Auto Update 2024/05/19 00:28:07

This commit is contained in:
motikan2010-bot 2024-05-19 09:28:07 +09:00
parent 69dc2ede75
commit 8495c42d40
21 changed files with 120 additions and 72 deletions

View file

@ -2296,5 +2296,52 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 802616947,
"name": "CVE-2014-6271-EXPLOIT",
"full_name": "K3ysTr0K3R\/CVE-2014-6271-EXPLOIT",
"owner": {
"login": "K3ysTr0K3R",
"id": 70909693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
"html_url": "https:\/\/github.com\/K3ysTr0K3R"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2014-6271-EXPLOIT",
"description": "A PoC exploit for CVE-2014-6271 - Shellshock",
"fork": false,
"created_at": "2024-05-18T19:42:58Z",
"updated_at": "2024-05-18T20:00:10Z",
"pushed_at": "2024-05-18T19:56:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bash",
"critical",
"cve-2014-6271",
"exploit",
"exploitation",
"hacking",
"poc",
"proof-of-concept",
"rce",
"rce-exploit",
"rce-scanner",
"remote-code-execution",
"shellshock",
"shellshock-vulnerability",
"vulnerabilities",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -279,7 +279,7 @@
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
},
{
"id": 336183847,

View file

@ -48,7 +48,7 @@
"stargazers_count": 253,
"watchers_count": 253,
"has_discussions": false,
"forks_count": 82,
"forks_count": 78,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -57,7 +57,7 @@
"cve-2020-0610"
],
"visibility": "public",
"forks": 82,
"forks": 78,
"watchers": 253,
"score": 0,
"subscribers_count": 13

View file

@ -43,10 +43,10 @@
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
"fork": false,
"created_at": "2020-05-07T22:02:25Z",
"updated_at": "2024-05-07T13:53:48Z",
"updated_at": "2024-05-18T20:32:13Z",
"pushed_at": "2020-05-15T09:03:36Z",
"stargazers_count": 224,
"watchers_count": 224,
"stargazers_count": 223,
"watchers_count": 223,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 224,
"watchers": 223,
"score": 0,
"subscribers_count": 12
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -73,10 +73,10 @@
"description": "Win10 20H2 LPE for CVE-2021-31956",
"fork": false,
"created_at": "2022-09-02T10:35:11Z",
"updated_at": "2023-09-03T03:26:03Z",
"updated_at": "2024-05-18T18:32:10Z",
"pushed_at": "2022-09-02T10:40:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},
@ -103,10 +103,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-05T00:03:10Z",
"updated_at": "2023-07-23T03:59:29Z",
"updated_at": "2024-05-18T18:32:08Z",
"pushed_at": "2023-06-05T14:20:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Pickle Serialization Remote Code Execution - Memcached Poisoning",
"fork": false,
"created_at": "2021-11-05T18:11:54Z",
"updated_at": "2024-03-12T17:17:13Z",
"updated_at": "2024-05-18T22:35:21Z",
"pushed_at": "2021-11-05T21:04:59Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -236,10 +236,10 @@
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2024-05-17T15:04:42Z",
"updated_at": "2024-05-18T20:26:46Z",
"pushed_at": "2023-08-25T16:11:40Z",
"stargazers_count": 746,
"watchers_count": 746,
"stargazers_count": 747,
"watchers_count": 747,
"has_discussions": false,
"forks_count": 114,
"allow_forking": true,
@ -248,7 +248,7 @@
"topics": [],
"visibility": "public",
"forks": 114,
"watchers": 746,
"watchers": 747,
"score": 0,
"subscribers_count": 10
},

View file

@ -493,10 +493,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2024-05-18T09:10:34Z",
"updated_at": "2024-05-18T23:12:29Z",
"pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 784,
"watchers_count": 784,
"stargazers_count": 785,
"watchers_count": 785,
"has_discussions": false,
"forks_count": 174,
"allow_forking": true,
@ -512,7 +512,7 @@
],
"visibility": "public",
"forks": 174,
"watchers": 784,
"watchers": 785,
"score": 0,
"subscribers_count": 19
},

View file

@ -196,10 +196,10 @@
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
"fork": false,
"created_at": "2023-02-05T18:42:27Z",
"updated_at": "2024-05-17T06:21:05Z",
"updated_at": "2024-05-18T20:32:12Z",
"pushed_at": "2023-02-05T19:35:03Z",
"stargazers_count": 208,
"watchers_count": 208,
"stargazers_count": 209,
"watchers_count": 209,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -208,7 +208,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 208,
"watchers": 209,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-21707 EXP",
"fork": false,
"created_at": "2023-06-30T10:15:07Z",
"updated_at": "2024-04-20T01:38:48Z",
"updated_at": "2024-05-18T19:23:35Z",
"pushed_at": "2023-07-06T07:43:24Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-23T19:06:36Z",
"updated_at": "2024-05-16T06:46:11Z",
"updated_at": "2024-05-18T19:24:27Z",
"pushed_at": "2023-10-29T11:12:26Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 161,
"watchers_count": 161,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 160,
"watchers": 161,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-05-18T18:27:13Z",
"updated_at": "2024-05-19T00:23:17Z",
"pushed_at": "2024-05-16T21:12:20Z",
"stargazers_count": 692,
"watchers_count": 692,
"stargazers_count": 695,
"watchers_count": 695,
"has_discussions": false,
"forks_count": 117,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 117,
"watchers": 692,
"watchers": 695,
"score": 0,
"subscribers_count": 11
},

View file

@ -43,10 +43,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2024-05-07T00:21:50Z",
"updated_at": "2024-05-18T21:38:08Z",
"pushed_at": "2024-01-29T02:28:11Z",
"stargazers_count": 206,
"watchers_count": 206,
"stargazers_count": 207,
"watchers_count": 207,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 206,
"watchers": 207,
"score": 0,
"subscribers_count": 4
},

View file

@ -193,7 +193,7 @@
"description": "CVE-2023-4911",
"fork": false,
"created_at": "2023-10-11T14:49:22Z",
"updated_at": "2024-03-22T21:03:07Z",
"updated_at": "2024-05-18T18:45:06Z",
"pushed_at": "2023-10-11T15:15:18Z",
"stargazers_count": 9,
"watchers_count": 9,

View file

@ -18,13 +18,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 5,
"score": 0,
"subscribers_count": 0

View file

@ -198,10 +198,10 @@
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
"fork": false,
"created_at": "2024-05-14T14:21:49Z",
"updated_at": "2024-05-18T17:19:30Z",
"updated_at": "2024-05-18T20:39:52Z",
"pushed_at": "2024-05-18T09:40:01Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -230,7 +230,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 50,
"watchers": 52,
"score": 0,
"subscribers_count": 2
},

View file

@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-05-17T00:52:53Z",
"updated_at": "2024-05-18T19:24:05Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3462,
"watchers_count": 3462,
"stargazers_count": 3461,
"watchers_count": 3461,
"has_discussions": false,
"forks_count": 233,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 233,
"watchers": 3462,
"watchers": 3461,
"score": 0,
"subscribers_count": 38
},

View file

@ -70,11 +70,11 @@
"html_url": "https:\/\/github.com\/M507"
},
"html_url": "https:\/\/github.com\/M507\/CVE-2024-32002",
"description": null,
"description": "local poc for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-18T02:42:33Z",
"updated_at": "2024-05-18T16:18:05Z",
"pushed_at": "2024-05-18T16:56:56Z",
"updated_at": "2024-05-18T19:33:05Z",
"pushed_at": "2024-05-18T19:32:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
@ -106,12 +106,12 @@
"description": "CVE-2024-32002 RCE PoC",
"fork": false,
"created_at": "2024-05-18T15:05:28Z",
"updated_at": "2024-05-18T16:42:33Z",
"updated_at": "2024-05-18T21:50:27Z",
"pushed_at": "2024-05-18T15:12:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -121,8 +121,8 @@
"rce"
],
"visibility": "public",
"forks": 3,
"watchers": 6,
"forks": 4,
"watchers": 7,
"score": 0,
"subscribers_count": 0
}

View file

@ -133,10 +133,10 @@
"description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support",
"fork": false,
"created_at": "2024-04-25T19:51:38Z",
"updated_at": "2024-05-18T08:54:24Z",
"updated_at": "2024-05-18T20:50:23Z",
"pushed_at": "2024-05-13T17:29:03Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -160,7 +160,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 1
},

View file

@ -40761,6 +40761,7 @@
- [AlissonFaoli/Shellshock](https://github.com/AlissonFaoli/Shellshock)
- [hackintoanetwork/shellshock](https://github.com/hackintoanetwork/shellshock)
- [ajansha/shellshock](https://github.com/ajansha/shellshock)
- [K3ysTr0K3R/CVE-2014-6271-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2014-6271-EXPLOIT)
### CVE-2014-6287 (2014-10-07)