false,
"created_at": "2024-07-05T16:02:56Z",
"updated_at": "2024-10-10T07:22:45Z",
"updated_at": "2024-10-17T07:47:02Z",
"pushed_at": "2024-07-05T16:06:16Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 1
},

32
2024/CVE-2024-30090.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 874092793,
"name": "CVE-2024-30090",
"full_name": "Dor00tkit\/CVE-2024-30090",
"owner": {
"login": "Dor00tkit",
"id": 47893732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47893732?v=4",
"html_url": "https:\/\/github.com\/Dor00tkit"
},
"html_url": "https:\/\/github.com\/Dor00tkit\/CVE-2024-30090",
"description": "CVE-2024-30090 - LPE PoC",
"fork": false,
"created_at": "2024-10-17T08:38:47Z",
"updated_at": "2024-10-17T12:18:43Z",
"pushed_at": "2024-10-17T09:53:33Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1062,6 +1062,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -30,6 +30,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-05-12T10:49:41Z",
"updated_at": "2024-08-06T08:55:49Z",
"updated_at": "2024-10-17T08:49:16Z",
"pushed_at": "2024-05-12T13:05:22Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,20 +13,20 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-10-17T06:06:02Z",
"updated_at": "2024-10-17T12:04:02Z",
"pushed_at": "2024-10-13T19:46:23Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 28,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 96,
"forks": 30,
"watchers": 112,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 20,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
"fork": false,
"created_at": "2024-07-06T00:49:40Z",
"updated_at": "2024-09-25T10:19:26Z",
"updated_at": "2024-10-17T10:08:00Z",
"pushed_at": "2024-07-12T00:41:36Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 110,
"watchers_count": 110,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 109,
"watchers": 110,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,21 +43,21 @@
"description": "RDL的堆溢出导致的RCE",
"fork": false,
"created_at": "2024-08-09T05:00:44Z",
"updated_at": "2024-10-15T01:21:48Z",
"updated_at": "2024-10-17T11:48:29Z",
"pushed_at": "2024-08-14T04:43:05Z",
"stargazers_count": 204,
"watchers_count": 204,
"stargazers_count": 205,
"watchers_count": 205,
"has_discussions": false,
"forks_count": 86,
"forks_count": 87,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 86,
"watchers": 204,
"forks": 87,
"watchers": 205,
"score": 0,
"subscribers_count": 0
"subscribers_count": 5
},
{
"id": 840205980,
@ -343,10 +343,10 @@
"description": "CVE-2024-38077: Remote Code Execution Vulnerability in Windows Remote Desktop Licensing Service",
"fork": false,
"created_at": "2024-10-09T06:39:21Z",
"updated_at": "2024-10-09T06:52:30Z",
"updated_at": "2024-10-17T12:14:02Z",
"pushed_at": "2024-10-09T06:42:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -366,7 +366,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/Dor00tkit"
},
"html_url": "https:\/\/github.com\/Dor00tkit\/CVE-2024-38144",
"description": null,
"description": "CVE-2024-38144 - DoS PoC",
"fork": false,
"created_at": "2024-09-29T07:04:58Z",
"updated_at": "2024-09-29T07:16:53Z",
"updated_at": "2024-10-17T10:01:13Z",
"pushed_at": "2024-09-29T07:13:34Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,19 +13,19 @@
"description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ",
"fork": false,
"created_at": "2024-09-17T06:28:17Z",
"updated_at": "2024-10-17T06:19:31Z",
"updated_at": "2024-10-17T11:36:28Z",
"pushed_at": "2024-10-16T22:27:13Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 22,
"forks": 5,
"watchers": 25,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-40673.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 874201744,
"name": "G3_libcore_native_CVE-2024-40673",
"full_name": "Aakashmom\/G3_libcore_native_CVE-2024-40673",
"owner": {
"login": "Aakashmom",
"id": 76400693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76400693?v=4",
"html_url": "https:\/\/github.com\/Aakashmom"
},
"html_url": "https:\/\/github.com\/Aakashmom\/G3_libcore_native_CVE-2024-40673",
"description": null,
"fork": false,
"created_at": "2024-10-17T12:26:24Z",
"updated_at": "2024-10-17T12:28:06Z",
"pushed_at": "2024-10-17T12:28:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-40675.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 874181651,
"name": "intent_CVE-2024-40675",
"full_name": "Aakashmom\/intent_CVE-2024-40675",
"owner": {
"login": "Aakashmom",
"id": 76400693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76400693?v=4",
"html_url": "https:\/\/github.com\/Aakashmom"
},
"html_url": "https:\/\/github.com\/Aakashmom\/intent_CVE-2024-40675",
"description": null,
"fork": false,
"created_at": "2024-10-17T11:46:29Z",
"updated_at": "2024-10-17T11:47:50Z",
"pushed_at": "2024-10-17T11:47:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

62
2024/CVE-2024-40676.json Normal file
View file

@ -0,0 +1,62 @@
[
{
"id": 874173855,
"name": "frameworks_base_accounts_CVE-2024-40676",
"full_name": "Aakashmom\/frameworks_base_accounts_CVE-2024-40676",
"owner": {
"login": "Aakashmom",
"id": 76400693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76400693?v=4",
"html_url": "https:\/\/github.com\/Aakashmom"
},
"html_url": "https:\/\/github.com\/Aakashmom\/frameworks_base_accounts_CVE-2024-40676",
"description": null,
"fork": false,
"created_at": "2024-10-17T11:29:33Z",
"updated_at": "2024-10-17T11:33:08Z",
"pushed_at": "2024-10-17T11:33:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 874178814,
"name": "accounts_CVE-2024-40676-",
"full_name": "Aakashmom\/accounts_CVE-2024-40676-",
"owner": {
"login": "Aakashmom",
"id": 76400693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76400693?v=4",
"html_url": "https:\/\/github.com\/Aakashmom"
},
"html_url": "https:\/\/github.com\/Aakashmom\/accounts_CVE-2024-40676-",
"description": null,
"fork": false,
"created_at": "2024-10-17T11:40:21Z",
"updated_at": "2024-10-17T11:42:10Z",
"pushed_at": "2024-10-17T11:42:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -57,6 +57,6 @@
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Metasploit Module for CVE-2024-43582 RPC Remote Desktop Service crititcal RCE",
"fork": false,
"created_at": "2024-10-09T12:50:24Z",
"updated_at": "2024-10-16T09:14:35Z",
"updated_at": "2024-10-17T12:14:17Z",
"pushed_at": "2024-10-09T13:19:29Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Ruby-SAML \/ GitLab Authentication Bypass (CVE-2024-45409) exploit",
"fork": false,
"created_at": "2024-10-07T09:24:46Z",
"updated_at": "2024-10-16T03:22:12Z",
"updated_at": "2024-10-17T07:21:57Z",
"pushed_at": "2024-10-07T11:50:17Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 62,
"watchers": 63,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
"fork": false,
"created_at": "2024-10-05T00:15:18Z",
"updated_at": "2024-10-17T01:38:36Z",
"updated_at": "2024-10-17T11:54:47Z",
"pushed_at": "2024-10-05T00:18:49Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 94,
"watchers": 95,
"score": 0,
"subscribers_count": 3
}

View file

@ -530,10 +530,10 @@
"description": "[漏洞复现] 全球首款利用PHP默认环境XAMPP的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。",
"fork": false,
"created_at": "2024-06-08T13:04:45Z",
"updated_at": "2024-10-17T03:00:03Z",
"updated_at": "2024-10-17T10:39:35Z",
"pushed_at": "2024-07-21T20:27:03Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -542,7 +542,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 116,
"watchers": 118,
"score": 0,
"subscribers_count": 1
},
@ -590,10 +590,10 @@
"description": "PHP CGI Argument Injection vulnerability",
"fork": false,
"created_at": "2024-06-09T14:18:21Z",
"updated_at": "2024-09-03T05:57:13Z",
"updated_at": "2024-10-17T07:43:20Z",
"pushed_at": "2024-06-09T14:20:36Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -602,7 +602,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 1
},

View file

@ -163,10 +163,10 @@
"description": "Ultrafast CUPS-browsed scanner (CVE-2024-47176)",
"fork": false,
"created_at": "2024-09-29T09:05:30Z",
"updated_at": "2024-10-08T00:38:25Z",
"updated_at": "2024-10-17T11:34:33Z",
"pushed_at": "2024-10-07T19:24:35Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -181,7 +181,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
@ -297,10 +297,10 @@
"description": "A simple scanner for identifying vulnerable cups-browsed instances on your network",
"fork": false,
"created_at": "2024-10-07T07:25:18Z",
"updated_at": "2024-10-15T14:05:02Z",
"updated_at": "2024-10-17T08:49:04Z",
"pushed_at": "2024-10-07T16:59:47Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -309,7 +309,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 47,
"watchers": 49,
"score": 0,
"subscribers_count": 1
},

View file

@ -2203,10 +2203,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-10-15T10:48:32Z",
"updated_at": "2024-10-17T09:51:59Z",
"pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -2215,7 +2215,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
"fork": false,
"created_at": "2024-09-10T06:27:59Z",
"updated_at": "2024-10-17T05:17:51Z",
"updated_at": "2024-10-17T12:13:47Z",
"pushed_at": "2024-10-17T05:12:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 11,
"score": 0,
"subscribers_count": 0
}

View file

@ -3585,6 +3585,13 @@
- [Admin9961/CVE-2024-30088](https://github.com/Admin9961/CVE-2024-30088)
- [Justintroup85/exploits-forsale-collateral-damage](https://github.com/Justintroup85/exploits-forsale-collateral-damage)
### CVE-2024-30090 (2024-06-11)
<code>Microsoft Streaming Service Elevation of Privilege Vulnerability
</code>
- [Dor00tkit/CVE-2024-30090](https://github.com/Dor00tkit/CVE-2024-30090)
### CVE-2024-30212 (2024-05-28)
<code>If a SCSI READ(10) command is initiated via USB using the largest LBA \n(0xFFFFFFFF) with it's default block size of 512 and a count of 1,\n\nthe first 512 byte of the 0x80000000 memory area is returned to the \nuser. If the block count is increased, the full RAM can be exposed.\n\nThe same method works to write to this memory area. If RAM contains \npointers, those can be - depending on the application - overwritten to\n\nreturn data from any other offset including Progam and Boot Flash.
@ -4984,6 +4991,16 @@
- [nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-40658](https://github.com/nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-40658)
### CVE-2024-40673
- [Aakashmom/G3_libcore_native_CVE-2024-40673](https://github.com/Aakashmom/G3_libcore_native_CVE-2024-40673)
### CVE-2024-40675
- [Aakashmom/intent_CVE-2024-40675](https://github.com/Aakashmom/intent_CVE-2024-40675)
### CVE-2024-40676
- [Aakashmom/frameworks_base_accounts_CVE-2024-40676](https://github.com/Aakashmom/frameworks_base_accounts_CVE-2024-40676)
- [Aakashmom/accounts_CVE-2024-40676-](https://github.com/Aakashmom/accounts_CVE-2024-40676-)
### CVE-2024-40711 (2024-09-07)
<code>A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).
@ -46334,6 +46351,7 @@
- [chancej715/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution](https://github.com/chancej715/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution)
- [FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1](https://github.com/FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1)
- [JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution](https://github.com/JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution)
- [nwclasantha/unreal_ircd_3281_backdoor_and_mitigation](https://github.com/nwclasantha/unreal_ircd_3281_backdoor_and_mitigation)
### CVE-2010-2387 (2012-12-21)