Auto Update 2024/12/06 12:32:40

This commit is contained in:
motikan2010-bot 2024-12-06 21:32:40 +09:00
parent b1ae207126
commit a0ec5db0db
56 changed files with 219 additions and 251 deletions

View file

@ -14,10 +14,10 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2024-12-05T01:23:45Z",
"updated_at": "2024-12-06T09:40:30Z",
"pushed_at": "2024-05-03T22:24:07Z",
"stargazers_count": 188,
"watchers_count": 188,
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 188,
"watchers": 187,
"score": 0,
"subscribers_count": 8
}

View file

@ -272,10 +272,10 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2024-12-04T10:09:50Z",
"updated_at": "2024-12-06T06:15:55Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 315,
"watchers_count": 315,
"stargazers_count": 316,
"watchers_count": 316,
"has_discussions": false,
"forks_count": 120,
"allow_forking": true,
@ -288,7 +288,7 @@
],
"visibility": "public",
"forks": 120,
"watchers": 315,
"watchers": 316,
"score": 0,
"subscribers_count": 16
},

View file

@ -76,10 +76,10 @@
"description": "Proof-of-concept exploit code for CVE-2016-5696",
"fork": false,
"created_at": "2016-08-23T00:21:18Z",
"updated_at": "2024-08-12T19:24:30Z",
"updated_at": "2024-12-06T11:23:30Z",
"pushed_at": "2016-08-30T06:32:43Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 8
},

View file

@ -46,7 +46,7 @@
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-12-04T16:36:36Z",
"pushed_at": "2024-12-04T16:36:35Z",
"pushed_at": "2024-12-06T09:35:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 10. This proof-of-concept only activates a privileged intent.",
"fork": false,
"created_at": "2021-02-23T14:00:55Z",
"updated_at": "2024-02-08T07:56:29Z",
"updated_at": "2024-12-06T07:19:14Z",
"pushed_at": "2021-02-23T14:03:00Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 2
}

View file

@ -107,10 +107,10 @@
"description": "Make CVE-2020-0668 exploit work for version < win10 v1903 and version >= win10 v1903",
"fork": false,
"created_at": "2021-10-28T05:30:14Z",
"updated_at": "2024-06-01T01:13:32Z",
"updated_at": "2024-12-06T11:54:47Z",
"pushed_at": "2021-12-07T03:33:56Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 4
},

View file

@ -45,10 +45,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2024-12-05T17:05:00Z",
"updated_at": "2024-12-06T06:42:39Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1843,
"watchers_count": 1843,
"stargazers_count": 1844,
"watchers_count": 1844,
"has_discussions": false,
"forks_count": 583,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 583,
"watchers": 1843,
"watchers": 1844,
"score": 0,
"subscribers_count": 43
},
@ -178,10 +178,10 @@
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-07-01T09:47:13Z",
"updated_at": "2024-09-19T12:06:30Z",
"updated_at": "2024-12-06T06:42:42Z",
"pushed_at": "2021-07-05T06:46:12Z",
"stargazers_count": 330,
"watchers_count": 330,
"stargazers_count": 331,
"watchers_count": 331,
"has_discussions": false,
"forks_count": 79,
"allow_forking": true,
@ -199,7 +199,7 @@
],
"visibility": "public",
"forks": 79,
"watchers": 330,
"watchers": 331,
"score": 0,
"subscribers_count": 13
},

View file

@ -1109,13 +1109,13 @@
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 45,
"score": 0,
"subscribers_count": 18
@ -1357,7 +1357,7 @@
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1376,7 +1376,7 @@
"zeroday"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 9,
"score": 0,
"subscribers_count": 2

View file

@ -244,19 +244,19 @@
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2024-12-01T14:07:15Z",
"updated_at": "2024-12-06T12:04:45Z",
"pushed_at": "2024-05-19T16:25:52Z",
"stargazers_count": 785,
"watchers_count": 785,
"stargazers_count": 786,
"watchers_count": 786,
"has_discussions": false,
"forks_count": 121,
"forks_count": 122,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 121,
"watchers": 785,
"forks": 122,
"watchers": 786,
"score": 0,
"subscribers_count": 10
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 1345,
"watchers_count": 1345,
"has_discussions": false,
"forks_count": 322,
"forks_count": 323,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 322,
"forks": 323,
"watchers": 1345,
"score": 0,
"subscribers_count": 27

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ",
"fork": false,
"created_at": "2024-09-17T06:28:17Z",
"updated_at": "2024-11-18T12:42:17Z",
"updated_at": "2024-12-06T09:40:43Z",
"pushed_at": "2024-10-16T22:27:13Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 45,
"watchers": 44,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "nps认证绕过利用工具CVE-2022-40494使用此工具可在浏览器访问web控制端后台页面或者批量获取socks5和http代理",
"fork": false,
"created_at": "2022-08-04T08:22:41Z",
"updated_at": "2024-12-05T07:52:45Z",
"updated_at": "2024-12-06T08:46:32Z",
"pushed_at": "2022-08-19T09:04:09Z",
"stargazers_count": 301,
"watchers_count": 301,
"stargazers_count": 300,
"watchers_count": 300,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 301,
"watchers": 300,
"score": 0,
"subscribers_count": 6
}

View file

@ -638,7 +638,7 @@
"fork": false,
"created_at": "2024-03-04T19:09:57Z",
"updated_at": "2024-10-31T13:25:33Z",
"pushed_at": "2024-11-25T09:11:38Z",
"pushed_at": "2024-12-06T08:36:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -1,35 +1,4 @@
[
{
"id": 773579290,
"name": "CVE-2023-3824-PHP-to-RCE-LockBit-LEAK",
"full_name": "Starla2u\/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK",
"owner": {
"login": "Starla2u",
"id": 106727356,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106727356?v=4",
"html_url": "https:\/\/github.com\/Starla2u",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Starla2u\/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK",
"description": null,
"fork": false,
"created_at": "2024-03-18T02:19:03Z",
"updated_at": "2024-03-18T02:19:03Z",
"pushed_at": "2024-03-10T04:37:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 773755811,
"name": "CVE-2023-3824",

View file

@ -702,10 +702,10 @@
"description": "Carga de archivos sin restricciones en la funcionalidad de carga de archivos grandes en `\/main\/inc\/lib\/javascript\/bigupload\/inc\/bigUpload.php` en Chamilo LMS en versiones <= 1.11.24 permite a atacantes no autenticados realizar ataques de Cross Site Scripting almacenados y obtener código remoto ejecución mediante la carga de web shell.",
"fork": false,
"created_at": "2024-12-05T12:45:13Z",
"updated_at": "2024-12-05T13:11:43Z",
"updated_at": "2024-12-06T11:57:04Z",
"pushed_at": "2024-12-05T13:11:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -714,7 +714,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "JetBrains TeamCity Authentication Bypass CVE-2023-42793 Exploit",
"fork": false,
"created_at": "2023-09-29T06:43:35Z",
"updated_at": "2024-10-27T21:40:54Z",
"updated_at": "2024-12-06T09:40:36Z",
"pushed_at": "2024-05-22T16:07:18Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 45,
"watchers": 44,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-03-15T12:03:51Z",
"updated_at": "2024-09-19T12:05:19Z",
"updated_at": "2024-12-06T09:40:38Z",
"pushed_at": "2024-03-16T21:22:27Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -40,7 +40,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 26,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "[漏洞复现] 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
"fork": false,
"created_at": "2023-11-17T10:32:31Z",
"updated_at": "2024-12-02T03:13:36Z",
"updated_at": "2024-12-06T10:52:35Z",
"pushed_at": "2023-11-21T10:45:58Z",
"stargazers_count": 202,
"watchers_count": 202,
"stargazers_count": 203,
"watchers_count": 203,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 34,
"watchers": 202,
"watchers": 203,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,19 +14,19 @@
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
"fork": false,
"created_at": "2024-01-20T07:14:06Z",
"updated_at": "2024-11-30T12:57:29Z",
"updated_at": "2024-12-06T12:07:48Z",
"pushed_at": "2024-01-21T05:04:01Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 81,
"forks": 9,
"watchers": 82,
"score": 0,
"subscribers_count": 4
}

View file

@ -14,7 +14,7 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-04T23:00:01Z",
"updated_at": "2024-12-06T11:10:38Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1285,
"watchers_count": 1285,

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-19T08:29:32Z",
"updated_at": "2024-12-05T20:22:20Z",
"updated_at": "2024-12-06T10:25:45Z",
"pushed_at": "2024-11-19T09:28:42Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,10 +14,10 @@
"description": "a demo poc for CVE-2024-0015",
"fork": false,
"created_at": "2024-03-19T10:00:21Z",
"updated_at": "2024-09-25T12:18:28Z",
"updated_at": "2024-12-06T06:50:42Z",
"pushed_at": "2024-08-14T09:53:13Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "LPE exploit for CVE-2024-0582 (io_uring)",
"fork": false,
"created_at": "2024-03-29T14:45:22Z",
"updated_at": "2024-11-21T09:29:02Z",
"updated_at": "2024-12-06T09:40:39Z",
"pushed_at": "2024-03-29T16:05:31Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 93,
"watchers": 92,
"score": 0,
"subscribers_count": 4
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 30,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698.",
"fork": false,
"created_at": "2024-03-29T04:11:06Z",
"updated_at": "2024-12-03T18:17:19Z",
"updated_at": "2024-12-06T09:40:39Z",
"pushed_at": "2024-03-29T04:31:31Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 10,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2024-20767 - Adobe ColdFusion",
"fork": false,
"created_at": "2024-03-26T06:51:08Z",
"updated_at": "2024-11-20T16:30:43Z",
"updated_at": "2024-12-06T09:40:39Z",
"pushed_at": "2024-03-26T15:52:49Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 33,
"watchers": 32,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-30T06:58:19Z",
"updated_at": "2024-10-30T06:59:03Z",
"updated_at": "2024-12-06T07:24:00Z",
"pushed_at": "2024-10-30T06:58:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -138,10 +138,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-23T06:03:44Z",
"updated_at": "2024-11-20T16:30:51Z",
"updated_at": "2024-12-06T09:40:41Z",
"pushed_at": "2024-06-23T06:09:10Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 38,
"watchers": 37,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-21683 Confluence Post Auth RCE",
"fork": false,
"created_at": "2024-05-23T09:05:40Z",
"updated_at": "2024-11-21T05:23:34Z",
"updated_at": "2024-12-06T09:40:41Z",
"pushed_at": "2024-05-27T03:47:36Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 123,
"watchers": 122,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-12-06T04:05:16Z",
"updated_at": "2024-12-06T09:40:41Z",
"pushed_at": "2024-07-04T10:39:15Z",
"stargazers_count": 323,
"watchers_count": 323,
"stargazers_count": 322,
"watchers_count": 322,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 323,
"watchers": 322,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested)",
"fork": false,
"created_at": "2024-04-09T08:08:07Z",
"updated_at": "2024-11-16T19:52:20Z",
"updated_at": "2024-12-06T09:40:39Z",
"pushed_at": "2024-04-13T09:02:39Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 14,
"watchers": 13,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
"fork": false,
"created_at": "2024-03-11T10:14:39Z",
"updated_at": "2024-11-15T17:13:47Z",
"updated_at": "2024-12-06T09:40:38Z",
"pushed_at": "2024-03-25T12:56:16Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 84,
"watchers_count": 84,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 86,
"watchers": 84,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,7 +76,7 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-11-30T14:01:49Z",
"updated_at": "2024-12-06T09:50:30Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 423,
"watchers_count": 423,

View file

@ -14,10 +14,10 @@
"description": "A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE",
"fork": false,
"created_at": "2024-06-27T13:47:52Z",
"updated_at": "2024-11-20T16:30:52Z",
"updated_at": "2024-12-06T09:40:41Z",
"pushed_at": "2024-07-07T03:36:49Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 88,
"watchers": 87,
"score": 0,
"subscribers_count": 1
}

View file

@ -107,10 +107,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-12-06T00:18:27Z",
"updated_at": "2024-12-06T09:31:02Z",
"pushed_at": "2024-09-08T21:23:34Z",
"stargazers_count": 425,
"watchers_count": 425,
"stargazers_count": 426,
"watchers_count": 426,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 425,
"watchers": 426,
"score": 0,
"subscribers_count": 19
},

View file

@ -14,10 +14,10 @@
"description": "CHAOS RAT web panel path RCE PoC",
"fork": false,
"created_at": "2024-04-05T21:35:04Z",
"updated_at": "2024-12-03T03:09:11Z",
"updated_at": "2024-12-06T09:40:39Z",
"pushed_at": "2024-04-15T17:46:32Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 30,
"watchers": 29,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Jasmin ransomware web panel path traversal PoC",
"fork": false,
"created_at": "2024-04-04T22:59:55Z",
"updated_at": "2024-07-08T20:23:49Z",
"updated_at": "2024-12-06T09:40:39Z",
"pushed_at": "2024-04-09T03:40:52Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 22,
"watchers": 21,
"score": 0,
"subscribers_count": 2
}

View file

@ -509,10 +509,10 @@
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
"fork": false,
"created_at": "2024-03-30T22:07:24Z",
"updated_at": "2024-11-08T15:00:46Z",
"updated_at": "2024-12-06T09:40:39Z",
"pushed_at": "2024-04-02T03:38:32Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 142,
"watchers_count": 142,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -526,7 +526,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 143,
"watchers": 142,
"score": 0,
"subscribers_count": 8
},

View file

@ -19,7 +19,7 @@
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 9,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -37,7 +37,7 @@
"sqli"
],
"visibility": "public",
"forks": 9,
"forks": 11,
"watchers": 60,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.",
"fork": false,
"created_at": "2024-07-04T13:19:47Z",
"updated_at": "2024-11-20T16:30:53Z",
"updated_at": "2024-12-06T09:40:42Z",
"pushed_at": "2024-07-04T19:18:04Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 33,
"watchers": 32,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "POC for CVE-2024-36527: puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal",
"fork": false,
"created_at": "2024-06-20T09:42:07Z",
"updated_at": "2024-06-22T00:50:37Z",
"updated_at": "2024-12-06T09:40:41Z",
"pushed_at": "2024-06-22T00:50:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,7 +14,7 @@
"description": null,
"fork": false,
"created_at": "2024-08-18T11:30:50Z",
"updated_at": "2024-08-29T13:31:16Z",
"updated_at": "2024-12-06T07:11:01Z",
"pushed_at": "2024-08-18T12:27:30Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -14,10 +14,10 @@
"description": "Scanner for CVE-2024-4040",
"fork": false,
"created_at": "2024-04-23T09:31:29Z",
"updated_at": "2024-11-23T22:43:47Z",
"updated_at": "2024-12-06T09:40:39Z",
"pushed_at": "2024-05-17T06:48:43Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 48,
"watchers": 47,
"score": 0,
"subscribers_count": 8
},
@ -308,10 +308,10 @@
"description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.",
"fork": false,
"created_at": "2024-05-03T23:29:53Z",
"updated_at": "2024-11-08T09:40:41Z",
"updated_at": "2024-12-06T09:40:40Z",
"pushed_at": "2024-05-04T00:05:16Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -320,7 +320,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 11,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
@ -401,10 +401,10 @@
"description": "CVE-2024-4040 PoC",
"fork": false,
"created_at": "2024-07-05T05:46:56Z",
"updated_at": "2024-11-20T16:30:53Z",
"updated_at": "2024-12-06T09:40:42Z",
"pushed_at": "2024-07-09T09:48:17Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -417,7 +417,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ",
"fork": false,
"created_at": "2024-09-17T06:28:17Z",
"updated_at": "2024-11-18T12:42:17Z",
"updated_at": "2024-12-06T09:40:43Z",
"pushed_at": "2024-10-16T22:27:13Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 45,
"watchers": 44,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-12-05T06:13:57Z",
"updated_at": "2024-12-05T15:47:07Z",
"updated_at": "2024-12-06T09:16:50Z",
"pushed_at": "2024-12-05T07:55:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,19 +14,19 @@
"description": "cve-2024-42327 ZBX-25623",
"fork": false,
"created_at": "2024-12-01T00:15:27Z",
"updated_at": "2024-12-05T13:53:01Z",
"updated_at": "2024-12-06T08:32:05Z",
"pushed_at": "2024-12-01T01:18:36Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 19,
"forks": 10,
"watchers": 20,
"score": 0,
"subscribers_count": 1
},

View file

@ -548,10 +548,10 @@
"description": "[漏洞复现] 全球首款利用PHP默认环境XAMPP的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。",
"fork": false,
"created_at": "2024-06-08T13:04:45Z",
"updated_at": "2024-12-05T09:00:28Z",
"updated_at": "2024-12-06T08:24:22Z",
"pushed_at": "2024-07-21T20:27:03Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -560,7 +560,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 122,
"watchers": 123,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-06T06:22:23Z",
"updated_at": "2024-12-06T08:32:40Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 71,
"watchers": 72,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "This repository presents a proof-of-concept of CVE-2024-50677",
"fork": false,
"created_at": "2024-12-06T01:04:44Z",
"updated_at": "2024-12-06T01:16:38Z",
"updated_at": "2024-12-06T08:10:02Z",
"pushed_at": "2024-12-06T01:16:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "Exploit for CyberPanel Pre-Auth RCE via Command Injection",
"fork": false,
"created_at": "2024-10-29T23:34:27Z",
"updated_at": "2024-12-06T02:15:52Z",
"updated_at": "2024-12-06T08:03:04Z",
"pushed_at": "2024-11-01T10:12:49Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
}

View file

@ -145,10 +145,10 @@
"description": "PoC RCE in OpenSSH",
"fork": false,
"created_at": "2024-07-01T12:51:18Z",
"updated_at": "2024-10-31T23:48:11Z",
"updated_at": "2024-12-06T09:40:42Z",
"pushed_at": "2024-07-01T13:34:47Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -157,7 +157,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 22,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},
@ -2211,10 +2211,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-12-02T07:30:19Z",
"updated_at": "2024-12-06T11:07:10Z",
"pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -2223,7 +2223,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.",
"fork": false,
"created_at": "2024-09-29T10:58:15Z",
"updated_at": "2024-12-03T02:33:59Z",
"updated_at": "2024-12-06T10:02:06Z",
"pushed_at": "2024-10-04T09:39:09Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 128,
"watchers": 129,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.",
"fork": false,
"created_at": "2024-09-16T19:04:57Z",
"updated_at": "2024-11-20T16:31:04Z",
"updated_at": "2024-12-06T09:40:43Z",
"pushed_at": "2024-09-16T19:44:54Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 45,
"watchers": 44,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "Widget Options The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution",
"fork": false,
"created_at": "2024-12-02T19:59:31Z",
"updated_at": "2024-12-05T10:09:53Z",
"updated_at": "2024-12-06T08:33:00Z",
"pushed_at": "2024-12-02T20:00:09Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "PAN-OS auth bypass + RCE",
"fork": false,
"created_at": "2024-11-19T17:26:27Z",
"updated_at": "2024-12-04T20:47:07Z",
"updated_at": "2024-12-06T10:25:57Z",
"pushed_at": "2024-11-19T17:38:29Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 1
},

View file

@ -8073,7 +8073,6 @@
<code>In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. \n\n
</code>
- [Starla2u/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK](https://github.com/Starla2u/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK)
- [jhonnybonny/CVE-2023-3824](https://github.com/jhonnybonny/CVE-2023-3824)
### CVE-2023-3836 (2023-07-22)