Auto Update 2025/02/06 06:32:09

This commit is contained in:
motikan2010-bot 2025-02-06 15:32:09 +09:00
parent 1bd8fb649b
commit 8e5324fffa
48 changed files with 199 additions and 230 deletions

View file

@ -45,10 +45,10 @@
"description": "Cisco iOS SNMP Overflow Exploit Toolkit (CVE-2017-6736)",
"fork": false,
"created_at": "2018-01-22T21:15:43Z",
"updated_at": "2023-02-17T08:45:25Z",
"updated_at": "2025-02-06T04:52:20Z",
"pushed_at": "2018-06-28T18:56:25Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 4
}

View file

@ -45,10 +45,10 @@
"description": "CVE-2018-6389 Exploit In WordPress DoS ",
"fork": false,
"created_at": "2018-02-06T15:16:03Z",
"updated_at": "2024-08-12T19:36:04Z",
"updated_at": "2025-02-06T05:00:46Z",
"pushed_at": "2018-02-06T15:36:29Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 79,
"watchers": 80,
"score": 0,
"subscribers_count": 5
},

File diff suppressed because one or more lines are too long

View file

@ -14,10 +14,10 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2025-01-23T07:54:11Z",
"updated_at": "2025-02-06T00:22:30Z",
"pushed_at": "2020-06-13T17:40:14Z",
"stargazers_count": 620,
"watchers_count": 620,
"stargazers_count": 621,
"watchers_count": 621,
"has_discussions": false,
"forks_count": 81,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 81,
"watchers": 620,
"watchers": 621,
"score": 0,
"subscribers_count": 19
}

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2019-19844(https:\/\/www.djangoproject.com\/weblog\/2019\/dec\/18\/security-releases\/)",
"fork": false,
"created_at": "2019-12-21T04:30:34Z",
"updated_at": "2024-08-30T17:23:17Z",
"updated_at": "2025-02-06T05:07:44Z",
"pushed_at": "2019-12-24T12:31:47Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 99,
"watchers": 100,
"score": 0,
"subscribers_count": 3
},

View file

@ -269,10 +269,10 @@
"description": "PoC for old Binder vulnerability (based on P0 exploit)",
"fork": false,
"created_at": "2020-10-27T14:43:17Z",
"updated_at": "2025-01-27T02:04:09Z",
"updated_at": "2025-02-06T03:54:02Z",
"pushed_at": "2020-10-27T14:48:04Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -286,7 +286,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Proof of concept app for Android permanent denial-of-service vulnerability CVE-2020-0443",
"fork": false,
"created_at": "2022-03-15T04:54:31Z",
"updated_at": "2025-01-21T08:11:58Z",
"updated_at": "2025-02-06T03:21:08Z",
"pushed_at": "2022-03-15T05:15:48Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 14,
"watchers": 16,
"score": 0,
"subscribers_count": 1
}

View file

@ -61,8 +61,8 @@
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
"fork": false,
"created_at": "2025-01-23T20:21:00Z",
"updated_at": "2025-02-05T23:16:55Z",
"pushed_at": "2025-02-05T23:16:52Z",
"updated_at": "2025-02-06T05:12:25Z",
"pushed_at": "2025-02-06T05:12:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -448,10 +448,10 @@
"description": null,
"fork": false,
"created_at": "2021-03-09T16:54:39Z",
"updated_at": "2024-08-12T20:11:03Z",
"updated_at": "2025-02-06T00:42:28Z",
"pushed_at": "2021-03-09T16:56:09Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -460,7 +460,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 99,
"watchers": 100,
"score": 0,
"subscribers_count": 13
},

View file

@ -14,10 +14,10 @@
"description": "Write-up and proof of concepts for CVE-2021-30862",
"fork": false,
"created_at": "2025-02-05T01:34:09Z",
"updated_at": "2025-02-05T03:16:30Z",
"updated_at": "2025-02-06T01:22:24Z",
"pushed_at": "2025-02-05T03:16:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -112,19 +112,19 @@
"description": "Small and dirty PoC for CVE-2021-36934",
"fork": false,
"created_at": "2021-07-22T00:55:23Z",
"updated_at": "2025-02-05T17:36:23Z",
"updated_at": "2025-02-06T02:03:46Z",
"pushed_at": "2021-07-22T02:15:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"forks": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},

View file

@ -2443,10 +2443,10 @@
"description": "CVE-2021-4034 Add Root User - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-28T15:13:28Z",
"updated_at": "2025-01-20T01:56:20Z",
"updated_at": "2025-02-06T05:22:12Z",
"pushed_at": "2022-01-28T15:37:41Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -2455,7 +2455,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 95,
"watchers": 96,
"score": 0,
"subscribers_count": 4
},

View file

@ -3749,10 +3749,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2025-02-05T20:20:40Z",
"updated_at": "2025-02-06T04:43:07Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3406,
"watchers_count": 3406,
"stargazers_count": 3407,
"watchers_count": 3407,
"has_discussions": true,
"forks_count": 742,
"allow_forking": true,
@ -3761,7 +3761,7 @@
"topics": [],
"visibility": "public",
"forks": 742,
"watchers": 3406,
"watchers": 3407,
"score": 0,
"subscribers_count": 55
},
@ -5634,10 +5634,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2025-01-28T05:22:50Z",
"updated_at": "2025-02-06T04:43:19Z",
"pushed_at": "2024-12-11T23:04:50Z",
"stargazers_count": 394,
"watchers_count": 394,
"stargazers_count": 395,
"watchers_count": 395,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -5652,7 +5652,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 394,
"watchers": 395,
"score": 0,
"subscribers_count": 12
},
@ -6058,10 +6058,10 @@
"description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T18:08:45Z",
"updated_at": "2024-10-14T22:09:15Z",
"updated_at": "2025-02-06T04:43:14Z",
"pushed_at": "2021-12-20T14:44:27Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 149,
"watchers_count": 149,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -6070,7 +6070,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 148,
"watchers": 149,
"score": 0,
"subscribers_count": 6
},

View file

@ -107,10 +107,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2025-02-01T10:44:26Z",
"updated_at": "2025-02-06T05:21:36Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1093,
"watchers_count": 1093,
"stargazers_count": 1094,
"watchers_count": 1094,
"has_discussions": false,
"forks_count": 220,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 220,
"watchers": 1093,
"watchers": 1094,
"score": 0,
"subscribers_count": 18
},

View file

@ -331,10 +331,10 @@
"description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)",
"fork": false,
"created_at": "2022-05-09T10:34:38Z",
"updated_at": "2025-01-06T07:29:21Z",
"updated_at": "2025-02-06T05:18:52Z",
"pushed_at": "2022-05-16T12:40:51Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -343,7 +343,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 88,
"watchers": 87,
"score": 0,
"subscribers_count": 2
},

View file

@ -262,29 +262,30 @@
"description": "Magento 2 patch for CVE-2022-24086, CVE-2022-24087. Fix the RCE vulnerability and related bugs by performing deep template variable escaping. If you cannot upgrade Magento or cannot apply the official patches, try this one.",
"fork": false,
"created_at": "2024-11-25T06:56:05Z",
"updated_at": "2024-12-22T06:48:12Z",
"pushed_at": "2024-12-22T06:57:13Z",
"updated_at": "2025-02-06T01:56:52Z",
"pushed_at": "2025-02-06T02:08:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"all-magento24-compatible",
"cve-2022-24086",
"cve-2022-24087",
"deep-escape",
"improper-input-validation",
"legacyresolver",
"magento2",
"magento23",
"magento24",
"patch",
"rce",
"template-filter"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -179,10 +179,10 @@
"description": "Exploit for CVE-202225765 (pdfkit) - Command Injection",
"fork": false,
"created_at": "2023-02-10T00:50:35Z",
"updated_at": "2025-01-15T15:52:49Z",
"updated_at": "2025-02-06T04:29:07Z",
"pushed_at": "2025-01-15T15:52:47Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -205,7 +205,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2025-02-04T05:48:55Z",
"updated_at": "2025-02-06T06:08:02Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1180,
"watchers_count": 1180,
"stargazers_count": 1181,
"watchers_count": 1181,
"has_discussions": true,
"forks_count": 188,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 188,
"watchers": 1180,
"watchers": 1181,
"score": 0,
"subscribers_count": 19
},

View file

@ -14,10 +14,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
"updated_at": "2025-01-25T09:49:42Z",
"updated_at": "2025-02-06T04:33:52Z",
"pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 305,
"watchers_count": 305,
"stargazers_count": 306,
"watchers_count": 306,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 305,
"watchers": 306,
"score": 0,
"subscribers_count": 6
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -76,10 +76,10 @@
"description": "GameOver(lay) Ubuntu Privilege Escalation",
"fork": false,
"created_at": "2023-10-09T22:02:42Z",
"updated_at": "2025-01-18T15:28:50Z",
"updated_at": "2025-02-06T06:05:33Z",
"pushed_at": "2023-10-09T22:44:21Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 122,
"watchers": 123,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,7 +14,7 @@
"description": null,
"fork": false,
"created_at": "2024-03-23T15:25:49Z",
"updated_at": "2025-02-05T06:08:51Z",
"updated_at": "2025-02-06T02:32:08Z",
"pushed_at": "2024-03-23T18:59:30Z",
"stargazers_count": 7,
"watchers_count": 7,

View file

@ -413,6 +413,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220",
"fork": false,
"created_at": "2024-07-07T15:08:30Z",
"updated_at": "2024-10-27T17:09:40Z",
"updated_at": "2025-02-06T05:37:38Z",
"pushed_at": "2024-07-27T00:19:17Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 1
},

View file

@ -206,10 +206,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-16T17:33:13Z",
"updated_at": "2025-02-02T22:59:17Z",
"updated_at": "2025-02-06T01:27:25Z",
"pushed_at": "2024-12-16T17:38:23Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -218,7 +218,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Technical Details and Exploit for CVE-2024-11393",
"fork": false,
"created_at": "2024-12-07T11:24:06Z",
"updated_at": "2025-01-31T22:08:52Z",
"updated_at": "2025-02-06T02:51:57Z",
"pushed_at": "2024-12-08T00:31:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
"fork": false,
"created_at": "2024-02-28T21:16:10Z",
"updated_at": "2024-12-17T08:07:06Z",
"updated_at": "2025-02-06T03:41:30Z",
"pushed_at": "2024-07-05T09:37:05Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 95,
"watchers": 96,
"score": 0,
"subscribers_count": 6
},

View file

@ -107,10 +107,10 @@
"description": "aiohttp LFI (CVE-2024-23334)",
"fork": false,
"created_at": "2024-03-19T16:28:56Z",
"updated_at": "2025-01-09T21:04:09Z",
"updated_at": "2025-02-06T03:25:04Z",
"pushed_at": "2024-03-19T17:06:26Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},

View file

@ -50,13 +50,13 @@
"stargazers_count": 84,
"watchers_count": 84,
"has_discussions": false,
"forks_count": 26,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"forks": 25,
"watchers": 84,
"score": 0,
"subscribers_count": 2

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2024-09-14T16:08:56Z",
"updated_at": "2025-01-20T18:54:25Z",
"updated_at": "2025-02-06T05:00:16Z",
"pushed_at": "2025-01-20T18:54:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
"fork": false,
"created_at": "2024-03-11T10:14:39Z",
"updated_at": "2025-02-05T13:21:44Z",
"updated_at": "2025-02-06T04:53:33Z",
"pushed_at": "2024-03-25T12:56:16Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 85,
"watchers": 86,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2025-02-04T05:36:00Z",
"updated_at": "2025-02-06T04:53:19Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 449,
"watchers_count": 449,
"stargazers_count": 450,
"watchers_count": 450,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 449,
"watchers": 450,
"score": 0,
"subscribers_count": 8
},

View file

@ -420,8 +420,8 @@
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
"fork": false,
"created_at": "2024-08-31T13:56:26Z",
"updated_at": "2025-01-16T21:39:23Z",
"pushed_at": "2024-12-15T05:49:39Z",
"updated_at": "2025-02-06T06:09:31Z",
"pushed_at": "2025-02-06T06:09:29Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2025-02-05T18:31:35Z",
"updated_at": "2025-02-05T19:05:31Z",
"updated_at": "2025-02-06T02:59:19Z",
"pushed_at": "2025-02-05T19:05:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -45,10 +45,10 @@
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
"fork": false,
"created_at": "2024-10-05T00:15:18Z",
"updated_at": "2025-01-26T16:54:04Z",
"updated_at": "2025-02-06T01:27:13Z",
"pushed_at": "2024-11-05T10:10:40Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 119,
"watchers": 120,
"score": 0,
"subscribers_count": 3
},

View file

@ -50,13 +50,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-02-05T17:20:54Z",
"updated_at": "2025-02-06T01:21:33Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 467,
"watchers_count": 467,
"stargazers_count": 468,
"watchers_count": 468,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 467,
"watchers": 468,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "POC exploit for CVE-2024-49138",
"fork": false,
"created_at": "2025-01-15T00:43:37Z",
"updated_at": "2025-02-05T23:54:48Z",
"updated_at": "2025-02-06T01:24:09Z",
"pushed_at": "2025-01-23T14:59:40Z",
"stargazers_count": 229,
"watchers_count": 229,
"stargazers_count": 230,
"watchers_count": 230,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 46,
"watchers": 229,
"watchers": 230,
"score": 0,
"subscribers_count": 3
},

View file

@ -169,10 +169,10 @@
"description": "RCE through a race condition in Apache Tomcat",
"fork": false,
"created_at": "2024-12-21T05:54:29Z",
"updated_at": "2025-01-30T16:04:29Z",
"updated_at": "2025-02-06T01:26:10Z",
"pushed_at": "2024-12-21T08:56:44Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 53,
"watchers": 54,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2025-02-02T13:29:45Z",
"updated_at": "2025-02-06T01:28:20Z",
"pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 84,
"watchers": 85,
"score": 0,
"subscribers_count": 3
},
@ -216,37 +216,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 907464165,
"name": "VM-CVE-2024-53677",
"full_name": "Q0LT\/VM-CVE-2024-53677",
"owner": {
"login": "Q0LT",
"id": 155090912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155090912?v=4",
"html_url": "https:\/\/github.com\/Q0LT",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Q0LT\/VM-CVE-2024-53677",
"description": "Struts Vulnerability - CVE-2024-53677",
"fork": false,
"created_at": "2024-12-23T16:32:59Z",
"updated_at": "2024-12-23T17:31:35Z",
"pushed_at": "2024-12-23T17:31:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 911433822,
"name": "CVE-2024-53677",

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-21T12:30:21Z",
"updated_at": "2025-01-25T00:43:45Z",
"updated_at": "2025-02-06T01:15:59Z",
"pushed_at": "2025-01-23T07:40:16Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 2
},
@ -76,10 +76,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-22T14:16:30Z",
"updated_at": "2025-01-24T04:02:01Z",
"updated_at": "2025-02-06T01:16:34Z",
"pushed_at": "2025-01-23T07:38:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 3
},
@ -143,13 +143,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
@ -200,10 +200,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-27T06:25:53Z",
"updated_at": "2025-02-05T07:09:35Z",
"updated_at": "2025-02-06T02:27:03Z",
"pushed_at": "2025-01-27T19:11:46Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 1
},

View file

@ -1324,10 +1324,10 @@
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ",
"fork": false,
"created_at": "2024-07-02T18:32:46Z",
"updated_at": "2025-02-03T01:17:51Z",
"updated_at": "2025-02-06T01:26:28Z",
"pushed_at": "2024-07-05T15:19:28Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -1345,7 +1345,7 @@
],
"visibility": "public",
"forks": 31,
"watchers": 77,
"watchers": 78,
"score": 0,
"subscribers_count": 3
},

View file

@ -61,8 +61,8 @@
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
"fork": false,
"created_at": "2025-01-23T20:21:00Z",
"updated_at": "2025-02-06T00:27:24Z",
"pushed_at": "2025-02-06T00:27:22Z",
"updated_at": "2025-02-06T06:23:46Z",
"pushed_at": "2025-02-06T06:23:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
"fork": false,
"created_at": "2025-01-11T02:06:51Z",
"updated_at": "2025-01-31T02:27:06Z",
"updated_at": "2025-02-06T01:23:38Z",
"pushed_at": "2025-01-11T23:54:06Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,10 +14,10 @@
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
"fork": false,
"created_at": "2025-01-22T14:40:34Z",
"updated_at": "2025-02-06T00:07:09Z",
"updated_at": "2025-02-06T03:01:55Z",
"pushed_at": "2025-01-22T15:08:56Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 95,
"watchers": 96,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,19 +14,19 @@
"description": "Proof of concept & details for CVE-2025-21298",
"fork": false,
"created_at": "2025-01-20T18:16:51Z",
"updated_at": "2025-02-05T23:54:01Z",
"updated_at": "2025-02-06T02:08:10Z",
"pushed_at": "2025-01-20T18:22:01Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 35,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 114,
"forks": 37,
"watchers": 116,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "An XNU kernel race condition bug",
"fork": false,
"created_at": "2025-01-30T00:10:44Z",
"updated_at": "2025-02-05T06:57:45Z",
"updated_at": "2025-02-06T01:16:24Z",
"pushed_at": "2025-01-30T00:15:56Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 0
},
@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2025-02-01T22:20:18Z",
"updated_at": "2025-02-03T23:50:44Z",
"updated_at": "2025-02-06T03:22:51Z",
"pushed_at": "2025-02-01T22:30:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -8391,7 +8391,6 @@
- [XiaomingX/CVE-2024-53677-S2-067](https://github.com/XiaomingX/CVE-2024-53677-S2-067)
- [dustblessnotdust/CVE-2024-53677-S2-067-thread](https://github.com/dustblessnotdust/CVE-2024-53677-S2-067-thread)
- [0xdeviner/CVE-2024-53677](https://github.com/0xdeviner/CVE-2024-53677)
- [Q0LT/VM-CVE-2024-53677](https://github.com/Q0LT/VM-CVE-2024-53677)
- [EQSTLab/CVE-2024-53677](https://github.com/EQSTLab/CVE-2024-53677)
- [0xPThree/struts_cve-2024-53677](https://github.com/0xPThree/struts_cve-2024-53677)
- [punitdarji/Apache-struts-cve-2024-53677](https://github.com/punitdarji/Apache-struts-cve-2024-53677)