Auto Update 2024/06/03 12:29:21

This commit is contained in:
motikan2010-bot 2024-06-03 21:29:21 +09:00
parent 4d291592a4
commit 979851b426
46 changed files with 330 additions and 225 deletions

View file

@ -13,8 +13,8 @@
"description": "Microsoft FrontPage Extensions Check (shtml.dll)",
"fork": false,
"created_at": "2024-05-30T09:55:41Z",
"updated_at": "2024-05-30T10:01:41Z",
"pushed_at": "2024-05-30T09:56:33Z",
"updated_at": "2024-06-03T07:27:46Z",
"pushed_at": "2024-06-03T07:27:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -73,10 +73,10 @@
"description": "Remote Command Execution exploit for vulnerability CVE-2004-2687 in DistCC Daemon v1",
"fork": false,
"created_at": "2023-05-09T13:49:18Z",
"updated_at": "2023-09-28T03:45:52Z",
"updated_at": "2024-06-03T09:24:20Z",
"pushed_at": "2023-05-09T13:57:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -193,10 +193,10 @@
"description": "Gain root privilege by exploiting CVE-2014-3153 vulnerability",
"fork": false,
"created_at": "2018-09-27T03:16:15Z",
"updated_at": "2023-10-26T11:09:59Z",
"updated_at": "2024-06-03T08:24:05Z",
"pushed_at": "2018-09-27T03:31:02Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -208,7 +208,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 3
},

View file

@ -40,13 +40,13 @@
"html_url": "https:\/\/github.com\/Milo-D"
},
"html_url": "https:\/\/github.com\/Milo-D\/CVE-2016-6187_LPE",
"description": "Kernel Exploit PoC for CVE-2016-6187 (Local Privilege Escalation)",
"description": "Kernel Exploit for CVE-2016-6187 (Local Privilege Escalation)",
"fork": false,
"created_at": "2024-05-12T12:52:54Z",
"updated_at": "2024-06-02T18:08:50Z",
"updated_at": "2024-06-03T12:03:52Z",
"pushed_at": "2024-06-02T18:08:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 65,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 65,
"forks": 57,
"watchers": 68,
"score": 0,
"subscribers_count": 7

View file

@ -184,36 +184,6 @@
"score": 0,
"subscribers_count": 24
},
{
"id": 103595749,
"name": "CVE-2017-8759",
"full_name": "Lz1y\/CVE-2017-8759",
"owner": {
"login": "Lz1y",
"id": 23468993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23468993?v=4",
"html_url": "https:\/\/github.com\/Lz1y"
},
"html_url": "https:\/\/github.com\/Lz1y\/CVE-2017-8759",
"description": "CVE-2017-8759",
"fork": false,
"created_at": "2017-09-15T00:36:17Z",
"updated_at": "2023-08-30T05:14:51Z",
"pushed_at": "2017-12-28T07:16:15Z",
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 80,
"score": 0,
"subscribers_count": 5
},
{
"id": 103865283,
"name": "CVE-2017-8759",
@ -248,6 +218,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 104006150,
"name": "CVE-2017-8759",
"full_name": "sythass\/CVE-2017-8759",
"owner": {
"login": "sythass",
"id": 29907348,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29907348?v=4",
"html_url": "https:\/\/github.com\/sythass"
},
"html_url": "https:\/\/github.com\/sythass\/CVE-2017-8759",
"description": "CVE-2017-8759",
"fork": false,
"created_at": "2017-09-19T00:30:56Z",
"updated_at": "2017-09-18T00:45:48Z",
"pushed_at": "2017-09-17T06:16:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 104033989,
"name": "CVE-2017-8759-exploits",

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-05-29T12:18:35Z",
"pushed_at": "2024-05-29T12:18:34Z",
"pushed_at": "2024-06-03T08:22:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Simple IOCTL dispatcher for CVE-2018-8060\/8061",
"fork": false,
"created_at": "2018-04-27T19:45:20Z",
"updated_at": "2019-01-22T23:13:45Z",
"updated_at": "2024-06-03T07:07:39Z",
"pushed_at": "2018-05-09T22:05:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 3
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 47,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 47,
"forks": 46,
"watchers": 3,
"score": 0,
"subscribers_count": 2

View file

@ -1326,13 +1326,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 374,
"forks_count": 373,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 374,
"forks": 373,
"watchers": 4,
"score": 0,
"subscribers_count": 0

View file

@ -18,13 +18,13 @@
"stargazers_count": 242,
"watchers_count": 242,
"has_discussions": false,
"forks_count": 101,
"forks_count": 99,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 101,
"forks": 99,
"watchers": 242,
"score": 0,
"subscribers_count": 4

View file

@ -13,8 +13,8 @@
"description": "phpMyAdmin <4.9.0 - Cross-Site Request Forgery",
"fork": false,
"created_at": "2024-06-02T15:50:16Z",
"updated_at": "2024-06-02T15:52:36Z",
"pushed_at": "2024-06-02T15:51:34Z",
"updated_at": "2024-06-03T09:59:13Z",
"pushed_at": "2024-06-03T09:59:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "ProFTPd mod_copy - arbitrary file copy without authentication",
"fork": false,
"created_at": "2019-07-27T21:26:06Z",
"updated_at": "2023-09-28T11:04:31Z",
"updated_at": "2024-06-03T11:18:07Z",
"pushed_at": "2019-09-24T02:06:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-06-02T08:06:35Z",
"updated_at": "2024-06-03T08:00:37Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4039,
"watchers_count": 4039,
"stargazers_count": 4040,
"watchers_count": 4040,
"has_discussions": false,
"forks_count": 1080,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1080,
"watchers": 4039,
"watchers": 4040,
"score": 0,
"subscribers_count": 151
},

View file

@ -43,19 +43,19 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2024-05-26T10:26:15Z",
"updated_at": "2024-06-03T09:13:24Z",
"pushed_at": "2022-01-05T04:09:42Z",
"stargazers_count": 631,
"watchers_count": 631,
"stargazers_count": 632,
"watchers_count": 632,
"has_discussions": false,
"forks_count": 172,
"forks_count": 161,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 172,
"watchers": 631,
"forks": 161,
"watchers": 632,
"score": 0,
"subscribers_count": 13
},

View file

@ -43,10 +43,10 @@
"description": "CVE-20199193 - PostgreSQL 9.3-12.3 Authenticated Remote Code Execution",
"fork": false,
"created_at": "2022-03-29T21:02:02Z",
"updated_at": "2024-02-27T06:04:38Z",
"updated_at": "2024-06-03T08:39:45Z",
"pushed_at": "2022-05-26T23:00:33Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
"fork": false,
"created_at": "2020-06-01T04:44:05Z",
"updated_at": "2024-01-04T16:46:34Z",
"updated_at": "2024-06-03T06:18:44Z",
"pushed_at": "2020-06-17T00:56:08Z",
"stargazers_count": 186,
"watchers_count": 186,
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 186,
"watchers": 187,
"score": 0,
"subscribers_count": 5
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 28,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"forks": 27,
"watchers": 153,
"score": 0,
"subscribers_count": 7

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-06-02T08:06:35Z",
"updated_at": "2024-06-03T08:00:37Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4039,
"watchers_count": 4039,
"stargazers_count": 4040,
"watchers_count": 4040,
"has_discussions": false,
"forks_count": 1080,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1080,
"watchers": 4039,
"watchers": 4040,
"score": 0,
"subscribers_count": 151
},

View file

@ -373,10 +373,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2024-06-02T16:52:58Z",
"updated_at": "2024-06-03T09:31:21Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 345,
"watchers_count": 345,
"stargazers_count": 346,
"watchers_count": 346,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -391,7 +391,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 345,
"watchers": 346,
"score": 0,
"subscribers_count": 5
},

View file

@ -133,10 +133,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2024-05-31T07:56:02Z",
"updated_at": "2024-06-03T08:37:25Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -148,7 +148,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 124,
"watchers": 125,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability ",
"fork": false,
"created_at": "2021-12-13T17:26:49Z",
"updated_at": "2024-04-19T14:48:47Z",
"updated_at": "2024-06-03T10:53:44Z",
"pushed_at": "2024-03-16T08:25:52Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 73,
"watchers": 74,
"score": 0,
"subscribers_count": 3
}

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-06-02T20:57:39Z",
"updated_at": "2024-06-03T06:43:14Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1760,
"watchers_count": 1760,
"stargazers_count": 1759,
"watchers_count": 1759,
"has_discussions": false,
"forks_count": 518,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 518,
"watchers": 1760,
"watchers": 1759,
"score": 0,
"subscribers_count": 28
},
@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-05-30T05:22:07Z",
"updated_at": "2024-06-03T06:37:41Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 778,
"watchers_count": 778,
"stargazers_count": 779,
"watchers_count": 779,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -1285,7 +1285,7 @@
],
"visibility": "public",
"forks": 112,
"watchers": 778,
"watchers": 779,
"score": 0,
"subscribers_count": 11
},
@ -3636,10 +3636,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2024-06-02T07:18:34Z",
"updated_at": "2024-06-03T09:13:33Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3368,
"watchers_count": 3368,
"stargazers_count": 3369,
"watchers_count": 3369,
"has_discussions": true,
"forks_count": 740,
"allow_forking": true,
@ -3648,7 +3648,7 @@
"topics": [],
"visibility": "public",
"forks": 740,
"watchers": 3368,
"watchers": 3369,
"score": 0,
"subscribers_count": 57
},

View file

@ -1186,10 +1186,10 @@
"description": "F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB",
"fork": false,
"created_at": "2022-05-12T16:54:52Z",
"updated_at": "2023-09-28T11:38:46Z",
"updated_at": "2024-06-03T11:26:54Z",
"pushed_at": "2023-05-11T02:55:01Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -1206,7 +1206,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 2
},

View file

@ -947,10 +947,10 @@
"description": null,
"fork": false,
"created_at": "2022-03-21T23:37:20Z",
"updated_at": "2024-05-26T01:58:43Z",
"updated_at": "2024-06-03T08:21:00Z",
"pushed_at": "2022-04-07T01:21:34Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -959,7 +959,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},

View file

@ -2277,36 +2277,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 678008039,
"name": "Spring4Shell-PoC",
"full_name": "h4ck0rman\/Spring4Shell-PoC",
"owner": {
"login": "h4ck0rman",
"id": 105838328,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105838328?v=4",
"html_url": "https:\/\/github.com\/h4ck0rman"
},
"html_url": "https:\/\/github.com\/h4ck0rman\/Spring4Shell-PoC",
"description": "A quick python script that automates the exploitation of the second deadliest Java based vulnerability CVE-2022-22965.",
"fork": false,
"created_at": "2023-08-13T11:42:22Z",
"updated_at": "2023-08-13T11:42:23Z",
"pushed_at": "2023-08-13T11:42:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 686301684,
"name": "Spring4Shell-CVE-2022-22965",

View file

@ -321,10 +321,10 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
"updated_at": "2024-05-19T23:26:35Z",
"updated_at": "2024-06-03T12:24:09Z",
"pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 370,
"watchers_count": 370,
"stargazers_count": 371,
"watchers_count": 371,
"has_discussions": false,
"forks_count": 76,
"allow_forking": true,
@ -333,7 +333,7 @@
"topics": [],
"visibility": "public",
"forks": 76,
"watchers": 370,
"watchers": 371,
"score": 0,
"subscribers_count": 7
},

View file

@ -493,10 +493,10 @@
"description": "cpanel_xss_2023 is a simple Python script designed for finding CVE-2023-29489 vulnerability in cpanel.",
"fork": false,
"created_at": "2024-01-23T20:29:57Z",
"updated_at": "2024-02-01T06:54:00Z",
"updated_at": "2024-06-03T08:19:43Z",
"pushed_at": "2024-01-31T16:23:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -505,7 +505,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2024-06-03T02:45:43Z",
"updated_at": "2024-06-03T07:56:52Z",
"pushed_at": "2024-05-16T07:42:00Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 165,
"watchers": 166,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
"fork": false,
"created_at": "2024-01-20T07:14:06Z",
"updated_at": "2024-06-01T13:15:46Z",
"updated_at": "2024-06-03T12:15:10Z",
"pushed_at": "2024-01-21T05:04:01Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 68,
"watchers": 70,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-06-02T18:40:03Z",
"updated_at": "2024-06-03T08:23:47Z",
"pushed_at": "2024-05-29T14:55:57Z",
"stargazers_count": 765,
"watchers_count": 765,
"stargazers_count": 767,
"watchers_count": 767,
"has_discussions": false,
"forks_count": 134,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 134,
"watchers": 765,
"watchers": 767,
"score": 0,
"subscribers_count": 12
},

View file

@ -262,8 +262,8 @@
"description": "Ivanti ICS - Authentication Bypass",
"fork": false,
"created_at": "2024-05-31T02:18:57Z",
"updated_at": "2024-05-31T02:20:47Z",
"pushed_at": "2024-05-31T02:20:43Z",
"updated_at": "2024-06-03T09:40:39Z",
"pushed_at": "2024-06-03T09:40:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. ",
"fork": false,
"created_at": "2023-10-24T17:19:32Z",
"updated_at": "2024-03-19T02:46:13Z",
"updated_at": "2024-06-03T09:31:10Z",
"pushed_at": "2023-10-26T14:16:05Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 61,
"watchers": 62,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)",
"fork": false,
"created_at": "2024-06-02T14:15:27Z",
"updated_at": "2024-06-03T06:09:18Z",
"updated_at": "2024-06-03T10:39:03Z",
"pushed_at": "2024-06-03T05:03:46Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 20,
"watchers": 24,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-06-03T06:07:05Z",
"updated_at": "2024-06-03T11:45:14Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 1996,
"watchers_count": 1996,
"stargazers_count": 2003,
"watchers_count": 2003,
"has_discussions": false,
"forks_count": 249,
"forks_count": 251,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc"
],
"visibility": "public",
"forks": 249,
"watchers": 1996,
"forks": 251,
"watchers": 2003,
"score": 0,
"subscribers_count": 22
},

View file

@ -43,8 +43,8 @@
"description": "LearnDash LMS < 4.10.3 - Sensitive Information Exposure",
"fork": false,
"created_at": "2024-05-30T17:55:45Z",
"updated_at": "2024-05-30T17:58:37Z",
"pushed_at": "2024-05-30T17:56:55Z",
"updated_at": "2024-06-03T08:19:28Z",
"pushed_at": "2024-06-03T08:19:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -360,10 +360,10 @@
"description": "An Vulnerability detection and Exploitation tool for CVE-2024-24919",
"fork": false,
"created_at": "2024-05-31T10:18:36Z",
"updated_at": "2024-06-03T06:15:18Z",
"updated_at": "2024-06-03T09:25:21Z",
"pushed_at": "2024-05-31T12:05:00Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -372,7 +372,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
@ -420,19 +420,19 @@
"description": null,
"fork": false,
"created_at": "2024-05-31T11:52:59Z",
"updated_at": "2024-06-03T01:30:44Z",
"updated_at": "2024-06-03T08:37:57Z",
"pushed_at": "2024-05-31T22:55:07Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 24,
"forks": 6,
"watchers": 26,
"score": 0,
"subscribers_count": 1
},
@ -1075,5 +1075,65 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 809679765,
"name": "cve-2024-24919-checker",
"full_name": "birdlex\/cve-2024-24919-checker",
"owner": {
"login": "birdlex",
"id": 3228984,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3228984?v=4",
"html_url": "https:\/\/github.com\/birdlex"
},
"html_url": "https:\/\/github.com\/birdlex\/cve-2024-24919-checker",
"description": null,
"fork": false,
"created_at": "2024-06-03T08:39:09Z",
"updated_at": "2024-06-03T09:05:40Z",
"pushed_at": "2024-06-03T09:05:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 809769497,
"name": "CVE-2024-24919-Exploit",
"full_name": "Rug4lo\/CVE-2024-24919-Exploit",
"owner": {
"login": "Rug4lo",
"id": 123998963,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123998963?v=4",
"html_url": "https:\/\/github.com\/Rug4lo"
},
"html_url": "https:\/\/github.com\/Rug4lo\/CVE-2024-24919-Exploit",
"description": null,
"fork": false,
"created_at": "2024-06-03T12:18:35Z",
"updated_at": "2024-06-03T12:27:44Z",
"pushed_at": "2024-06-03T12:27:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,12 +13,12 @@
"description": "Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )",
"fork": false,
"created_at": "2024-05-31T20:11:37Z",
"updated_at": "2024-06-03T06:25:58Z",
"updated_at": "2024-06-03T11:45:51Z",
"pushed_at": "2024-05-31T22:16:47Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 2,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"vulnerability-scanners"
],
"visibility": "public",
"forks": 2,
"watchers": 19,
"forks": 4,
"watchers": 27,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-20242961 Security Issue Mitigation Script",
"fork": false,
"created_at": "2024-05-20T06:53:23Z",
"updated_at": "2024-05-29T10:01:08Z",
"updated_at": "2024-06-03T09:06:19Z",
"pushed_at": "2024-05-20T07:12:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -73,10 +73,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-06-03T03:22:46Z",
"updated_at": "2024-06-03T10:40:59Z",
"pushed_at": "2024-05-28T03:19:34Z",
"stargazers_count": 236,
"watchers_count": 236,
"stargazers_count": 240,
"watchers_count": 240,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 236,
"watchers": 240,
"score": 0,
"subscribers_count": 5
},

View file

@ -1012,7 +1012,7 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-06-03T04:17:15Z",
"updated_at": "2024-06-03T08:01:51Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3474,
"watchers_count": 3474,

View file

@ -73,10 +73,10 @@
"description": "Proof Of Concept that exploits PuTTy CVE-2024-31497.",
"fork": false,
"created_at": "2024-05-10T14:30:50Z",
"updated_at": "2024-05-15T01:04:25Z",
"updated_at": "2024-06-03T09:15:23Z",
"pushed_at": "2024-05-11T13:33:17Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-34832.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 800669988,
"name": "CVE-2024-34832",
"full_name": "julio-cfa\/CVE-2024-34832",
"owner": {
"login": "julio-cfa",
"id": 52619625,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52619625?v=4",
"html_url": "https:\/\/github.com\/julio-cfa"
},
"html_url": "https:\/\/github.com\/julio-cfa\/CVE-2024-34832",
"description": "CVE-2024-34832",
"fork": false,
"created_at": "2024-05-14T19:15:31Z",
"updated_at": "2024-06-03T10:42:47Z",
"pushed_at": "2024-06-03T10:42:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-4358.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 809672691,
"name": "CVE-2024-4358",
"full_name": "sinsinology\/CVE-2024-4358",
"owner": {
"login": "sinsinology",
"id": 77316200,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77316200?v=4",
"html_url": "https:\/\/github.com\/sinsinology"
},
"html_url": "https:\/\/github.com\/sinsinology\/CVE-2024-4358",
"description": "Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358\/CVE-2024-1800)",
"fork": false,
"created_at": "2024-06-03T08:22:10Z",
"updated_at": "2024-06-03T11:54:21Z",
"pushed_at": "2024-06-03T08:22:28Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-06-03T03:16:50Z",
"updated_at": "2024-06-03T08:02:01Z",
"pushed_at": "2024-05-31T13:39:16Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 53,
"watchers": 54,
"score": 0,
"subscribers_count": 2
},

View file

@ -291,8 +291,8 @@
"description": "Sonatype Nexus Repository Manager 3 (LFI)",
"fork": false,
"created_at": "2024-06-03T02:49:20Z",
"updated_at": "2024-06-03T02:52:50Z",
"pushed_at": "2024-06-03T02:50:52Z",
"updated_at": "2024-06-03T10:15:59Z",
"pushed_at": "2024-06-03T10:15:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -565,6 +565,13 @@
- [truonghuuphuc/CVE-2024-4352-Poc](https://github.com/truonghuuphuc/CVE-2024-4352-Poc)
### CVE-2024-4358 (2024-05-29)
<code>In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.
</code>
- [sinsinology/CVE-2024-4358](https://github.com/sinsinology/CVE-2024-4358)
### CVE-2024-4367 (2024-05-14)
<code>A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox &lt; 126, Firefox ESR &lt; 115.11, and Thunderbird &lt; 115.11.
@ -1447,6 +1454,8 @@
- [B1naryo/CVE-2024-24919-POC](https://github.com/B1naryo/CVE-2024-24919-POC)
- [Expl0itD0g/CVE-2024-24919---Poc](https://github.com/Expl0itD0g/CVE-2024-24919---Poc)
- [bigb0x/CVE-2024-24919-Sniper](https://github.com/bigb0x/CVE-2024-24919-Sniper)
- [birdlex/cve-2024-24919-checker](https://github.com/birdlex/cve-2024-24919-checker)
- [Rug4lo/CVE-2024-24919-Exploit](https://github.com/Rug4lo/CVE-2024-24919-Exploit)
### CVE-2024-25092
- [RandomRobbieBF/CVE-2024-25092](https://github.com/RandomRobbieBF/CVE-2024-25092)
@ -2383,6 +2392,9 @@
- [aelmokhtar/CVE-2024-34716_PoC](https://github.com/aelmokhtar/CVE-2024-34716_PoC)
### CVE-2024-34832
- [julio-cfa/CVE-2024-34832](https://github.com/julio-cfa/CVE-2024-34832)
### CVE-2024-34958 (-)
<code>idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component admin/banner_deal.php?mudi=add
@ -12121,7 +12133,6 @@
- [BKLockly/CVE-2022-22965](https://github.com/BKLockly/CVE-2022-22965)
- [dbgee/Spring4Shell](https://github.com/dbgee/Spring4Shell)
- [jakabakos/CVE-2022-22965-Spring4Shell](https://github.com/jakabakos/CVE-2022-22965-Spring4Shell)
- [h4ck0rman/Spring4Shell-PoC](https://github.com/h4ck0rman/Spring4Shell-PoC)
- [sohamsharma966/Spring4Shell-CVE-2022-22965](https://github.com/sohamsharma966/Spring4Shell-CVE-2022-22965)
- [LucasPDiniz/CVE-2022-22965](https://github.com/LucasPDiniz/CVE-2022-22965)
@ -37238,8 +37249,8 @@
- [tahisaad6/CVE-2017-8759-Exploit-sample2](https://github.com/tahisaad6/CVE-2017-8759-Exploit-sample2)
- [homjxi0e/CVE-2017-8759_-SOAP_WSDL](https://github.com/homjxi0e/CVE-2017-8759_-SOAP_WSDL)
- [bhdresh/CVE-2017-8759](https://github.com/bhdresh/CVE-2017-8759)
- [Lz1y/CVE-2017-8759](https://github.com/Lz1y/CVE-2017-8759)
- [JonasUliana/CVE-2017-8759](https://github.com/JonasUliana/CVE-2017-8759)
- [sythass/CVE-2017-8759](https://github.com/sythass/CVE-2017-8759)
- [ashr/CVE-2017-8759-exploits](https://github.com/ashr/CVE-2017-8759-exploits)
- [l0n3rs/CVE-2017-8759](https://github.com/l0n3rs/CVE-2017-8759)
- [ChaitanyaHaritash/CVE-2017-8759](https://github.com/ChaitanyaHaritash/CVE-2017-8759)