Auto Update 2025/01/13 00:31:59

This commit is contained in:
motikan2010-bot 2025-01-13 09:31:59 +09:00
parent 4fc6f2ab16
commit a0ed6a9ea7
53 changed files with 258 additions and 194 deletions

View file

@ -14,10 +14,10 @@
"description": "xnu local privilege escalation via cve-2015-1140 IOHIDSecurePromptClient injectStringGated heap overflow | poc||gtfo",
"fork": false,
"created_at": "2015-03-16T03:43:50Z",
"updated_at": "2024-12-23T15:57:40Z",
"updated_at": "2025-01-12T19:59:21Z",
"pushed_at": "2015-03-20T15:57:00Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 15
}

View file

@ -417,10 +417,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2025-01-10T08:12:20Z",
"updated_at": "2025-01-12T20:34:56Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 173,
"watchers_count": 173,
"stargazers_count": 174,
"watchers_count": 174,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 173,
"watchers": 174,
"score": 0,
"subscribers_count": 2
},

View file

@ -615,10 +615,10 @@
"description": "is a PoC tool demonstrating an exploit for a known vulnerability in the WebDAV component of IIS6",
"fork": false,
"created_at": "2024-10-06T17:33:11Z",
"updated_at": "2025-01-12T11:49:52Z",
"updated_at": "2025-01-12T18:26:13Z",
"pushed_at": "2024-10-07T17:34:02Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -627,7 +627,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "The CVE-2019-16172 Scanner is designed to check LimeSurvey instances for the stored XSS vulnerability.",
"fork": false,
"created_at": "2024-10-05T08:30:54Z",
"updated_at": "2025-01-12T12:57:27Z",
"updated_at": "2025-01-12T18:26:02Z",
"pushed_at": "2024-10-05T08:35:11Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Banner Web Tailor and Banner Enterprise Identity Services Vulnerability Disclosure",
"fork": false,
"created_at": "2019-05-10T19:46:58Z",
"updated_at": "2019-12-16T20:26:11Z",
"updated_at": "2025-01-12T20:42:51Z",
"pushed_at": "2019-12-16T20:26:09Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 3
}

View file

@ -146,10 +146,10 @@
"description": "is a PoC tool designed to exploit an authenticated Remote Code Execution (RCE) vulnerability in specific versions of PostgreSQL (9.3 - 11.7)",
"fork": false,
"created_at": "2024-10-06T17:16:44Z",
"updated_at": "2024-10-21T08:15:11Z",
"updated_at": "2025-01-12T18:35:00Z",
"pushed_at": "2024-10-06T17:45:30Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -158,7 +158,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "poc for CVE-2020-13519(still under construction). needs refining , testing , tunning...",
"fork": false,
"created_at": "2024-09-30T06:28:49Z",
"updated_at": "2025-01-12T11:13:21Z",
"updated_at": "2025-01-12T18:25:16Z",
"pushed_at": "2024-09-30T06:30:50Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -981,10 +981,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2025-01-10T08:12:20Z",
"updated_at": "2025-01-12T20:34:56Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 173,
"watchers_count": 173,
"stargazers_count": 174,
"watchers_count": 174,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -1001,7 +1001,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 173,
"watchers": 174,
"score": 0,
"subscribers_count": 2
},

View file

@ -33,15 +33,15 @@
{
"id": 604312152,
"name": "CVE-2020-7384",
"full_name": "0xCarsonS\/CVE-2020-7384",
"full_name": "CarsonShaffer\/CVE-2020-7384",
"owner": {
"login": "0xCarsonS",
"login": "CarsonShaffer",
"id": 125919527,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125919527?v=4",
"html_url": "https:\/\/github.com\/0xCarsonS",
"html_url": "https:\/\/github.com\/CarsonShaffer",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xCarsonS\/CVE-2020-7384",
"html_url": "https:\/\/github.com\/CarsonShaffer\/CVE-2020-7384",
"description": null,
"fork": false,
"created_at": "2023-02-20T19:42:38Z",

View file

@ -28,7 +28,7 @@
"forks": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 37
"subscribers_count": 38
},
{
"id": 320642790,

View file

@ -1265,10 +1265,10 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
"updated_at": "2024-12-13T08:10:23Z",
"updated_at": "2025-01-13T00:13:44Z",
"pushed_at": "2022-02-12T19:33:07Z",
"stargazers_count": 222,
"watchers_count": 222,
"stargazers_count": 223,
"watchers_count": 223,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -1277,7 +1277,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 222,
"watchers": 223,
"score": 0,
"subscribers_count": 8
},

View file

@ -113,10 +113,10 @@
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
"fork": false,
"created_at": "2021-07-03T15:15:12Z",
"updated_at": "2025-01-09T19:41:07Z",
"updated_at": "2025-01-12T19:41:20Z",
"pushed_at": "2021-09-13T12:12:17Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -132,7 +132,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 131,
"watchers": 132,
"score": 0,
"subscribers_count": 7
},

View file

@ -76,19 +76,19 @@
"description": "Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)",
"fork": false,
"created_at": "2021-09-16T02:11:36Z",
"updated_at": "2024-11-22T22:56:15Z",
"updated_at": "2025-01-12T22:10:01Z",
"pushed_at": "2021-09-16T10:39:04Z",
"stargazers_count": 233,
"watchers_count": 233,
"stargazers_count": 234,
"watchers_count": 234,
"has_discussions": false,
"forks_count": 56,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 233,
"forks": 54,
"watchers": 234,
"score": 0,
"subscribers_count": 12
},

View file

@ -231,19 +231,19 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2025-01-10T14:20:22Z",
"updated_at": "2025-01-12T22:18:26Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1607,
"watchers_count": 1607,
"stargazers_count": 1608,
"watchers_count": 1608,
"has_discussions": false,
"forks_count": 483,
"forks_count": 482,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 483,
"watchers": 1607,
"forks": 482,
"watchers": 1608,
"score": 0,
"subscribers_count": 28
},

View file

@ -14,10 +14,10 @@
"description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
"fork": false,
"created_at": "2021-11-15T14:48:14Z",
"updated_at": "2025-01-05T16:37:14Z",
"updated_at": "2025-01-12T19:24:33Z",
"pushed_at": "2024-10-31T18:50:48Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 78,
"watchers": 79,
"score": 0,
"subscribers_count": 2
},

View file

@ -7201,10 +7201,10 @@
"description": "Small example repo for looking into log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-15T19:59:38Z",
"updated_at": "2024-12-15T03:24:00Z",
"updated_at": "2025-01-13T00:14:43Z",
"pushed_at": "2021-12-24T15:44:53Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -7213,7 +7213,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 69,
"watchers": 70,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "Experimenting with CVE-2022-20120 (Pixel Bootloader \/ ABL) using Unicorn, derived from eShard's emulator at https:\/\/github.com\/eshard\/pixel6-boot\/blob\/main\/run_abl_public.ipynb",
"fork": false,
"created_at": "2024-12-18T10:44:34Z",
"updated_at": "2025-01-12T15:14:35Z",
"updated_at": "2025-01-12T18:35:23Z",
"pushed_at": "2024-12-18T11:00:38Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2023-03-10T19:08:28Z",
"updated_at": "2025-01-12T17:34:51Z",
"updated_at": "2025-01-12T22:47:17Z",
"pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -96,7 +96,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 181,
"watchers": 182,
"score": 0,
"subscribers_count": 4
},

View file

@ -1145,10 +1145,10 @@
"description": "CVE-2023-38646是Metabase中的一个远程代码执行漏洞。该漏洞源于Metabase在处理未经身份验证的API端点\/api\/setup\/validate时对JDBC连接字符串的处理存在安全缺陷。攻击者可以通过构造特定的JDBC连接字符串利用该端点在服务器上执行任意命令而无需进行身份验证。",
"fork": false,
"created_at": "2024-11-22T04:15:25Z",
"updated_at": "2025-01-12T18:21:45Z",
"updated_at": "2025-01-12T18:32:12Z",
"pushed_at": "2024-11-22T04:18:53Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1157,7 +1157,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -306,10 +306,10 @@
"description": "Xss injection, WonderCMS 3.2.0 -3.4.2 ",
"fork": false,
"created_at": "2024-11-24T17:39:45Z",
"updated_at": "2025-01-10T01:50:13Z",
"updated_at": "2025-01-12T19:40:07Z",
"pushed_at": "2024-11-24T18:08:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -318,7 +318,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -206,10 +206,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-16T17:33:13Z",
"updated_at": "2025-01-12T17:46:41Z",
"updated_at": "2025-01-12T18:35:09Z",
"pushed_at": "2024-12-16T17:38:23Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -218,7 +218,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 13,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}

View file

@ -277,10 +277,10 @@
"description": "CVE-2024-10914 D-Link Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-12-06T19:03:34Z",
"updated_at": "2025-01-12T13:09:20Z",
"updated_at": "2025-01-12T18:34:06Z",
"pushed_at": "2024-12-07T07:32:30Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -293,7 +293,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": " Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 9.1.1.1 Authentication Bypass",
"fork": false,
"created_at": "2024-11-14T16:59:52Z",
"updated_at": "2025-01-12T12:27:27Z",
"updated_at": "2025-01-12T18:31:17Z",
"pushed_at": "2024-11-14T17:00:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -80,10 +80,10 @@
"description": "POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE) due to improper input sanitization",
"fork": false,
"created_at": "2024-11-28T17:47:53Z",
"updated_at": "2025-01-12T16:56:15Z",
"updated_at": "2025-01-12T18:33:09Z",
"pushed_at": "2024-11-28T18:07:14Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -99,7 +99,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -329,10 +329,10 @@
"description": "CVE-2024-23692 是影响 Rejetto HTTP File ServerHFS2.3m 及之前版本的模板注入漏洞。该漏洞允许远程未授权的攻击者通过发送特制的 HTTP 请求,在受影响的系统上执行任意命令。",
"fork": false,
"created_at": "2024-11-23T03:59:13Z",
"updated_at": "2025-01-12T18:21:43Z",
"updated_at": "2025-01-12T18:32:20Z",
"pushed_at": "2024-11-23T04:00:55Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -341,7 +341,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "Proof of concept of the CVE-2024-24549, Exploit in Python. ",
"fork": false,
"created_at": "2024-12-09T04:59:07Z",
"updated_at": "2024-12-16T23:48:16Z",
"updated_at": "2025-01-13T00:24:33Z",
"pushed_at": "2024-12-16T23:48:12Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,7 +14,7 @@
"description": "Exploit For SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)",
"fork": false,
"created_at": "2025-01-07T13:38:34Z",
"updated_at": "2025-01-12T17:20:03Z",
"updated_at": "2025-01-12T21:19:20Z",
"pushed_at": "2025-01-07T14:16:47Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -1176,10 +1176,10 @@
"description": "CVE-2024-3400的攻击脚本",
"fork": false,
"created_at": "2025-01-10T02:20:26Z",
"updated_at": "2025-01-12T17:17:58Z",
"updated_at": "2025-01-12T18:36:58Z",
"pushed_at": "2025-01-10T02:22:27Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1188,7 +1188,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -293,10 +293,10 @@
"description": "CosmicSting: critical unauthenticated XXE vulnerability in Adobe Commerce and Magento (CVE-2024-34102)",
"fork": false,
"created_at": "2024-07-01T08:19:28Z",
"updated_at": "2024-12-17T13:58:45Z",
"updated_at": "2025-01-12T19:20:20Z",
"pushed_at": "2024-07-05T09:26:02Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -305,7 +305,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-35250 的 Beacon Object File (BOF) 实现。",
"fork": false,
"created_at": "2024-11-23T12:12:00Z",
"updated_at": "2025-01-12T16:25:32Z",
"updated_at": "2025-01-12T18:32:23Z",
"pushed_at": "2024-11-28T09:23:35Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -92,7 +92,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Exploit For: CVE-2024-36840: SQL Injection Vulnerability in Boelter Blue System Management (Version 1.3)",
"fork": false,
"created_at": "2025-01-10T16:08:07Z",
"updated_at": "2025-01-12T17:20:03Z",
"updated_at": "2025-01-12T21:19:18Z",
"pushed_at": "2025-01-10T16:12:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Exploit For: CVE-2024-39123: Stored XSS in Calibre-web 0.6.21",
"fork": false,
"created_at": "2025-01-10T20:05:24Z",
"updated_at": "2025-01-10T20:15:35Z",
"updated_at": "2025-01-12T21:19:16Z",
"pushed_at": "2025-01-10T20:06:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Exploit For: CVE-2024-40111: Stored Cross-Site Scripting (XSS) in Automad 2.0.0-alpha.4",
"fork": false,
"created_at": "2025-01-10T20:14:07Z",
"updated_at": "2025-01-10T20:15:05Z",
"updated_at": "2025-01-12T21:19:16Z",
"pushed_at": "2025-01-10T20:14:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -49,10 +49,10 @@
"description": "Exploit For: CVE-2024-42845: Remote Code Execution (RCE) in Invesalius 3.1",
"fork": false,
"created_at": "2025-01-10T20:00:26Z",
"updated_at": "2025-01-10T20:02:09Z",
"updated_at": "2025-01-12T21:19:18Z",
"pushed_at": "2025-01-10T20:01:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -61,7 +61,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -126,5 +126,36 @@
"watchers": 167,
"score": 0,
"subscribers_count": 3
},
{
"id": 915777608,
"name": "CVE-2024-43044-jenkins-creds",
"full_name": "DACC4\/CVE-2024-43044-jenkins-creds",
"owner": {
"login": "DACC4",
"id": 46499354,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46499354?v=4",
"html_url": "https:\/\/github.com\/DACC4",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DACC4\/CVE-2024-43044-jenkins-creds",
"description": null,
"fork": false,
"created_at": "2025-01-12T19:16:31Z",
"updated_at": "2025-01-12T19:17:01Z",
"pushed_at": "2025-01-12T19:16:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Symbolic link path traversal vulnerability in Gogs",
"fork": false,
"created_at": "2024-11-13T16:16:31Z",
"updated_at": "2025-01-12T15:21:51Z",
"updated_at": "2025-01-12T18:31:10Z",
"pushed_at": "2024-11-14T02:54:13Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability",
"fork": false,
"created_at": "2024-09-13T00:41:32Z",
"updated_at": "2025-01-06T13:20:49Z",
"updated_at": "2025-01-12T20:01:00Z",
"pushed_at": "2024-10-01T00:57:03Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 3
}

View file

@ -14,10 +14,10 @@
"description": "Proof of concept (POC) for CVE-2024-45337 ",
"fork": false,
"created_at": "2024-12-17T22:07:53Z",
"updated_at": "2025-01-12T12:23:48Z",
"updated_at": "2025-01-12T18:35:20Z",
"pushed_at": "2024-12-17T22:27:03Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
"fork": false,
"created_at": "2024-11-07T21:03:30Z",
"updated_at": "2025-01-12T18:30:21Z",
"updated_at": "2025-01-12T23:38:11Z",
"pushed_at": "2024-11-14T16:25:52Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 79,
"watchers": 80,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2024-48990",
"fork": false,
"created_at": "2024-11-20T18:41:25Z",
"updated_at": "2025-01-12T03:02:53Z",
"updated_at": "2025-01-12T18:32:01Z",
"pushed_at": "2024-11-20T18:49:33Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 95,
"watchers": 94,
"score": 0,
"subscribers_count": 1
},

View file

@ -262,7 +262,7 @@
"description": "CVE-2024-50379-exp",
"fork": false,
"created_at": "2024-12-25T02:41:31Z",
"updated_at": "2025-01-12T00:38:04Z",
"updated_at": "2025-01-12T23:25:24Z",
"pushed_at": "2024-12-31T07:11:13Z",
"stargazers_count": 7,
"watchers_count": 7,

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection",
"fork": false,
"created_at": "2025-01-12T11:20:21Z",
"updated_at": "2025-01-12T16:50:12Z",
"updated_at": "2025-01-12T23:10:49Z",
"pushed_at": "2025-01-12T16:35:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE",
"fork": false,
"created_at": "2024-12-13T06:21:36Z",
"updated_at": "2025-01-03T14:51:11Z",
"updated_at": "2025-01-13T00:28:20Z",
"pushed_at": "2024-12-13T07:28:34Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
"fork": false,
"created_at": "2024-12-20T03:34:01Z",
"updated_at": "2025-01-12T04:06:08Z",
"updated_at": "2025-01-12T18:35:39Z",
"pushed_at": "2024-12-23T12:51:54Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 38,
"watchers": 37,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-20T12:47:53Z",
"updated_at": "2025-01-12T18:28:09Z",
"updated_at": "2025-01-12T23:22:46Z",
"pushed_at": "2024-10-20T12:50:33Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "⚠️⚠️ CVE-2024-7120 Command Injection Vulnerability in RAISECOM Gateway Devices",
"fork": false,
"created_at": "2024-08-30T15:50:50Z",
"updated_at": "2024-11-20T16:31:03Z",
"updated_at": "2025-01-12T20:42:17Z",
"pushed_at": "2024-08-30T16:29:33Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "WordPress File Upload插件任意文件读取漏洞CVE-2024-9047批量检测脚本",
"fork": false,
"created_at": "2024-12-25T05:19:17Z",
"updated_at": "2025-01-12T13:19:38Z",
"updated_at": "2025-01-12T18:36:04Z",
"pushed_at": "2024-12-25T05:28:55Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},

View file

@ -76,10 +76,10 @@
"description": "Proof of Concept Exploit for CVE-2024-9465",
"fork": false,
"created_at": "2024-12-03T12:16:44Z",
"updated_at": "2025-01-07T14:21:34Z",
"updated_at": "2025-01-12T23:31:40Z",
"pushed_at": "2024-12-03T12:21:35Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-19T22:03:13Z",
"updated_at": "2025-01-12T15:29:21Z",
"updated_at": "2025-01-12T18:31:54Z",
"pushed_at": "2024-11-22T16:39:20Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -29,5 +29,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 915839096,
"name": "CVE-2024-9707-Poc",
"full_name": "Nxploited\/CVE-2024-9707-Poc",
"owner": {
"login": "Nxploited",
"id": 188819918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
"html_url": "https:\/\/github.com\/Nxploited",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-9707-Poc",
"description": "he Hunk Companion Plugin for WordPress: Vulnerable to Unauthorized Plugin Installation\/Activation (Versions Up to and Including 1.8.4)",
"fork": false,
"created_at": "2025-01-12T23:35:02Z",
"updated_at": "2025-01-13T00:13:58Z",
"pushed_at": "2025-01-13T00:13:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -50,7 +50,7 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -63,7 +63,7 @@
"wordpress-plugin"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -107,10 +107,10 @@
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
"fork": false,
"created_at": "2025-01-11T02:06:51Z",
"updated_at": "2025-01-12T16:22:06Z",
"updated_at": "2025-01-12T20:07:52Z",
"pushed_at": "2025-01-11T23:54:06Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 19,
"watchers": 21,
"score": 0,
"subscribers_count": 0
},

View file

@ -2034,6 +2034,7 @@
</code>
- [RandomRobbieBF/CVE-2024-9707](https://github.com/RandomRobbieBF/CVE-2024-9707)
- [Nxploited/CVE-2024-9707-Poc](https://github.com/Nxploited/CVE-2024-9707-Poc)
### CVE-2024-9796 (2024-10-10)
@ -6662,6 +6663,7 @@
- [jenkinsci-cert/SECURITY-3430](https://github.com/jenkinsci-cert/SECURITY-3430)
- [v9d0g/CVE-2024-43044-POC](https://github.com/v9d0g/CVE-2024-43044-POC)
- [convisolabs/CVE-2024-43044-jenkins](https://github.com/convisolabs/CVE-2024-43044-jenkins)
- [DACC4/CVE-2024-43044-jenkins-creds](https://github.com/DACC4/CVE-2024-43044-jenkins-creds)
### CVE-2024-43160 (2024-08-13)
@ -31995,7 +31997,7 @@
</code>
- [nikhil1232/CVE-2020-7384](https://github.com/nikhil1232/CVE-2020-7384)
- [0xCarsonS/CVE-2020-7384](https://github.com/0xCarsonS/CVE-2020-7384)
- [CarsonShaffer/CVE-2020-7384](https://github.com/CarsonShaffer/CVE-2020-7384)
### CVE-2020-7388 (2021-07-22)