Auto Update 2024/08/26 12:30:05

This commit is contained in:
motikan2010-bot 2024-08-26 21:30:05 +09:00
parent e55fd7db7c
commit 98f45a6c50
50 changed files with 304 additions and 221 deletions

View file

@ -18,13 +18,13 @@
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 49,
"score": 0,
"subscribers_count": 4

View file

@ -73,10 +73,10 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2024-08-12T19:25:38Z",
"updated_at": "2024-08-26T11:36:50Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 949,
"watchers_count": 949,
"stargazers_count": 950,
"watchers_count": 950,
"has_discussions": false,
"forks_count": 392,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 392,
"watchers": 949,
"watchers": 950,
"score": 0,
"subscribers_count": 64
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 34,
"score": 0,
"subscribers_count": 5

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-25T08:24:24Z",
"updated_at": "2024-08-26T08:47:12Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4090,
"watchers_count": 4090,
"stargazers_count": 4091,
"watchers_count": 4091,
"has_discussions": false,
"forks_count": 1089,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1089,
"watchers": 4090,
"watchers": 4091,
"score": 0,
"subscribers_count": 149
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-08-25T08:24:24Z",
"updated_at": "2024-08-26T08:47:12Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4090,
"watchers_count": 4090,
"stargazers_count": 4091,
"watchers_count": 4091,
"has_discussions": false,
"forks_count": 1089,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1089,
"watchers": 4090,
"watchers": 4091,
"score": 0,
"subscribers_count": 149
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2024-08-25T20:15:43Z",
"updated_at": "2024-08-26T11:00:12Z",
"pushed_at": "2022-04-14T03:17:44Z",
"stargazers_count": 424,
"watchers_count": 424,
"stargazers_count": 425,
"watchers_count": 425,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 45,
"watchers": 424,
"watchers": 425,
"score": 0,
"subscribers_count": 6
},

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-08-23T03:38:46Z",
"updated_at": "2024-08-26T08:56:01Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1298,
"watchers_count": 1298,
"stargazers_count": 1299,
"watchers_count": 1299,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 165,
"watchers": 1298,
"watchers": 1299,
"score": 0,
"subscribers_count": 14
}

View file

@ -1160,8 +1160,8 @@
"description": "confluence rce (CVE-2021-26084, CVE-2022-26134, CVE-2023-22527)",
"fork": false,
"created_at": "2024-05-29T03:20:22Z",
"updated_at": "2024-08-17T19:46:05Z",
"pushed_at": "2024-05-29T06:14:19Z",
"updated_at": "2024-08-26T09:24:34Z",
"pushed_at": "2024-08-26T09:24:31Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -48,13 +48,13 @@
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 33,
"score": 0,
"subscribers_count": 3

View file

@ -262,19 +262,19 @@
"description": "ubuntu new PrivEsc race condition vulnerability",
"fork": false,
"created_at": "2021-07-02T10:03:26Z",
"updated_at": "2022-11-19T21:44:24Z",
"updated_at": "2024-08-26T07:05:52Z",
"pushed_at": "2021-08-05T02:07:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -936,10 +936,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-08-21T01:31:12Z",
"updated_at": "2024-08-26T12:13:53Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 1036,
"watchers_count": 1036,
"stargazers_count": 1037,
"watchers_count": 1037,
"has_discussions": false,
"forks_count": 184,
"allow_forking": true,
@ -950,7 +950,7 @@
],
"visibility": "public",
"forks": 184,
"watchers": 1036,
"watchers": 1037,
"score": 0,
"subscribers_count": 14
},
@ -2850,13 +2850,13 @@
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 11,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 10,
"watchers": 21,
"score": 0,
"subscribers_count": 2

View file

@ -3562,5 +3562,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 847643436,
"name": "CVE-2021-41773",
"full_name": "0xc4t\/CVE-2021-41773",
"owner": {
"login": "0xc4t",
"id": 105418279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105418279?v=4",
"html_url": "https:\/\/github.com\/0xc4t"
},
"html_url": "https:\/\/github.com\/0xc4t\/CVE-2021-41773",
"description": "POC & Lab For CVE-2021-41773",
"fork": false,
"created_at": "2024-08-26T09:07:33Z",
"updated_at": "2024-08-26T09:13:49Z",
"pushed_at": "2024-08-26T09:13:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -2076,10 +2076,10 @@
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-12T01:24:51Z",
"updated_at": "2024-08-24T16:05:14Z",
"updated_at": "2024-08-26T09:31:24Z",
"pushed_at": "2022-10-24T02:25:53Z",
"stargazers_count": 493,
"watchers_count": 493,
"stargazers_count": 492,
"watchers_count": 492,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -2088,7 +2088,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 493,
"watchers": 492,
"score": 0,
"subscribers_count": 25
},

View file

@ -212,36 +212,6 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 444081415,
"name": "-cve-2021-45232",
"full_name": "xiju2003\/-cve-2021-45232",
"owner": {
"login": "xiju2003",
"id": 17631407,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17631407?v=4",
"html_url": "https:\/\/github.com\/xiju2003"
},
"html_url": "https:\/\/github.com\/xiju2003\/-cve-2021-45232",
"description": "The vulnerability affects Apache APISIX Dashboard version 2.10.1",
"fork": false,
"created_at": "2022-01-03T14:01:32Z",
"updated_at": "2022-01-03T14:01:33Z",
"pushed_at": "2022-01-01T20:22:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 444659919,
"name": "CVE-2021-45232-RCE",

View file

@ -220,10 +220,10 @@
"description": "A REAL DoS exploit for CVE-2022-21907",
"fork": false,
"created_at": "2022-04-04T10:53:28Z",
"updated_at": "2024-08-20T03:29:44Z",
"updated_at": "2024-08-26T10:23:44Z",
"pushed_at": "2022-04-13T05:48:04Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -232,7 +232,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 129,
"watchers": 130,
"score": 0,
"subscribers_count": 4
},

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-08-23T03:38:46Z",
"updated_at": "2024-08-26T08:56:01Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1298,
"watchers_count": 1298,
"stargazers_count": 1299,
"watchers_count": 1299,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 165,
"watchers": 1298,
"watchers": 1299,
"score": 0,
"subscribers_count": 14
},

View file

@ -2049,8 +2049,8 @@
"description": "confluence rce (CVE-2021-26084, CVE-2022-26134, CVE-2023-22527)",
"fork": false,
"created_at": "2024-05-29T03:20:22Z",
"updated_at": "2024-08-17T19:46:05Z",
"pushed_at": "2024-05-29T06:14:19Z",
"updated_at": "2024-08-26T09:24:34Z",
"pushed_at": "2024-08-26T09:24:31Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "HTTP3-attacks (CVE-2022-30592)",
"fork": false,
"created_at": "2022-08-06T09:57:43Z",
"updated_at": "2024-08-12T20:25:55Z",
"updated_at": "2024-08-26T09:07:53Z",
"pushed_at": "2022-12-18T03:36:03Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 71,
"watchers": 70,
"score": 0,
"subscribers_count": 4
}

View file

@ -73,10 +73,10 @@
"description": "CVE-2022-37042 Zimbra Auth Bypass leads to RCE",
"fork": false,
"created_at": "2022-10-24T10:10:45Z",
"updated_at": "2024-08-12T20:27:58Z",
"updated_at": "2024-08-26T12:13:40Z",
"pushed_at": "2022-12-09T02:45:14Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-15T03:27:03Z",
"updated_at": "2024-07-08T18:20:55Z",
"updated_at": "2024-08-26T12:06:32Z",
"pushed_at": "2024-02-28T03:23:27Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 69,
"watchers": 70,
"score": 0,
"subscribers_count": 4
}

View file

@ -697,5 +697,35 @@
"watchers": 37,
"score": 0,
"subscribers_count": 3
},
{
"id": 847623387,
"name": "CVE-2023-20198",
"full_name": "sanan2004\/CVE-2023-20198",
"owner": {
"login": "sanan2004",
"id": 118365296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118365296?v=4",
"html_url": "https:\/\/github.com\/sanan2004"
},
"html_url": "https:\/\/github.com\/sanan2004\/CVE-2023-20198",
"description": null,
"fork": false,
"created_at": "2024-08-26T08:16:28Z",
"updated_at": "2024-08-26T08:31:22Z",
"pushed_at": "2024-08-26T08:31:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -646,8 +646,8 @@
"description": "confluence rce (CVE-2021-26084, CVE-2022-26134, CVE-2023-22527)",
"fork": false,
"created_at": "2024-05-29T03:20:22Z",
"updated_at": "2024-08-17T19:46:05Z",
"pushed_at": "2024-05-29T06:14:19Z",
"updated_at": "2024-08-26T09:24:34Z",
"pushed_at": "2024-08-26T09:24:31Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -297,8 +297,8 @@
"description": "Sudo Privilege Escalation: CVE-2023-22809 Simulation This project simulates the Sudo privilege escalation vulnerability (CVE-2023-22809) to demonstrate how unauthorized root access can be gained. It involves identifying and exploiting this vulnerability in a controlled environment using Parrot OS, the Sudo command, and Bash scripting.",
"fork": false,
"created_at": "2024-08-26T06:27:59Z",
"updated_at": "2024-08-26T06:28:03Z",
"pushed_at": "2024-08-26T06:28:00Z",
"updated_at": "2024-08-26T07:09:13Z",
"pushed_at": "2024-08-26T07:09:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-11-18T04:35:37Z",
"updated_at": "2024-01-22T21:48:05Z",
"updated_at": "2024-08-26T07:38:34Z",
"pushed_at": "2023-11-22T16:50:34Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-34312",
"fork": false,
"created_at": "2023-05-27T12:44:42Z",
"updated_at": "2024-07-11T00:27:25Z",
"updated_at": "2024-08-26T10:50:08Z",
"pushed_at": "2023-05-27T12:45:10Z",
"stargazers_count": 419,
"watchers_count": 419,
"stargazers_count": 418,
"watchers_count": 418,
"has_discussions": false,
"forks_count": 75,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 75,
"watchers": 419,
"watchers": 418,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "WonderCMS Authenticated RCE - CVE-2023-41425",
"fork": false,
"created_at": "2023-11-05T15:06:43Z",
"updated_at": "2024-08-18T18:29:48Z",
"updated_at": "2024-08-26T11:05:30Z",
"pushed_at": "2023-11-06T18:56:53Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering them ineffective, working for both x32 and x64(CVE-2023-44976).",
"fork": false,
"created_at": "2023-10-01T18:24:38Z",
"updated_at": "2024-08-22T05:32:33Z",
"updated_at": "2024-08-26T11:11:42Z",
"pushed_at": "2024-07-06T23:35:51Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 71,
"watchers": 72,
"score": 0,
"subscribers_count": 2
}

View file

@ -223,10 +223,10 @@
"description": null,
"fork": false,
"created_at": "2023-12-18T23:12:25Z",
"updated_at": "2024-08-25T15:14:49Z",
"updated_at": "2024-08-26T12:01:56Z",
"pushed_at": "2024-05-13T17:40:58Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-08-25T20:02:46Z",
"updated_at": "2024-08-26T11:07:34Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 664,
"watchers_count": 664,
"stargazers_count": 665,
"watchers_count": 665,
"has_discussions": false,
"forks_count": 147,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 147,
"watchers": 664,
"watchers": 665,
"score": 0,
"subscribers_count": 10
},

View file

@ -43,8 +43,8 @@
"description": "LiteSpeed Cache Privilege Escalation PoC - CVE-2024-28000",
"fork": false,
"created_at": "2024-08-25T16:57:24Z",
"updated_at": "2024-08-25T16:57:27Z",
"pushed_at": "2024-08-25T16:57:25Z",
"updated_at": "2024-08-26T08:20:48Z",
"pushed_at": "2024-08-26T08:28:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -52,7 +52,16 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"abdal",
"cve-2024-28000",
"ebrasha",
"exploit",
"litespeed-cache-privilege",
"poc",
"privilege-escalation-poc",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -262,10 +262,10 @@
"description": "SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine. ",
"fork": false,
"created_at": "2024-08-24T17:05:48Z",
"updated_at": "2024-08-25T12:40:30Z",
"updated_at": "2024-08-26T11:33:03Z",
"pushed_at": "2024-08-24T17:22:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -274,7 +274,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-24T10:37:26Z",
"updated_at": "2024-08-24T09:43:11Z",
"updated_at": "2024-08-26T06:47:18Z",
"pushed_at": "2024-07-31T19:11:55Z",
"stargazers_count": 192,
"watchers_count": 192,
"stargazers_count": 193,
"watchers_count": 193,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 192,
"watchers": 193,
"score": 0,
"subscribers_count": 3
},

View file

@ -765,36 +765,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 804135331,
"name": "CVE-2024-32002-poc",
"full_name": "YuanlooSec\/CVE-2024-32002-poc",
"owner": {
"login": "YuanlooSec",
"id": 133356276,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133356276?v=4",
"html_url": "https:\/\/github.com\/YuanlooSec"
},
"html_url": "https:\/\/github.com\/YuanlooSec\/CVE-2024-32002-poc",
"description": null,
"fork": false,
"created_at": "2024-05-22T02:51:36Z",
"updated_at": "2024-05-22T06:48:17Z",
"pushed_at": "2024-05-22T06:48:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 804285979,
"name": "CVE-2024-32002-poc",

View file

@ -226,10 +226,10 @@
"description": "CVE-2024-38063 Research Tool",
"fork": false,
"created_at": "2024-08-24T15:04:54Z",
"updated_at": "2024-08-26T06:18:11Z",
"updated_at": "2024-08-26T09:41:30Z",
"pushed_at": "2024-08-26T06:18:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -238,7 +238,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
@ -256,10 +256,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-08-26T02:16:10Z",
"pushed_at": "2024-08-25T12:35:21Z",
"stargazers_count": 3,
"watchers_count": 3,
"updated_at": "2024-08-26T10:42:37Z",
"pushed_at": "2024-08-26T08:14:55Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -268,7 +268,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 219,
"forks_count": 220,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 219,
"forks": 220,
"watchers": 0,
"score": 0,
"subscribers_count": 0
@ -43,10 +43,10 @@
"description": "RDL的堆溢出导致的RCE",
"fork": false,
"created_at": "2024-08-09T05:00:44Z",
"updated_at": "2024-08-26T03:01:03Z",
"updated_at": "2024-08-26T08:01:23Z",
"pushed_at": "2024-08-14T04:43:05Z",
"stargazers_count": 183,
"watchers_count": 183,
"stargazers_count": 184,
"watchers_count": 184,
"has_discussions": false,
"forks_count": 80,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 80,
"watchers": 183,
"watchers": 184,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-20T12:41:57Z",
"updated_at": "2024-08-22T01:15:47Z",
"updated_at": "2024-08-26T08:46:24Z",
"pushed_at": "2024-08-20T15:36:45Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-18T11:30:50Z",
"updated_at": "2024-08-25T17:18:13Z",
"updated_at": "2024-08-26T07:39:21Z",
"pushed_at": "2024-08-18T12:27:30Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)",
"fork": false,
"created_at": "2024-08-08T02:40:56Z",
"updated_at": "2024-08-24T16:07:08Z",
"updated_at": "2024-08-26T08:13:22Z",
"pushed_at": "2024-08-24T16:07:05Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,8 +13,8 @@
"description": "InstantCMS - Stored Cross Site Scripting (XSS)",
"fork": false,
"created_at": "2024-08-26T06:32:49Z",
"updated_at": "2024-08-26T06:32:52Z",
"pushed_at": "2024-08-26T06:32:49Z",
"updated_at": "2024-08-26T06:45:26Z",
"pushed_at": "2024-08-26T06:45:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,8 +13,8 @@
"description": "PoC for the CVE-2024-41992 (RCE on devices running WiFi-TestSuite-DUT)",
"fork": false,
"created_at": "2024-08-23T23:48:01Z",
"updated_at": "2024-08-23T23:50:24Z",
"pushed_at": "2024-08-23T23:50:21Z",
"updated_at": "2024-08-26T07:09:36Z",
"pushed_at": "2024-08-26T07:09:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "An issue in Silverpeas v6.4.2 and lower allows for the bypassing of password complexity requirements.",
"fork": false,
"created_at": "2024-08-15T21:32:29Z",
"updated_at": "2024-08-15T21:55:43Z",
"updated_at": "2024-08-26T09:13:40Z",
"pushed_at": "2024-08-15T21:55:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "CVE-2024-42992",
"fork": false,
"created_at": "2024-08-22T04:40:34Z",
"updated_at": "2024-08-24T14:01:05Z",
"updated_at": "2024-08-26T09:34:43Z",
"pushed_at": "2024-08-22T04:43:17Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -10,13 +10,13 @@
"html_url": "https:\/\/github.com\/Azvanzed"
},
"html_url": "https:\/\/github.com\/Azvanzed\/CVE-2024-44083",
"description": "Makes IDA (all versions) to crash upon opening it. ",
"description": "Makes IDA (most versions) to crash upon opening it. ",
"fork": false,
"created_at": "2024-08-25T12:33:14Z",
"updated_at": "2024-08-26T06:27:38Z",
"updated_at": "2024-08-26T10:33:10Z",
"pushed_at": "2024-08-26T00:12:57Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 23,
"watchers": 28,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-45264.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 847669530,
"name": "CVE-2024-45264",
"full_name": "TheHermione\/CVE-2024-45264",
"owner": {
"login": "TheHermione",
"id": 73027590,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73027590?v=4",
"html_url": "https:\/\/github.com\/TheHermione"
},
"html_url": "https:\/\/github.com\/TheHermione\/CVE-2024-45264",
"description": " CVE-2024-45264",
"fork": false,
"created_at": "2024-08-26T10:10:52Z",
"updated_at": "2024-08-26T11:03:27Z",
"pushed_at": "2024-08-26T10:56:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-45265.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 847689277,
"name": "CVE-2024-45265",
"full_name": "TheHermione\/CVE-2024-45265",
"owner": {
"login": "TheHermione",
"id": 73027590,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73027590?v=4",
"html_url": "https:\/\/github.com\/TheHermione"
},
"html_url": "https:\/\/github.com\/TheHermione\/CVE-2024-45265",
"description": "CVE-2024-45265",
"fork": false,
"created_at": "2024-08-26T11:02:37Z",
"updated_at": "2024-08-26T11:05:59Z",
"pushed_at": "2024-08-26T11:05:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -498,7 +498,7 @@
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -511,7 +511,7 @@
"redteam"
],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 15,
"score": 0,
"subscribers_count": 1

View file

@ -13,8 +13,8 @@
"description": "Proof-of-Concept for CVE-2024-5932",
"fork": false,
"created_at": "2024-08-25T11:51:36Z",
"updated_at": "2024-08-26T01:13:39Z",
"pushed_at": "2024-08-25T14:05:06Z",
"updated_at": "2024-08-26T12:16:54Z",
"pushed_at": "2024-08-26T12:16:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -2838,13 +2838,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -13,7 +13,7 @@
"description": "Will attempt to retrieve DB details for FastAdmin instances",
"fork": false,
"created_at": "2024-08-20T03:09:47Z",
"updated_at": "2024-08-26T02:18:07Z",
"updated_at": "2024-08-26T07:24:14Z",
"pushed_at": "2024-08-20T03:21:56Z",
"stargazers_count": 58,
"watchers_count": 58,

View file

@ -3212,7 +3212,6 @@
- [Roronoawjd/hook](https://github.com/Roronoawjd/hook)
- [Roronoawjd/git_rce](https://github.com/Roronoawjd/git_rce)
- [JJoosh/CVE-2024-32002-Reverse-Shell](https://github.com/JJoosh/CVE-2024-32002-Reverse-Shell)
- [YuanlooSec/CVE-2024-32002-poc](https://github.com/YuanlooSec/CVE-2024-32002-poc)
- [1mxml/CVE-2024-32002-poc](https://github.com/1mxml/CVE-2024-32002-poc)
- [bfengj/CVE-2024-32002-hook](https://github.com/bfengj/CVE-2024-32002-hook)
- [ycdxsb/CVE-2024-32002-hulk](https://github.com/ycdxsb/CVE-2024-32002-hulk)
@ -4426,9 +4425,19 @@
- [Azvanzed/CVE-2024-44083](https://github.com/Azvanzed/CVE-2024-44083)
### CVE-2024-45241
### CVE-2024-45241 (2024-08-26)
<code>A traversal vulnerability in GeneralDocs.aspx in CentralSquare CryWolf (False Alarm Management) through 2024-08-09 allows unauthenticated attackers to read files outside of the working web directory via the rpt parameter, leading to the disclosure of sensitive information.
</code>
- [d4lyw/CVE-2024-45241](https://github.com/d4lyw/CVE-2024-45241)
### CVE-2024-45264
- [TheHermione/CVE-2024-45264](https://github.com/TheHermione/CVE-2024-45264)
### CVE-2024-45265
- [TheHermione/CVE-2024-45265](https://github.com/TheHermione/CVE-2024-45265)
### CVE-2024-56662
- [nimosec/cve-2024-56662](https://github.com/nimosec/cve-2024-56662)
@ -5991,6 +6000,7 @@
- [netbell/CVE-2023-20198-Fix](https://github.com/netbell/CVE-2023-20198-Fix)
- [Vulnmachines/Cisco_CVE-2023-20198](https://github.com/Vulnmachines/Cisco_CVE-2023-20198)
- [W01fh4cker/CVE-2023-20198-RCE](https://github.com/W01fh4cker/CVE-2023-20198-RCE)
- [sanan2004/CVE-2023-20198](https://github.com/sanan2004/CVE-2023-20198)
### CVE-2023-20209 (2023-08-16)
@ -24200,6 +24210,7 @@
- [belajarqywok/CVE-2021-41773-MSF](https://github.com/belajarqywok/CVE-2021-41773-MSF)
- [Iris288/CVE-2021-41773](https://github.com/Iris288/CVE-2021-41773)
- [Maybe4a6f7365/CVE-2021-41773](https://github.com/Maybe4a6f7365/CVE-2021-41773)
- [0xc4t/CVE-2021-41773](https://github.com/0xc4t/CVE-2021-41773)
### CVE-2021-41784 (2022-08-29)
@ -25547,7 +25558,6 @@
- [jxpsx/CVE-2021-45232-RCE](https://github.com/jxpsx/CVE-2021-45232-RCE)
- [wuppp/cve-2021-45232-exp](https://github.com/wuppp/cve-2021-45232-exp)
- [dskho/CVE-2021-45232](https://github.com/dskho/CVE-2021-45232)
- [xiju2003/-cve-2021-45232](https://github.com/xiju2003/-cve-2021-45232)
- [GYLQ/CVE-2021-45232-RCE](https://github.com/GYLQ/CVE-2021-45232-RCE)
- [fany0r/CVE-2021-45232-RCE](https://github.com/fany0r/CVE-2021-45232-RCE)
- [yggcwhat/Demo](https://github.com/yggcwhat/Demo)