Auto Update 2024/08/05 06:29:19

This commit is contained in:
motikan2010-bot 2024-08-05 15:29:19 +09:00
parent 4ae689db99
commit 86a2ca259e
38 changed files with 206 additions and 334 deletions

View file

@ -263,10 +263,10 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2024-07-24T02:21:49Z",
"updated_at": "2024-08-05T04:13:50Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 311,
"watchers_count": 311,
"stargazers_count": 312,
"watchers_count": 312,
"has_discussions": false,
"forks_count": 120,
"allow_forking": true,
@ -279,7 +279,7 @@
],
"visibility": "public",
"forks": 120,
"watchers": 311,
"watchers": 312,
"score": 0,
"subscribers_count": 16
},

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-03T05:09:05Z",
"updated_at": "2024-08-05T04:20:27Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4074,
"watchers_count": 4074,
"stargazers_count": 4075,
"watchers_count": 4075,
"has_discussions": false,
"forks_count": 1087,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1087,
"watchers": 4074,
"watchers": 4075,
"score": 0,
"subscribers_count": 151
},

View file

@ -818,10 +818,10 @@
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T15:20:25Z",
"updated_at": "2023-07-25T14:32:15Z",
"updated_at": "2024-08-05T03:06:48Z",
"pushed_at": "2020-03-25T05:07:43Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -830,7 +830,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 91,
"watchers": 92,
"score": 0,
"subscribers_count": 14
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-03T05:09:05Z",
"updated_at": "2024-08-05T04:20:27Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4074,
"watchers_count": 4074,
"stargazers_count": 4075,
"watchers_count": 4075,
"has_discussions": false,
"forks_count": 1087,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1087,
"watchers": 4074,
"watchers": 4075,
"score": 0,
"subscribers_count": 151
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"forks": 16,
"watchers": 35,
"score": 0,
"subscribers_count": 1

32
2020/CVE-2020-29661.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 838190475,
"name": "arm-CVE-2020-29661",
"full_name": "wojkos9\/arm-CVE-2020-29661",
"owner": {
"login": "wojkos9",
"id": 38809282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38809282?v=4",
"html_url": "https:\/\/github.com\/wojkos9"
},
"html_url": "https:\/\/github.com\/wojkos9\/arm-CVE-2020-29661",
"description": null,
"fork": false,
"created_at": "2024-08-05T06:15:26Z",
"updated_at": "2024-08-05T06:18:53Z",
"pushed_at": "2024-08-05T06:18:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-24917 ",
"fork": false,
"created_at": "2024-01-20T06:36:13Z",
"updated_at": "2024-06-02T20:57:45Z",
"updated_at": "2024-08-05T00:43:07Z",
"pushed_at": "2024-01-20T06:37:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -133,10 +133,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2024-07-29T10:57:10Z",
"updated_at": "2024-08-05T05:51:11Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 133,
"watchers_count": 133,
"stargazers_count": 134,
"watchers_count": 134,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -148,7 +148,7 @@
],
"visibility": "public",
"forks": 25,
"watchers": 133,
"watchers": 134,
"score": 0,
"subscribers_count": 2
},

View file

@ -2076,10 +2076,10 @@
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-12T01:24:51Z",
"updated_at": "2024-08-03T01:09:33Z",
"updated_at": "2024-08-05T02:48:58Z",
"pushed_at": "2022-10-24T02:25:53Z",
"stargazers_count": 496,
"watchers_count": 496,
"stargazers_count": 495,
"watchers_count": 495,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -2088,7 +2088,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 496,
"watchers": 495,
"score": 0,
"subscribers_count": 25
},
@ -3068,7 +3068,7 @@
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 21,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -3078,7 +3078,7 @@
"spring-boot-log4j"
],
"visibility": "public",
"forks": 21,
"forks": 20,
"watchers": 24,
"score": 0,
"subscribers_count": 2
@ -3606,10 +3606,10 @@
"description": "OpenIOC rules to facilitate hunting for indicators of compromise",
"fork": false,
"created_at": "2021-12-13T03:55:32Z",
"updated_at": "2022-07-22T10:52:24Z",
"updated_at": "2024-08-05T03:09:51Z",
"pushed_at": "2022-01-07T14:25:33Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -3618,7 +3618,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 8
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2022-0492 EXP and Analysis write up",
"fork": false,
"created_at": "2022-03-11T08:02:46Z",
"updated_at": "2024-05-23T02:59:35Z",
"updated_at": "2024-08-05T06:20:36Z",
"pushed_at": "2022-03-11T09:33:24Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "cve-2022-23131 exp",
"fork": false,
"created_at": "2022-02-18T08:38:53Z",
"updated_at": "2024-05-31T12:26:12Z",
"updated_at": "2024-08-05T02:01:50Z",
"pushed_at": "2022-02-21T04:27:48Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 3
},

View file

@ -135,10 +135,10 @@
"description": "This repository contains a PoC for remote code execution CVE-2022-26809",
"fork": false,
"created_at": "2022-04-20T20:54:26Z",
"updated_at": "2023-12-12T15:50:11Z",
"updated_at": "2024-08-05T04:35:37Z",
"pushed_at": "2022-04-25T20:38:57Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -147,7 +147,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "Zimbra <9.0.0.p27 RCE",
"fork": false,
"created_at": "2022-11-11T20:58:08Z",
"updated_at": "2024-07-08T09:31:38Z",
"updated_at": "2024-08-05T01:23:08Z",
"pushed_at": "2022-11-24T14:59:35Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -62,7 +62,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 102,
"watchers": 103,
"score": 0,
"subscribers_count": 2
},

View file

@ -586,10 +586,10 @@
"description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理",
"fork": false,
"created_at": "2024-02-26T02:34:44Z",
"updated_at": "2024-06-07T14:56:33Z",
"updated_at": "2024-08-05T01:10:21Z",
"pushed_at": "2024-04-24T02:34:16Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -598,7 +598,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 1
},

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -172,10 +172,10 @@
"description": "RCE exploit for CVE-2023-3519",
"fork": false,
"created_at": "2023-07-21T20:17:43Z",
"updated_at": "2024-08-04T18:39:53Z",
"updated_at": "2024-08-05T03:42:33Z",
"pushed_at": "2023-08-23T16:27:28Z",
"stargazers_count": 215,
"watchers_count": 215,
"stargazers_count": 216,
"watchers_count": 216,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -184,7 +184,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 215,
"watchers": 216,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
"fork": false,
"created_at": "2024-01-29T17:08:05Z",
"updated_at": "2024-04-27T08:41:16Z",
"updated_at": "2024-08-05T05:38:22Z",
"pushed_at": "2024-01-30T05:58:08Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 41,
"watchers": 42,
"score": 0,
"subscribers_count": 2
}

View file

@ -174,10 +174,10 @@
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
"fork": false,
"created_at": "2023-08-28T04:56:10Z",
"updated_at": "2024-08-04T01:00:38Z",
"updated_at": "2024-08-05T01:55:07Z",
"pushed_at": "2024-08-04T01:00:35Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -186,7 +186,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 61,
"watchers": 62,
"score": 0,
"subscribers_count": 0
},

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-08-04T05:26:07Z",
"updated_at": "2024-08-05T06:03:05Z",
"pushed_at": "2024-07-24T13:17:05Z",
"stargazers_count": 1038,
"watchers_count": 1038,
"stargazers_count": 1039,
"watchers_count": 1039,
"has_discussions": false,
"forks_count": 176,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 176,
"watchers": 1038,
"watchers": 1039,
"score": 0,
"subscribers_count": 17
},

View file

@ -163,10 +163,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-10T22:04:23Z",
"updated_at": "2024-07-22T08:16:36Z",
"updated_at": "2024-08-05T02:49:57Z",
"pushed_at": "2023-10-15T19:37:06Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 2
},

View file

@ -1,34 +1,4 @@
[
{
"id": 742312591,
"name": "CVE-2023-7028",
"full_name": "V1lu0\/CVE-2023-7028",
"owner": {
"login": "V1lu0",
"id": 33352530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33352530?v=4",
"html_url": "https:\/\/github.com\/V1lu0"
},
"html_url": "https:\/\/github.com\/V1lu0\/CVE-2023-7028",
"description": "CVE-2023-7028 poc",
"fork": false,
"created_at": "2024-01-12T07:42:02Z",
"updated_at": "2024-05-29T08:10:49Z",
"pushed_at": "2024-05-03T06:05:46Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},
{
"id": 742381856,
"name": "CVE-2023-7028",
@ -62,6 +32,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 742443954,
"name": "CVE-2023-7028",
"full_name": "googlei1996\/CVE-2023-7028",
"owner": {
"login": "googlei1996",
"id": 101400530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101400530?v=4",
"html_url": "https:\/\/github.com\/googlei1996"
},
"html_url": "https:\/\/github.com\/googlei1996\/CVE-2023-7028",
"description": "CVE-2023-7028 poc",
"fork": false,
"created_at": "2024-01-12T13:47:37Z",
"updated_at": "2024-01-12T13:47:37Z",
"pushed_at": "2024-01-12T08:58:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 742480461,
"name": "CVE-2023-7028",

View file

@ -13,10 +13,10 @@
"description": "a demo poc for CVE-2024-0015",
"fork": false,
"created_at": "2024-03-19T10:00:21Z",
"updated_at": "2024-06-25T06:22:28Z",
"updated_at": "2024-08-05T05:51:58Z",
"pushed_at": "2024-03-19T10:05:07Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-08-04T12:32:27Z",
"updated_at": "2024-08-05T03:07:12Z",
"pushed_at": "2024-07-25T18:12:57Z",
"stargazers_count": 175,
"watchers_count": 175,
"stargazers_count": 177,
"watchers_count": 177,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 175,
"watchers": 177,
"score": 0,
"subscribers_count": 5
},
@ -207,6 +207,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-21006 exp",
"fork": false,
"created_at": "2024-07-02T06:25:14Z",
"updated_at": "2024-08-04T03:28:26Z",
"updated_at": "2024-08-05T05:25:08Z",
"pushed_at": "2024-07-29T19:39:15Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 3
},

View file

@ -163,12 +163,12 @@
"description": "Windows AppLocker Driver (appid.sys) LPE",
"fork": false,
"created_at": "2024-07-29T13:18:06Z",
"updated_at": "2024-08-04T02:34:37Z",
"updated_at": "2024-08-05T02:58:42Z",
"pushed_at": "2024-07-29T13:29:59Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -179,8 +179,8 @@
"windowd"
],
"visibility": "public",
"forks": 6,
"watchers": 16,
"forks": 7,
"watchers": 17,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
"fork": false,
"created_at": "2024-03-13T09:17:28Z",
"updated_at": "2024-07-29T03:59:00Z",
"updated_at": "2024-08-05T06:04:28Z",
"pushed_at": "2024-03-16T00:35:12Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 108,
"watchers": 109,
"score": 0,
"subscribers_count": 5
},

View file

@ -875,35 +875,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 833465280,
"name": "CVE-2024-23897",
"full_name": "AnastasiaStill\/CVE-2024-23897",
"owner": {
"login": "AnastasiaStill",
"id": 176557424,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176557424?v=4",
"html_url": "https:\/\/github.com\/AnastasiaStill"
},
"html_url": "https:\/\/github.com\/AnastasiaStill\/CVE-2024-23897",
"description": null,
"fork": false,
"created_at": "2024-07-25T05:42:11Z",
"updated_at": "2024-07-25T05:52:15Z",
"pushed_at": "2024-07-25T05:52:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-08-05T00:05:18Z",
"updated_at": "2024-08-05T01:39:17Z",
"pushed_at": "2024-07-04T10:39:15Z",
"stargazers_count": 287,
"watchers_count": 287,
"stargazers_count": 288,
"watchers_count": 288,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 287,
"watchers": 288,
"score": 0,
"subscribers_count": 4
},
@ -133,20 +133,20 @@
"description": "A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a privileged user",
"fork": false,
"created_at": "2024-08-04T17:40:51Z",
"updated_at": "2024-08-04T21:04:58Z",
"updated_at": "2024-08-05T06:25:02Z",
"pushed_at": "2024-08-04T21:04:55Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-27804",
"fork": false,
"created_at": "2024-05-14T14:17:06Z",
"updated_at": "2024-07-14T06:02:41Z",
"updated_at": "2024-08-05T00:45:36Z",
"pushed_at": "2024-05-14T14:55:23Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 125,
"watchers": 126,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
"fork": false,
"created_at": "2024-03-11T10:14:39Z",
"updated_at": "2024-07-27T13:29:46Z",
"updated_at": "2024-08-05T01:18:59Z",
"pushed_at": "2024-03-25T12:56:16Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 77,
"watchers": 78,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-08-04T00:57:16Z",
"updated_at": "2024-08-05T03:41:15Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 481,
"watchers_count": 481,
"stargazers_count": 483,
"watchers_count": 483,
"has_discussions": false,
"forks_count": 141,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 141,
"watchers": 481,
"watchers": 483,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-3495 Country State City Dropdown CF7 <= 2.7.2 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2024-05-23T02:41:15Z",
"updated_at": "2024-06-26T12:03:33Z",
"updated_at": "2024-08-05T05:08:13Z",
"pushed_at": "2024-05-24T15:27:43Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -1,62 +0,0 @@
[
{
"id": 837993502,
"name": "CVE-2024-4514",
"full_name": "W1hithat\/CVE-2024-4514",
"owner": {
"login": "W1hithat",
"id": 175875975,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175875975?v=4",
"html_url": "https:\/\/github.com\/W1hithat"
},
"html_url": "https:\/\/github.com\/W1hithat\/CVE-2024-4514",
"description": "WordPress Core <= 6.6.1 - Authenticated Arbitrary File Upload (CVE-2024-4514) - Remote Code Execution",
"fork": false,
"created_at": "2024-08-04T16:29:04Z",
"updated_at": "2024-08-04T16:29:05Z",
"pushed_at": "2024-08-04T16:29:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 837999388,
"name": "-CVE-2024-4514-",
"full_name": "AnastasiaStill\/-CVE-2024-4514-",
"owner": {
"login": "AnastasiaStill",
"id": 176557424,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176557424?v=4",
"html_url": "https:\/\/github.com\/AnastasiaStill"
},
"html_url": "https:\/\/github.com\/AnastasiaStill\/-CVE-2024-4514-",
"description": null,
"fork": false,
"created_at": "2024-08-04T16:48:33Z",
"updated_at": "2024-08-04T16:49:00Z",
"pushed_at": "2024-08-04T16:48:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -754,10 +754,10 @@
"description": "CVE-2024-4577",
"fork": false,
"created_at": "2024-06-12T04:50:25Z",
"updated_at": "2024-06-13T19:21:47Z",
"updated_at": "2024-08-05T02:28:28Z",
"pushed_at": "2024-06-12T10:30:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -766,7 +766,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "a signal handler race condition in OpenSSH's server (sshd)",
"fork": false,
"created_at": "2024-07-01T10:55:29Z",
"updated_at": "2024-08-04T19:08:31Z",
"updated_at": "2024-08-05T04:01:03Z",
"pushed_at": "2024-07-01T10:54:02Z",
"stargazers_count": 443,
"watchers_count": 443,
"stargazers_count": 444,
"watchers_count": 444,
"has_discussions": false,
"forks_count": 181,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 181,
"watchers": 443,
"watchers": 444,
"score": 0,
"subscribers_count": 5
},
@ -2639,36 +2639,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 830187084,
"name": "CVE-2024-6387",
"full_name": "W1hithat\/CVE-2024-6387",
"owner": {
"login": "W1hithat",
"id": 175875975,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175875975?v=4",
"html_url": "https:\/\/github.com\/W1hithat"
},
"html_url": "https:\/\/github.com\/W1hithat\/CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-07-17T19:14:11Z",
"updated_at": "2024-07-29T20:18:53Z",
"pushed_at": "2024-07-17T19:14:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 833415966,
"name": "CVE-2024-6387",

View file

@ -1,32 +0,0 @@
[
{
"id": 835079866,
"name": "CVE-2024-81757-Apache-web-server-2.4.61",
"full_name": "AnastasiaStill\/CVE-2024-81757-Apache-web-server-2.4.61",
"owner": {
"login": "AnastasiaStill",
"id": 176557424,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176557424?v=4",
"html_url": "https:\/\/github.com\/AnastasiaStill"
},
"html_url": "https:\/\/github.com\/AnastasiaStill\/CVE-2024-81757-Apache-web-server-2.4.61",
"description": null,
"fork": false,
"created_at": "2024-07-29T05:54:39Z",
"updated_at": "2024-07-31T07:03:50Z",
"pushed_at": "2024-07-29T06:05:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -747,14 +747,6 @@
- [Abo5/CVE-2024-4484](https://github.com/Abo5/CVE-2024-4484)
### CVE-2024-4514 (2024-05-06)
<code>Es wurde eine Schwachstelle in Campcodes Complete Web-Based School Management System 1.0 gefunden. Sie wurde als problematisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei /view/timetable_insert_form.php. Durch das Beeinflussen des Arguments grade mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
</code>
- [W1hithat/CVE-2024-4514](https://github.com/W1hithat/CVE-2024-4514)
- [AnastasiaStill/-CVE-2024-4514-](https://github.com/AnastasiaStill/-CVE-2024-4514-)
### CVE-2024-4577 (2024-06-09)
<code>In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use &quot;Best-Fit&quot; behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
@ -1095,7 +1087,6 @@
- [k4t3pr0/CVE-2024-6387-Check](https://github.com/k4t3pr0/CVE-2024-6387-Check)
- [Jhonsonwannaa/CVE-2024-6387](https://github.com/Jhonsonwannaa/CVE-2024-6387)
- [ThatNotEasy/CVE-2024-6387](https://github.com/ThatNotEasy/CVE-2024-6387)
- [W1hithat/CVE-2024-6387](https://github.com/W1hithat/CVE-2024-6387)
- [prelearn-code/CVE-2024-6387](https://github.com/prelearn-code/CVE-2024-6387)
- [l-urk/CVE-2024-6387-L](https://github.com/l-urk/CVE-2024-6387-L)
- [alex14324/ssh_poc2024](https://github.com/alex14324/ssh_poc2024)
@ -1828,7 +1819,6 @@
- [mil4ne/CVE-2024-23897-Jenkins-4.441](https://github.com/mil4ne/CVE-2024-23897-Jenkins-4.441)
- [Maalfer/CVE-2024-23897](https://github.com/Maalfer/CVE-2024-23897)
- [Surko888/Surko-Exploit-Jenkins-CVE-2024-23897](https://github.com/Surko888/Surko-Exploit-Jenkins-CVE-2024-23897)
- [AnastasiaStill/CVE-2024-23897](https://github.com/AnastasiaStill/CVE-2024-23897)
### CVE-2024-24034 (2024-02-08)
@ -3945,9 +3935,6 @@
### CVE-2024-65230
- [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230)
### CVE-2024-81757
- [AnastasiaStill/CVE-2024-81757-Apache-web-server-2.4.61](https://github.com/AnastasiaStill/CVE-2024-81757-Apache-web-server-2.4.61)
### CVE-2024-206565
- [sanderswannalive/sumkaluissessss](https://github.com/sanderswannalive/sumkaluissessss)
@ -5366,8 +5353,8 @@
<code>An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
</code>
- [V1lu0/CVE-2023-7028](https://github.com/V1lu0/CVE-2023-7028)
- [RandomRobbieBF/CVE-2023-7028](https://github.com/RandomRobbieBF/CVE-2023-7028)
- [googlei1996/CVE-2023-7028](https://github.com/googlei1996/CVE-2023-7028)
- [duy-31/CVE-2023-7028](https://github.com/duy-31/CVE-2023-7028)
- [Vozec/CVE-2023-7028](https://github.com/Vozec/CVE-2023-7028)
- [yoryio/CVE-2023-7028](https://github.com/yoryio/CVE-2023-7028)
@ -30441,6 +30428,13 @@
- [0xAbbarhSF/CVE-2020-29607](https://github.com/0xAbbarhSF/CVE-2020-29607)
- [0xN7y/CVE-2020-29607](https://github.com/0xN7y/CVE-2020-29607)
### CVE-2020-29661 (2020-12-09)
<code>A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
</code>
- [wojkos9/arm-CVE-2020-29661](https://github.com/wojkos9/arm-CVE-2020-29661)
### CVE-2020-29666 (2020-12-10)
<code>In Lan ATMService M3 ATM Monitoring System 6.1.0, due to a directory-listing vulnerability, a remote attacker can view log files, located in /websocket/logs/, that contain a user's cookie values and the predefined developer's cookie value.