Auto Update 2024/12/21 12:32:02

This commit is contained in:
motikan2010-bot 2024-12-21 21:32:02 +09:00
parent 2304645eb8
commit 9ebf19b794
38 changed files with 313 additions and 104 deletions

View file

@ -14,10 +14,10 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2024-12-15T07:06:04Z",
"updated_at": "2024-12-21T07:10:47Z",
"pushed_at": "2023-01-22T09:39:45Z",
"stargazers_count": 389,
"watchers_count": 389,
"stargazers_count": 390,
"watchers_count": 390,
"has_discussions": false,
"forks_count": 110,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 110,
"watchers": 389,
"watchers": 390,
"score": 0,
"subscribers_count": 18
},

View file

@ -246,5 +246,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 906576715,
"name": "cve-2017-12149",
"full_name": "zesnd\/cve-2017-12149",
"owner": {
"login": "zesnd",
"id": 109968085,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109968085?v=4",
"html_url": "https:\/\/github.com\/zesnd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zesnd\/cve-2017-12149",
"description": null,
"fork": false,
"created_at": "2024-12-21T09:38:36Z",
"updated_at": "2024-12-21T09:39:32Z",
"pushed_at": "2024-12-21T09:39:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2024-11-12T00:23:00Z",
"updated_at": "2024-12-21T07:22:59Z",
"pushed_at": "2023-09-28T18:58:28Z",
"stargazers_count": 670,
"watchers_count": 670,
"stargazers_count": 669,
"watchers_count": 669,
"has_discussions": false,
"forks_count": 131,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 131,
"watchers": 670,
"watchers": 669,
"score": 0,
"subscribers_count": 43
},

View file

@ -954,5 +954,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 906576137,
"name": "CVE-2020-14882-POC",
"full_name": "zesnd\/CVE-2020-14882-POC",
"owner": {
"login": "zesnd",
"id": 109968085,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109968085?v=4",
"html_url": "https:\/\/github.com\/zesnd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zesnd\/CVE-2020-14882-POC",
"description": null,
"fork": false,
"created_at": "2024-12-21T09:36:18Z",
"updated_at": "2024-12-21T09:37:48Z",
"pushed_at": "2024-12-21T09:37:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2024-12-17T10:32:29Z",
"updated_at": "2024-12-21T10:46:19Z",
"pushed_at": "2024-04-02T02:48:18Z",
"stargazers_count": 412,
"watchers_count": 412,
"stargazers_count": 413,
"watchers_count": 413,
"has_discussions": false,
"forks_count": 136,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 136,
"watchers": 412,
"watchers": 413,
"score": 0,
"subscribers_count": 4
},
@ -107,10 +107,10 @@
"description": "CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered)",
"fork": false,
"created_at": "2021-07-07T06:16:48Z",
"updated_at": "2024-08-12T20:14:31Z",
"updated_at": "2024-12-21T10:39:42Z",
"pushed_at": "2021-07-07T07:19:03Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -125,7 +125,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 1
},

View file

@ -6374,10 +6374,10 @@
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T23:33:51Z",
"updated_at": "2024-12-11T09:38:58Z",
"updated_at": "2024-12-21T07:23:09Z",
"pushed_at": "2022-03-23T18:12:51Z",
"stargazers_count": 345,
"watchers_count": 345,
"stargazers_count": 344,
"watchers_count": 344,
"has_discussions": false,
"forks_count": 87,
"allow_forking": true,
@ -6386,7 +6386,7 @@
"topics": [],
"visibility": "public",
"forks": 87,
"watchers": 345,
"watchers": 344,
"score": 0,
"subscribers_count": 35
},

View file

@ -107,10 +107,10 @@
"description": "CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!",
"fork": false,
"created_at": "2024-11-07T13:06:44Z",
"updated_at": "2024-12-06T02:36:59Z",
"updated_at": "2024-12-21T08:39:32Z",
"pushed_at": "2024-11-07T13:38:18Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 74,
"watchers": 75,
"score": 0,
"subscribers_count": 3
},

View file

@ -696,10 +696,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-07T09:19:02Z",
"updated_at": "2024-11-29T07:25:20Z",
"updated_at": "2024-12-21T08:17:49Z",
"pushed_at": "2022-06-07T10:35:18Z",
"stargazers_count": 334,
"watchers_count": 334,
"stargazers_count": 335,
"watchers_count": 335,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -708,7 +708,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 334,
"watchers": 335,
"score": 0,
"subscribers_count": 7
},

View file

@ -14,10 +14,10 @@
"description": "Attacks against QUIC (CVE-2022-30591)",
"fork": false,
"created_at": "2022-06-30T18:25:23Z",
"updated_at": "2024-11-15T04:16:53Z",
"updated_at": "2024-12-21T09:02:33Z",
"pushed_at": "2022-12-31T01:55:15Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,28 @@
"description": "CVE-2022-39227 : Proof of Concept ",
"fork": false,
"created_at": "2023-06-07T11:11:12Z",
"updated_at": "2024-07-12T19:04:28Z",
"updated_at": "2024-12-21T11:10:19Z",
"pushed_at": "2024-03-19T14:37:31Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"ctf",
"cve",
"cve-2022-39227",
"exploit",
"hackthebox",
"it-security",
"jwt",
"jwt-token"
],
"visibility": "public",
"forks": 1,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 1
},

View file

@ -1423,7 +1423,7 @@
"fork": false,
"created_at": "2024-02-08T20:55:09Z",
"updated_at": "2024-02-08T20:55:23Z",
"pushed_at": "2024-12-17T18:06:54Z",
"pushed_at": "2024-12-21T12:11:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -45,7 +45,7 @@
"description": "harbor unauthorized detection",
"fork": false,
"created_at": "2023-03-21T10:40:19Z",
"updated_at": "2024-12-21T04:46:10Z",
"updated_at": "2024-12-21T08:30:28Z",
"pushed_at": "2024-12-12T07:37:01Z",
"stargazers_count": 28,
"watchers_count": 28,

View file

@ -14,10 +14,10 @@
"description": "MOC3ingbird Exploit for Live2D (CVE-2023-27566)",
"fork": false,
"created_at": "2023-03-03T01:57:28Z",
"updated_at": "2024-12-18T12:41:54Z",
"updated_at": "2024-12-21T11:03:49Z",
"pushed_at": "2023-09-19T01:12:41Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": true,
"forks_count": 6,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 81,
"watchers": 82,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,7 +14,7 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-20T19:04:31Z",
"updated_at": "2024-12-21T09:53:25Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 45,
"watchers_count": 45,

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-20T13:21:17Z",
"updated_at": "2024-12-21T10:33:12Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1305,
"watchers_count": 1305,
"stargazers_count": 1306,
"watchers_count": 1306,
"has_discussions": false,
"forks_count": 221,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 221,
"watchers": 1305,
"watchers": 1306,
"score": 0,
"subscribers_count": 21
},

View file

@ -392,10 +392,10 @@
"description": "CVE-2023-7028 POC && Exploit",
"fork": false,
"created_at": "2024-08-21T04:14:55Z",
"updated_at": "2024-10-08T09:02:23Z",
"updated_at": "2024-12-21T06:40:31Z",
"pushed_at": "2024-08-21T04:16:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -404,7 +404,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-21306 BadBlue implementation (Using DuckyScript)",
"fork": false,
"created_at": "2024-05-06T02:05:02Z",
"updated_at": "2024-12-15T09:33:29Z",
"updated_at": "2024-12-21T07:04:49Z",
"pushed_at": "2024-07-11T05:13:43Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},

View file

@ -344,5 +344,36 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 906538490,
"name": "HFS2.3_poc",
"full_name": "NingXin2002\/HFS2.3_poc",
"owner": {
"login": "NingXin2002",
"id": 138864342,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4",
"html_url": "https:\/\/github.com\/NingXin2002",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NingXin2002\/HFS2.3_poc",
"description": "HFS2.3未经身份验证的远程代码执行(CVE-2024-23692)",
"fork": false,
"created_at": "2024-12-21T07:13:11Z",
"updated_at": "2024-12-21T07:14:30Z",
"pushed_at": "2024-12-21T07:14:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -461,6 +461,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -265,10 +265,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-12-19T20:46:08Z",
"updated_at": "2024-12-21T09:47:59Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 637,
"watchers_count": 637,
"stargazers_count": 636,
"watchers_count": 636,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -277,7 +277,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 637,
"watchers": 636,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-03T08:56:59Z",
"updated_at": "2024-12-18T10:56:35Z",
"updated_at": "2024-12-21T07:19:27Z",
"pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 0
}

View file

@ -45,7 +45,7 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-20T19:04:31Z",
"updated_at": "2024-12-21T09:53:25Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 45,
"watchers_count": 45,

33
2024/CVE-2024-39914.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 906558100,
"name": "FOG-Project",
"full_name": "9874621368\/FOG-Project",
"owner": {
"login": "9874621368",
"id": 154233216,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154233216?v=4",
"html_url": "https:\/\/github.com\/9874621368",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/9874621368\/FOG-Project",
"description": "FOG Project CVE-2024-39914 命令执行漏洞",
"fork": false,
"created_at": "2024-12-21T08:30:00Z",
"updated_at": "2024-12-21T08:33:57Z",
"pushed_at": "2024-12-21T08:33:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -60,5 +60,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 906575821,
"name": "cve-2024-CVE-2024-41713",
"full_name": "Sanandd\/cve-2024-CVE-2024-41713",
"owner": {
"login": "Sanandd",
"id": 192220387,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192220387?v=4",
"html_url": "https:\/\/github.com\/Sanandd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Sanandd\/cve-2024-CVE-2024-41713",
"description": "cve-2024-CVE-2024-41713",
"fork": false,
"created_at": "2024-12-21T09:35:12Z",
"updated_at": "2024-12-21T09:36:20Z",
"pushed_at": "2024-12-21T09:36:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-4898 InstaWP Connect 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup\/Arbitrary Options Update\/Administrative User Creation",
"fork": false,
"created_at": "2024-06-12T10:03:14Z",
"updated_at": "2024-10-15T23:45:27Z",
"updated_at": "2024-12-21T07:07:20Z",
"pushed_at": "2024-06-12T10:23:05Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module",
"fork": false,
"created_at": "2024-12-18T01:06:54Z",
"updated_at": "2024-12-20T03:34:26Z",
"updated_at": "2024-12-21T06:46:18Z",
"pushed_at": "2024-12-18T01:17:11Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -59,7 +59,7 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 906070879,
@ -90,7 +90,7 @@
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 906416890,
@ -121,6 +121,37 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 906517672,
"name": "Tomcat-CVE-2024-50379-Poc",
"full_name": "ph0ebus\/Tomcat-CVE-2024-50379-Poc",
"owner": {
"login": "ph0ebus",
"id": 108201283,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108201283?v=4",
"html_url": "https:\/\/github.com\/ph0ebus",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ph0ebus\/Tomcat-CVE-2024-50379-Poc",
"description": "RCE through a race condition in Apache Tomcat",
"fork": false,
"created_at": "2024-12-21T05:54:29Z",
"updated_at": "2024-12-21T08:57:38Z",
"pushed_at": "2024-12-21T08:56:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-21T01:51:32Z",
"updated_at": "2024-12-21T07:55:19Z",
"pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 65,
"watchers": 66,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
"fork": false,
"created_at": "2024-12-20T03:34:01Z",
"updated_at": "2024-12-21T05:14:20Z",
"pushed_at": "2024-12-20T04:26:44Z",
"stargazers_count": 16,
"watchers_count": 16,
"updated_at": "2024-12-21T10:59:02Z",
"pushed_at": "2024-12-21T10:28:39Z",
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,8 +26,8 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 16,
"watchers": 19,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -274,7 +274,7 @@
"stargazers_count": 460,
"watchers_count": 460,
"has_discussions": false,
"forks_count": 88,
"forks_count": 89,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -286,7 +286,7 @@
"redteam"
],
"visibility": "public",
"forks": 88,
"forks": 89,
"watchers": 460,
"score": 0,
"subscribers_count": 7

View file

@ -14,10 +14,10 @@
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
"fork": false,
"created_at": "2024-09-10T06:27:59Z",
"updated_at": "2024-12-16T08:03:54Z",
"updated_at": "2024-12-21T06:44:02Z",
"pushed_at": "2024-10-17T05:12:29Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 83,
"watchers": 84,
"score": 0,
"subscribers_count": 2
},

View file

@ -214,6 +214,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "SourceCodester Online Eyewear Shop Remote File Inclusion Vulnerability",
"fork": false,
"created_at": "2024-09-28T15:58:54Z",
"updated_at": "2024-09-28T16:06:34Z",
"updated_at": "2024-12-21T06:40:14Z",
"pushed_at": "2024-09-28T16:06:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "All-in-One WP Migration and Backup <= 7.86 - Authenticated (Administrator+) Arbitrary PHP Code Injection",
"fork": false,
"created_at": "2024-09-29T19:34:59Z",
"updated_at": "2024-10-29T21:42:00Z",
"updated_at": "2024-12-21T06:52:20Z",
"pushed_at": "2024-10-27T21:45:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -3086,6 +3086,7 @@
- [pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692](https://github.com/pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692)
- [verylazytech/CVE-2024-23692](https://github.com/verylazytech/CVE-2024-23692)
- [XiaomingX/cve-2024-23692-poc](https://github.com/XiaomingX/cve-2024-23692-poc)
- [NingXin2002/HFS2.3_poc](https://github.com/NingXin2002/HFS2.3_poc)
### CVE-2024-23708 (2024-05-07)
@ -5917,6 +5918,13 @@
- [SpiralBL0CK/CVE-2024-39908](https://github.com/SpiralBL0CK/CVE-2024-39908)
### CVE-2024-39914 (2024-07-12)
<code>FOG is a cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.34, packages/web/lib/fog/reportmaker.class.php in FOG was affected by a command injection via the filename parameter to /fog/management/export.php. This vulnerability is fixed in 1.5.10.34.
</code>
- [9874621368/FOG-Project](https://github.com/9874621368/FOG-Project)
### CVE-2024-39929 (2024-07-04)
<code>Exim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users.
@ -6213,6 +6221,7 @@
- [watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713](https://github.com/watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713)
- [zxj-hub/CVE-2024-41713POC](https://github.com/zxj-hub/CVE-2024-41713POC)
- [Sanandd/cve-2024-CVE-2024-41713](https://github.com/Sanandd/cve-2024-CVE-2024-41713)
### CVE-2024-41958 (2024-08-05)
@ -7094,6 +7103,7 @@
- [JFOZ1010/Nuclei-Template-CVE-2024-50379](https://github.com/JFOZ1010/Nuclei-Template-CVE-2024-50379)
- [iSee857/CVE-2024-50379-PoC](https://github.com/iSee857/CVE-2024-50379-PoC)
- [Alchemist3dot14/CVE-2024-50379](https://github.com/Alchemist3dot14/CVE-2024-50379)
- [ph0ebus/Tomcat-CVE-2024-50379-Poc](https://github.com/ph0ebus/Tomcat-CVE-2024-50379-Poc)
### CVE-2024-50395 (2024-11-22)
@ -33075,6 +33085,7 @@
- [Danny-LLi/CVE-2020-14882](https://github.com/Danny-LLi/CVE-2020-14882)
- [LucasPDiniz/CVE-2020-14882](https://github.com/LucasPDiniz/CVE-2020-14882)
- [xMr110/CVE-2020-14882](https://github.com/xMr110/CVE-2020-14882)
- [zesnd/CVE-2020-14882-POC](https://github.com/zesnd/CVE-2020-14882-POC)
### CVE-2020-14883 (2020-10-21)
@ -44144,6 +44155,7 @@
- [VVeakee/CVE-2017-12149](https://github.com/VVeakee/CVE-2017-12149)
- [MrE-Fog/jboss-_CVE-2017-12149](https://github.com/MrE-Fog/jboss-_CVE-2017-12149)
- [JesseClarkND/CVE-2017-12149](https://github.com/JesseClarkND/CVE-2017-12149)
- [zesnd/cve-2017-12149](https://github.com/zesnd/cve-2017-12149)
### CVE-2017-12426 (2017-08-14)