Auto Update 2024/12/03 12:32:44

This commit is contained in:
motikan2010-bot 2024-12-03 21:32:44 +09:00
parent 96bf8a4f17
commit 88afbbc990
38 changed files with 210 additions and 146 deletions

View file

@ -417,10 +417,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-03T03:23:31Z",
"updated_at": "2024-12-03T10:40:52Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 153,
"watchers": 154,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,8 +14,8 @@
"description": "Fork of the send module to deal with CVE-2017-20165",
"fork": false,
"created_at": "2023-01-11T10:20:27Z",
"updated_at": "2024-12-02T08:46:55Z",
"pushed_at": "2024-12-02T08:46:51Z",
"updated_at": "2024-12-03T08:43:14Z",
"pushed_at": "2024-12-03T08:43:10Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,

View file

@ -76,10 +76,10 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2024-11-15T10:25:31Z",
"updated_at": "2024-12-03T10:08:14Z",
"pushed_at": "2022-12-27T20:25:09Z",
"stargazers_count": 379,
"watchers_count": 379,
"stargazers_count": 380,
"watchers_count": 380,
"has_discussions": false,
"forks_count": 100,
"allow_forking": true,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 100,
"watchers": 379,
"watchers": 380,
"score": 0,
"subscribers_count": 10
},

View file

@ -329,10 +329,10 @@
"description": "A PoC exploit for CVE-2018-14847 - MikroTik WinBox File Read",
"fork": false,
"created_at": "2024-04-22T22:33:25Z",
"updated_at": "2024-05-02T23:52:09Z",
"updated_at": "2024-12-03T08:06:15Z",
"pushed_at": "2024-05-02T23:52:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -356,7 +356,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "CVE-2018-19320 LPE Exploit",
"fork": false,
"created_at": "2021-08-19T16:43:52Z",
"updated_at": "2024-09-29T11:50:56Z",
"updated_at": "2024-12-03T11:38:43Z",
"pushed_at": "2023-06-19T21:47:37Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
"fork": false,
"created_at": "2019-02-22T04:52:08Z",
"updated_at": "2024-09-09T06:55:53Z",
"updated_at": "2024-12-03T10:19:33Z",
"pushed_at": "2019-08-05T10:45:34Z",
"stargazers_count": 487,
"watchers_count": 487,
"stargazers_count": 488,
"watchers_count": 488,
"has_discussions": false,
"forks_count": 177,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 177,
"watchers": 487,
"watchers": 488,
"score": 0,
"subscribers_count": 10
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2019-0230 Exploit POC",
"fork": false,
"created_at": "2020-08-13T15:18:32Z",
"updated_at": "2024-09-09T06:55:58Z",
"updated_at": "2024-12-03T10:19:36Z",
"pushed_at": "2020-08-21T07:35:11Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},

View file

@ -301,10 +301,10 @@
"description": "A fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash \/ Shitrix",
"fork": false,
"created_at": "2020-01-12T15:16:54Z",
"updated_at": "2024-11-16T19:52:59Z",
"updated_at": "2024-12-03T10:19:36Z",
"pushed_at": "2020-01-17T22:01:20Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -319,7 +319,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
"fork": false,
"created_at": "2022-03-08T17:14:27Z",
"updated_at": "2024-09-23T08:20:28Z",
"updated_at": "2024-12-03T08:48:07Z",
"pushed_at": "2022-05-03T10:40:14Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 2
}

View file

@ -981,10 +981,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-03T03:23:31Z",
"updated_at": "2024-12-03T10:40:52Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -1001,7 +1001,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 153,
"watchers": 154,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
"fork": false,
"created_at": "2020-01-17T05:35:01Z",
"updated_at": "2024-09-09T06:55:57Z",
"updated_at": "2024-12-03T10:19:36Z",
"pushed_at": "2022-12-15T07:33:15Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 84,
"watchers": 85,
"score": 0,
"subscribers_count": 2
}

View file

@ -848,12 +848,12 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-03T01:13:31Z",
"updated_at": "2024-12-03T08:43:07Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1340,
"watchers_count": 1340,
"stargazers_count": 1341,
"watchers_count": 1341,
"has_discussions": false,
"forks_count": 165,
"forks_count": 166,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -866,8 +866,8 @@
"vcenter"
],
"visibility": "public",
"forks": 165,
"watchers": 1340,
"forks": 166,
"watchers": 1341,
"score": 0,
"subscribers_count": 15
}

View file

@ -293,10 +293,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-18T08:18:50Z",
"updated_at": "2024-11-27T01:07:41Z",
"updated_at": "2024-12-03T11:47:16Z",
"pushed_at": "2021-12-22T10:32:37Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 190,
"watchers_count": 190,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -305,7 +305,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 189,
"watchers": 190,
"score": 0,
"subscribers_count": 5
},

View file

@ -359,10 +359,10 @@
"description": "Laravel RCE Exploit Script - CVE-2021-3129",
"fork": false,
"created_at": "2022-04-16T17:22:55Z",
"updated_at": "2024-11-22T09:53:32Z",
"updated_at": "2024-12-03T07:44:17Z",
"pushed_at": "2024-09-22T13:10:27Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -386,7 +386,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2021-34371.jar",
"fork": false,
"created_at": "2021-09-06T02:00:52Z",
"updated_at": "2024-11-28T12:56:16Z",
"updated_at": "2024-12-03T07:56:49Z",
"pushed_at": "2021-09-06T02:04:15Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 23,
"watchers": 25,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2024-11-11T11:09:47Z",
"updated_at": "2024-12-03T10:15:53Z",
"pushed_at": "2024-04-02T02:48:18Z",
"stargazers_count": 408,
"watchers_count": 408,
"stargazers_count": 409,
"watchers_count": 409,
"has_discussions": false,
"forks_count": 137,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 137,
"watchers": 408,
"watchers": 409,
"score": 0,
"subscribers_count": 4
},

View file

@ -49,10 +49,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2024-12-02T11:07:32Z",
"updated_at": "2024-12-03T08:43:46Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1970,
"watchers_count": 1970,
"stargazers_count": 1971,
"watchers_count": 1971,
"has_discussions": false,
"forks_count": 512,
"allow_forking": true,
@ -61,7 +61,7 @@
"topics": [],
"visibility": "public",
"forks": 512,
"watchers": 1970,
"watchers": 1971,
"score": 0,
"subscribers_count": 20
},
@ -967,7 +967,7 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-12-03T03:14:04Z",
"updated_at": "2024-12-03T09:53:51Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 1087,
"watchers_count": 1087,

View file

@ -14,10 +14,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2024-11-24T23:34:57Z",
"updated_at": "2024-12-03T06:21:02Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 987,
"watchers_count": 987,
"stargazers_count": 988,
"watchers_count": 988,
"has_discussions": false,
"forks_count": 190,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 987,
"watchers": 988,
"score": 0,
"subscribers_count": 24
},
@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-12-03T00:31:03Z",
"updated_at": "2024-12-03T06:18:45Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 810,
"watchers_count": 810,
"stargazers_count": 811,
"watchers_count": 811,
"has_discussions": false,
"forks_count": 124,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 124,
"watchers": 810,
"watchers": 811,
"score": 0,
"subscribers_count": 13
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2024-12-02T21:25:51Z",
"updated_at": "2024-12-03T06:19:44Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1344,
"watchers_count": 1344,
"stargazers_count": 1345,
"watchers_count": 1345,
"has_discussions": false,
"forks_count": 322,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 322,
"watchers": 1344,
"watchers": 1345,
"score": 0,
"subscribers_count": 27
},

View file

@ -792,12 +792,12 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-03T01:13:31Z",
"updated_at": "2024-12-03T08:43:07Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1340,
"watchers_count": 1340,
"stargazers_count": 1341,
"watchers_count": 1341,
"has_discussions": false,
"forks_count": 165,
"forks_count": 166,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -810,8 +810,8 @@
"vcenter"
],
"visibility": "public",
"forks": 165,
"watchers": 1340,
"forks": 166,
"watchers": 1341,
"score": 0,
"subscribers_count": 15
}

View file

@ -107,10 +107,10 @@
"description": "检测域内常见一把梭漏洞包括NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare",
"fork": false,
"created_at": "2023-10-17T06:29:44Z",
"updated_at": "2024-11-20T09:00:48Z",
"updated_at": "2024-12-03T11:09:01Z",
"pushed_at": "2023-10-23T04:47:11Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 38,
"watchers": 40,
"score": 0,
"subscribers_count": 2
},

View file

@ -367,10 +367,10 @@
"description": "Example of CVE-2022-46689 aka MacDirtyCow.",
"fork": false,
"created_at": "2023-03-01T08:23:49Z",
"updated_at": "2024-11-22T21:35:55Z",
"updated_at": "2024-12-03T09:45:25Z",
"pushed_at": "2023-03-01T08:25:46Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -386,7 +386,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},

View file

@ -1604,5 +1604,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 897859058,
"name": "CVE-2023-38831_Exploit",
"full_name": "VictoriousKnight\/CVE-2023-38831_Exploit",
"owner": {
"login": "VictoriousKnight",
"id": 97209296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97209296?v=4",
"html_url": "https:\/\/github.com\/VictoriousKnight",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/VictoriousKnight\/CVE-2023-38831_Exploit",
"description": null,
"fork": false,
"created_at": "2024-12-03T11:13:37Z",
"updated_at": "2024-12-03T11:17:23Z",
"pushed_at": "2024-12-03T11:17:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-12-02T21:26:25Z",
"updated_at": "2024-12-03T07:17:07Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2293,
"watchers_count": 2293,
"stargazers_count": 2294,
"watchers_count": 2294,
"has_discussions": false,
"forks_count": 299,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 299,
"watchers": 2293,
"watchers": 2294,
"score": 0,
"subscribers_count": 26
},

View file

@ -138,7 +138,7 @@
"description": "A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user",
"fork": false,
"created_at": "2024-08-04T17:40:51Z",
"updated_at": "2024-11-20T16:30:59Z",
"updated_at": "2024-12-03T09:06:04Z",
"pushed_at": "2024-08-15T10:48:05Z",
"stargazers_count": 33,
"watchers_count": 33,

View file

@ -107,10 +107,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-12-02T21:53:52Z",
"updated_at": "2024-12-03T11:11:26Z",
"pushed_at": "2024-09-08T21:23:34Z",
"stargazers_count": 420,
"watchers_count": 420,
"stargazers_count": 421,
"watchers_count": 421,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 420,
"watchers": 421,
"score": 0,
"subscribers_count": 19
},

View file

@ -642,10 +642,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-31T10:46:33Z",
"updated_at": "2024-07-25T15:39:52Z",
"updated_at": "2024-12-03T09:26:32Z",
"pushed_at": "2024-04-07T13:07:44Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -654,7 +654,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 6
},

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-11-18T23:34:34Z",
"updated_at": "2024-12-02T22:52:56Z",
"updated_at": "2024-12-03T08:56:06Z",
"pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": "cve-2024-42327 ZBX-25623",
"fork": false,
"created_at": "2024-12-01T00:15:27Z",
"updated_at": "2024-12-03T03:56:58Z",
"updated_at": "2024-12-03T09:54:21Z",
"pushed_at": "2024-12-01T01:18:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"forks": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-11-29T09:21:58Z",
"updated_at": "2024-12-03T09:56:22Z",
"pushed_at": "2024-06-07T03:28:00Z",
"stargazers_count": 137,
"watchers_count": 137,
"stargazers_count": 138,
"watchers_count": 138,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 137,
"watchers": 138,
"score": 0,
"subscribers_count": 2
},

View file

@ -138,10 +138,10 @@
"description": "Testing POC for use cases",
"fork": false,
"created_at": "2024-11-24T07:33:06Z",
"updated_at": "2024-12-02T17:37:13Z",
"updated_at": "2024-12-03T10:12:28Z",
"pushed_at": "2024-11-24T07:56:49Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,19 +14,19 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-03T05:12:07Z",
"updated_at": "2024-12-03T12:24:40Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 20,
"forks": 5,
"watchers": 27,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "WP REST API FNS <= 1.0.0 - Privilege Escalation",
"fork": false,
"created_at": "2024-11-06T16:25:59Z",
"updated_at": "2024-11-18T17:47:41Z",
"updated_at": "2024-12-03T07:30:32Z",
"pushed_at": "2024-11-06T16:28:46Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "TP-Link Archer AXE75 Authenticated Command Injection",
"fork": false,
"created_at": "2024-10-04T12:49:19Z",
"updated_at": "2024-11-25T19:36:35Z",
"updated_at": "2024-12-03T09:01:03Z",
"pushed_at": "2024-11-23T00:33:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 45,
"score": 0,
"subscribers_count": 5

View file

@ -19,13 +19,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1

View file

@ -60,5 +60,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 897887165,
"name": "cve-2024-9465-poc",
"full_name": "XiaomingX\/cve-2024-9465-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-9465-poc",
"description": "Proof of Concept Exploit for CVE-2024-9465",
"fork": false,
"created_at": "2024-12-03T12:16:44Z",
"updated_at": "2024-12-03T12:29:57Z",
"pushed_at": "2024-12-03T12:21:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1876,6 +1876,7 @@
- [horizon3ai/CVE-2024-9465](https://github.com/horizon3ai/CVE-2024-9465)
- [mustafaakalin/CVE-2024-9465](https://github.com/mustafaakalin/CVE-2024-9465)
- [XiaomingX/cve-2024-9465-poc](https://github.com/XiaomingX/cve-2024-9465-poc)
### CVE-2024-9466 (2024-10-09)
@ -12882,6 +12883,7 @@
- [technicalcorp0/CVE-2023-38831-Exploit](https://github.com/technicalcorp0/CVE-2023-38831-Exploit)
- [idkwastaken/CVE-2023-38831](https://github.com/idkwastaken/CVE-2023-38831)
- [RonF98/CVE-2023-38831-POC](https://github.com/RonF98/CVE-2023-38831-POC)
- [VictoriousKnight/CVE-2023-38831_Exploit](https://github.com/VictoriousKnight/CVE-2023-38831_Exploit)
### CVE-2023-38836 (2023-08-21)