Auto Update 2024/06/09 18:29:02

This commit is contained in:
motikan2010-bot 2024-06-10 03:29:02 +09:00
parent 2eadc954f9
commit 815091dc0a
29 changed files with 245 additions and 144 deletions

View file

@ -13,10 +13,10 @@
"description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
"fork": false,
"created_at": "2018-12-18T04:24:43Z",
"updated_at": "2024-05-05T14:22:51Z",
"updated_at": "2024-06-09T16:13:01Z",
"pushed_at": "2019-09-30T23:38:11Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 69,
"watchers": 70,
"score": 0,
"subscribers_count": 7
}

View file

@ -13,10 +13,10 @@
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2016-12-26T13:39:03Z",
"updated_at": "2024-05-31T12:26:00Z",
"updated_at": "2024-06-09T12:42:18Z",
"pushed_at": "2023-02-27T06:48:09Z",
"stargazers_count": 395,
"watchers_count": 395,
"stargazers_count": 396,
"watchers_count": 396,
"has_discussions": false,
"forks_count": 150,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 150,
"watchers": 395,
"watchers": 396,
"score": 0,
"subscribers_count": 26
},

View file

@ -142,7 +142,7 @@
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -151,7 +151,7 @@
"cve-2017-9841"
],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 22,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2024-05-31T08:38:26Z",
"updated_at": "2024-06-09T17:28:13Z",
"pushed_at": "2022-12-11T10:44:39Z",
"stargazers_count": 513,
"watchers_count": 513,
"stargazers_count": 514,
"watchers_count": 514,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 513,
"watchers": 514,
"score": 0,
"subscribers_count": 55
},

View file

@ -13,8 +13,8 @@
"description": "Chain CVE-2019-11408 XSS in operator panel and CVE-2019-11409 Command injection in operator panel.",
"fork": false,
"created_at": "2023-11-25T17:04:39Z",
"updated_at": "2023-11-25T17:14:55Z",
"pushed_at": "2024-02-06T19:12:16Z",
"updated_at": "2024-06-09T16:05:08Z",
"pushed_at": "2024-06-09T16:05:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -253,8 +253,8 @@
"description": "The exploit is edited to work with different text encodings and Python 3 and is compatible with CMSMS version 2.2.9 and below.",
"fork": false,
"created_at": "2023-05-29T17:59:09Z",
"updated_at": "2023-09-13T17:57:14Z",
"pushed_at": "2024-06-09T10:32:40Z",
"updated_at": "2024-06-09T12:39:51Z",
"pushed_at": "2024-06-09T12:39:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -719,10 +719,10 @@
"description": "GUI Exploit Tool for CVE-2020-0688(Microsoft Exchange default MachineKeySection deserialize vulnerability)",
"fork": false,
"created_at": "2024-05-09T12:50:48Z",
"updated_at": "2024-06-07T06:10:36Z",
"updated_at": "2024-06-09T13:35:52Z",
"pushed_at": "2024-05-09T13:51:27Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -738,7 +738,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-06-06T08:12:05Z",
"updated_at": "2024-06-09T13:14:49Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1698,
"watchers_count": 1698,
"stargazers_count": 1699,
"watchers_count": 1699,
"has_discussions": false,
"forks_count": 360,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 360,
"watchers": 1698,
"watchers": 1699,
"score": 0,
"subscribers_count": 87
},

View file

@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2024-06-08T08:05:24Z",
"updated_at": "2024-06-09T14:16:01Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1805,
"watchers_count": 1805,
"stargazers_count": 1806,
"watchers_count": 1806,
"has_discussions": false,
"forks_count": 583,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 583,
"watchers": 1805,
"watchers": 1806,
"score": 0,
"subscribers_count": 44
},
@ -301,10 +301,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2024-06-04T22:58:22Z",
"updated_at": "2024-06-09T14:16:14Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 976,
"watchers_count": 976,
"stargazers_count": 977,
"watchers_count": 977,
"has_discussions": false,
"forks_count": 231,
"allow_forking": true,
@ -313,7 +313,7 @@
"topics": [],
"visibility": "public",
"forks": 231,
"watchers": 976,
"watchers": 977,
"score": 0,
"subscribers_count": 27
},

View file

@ -43,10 +43,10 @@
"description": "CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
"fork": false,
"created_at": "2021-03-08T05:07:15Z",
"updated_at": "2024-04-10T14:40:33Z",
"updated_at": "2024-06-09T13:48:34Z",
"pushed_at": "2021-03-08T11:41:19Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 79,
"watchers": 80,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
"updated_at": "2024-06-06T05:15:03Z",
"updated_at": "2024-06-09T13:58:42Z",
"pushed_at": "2021-10-13T22:32:36Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 104,
"watchers": 103,
"score": 0,
"subscribers_count": 8
},

View file

@ -618,19 +618,19 @@
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
"fork": false,
"created_at": "2022-08-23T20:20:45Z",
"updated_at": "2024-04-29T07:55:03Z",
"updated_at": "2024-06-09T15:07:09Z",
"pushed_at": "2022-12-17T16:10:46Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 98,
"forks": 21,
"watchers": 99,
"score": 0,
"subscribers_count": 3
},

View file

@ -943,7 +943,7 @@
"stargazers_count": 1003,
"watchers_count": 1003,
"has_discussions": false,
"forks_count": 179,
"forks_count": 178,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -951,7 +951,7 @@
"cve-2021-4034"
],
"visibility": "public",
"forks": 179,
"forks": 178,
"watchers": 1003,
"score": 0,
"subscribers_count": 14

View file

@ -48,19 +48,19 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-06-09T09:20:45Z",
"updated_at": "2024-06-09T15:54:23Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 734,
"watchers_count": 734,
"stargazers_count": 736,
"watchers_count": 736,
"has_discussions": false,
"forks_count": 117,
"forks_count": 118,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 117,
"watchers": 734,
"forks": 118,
"watchers": 736,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,8 +13,8 @@
"description": "Oracle E-Business Suite <=12.2 - Authentication Bypass",
"fork": false,
"created_at": "2024-06-09T02:59:45Z",
"updated_at": "2024-06-09T03:01:11Z",
"pushed_at": "2024-06-09T03:01:08Z",
"updated_at": "2024-06-09T16:56:47Z",
"pushed_at": "2024-06-09T16:56:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)",
"fork": false,
"created_at": "2023-09-01T16:17:10Z",
"updated_at": "2024-06-07T18:34:50Z",
"updated_at": "2024-06-09T18:16:06Z",
"pushed_at": "2023-09-01T16:21:56Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 92,
"watchers": 93,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2024-06-08T10:08:09Z",
"updated_at": "2024-06-09T16:18:52Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 768,
"watchers_count": 768,
"stargazers_count": 769,
"watchers_count": 769,
"has_discussions": false,
"forks_count": 139,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 139,
"watchers": 768,
"watchers": 769,
"score": 0,
"subscribers_count": 9
},

View file

@ -2,14 +2,14 @@
{
"id": 704942565,
"name": "CVE-2023-45471",
"full_name": "itsAptx\/CVE-2023-45471",
"full_name": "mehdibelhajamor\/CVE-2023-45471",
"owner": {
"login": "itsAptx",
"login": "mehdibelhajamor",
"id": 62826765,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62826765?v=4",
"html_url": "https:\/\/github.com\/itsAptx"
"html_url": "https:\/\/github.com\/mehdibelhajamor"
},
"html_url": "https:\/\/github.com\/itsAptx\/CVE-2023-45471",
"html_url": "https:\/\/github.com\/mehdibelhajamor\/CVE-2023-45471",
"description": null,
"fork": false,
"created_at": "2023-10-14T15:20:37Z",

View file

@ -18,13 +18,13 @@
"stargazers_count": 784,
"watchers_count": 784,
"has_discussions": false,
"forks_count": 138,
"forks_count": 139,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 138,
"forks": 139,
"watchers": 784,
"score": 0,
"subscribers_count": 13

32
2024/CVE-2024-20404.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 812737384,
"name": "CVE-2024-20404",
"full_name": "AbdElRahmanEzzat1995\/CVE-2024-20404",
"owner": {
"login": "AbdElRahmanEzzat1995",
"id": 67908228,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67908228?v=4",
"html_url": "https:\/\/github.com\/AbdElRahmanEzzat1995"
},
"html_url": "https:\/\/github.com\/AbdElRahmanEzzat1995\/CVE-2024-20404",
"description": null,
"fork": false,
"created_at": "2024-06-09T18:27:52Z",
"updated_at": "2024-06-09T18:31:09Z",
"pushed_at": "2024-06-09T18:29:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1364,10 +1364,10 @@
"description": "POC - CVE-202424919 - Check Point Security Gateways",
"fork": false,
"created_at": "2024-06-09T06:54:51Z",
"updated_at": "2024-06-09T08:05:26Z",
"updated_at": "2024-06-09T15:55:51Z",
"pushed_at": "2024-06-09T08:03:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1376,7 +1376,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )",
"fork": false,
"created_at": "2024-05-31T20:11:37Z",
"updated_at": "2024-06-09T10:37:10Z",
"updated_at": "2024-06-09T16:23:12Z",
"pushed_at": "2024-06-08T09:12:43Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 48,
"watchers": 49,
"score": 0,
"subscribers_count": 1
},
@ -50,10 +50,10 @@
"description": "Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit ",
"fork": false,
"created_at": "2024-06-03T19:08:24Z",
"updated_at": "2024-06-08T22:26:38Z",
"updated_at": "2024-06-09T13:11:25Z",
"pushed_at": "2024-06-03T19:20:10Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -83,7 +83,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -163,10 +163,10 @@
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
"fork": false,
"created_at": "2024-05-14T14:21:49Z",
"updated_at": "2024-06-07T01:06:17Z",
"updated_at": "2024-06-09T12:35:32Z",
"pushed_at": "2024-05-29T03:43:05Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -195,7 +195,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 73,
"watchers": 74,
"score": 0,
"subscribers_count": 3
},
@ -283,8 +283,8 @@
"description": null,
"fork": false,
"created_at": "2024-06-09T07:21:44Z",
"updated_at": "2024-06-09T07:36:31Z",
"pushed_at": "2024-06-09T07:36:27Z",
"updated_at": "2024-06-09T16:37:44Z",
"pushed_at": "2024-06-09T16:37:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -100,11 +100,11 @@
"html_url": "https:\/\/github.com\/Jhonsonwannaa"
},
"html_url": "https:\/\/github.com\/Jhonsonwannaa\/CVE-2024-29269",
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-29269",
"description": "An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.",
"fork": false,
"created_at": "2024-06-08T22:06:33Z",
"updated_at": "2024-06-09T09:05:54Z",
"pushed_at": "2024-06-09T09:05:51Z",
"updated_at": "2024-06-09T13:12:11Z",
"pushed_at": "2024-06-09T13:12:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -48,13 +48,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
@ -78,7 +78,7 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -92,7 +92,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 1

View file

@ -133,10 +133,10 @@
"description": "Authentication Bypass Vulnerability — CVE-20244358 — Telerik Report Server 2024",
"fork": false,
"created_at": "2024-06-09T06:30:06Z",
"updated_at": "2024-06-09T08:05:03Z",
"updated_at": "2024-06-09T15:55:54Z",
"pushed_at": "2024-06-09T06:51:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
"fork": false,
"created_at": "2024-06-07T05:50:23Z",
"updated_at": "2024-06-09T11:26:26Z",
"updated_at": "2024-06-09T13:14:46Z",
"pushed_at": "2024-06-07T11:49:08Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 57,
"watchers": 58,
"score": 0,
"subscribers_count": 4
},
@ -133,10 +133,10 @@
"description": "POC & $BASH script for CVE-2024-4577",
"fork": false,
"created_at": "2024-06-07T09:51:39Z",
"updated_at": "2024-06-09T12:20:59Z",
"pushed_at": "2024-06-07T18:37:44Z",
"stargazers_count": 20,
"watchers_count": 20,
"updated_at": "2024-06-09T16:54:01Z",
"pushed_at": "2024-06-09T16:16:30Z",
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 20,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},
@ -163,19 +163,19 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-06-09T10:32:21Z",
"updated_at": "2024-06-09T16:45:31Z",
"pushed_at": "2024-06-07T09:53:15Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 70,
"forks": 13,
"watchers": 72,
"score": 0,
"subscribers_count": 2
},
@ -283,10 +283,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-07T12:49:20Z",
"updated_at": "2024-06-07T17:02:41Z",
"updated_at": "2024-06-09T12:50:40Z",
"pushed_at": "2024-06-07T14:29:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -295,7 +295,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -348,13 +348,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@ -433,10 +433,10 @@
"description": "Proof Of Concept RCE exploit for critical vulnerability in PHP <8.2.15 (Windows), allowing attackers to execute arbitrary commands.",
"fork": false,
"created_at": "2024-06-08T05:27:44Z",
"updated_at": "2024-06-08T10:58:54Z",
"updated_at": "2024-06-09T16:48:20Z",
"pushed_at": "2024-06-08T05:50:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -445,7 +445,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -464,7 +464,7 @@
"fork": false,
"created_at": "2024-06-08T06:36:14Z",
"updated_at": "2024-06-09T10:50:42Z",
"pushed_at": "2024-06-09T11:00:41Z",
"pushed_at": "2024-06-09T16:47:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -493,10 +493,10 @@
"description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
"fork": false,
"created_at": "2024-06-08T12:23:35Z",
"updated_at": "2024-06-08T15:59:30Z",
"updated_at": "2024-06-09T17:15:22Z",
"pushed_at": "2024-06-08T15:59:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -512,7 +512,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -530,12 +530,12 @@
"description": "全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP共享原创EXP支持SSRF支持绕过WAF。The world's first CVE-2024-4577 PHP-CGI RCE exploit utilizing the default PHP environment. Sharing original exploit, supports SSRF, supports WAF bypass.",
"fork": false,
"created_at": "2024-06-08T13:04:45Z",
"updated_at": "2024-06-09T12:17:28Z",
"pushed_at": "2024-06-09T11:51:52Z",
"stargazers_count": 11,
"watchers_count": 11,
"updated_at": "2024-06-09T17:20:23Z",
"pushed_at": "2024-06-09T15:45:15Z",
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 2,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -549,9 +549,69 @@
"xampp"
],
"visibility": "public",
"forks": 2,
"watchers": 11,
"forks": 5,
"watchers": 23,
"score": 0,
"subscribers_count": 1
},
{
"id": 812648512,
"name": "CVE-2024-4577",
"full_name": "dbyMelina\/CVE-2024-4577",
"owner": {
"login": "dbyMelina",
"id": 93864453,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93864453?v=4",
"html_url": "https:\/\/github.com\/dbyMelina"
},
"html_url": "https:\/\/github.com\/dbyMelina\/CVE-2024-4577",
"description": "python poc编写练手可以对单个目标或批量检测",
"fork": false,
"created_at": "2024-06-09T13:46:46Z",
"updated_at": "2024-06-09T13:48:02Z",
"pushed_at": "2024-06-09T13:47:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 812658588,
"name": "CVE-2024-4577",
"full_name": "Chocapikk\/CVE-2024-4577",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-4577",
"description": "PHP CGI Argument Injection vulnerability",
"fork": false,
"created_at": "2024-06-09T14:18:21Z",
"updated_at": "2024-06-09T17:56:38Z",
"pushed_at": "2024-06-09T14:20:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -367,10 +367,10 @@
"description": "POC - CVE-20244956 - Nexus Repository Manager 3 Unauthenticated Path Traversal",
"fork": false,
"created_at": "2024-06-09T10:57:29Z",
"updated_at": "2024-06-09T10:58:23Z",
"pushed_at": "2024-06-09T10:58:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-06-09T15:55:45Z",
"pushed_at": "2024-06-09T12:53:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -379,7 +379,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -639,6 +639,8 @@
- [zomasec/CVE-2024-4577](https://github.com/zomasec/CVE-2024-4577)
- [ZephrFish/CVE-2024-4577-PHP-RCE](https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE)
- [xcanwin/CVE-2024-4577-PHP-RCE](https://github.com/xcanwin/CVE-2024-4577-PHP-RCE)
- [dbyMelina/CVE-2024-4577](https://github.com/dbyMelina/CVE-2024-4577)
- [Chocapikk/CVE-2024-4577](https://github.com/Chocapikk/CVE-2024-4577)
### CVE-2024-4701 (2024-05-10)
@ -716,6 +718,13 @@
- [nettitude/CVE-2024-20356](https://github.com/nettitude/CVE-2024-20356)
- [SherllyNeo/CVE_2024_20356](https://github.com/SherllyNeo/CVE_2024_20356)
### CVE-2024-20404 (2024-06-05)
<code>A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct an SSRF attack on an affected system.\r\n\r This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain limited sensitive information for services that are associated to the affected device.
</code>
- [AbdElRahmanEzzat1995/CVE-2024-20404](https://github.com/AbdElRahmanEzzat1995/CVE-2024-20404)
### CVE-2024-20656 (2024-01-09)
<code>Visual Studio Elevation of Privilege Vulnerability
@ -9001,7 +9010,7 @@
<code>The QAD Search Server is vulnerable to Stored Cross-Site Scripting (XSS) in versions up to, and including, 1.0.0.315 due to insufficient checks on indexes. This makes it possible for unauthenticated attackers to create a new index and inject a malicious web script into its name, that will execute whenever a user accesses the search page.
</code>
- [itsAptx/CVE-2023-45471](https://github.com/itsAptx/CVE-2023-45471)
- [mehdibelhajamor/CVE-2023-45471](https://github.com/mehdibelhajamor/CVE-2023-45471)
### CVE-2023-45503 (2024-04-15)