Auto Update 2024/11/11 12:32:25

This commit is contained in:
motikan2010-bot 2024-11-11 21:32:25 +09:00
parent 5c180066ec
commit 8a8dac8271
47 changed files with 279 additions and 223 deletions

View file

@ -467,7 +467,7 @@
"stargazers_count": 859,
"watchers_count": 859,
"has_discussions": false,
"forks_count": 428,
"forks_count": 429,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -477,7 +477,7 @@
"exploit"
],
"visibility": "public",
"forks": 428,
"forks": 429,
"watchers": 859,
"score": 0,
"subscribers_count": 9

View file

@ -174,13 +174,13 @@
"stargazers_count": 136,
"watchers_count": 136,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 136,
"score": 0,
"subscribers_count": 4

View file

@ -417,10 +417,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-11-11T04:03:01Z",
"updated_at": "2024-11-11T06:58:45Z",
"pushed_at": "2024-09-09T07:42:24Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 106,
"watchers": 107,
"score": 0,
"subscribers_count": 2
}

View file

@ -45,10 +45,10 @@
"description": "CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesigning bypass.",
"fork": false,
"created_at": "2018-02-23T00:19:05Z",
"updated_at": "2024-09-21T09:54:12Z",
"updated_at": "2024-11-11T09:58:32Z",
"pushed_at": "2018-11-13T00:26:18Z",
"stargazers_count": 246,
"watchers_count": 246,
"stargazers_count": 247,
"watchers_count": 247,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 246,
"watchers": 247,
"score": 0,
"subscribers_count": 15
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 92,
"forks_count": 91,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 92,
"forks": 91,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -112,13 +112,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 15,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"forks": 14,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -107,10 +107,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2024-11-06T09:55:22Z",
"updated_at": "2024-11-11T10:11:04Z",
"pushed_at": "2024-06-16T15:35:20Z",
"stargazers_count": 949,
"watchers_count": 949,
"stargazers_count": 950,
"watchers_count": 950,
"has_discussions": false,
"forks_count": 178,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 178,
"watchers": 949,
"watchers": 950,
"score": 0,
"subscribers_count": 18
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 10,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 9,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -14,10 +14,10 @@
"description": "writeup of CVE-2020-1362",
"fork": false,
"created_at": "2020-07-17T07:35:05Z",
"updated_at": "2024-10-28T08:27:17Z",
"updated_at": "2024-11-11T06:23:25Z",
"pushed_at": "2020-07-17T07:54:26Z",
"stargazers_count": 232,
"watchers_count": 232,
"stargazers_count": 233,
"watchers_count": 233,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 232,
"watchers": 233,
"score": 0,
"subscribers_count": 12
}

View file

@ -981,10 +981,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-11-11T04:03:01Z",
"updated_at": "2024-11-11T06:58:45Z",
"pushed_at": "2024-09-09T07:42:24Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -1001,7 +1001,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 106,
"watchers": 107,
"score": 0,
"subscribers_count": 2
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 24,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 24,
"forks": 23,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -492,10 +492,10 @@
"description": "Remake of CVE-2020-9484 by Pentestical",
"fork": false,
"created_at": "2024-09-16T18:17:52Z",
"updated_at": "2024-11-07T10:58:16Z",
"updated_at": "2024-11-11T10:23:17Z",
"pushed_at": "2024-09-16T18:22:36Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -504,7 +504,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2024-10-31T11:34:39Z",
"updated_at": "2024-11-11T11:09:47Z",
"pushed_at": "2024-04-02T02:48:18Z",
"stargazers_count": 407,
"watchers_count": 407,
"stargazers_count": 408,
"watchers_count": 408,
"has_discussions": false,
"forks_count": 138,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 138,
"watchers": 407,
"watchers": 408,
"score": 0,
"subscribers_count": 4
},

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-11-10T02:48:52Z",
"updated_at": "2024-11-11T09:29:20Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 801,
"watchers_count": 801,
"stargazers_count": 802,
"watchers_count": 802,
"has_discussions": false,
"forks_count": 123,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 123,
"watchers": 801,
"watchers": 802,
"score": 0,
"subscribers_count": 13
},

View file

@ -174,13 +174,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 22,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"forks": 21,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -107,10 +107,10 @@
"description": "CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!",
"fork": false,
"created_at": "2024-11-07T13:06:44Z",
"updated_at": "2024-11-11T06:08:52Z",
"updated_at": "2024-11-11T08:46:52Z",
"pushed_at": "2024-11-07T13:38:18Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 52,
"watchers": 55,
"score": 0,
"subscribers_count": 3
}

View file

@ -14,7 +14,7 @@
"description": null,
"fork": false,
"created_at": "2023-10-27T08:58:11Z",
"updated_at": "2024-10-07T10:56:52Z",
"updated_at": "2024-11-11T07:56:41Z",
"pushed_at": "2023-10-27T09:00:33Z",
"stargazers_count": 9,
"watchers_count": 9,

View file

@ -76,10 +76,10 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2023-03-10T19:08:28Z",
"updated_at": "2024-11-04T19:00:09Z",
"updated_at": "2024-11-11T10:12:54Z",
"pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 175,
"watchers_count": 175,
"stargazers_count": 176,
"watchers_count": 176,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -96,7 +96,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 175,
"watchers": 176,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-02-21T16:08:56Z",
"updated_at": "2024-11-01T00:37:50Z",
"updated_at": "2024-11-11T08:47:34Z",
"pushed_at": "2023-02-26T06:43:18Z",
"stargazers_count": 224,
"watchers_count": 224,
"stargazers_count": 225,
"watchers_count": 225,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 224,
"watchers": 225,
"score": 0,
"subscribers_count": 3
},

View file

@ -351,13 +351,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 2

View file

@ -514,10 +514,10 @@
"description": "This is a script written in Python that allows the exploitation of the Metabase's software security flaw described in CVE-2023-38646.",
"fork": false,
"created_at": "2023-10-09T00:26:38Z",
"updated_at": "2024-11-07T18:03:31Z",
"updated_at": "2024-11-11T11:31:19Z",
"pushed_at": "2024-07-07T17:44:16Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -532,7 +532,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},

View file

@ -609,10 +609,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-10T18:13:18Z",
"updated_at": "2024-11-10T18:23:30Z",
"updated_at": "2024-11-11T12:18:47Z",
"pushed_at": "2024-11-10T18:23:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -621,7 +621,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

33
2023/CVE-2023-44488.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 886624608,
"name": "CVE-2023-44488-_libvpx_1.8.0",
"full_name": "uthrasri\/CVE-2023-44488-_libvpx_1.8.0",
"owner": {
"login": "uthrasri",
"id": 145666390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
"html_url": "https:\/\/github.com\/uthrasri",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/uthrasri\/CVE-2023-44488-_libvpx_1.8.0",
"description": null,
"fork": false,
"created_at": "2024-11-11T10:07:11Z",
"updated_at": "2024-11-11T10:22:59Z",
"pushed_at": "2024-11-11T10:19:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-49438 - Open Redirect Vulnerability in Flask-Security-Too",
"fork": false,
"created_at": "2023-12-14T23:58:42Z",
"updated_at": "2024-01-09T20:23:44Z",
"updated_at": "2024-11-11T07:19:29Z",
"pushed_at": "2023-12-30T02:02:19Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-11-08T11:07:59Z",
"updated_at": "2024-11-11T10:29:27Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2276,
"watchers_count": 2276,
"stargazers_count": 2278,
"watchers_count": 2278,
"has_discussions": false,
"forks_count": 297,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 297,
"watchers": 2276,
"watchers": 2278,
"score": 0,
"subscribers_count": 23
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
@ -45,10 +45,10 @@
"description": "POC - CVE-202410914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
"fork": false,
"created_at": "2024-11-10T12:01:21Z",
"updated_at": "2024-11-11T03:31:40Z",
"updated_at": "2024-11-11T06:50:29Z",
"pushed_at": "2024-11-10T12:13:16Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -65,7 +65,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-10T15:43:14Z",
"updated_at": "2024-11-10T16:42:01Z",
"updated_at": "2024-11-11T11:53:02Z",
"pushed_at": "2024-11-10T16:41:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-11-03T17:42:55Z",
"updated_at": "2024-11-11T07:17:27Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 282,
"watchers_count": 282,
"stargazers_count": 283,
"watchers_count": 283,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 282,
"watchers": 283,
"score": 0,
"subscribers_count": 3
},

View file

@ -45,10 +45,10 @@
"description": "Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)",
"fork": false,
"created_at": "2024-06-13T06:00:24Z",
"updated_at": "2024-10-09T00:08:16Z",
"updated_at": "2024-11-11T12:02:29Z",
"pushed_at": "2024-06-13T07:00:23Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-10-28T18:16:25Z",
"updated_at": "2024-11-11T09:11:20Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 193,
"watchers_count": 193,
"stargazers_count": 192,
"watchers_count": 192,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 193,
"watchers": 192,
"score": 0,
"subscribers_count": 2
},

View file

@ -76,10 +76,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-11-10T01:19:06Z",
"updated_at": "2024-11-11T11:51:32Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 415,
"watchers_count": 415,
"stargazers_count": 416,
"watchers_count": 416,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 415,
"watchers": 416,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-24T10:37:26Z",
"updated_at": "2024-11-08T15:42:35Z",
"updated_at": "2024-11-11T07:58:51Z",
"pushed_at": "2024-07-31T19:11:55Z",
"stargazers_count": 227,
"watchers_count": 227,
"stargazers_count": 228,
"watchers_count": 228,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 227,
"watchers": 228,
"score": 0,
"subscribers_count": 3
},

View file

@ -265,10 +265,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-11-10T12:30:06Z",
"updated_at": "2024-11-11T09:03:33Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 617,
"watchers_count": 617,
"stargazers_count": 618,
"watchers_count": 618,
"has_discussions": false,
"forks_count": 113,
"allow_forking": true,
@ -277,7 +277,7 @@
"topics": [],
"visibility": "public",
"forks": 113,
"watchers": 617,
"watchers": 618,
"score": 0,
"subscribers_count": 4
},

View file

@ -1,33 +0,0 @@
[
{
"id": 877973422,
"name": "PoC-CVE-2024-38178",
"full_name": "uixss\/PoC-CVE-2024-38178",
"owner": {
"login": "uixss",
"id": 182799343,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/182799343?v=4",
"html_url": "https:\/\/github.com\/uixss",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/uixss\/PoC-CVE-2024-38178",
"description": "A comprehensive analysis of the executing the malicious code without any user interaction",
"fork": false,
"created_at": "2024-10-24T14:59:32Z",
"updated_at": "2024-10-24T15:48:16Z",
"pushed_at": "2024-10-24T15:48:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Pyload RCE with js2py sandbox escape ",
"fork": false,
"created_at": "2024-10-26T01:01:35Z",
"updated_at": "2024-11-10T23:28:56Z",
"updated_at": "2024-11-11T08:32:25Z",
"pushed_at": "2024-10-26T01:11:57Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 12,
"watchers": 14,
"score": 0,
"subscribers_count": 1
}

View file

@ -29,5 +29,36 @@
"watchers": 64,
"score": 0,
"subscribers_count": 1
},
{
"id": 886594059,
"name": "CVE-2024-40725-CVE-2024-40898",
"full_name": "whiterose7777\/CVE-2024-40725-CVE-2024-40898",
"owner": {
"login": "whiterose7777",
"id": 174041119,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174041119?v=4",
"html_url": "https:\/\/github.com\/whiterose7777",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/whiterose7777\/CVE-2024-40725-CVE-2024-40898",
"description": null,
"fork": false,
"created_at": "2024-11-11T09:00:22Z",
"updated_at": "2024-11-11T09:01:05Z",
"pushed_at": "2024-11-11T09:01:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-25T15:25:57Z",
"updated_at": "2024-11-08T09:33:29Z",
"updated_at": "2024-11-11T07:13:09Z",
"pushed_at": "2024-10-26T11:50:10Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-44258",
"fork": false,
"created_at": "2024-10-29T09:45:03Z",
"updated_at": "2024-11-09T22:00:27Z",
"updated_at": "2024-11-11T10:11:58Z",
"pushed_at": "2024-11-02T19:20:44Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 43,
"watchers": 45,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
"fork": false,
"created_at": "2024-10-05T00:15:18Z",
"updated_at": "2024-11-10T10:41:55Z",
"updated_at": "2024-11-11T09:42:12Z",
"pushed_at": "2024-11-05T10:10:40Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -57,8 +57,39 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 111,
"watchers": 112,
"score": 0,
"subscribers_count": 3
},
{
"id": 886592882,
"name": "CVE-2024-45519",
"full_name": "whiterose7777\/CVE-2024-45519",
"owner": {
"login": "whiterose7777",
"id": 174041119,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174041119?v=4",
"html_url": "https:\/\/github.com\/whiterose7777",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/whiterose7777\/CVE-2024-45519",
"description": null,
"fork": false,
"created_at": "2024-11-11T08:57:44Z",
"updated_at": "2024-11-11T08:58:22Z",
"pushed_at": "2024-11-11T08:58:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -169,10 +169,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-11-08T12:21:45Z",
"updated_at": "2024-11-11T10:00:23Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 226,
"watchers_count": 226,
"stargazers_count": 227,
"watchers_count": 227,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 226,
"watchers": 227,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-01T03:07:04Z",
"updated_at": "2024-10-01T17:59:08Z",
"updated_at": "2024-11-11T08:25:02Z",
"pushed_at": "2024-10-01T17:59:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -1,33 +0,0 @@
[
{
"id": 877975885,
"name": "PoC-CVE-2024-4947",
"full_name": "uixss\/PoC-CVE-2024-4947",
"owner": {
"login": "uixss",
"id": 182799343,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/182799343?v=4",
"html_url": "https:\/\/github.com\/uixss",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/uixss\/PoC-CVE-2024-4947",
"description": "A comprehensive analysis of the Chrome Remote Code Execution ",
"fork": false,
"created_at": "2024-10-24T15:03:47Z",
"updated_at": "2024-10-24T15:49:20Z",
"pushed_at": "2024-10-24T15:49:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -29,5 +29,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 886590910,
"name": "CVE-2024-8275",
"full_name": "whiterose7777\/CVE-2024-8275",
"owner": {
"login": "whiterose7777",
"id": 174041119,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174041119?v=4",
"html_url": "https:\/\/github.com\/whiterose7777",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/whiterose7777\/CVE-2024-8275",
"description": null,
"fork": false,
"created_at": "2024-11-11T08:53:27Z",
"updated_at": "2024-11-11T08:56:13Z",
"pushed_at": "2024-11-11T08:56:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Exploit for Grafana arbitrary file-read (CVE-2024-9264)",
"fork": false,
"created_at": "2024-10-19T13:50:52Z",
"updated_at": "2024-11-07T08:37:35Z",
"updated_at": "2024-11-11T08:53:21Z",
"pushed_at": "2024-10-19T16:01:12Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 80,
"watchers": 81,
"score": 0,
"subscribers_count": 1
},

View file

@ -1063,13 +1063,6 @@
- [truonghuuphuc/CVE-2024-4898-Poc](https://github.com/truonghuuphuc/CVE-2024-4898-Poc)
- [cve-2024/CVE-2024-4898-Poc](https://github.com/cve-2024/CVE-2024-4898-Poc)
### CVE-2024-4947 (2024-05-15)
<code>Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
</code>
- [uixss/PoC-CVE-2024-4947](https://github.com/uixss/PoC-CVE-2024-4947)
### CVE-2024-4956 (2024-05-16)
<code>Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1.
@ -1619,6 +1612,7 @@
</code>
- [p33d/CVE-2024-8275](https://github.com/p33d/CVE-2024-8275)
- [whiterose7777/CVE-2024-8275](https://github.com/whiterose7777/CVE-2024-8275)
### CVE-2024-8277 (2024-09-11)
@ -5186,13 +5180,6 @@
- [Dor00tkit/CVE-2024-38144](https://github.com/Dor00tkit/CVE-2024-38144)
### CVE-2024-38178 (2024-08-13)
<code>Scripting Engine Memory Corruption Vulnerability
</code>
- [uixss/PoC-CVE-2024-38178](https://github.com/uixss/PoC-CVE-2024-38178)
### CVE-2024-38189 (2024-08-13)
<code>Microsoft Project Remote Code Execution Vulnerability
@ -5595,6 +5582,7 @@
</code>
- [TAM-K592/CVE-2024-40725-CVE-2024-40898](https://github.com/TAM-K592/CVE-2024-40725-CVE-2024-40898)
- [whiterose7777/CVE-2024-40725-CVE-2024-40898](https://github.com/whiterose7777/CVE-2024-40725-CVE-2024-40898)
### CVE-2024-40892 (2024-08-12)
@ -6076,6 +6064,7 @@
- [p33d/CVE-2024-45519](https://github.com/p33d/CVE-2024-45519)
- [Chocapikk/CVE-2024-45519](https://github.com/Chocapikk/CVE-2024-45519)
- [whiterose7777/CVE-2024-45519](https://github.com/whiterose7777/CVE-2024-45519)
### CVE-2024-45589 (2024-09-05)
@ -13305,6 +13294,13 @@
- [TYuan0816/cve-2023-44487](https://github.com/TYuan0816/cve-2023-44487)
- [sn130hk/CVE-2023-44487](https://github.com/sn130hk/CVE-2023-44487)
### CVE-2023-44488 (2023-09-30)
<code>VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.
</code>
- [uthrasri/CVE-2023-44488-_libvpx_1.8.0](https://github.com/uthrasri/CVE-2023-44488-_libvpx_1.8.0)
### CVE-2023-44758 (2023-10-06)
<code>GDidees CMS 3.0 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Page Title.