Auto Update 2025/01/04 12:31:55

This commit is contained in:
motikan2010-bot 2025-01-04 21:31:55 +09:00
parent 1789d7591b
commit a1f5e5eff0
50 changed files with 221 additions and 181 deletions

View file

@ -14,7 +14,7 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2024-12-27T05:58:44Z",
"updated_at": "2025-01-04T11:54:28Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -49,7 +49,7 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2024-12-27T05:58:44Z",
"updated_at": "2025-01-04T11:54:28Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -14,10 +14,10 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2024-12-30T01:43:06Z",
"updated_at": "2025-01-04T08:07:01Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2306,
"watchers_count": 2306,
"stargazers_count": 2305,
"watchers_count": 2305,
"has_discussions": false,
"forks_count": 461,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 461,
"watchers": 2306,
"watchers": 2305,
"score": 0,
"subscribers_count": 117
},
@ -1666,7 +1666,7 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2024-12-27T05:58:44Z",
"updated_at": "2025-01-04T11:54:28Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-01T16:33:30Z",
"updated_at": "2025-01-04T06:15:01Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2013,
"watchers_count": 2013,
"stargazers_count": 2014,
"watchers_count": 2014,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2013,
"watchers": 2014,
"score": 0,
"subscribers_count": 38
},

View file

@ -142,7 +142,7 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2024-12-27T05:58:44Z",
"updated_at": "2025-01-04T11:54:28Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-01T16:33:30Z",
"updated_at": "2025-01-04T06:15:01Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2013,
"watchers_count": 2013,
"stargazers_count": 2014,
"watchers_count": 2014,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2013,
"watchers": 2014,
"score": 0,
"subscribers_count": 38
},

View file

@ -14,7 +14,7 @@
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2024-12-27T05:58:44Z",
"updated_at": "2025-01-04T11:54:28Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -14,10 +14,10 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2025-01-03T00:53:15Z",
"updated_at": "2025-01-04T08:46:48Z",
"pushed_at": "2024-07-31T13:54:45Z",
"stargazers_count": 325,
"watchers_count": 325,
"stargazers_count": 326,
"watchers_count": 326,
"has_discussions": false,
"forks_count": 104,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 104,
"watchers": 325,
"watchers": 326,
"score": 0,
"subscribers_count": 22
},

View file

@ -76,10 +76,10 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2024-12-19T05:38:57Z",
"updated_at": "2025-01-04T08:49:03Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 541,
"watchers_count": 541,
"stargazers_count": 540,
"watchers_count": 540,
"has_discussions": false,
"forks_count": 252,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 252,
"watchers": 541,
"watchers": 540,
"score": 0,
"subscribers_count": 28
},

View file

@ -14,8 +14,8 @@
"description": "CVE-2017-9805 is a critical vulnerability in Apache Struts 2's Rest Plugin, allowing attackers to execute remote code via a specially crafted XML payload. If exploited, this vulnerability can lead to unauthorized system access and compromise vulnerable applications.",
"fork": false,
"created_at": "2025-01-02T11:06:58Z",
"updated_at": "2025-01-04T05:38:07Z",
"pushed_at": "2025-01-02T11:13:27Z",
"updated_at": "2025-01-04T07:47:22Z",
"pushed_at": "2025-01-04T07:47:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-01T16:33:30Z",
"updated_at": "2025-01-04T06:15:01Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2013,
"watchers_count": 2013,
"stargazers_count": 2014,
"watchers_count": 2014,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2013,
"watchers": 2014,
"score": 0,
"subscribers_count": 38
},

View file

@ -14,10 +14,10 @@
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false,
"created_at": "2018-06-24T05:34:05Z",
"updated_at": "2024-11-27T08:06:40Z",
"updated_at": "2025-01-04T08:46:24Z",
"pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 511,
"watchers_count": 511,
"stargazers_count": 510,
"watchers_count": 510,
"has_discussions": false,
"forks_count": 454,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 454,
"watchers": 511,
"watchers": 510,
"score": 0,
"subscribers_count": 57
},

View file

@ -576,10 +576,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-01T16:33:30Z",
"updated_at": "2025-01-04T06:15:01Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2013,
"watchers_count": 2013,
"stargazers_count": 2014,
"watchers_count": 2014,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -609,7 +609,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2013,
"watchers": 2014,
"score": 0,
"subscribers_count": 38
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2019-1040 with Exchange",
"fork": false,
"created_at": "2019-06-14T11:16:03Z",
"updated_at": "2024-11-04T18:58:55Z",
"updated_at": "2025-01-04T08:07:11Z",
"pushed_at": "2021-06-18T18:43:46Z",
"stargazers_count": 249,
"watchers_count": 249,
"stargazers_count": 248,
"watchers_count": 248,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 249,
"watchers": 248,
"score": 0,
"subscribers_count": 4
},

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2025-01-03T22:00:40Z",
"updated_at": "2025-01-04T09:02:22Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4152,
"watchers_count": 4152,
"stargazers_count": 4153,
"watchers_count": 4153,
"has_discussions": false,
"forks_count": 1099,
"allow_forking": true,
@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1099,
"watchers": 4152,
"watchers": 4153,
"score": 0,
"subscribers_count": 149
},

View file

@ -45,10 +45,10 @@
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2024-12-05T04:57:10Z",
"updated_at": "2025-01-04T08:08:36Z",
"pushed_at": "2022-04-14T18:23:38Z",
"stargazers_count": 349,
"watchers_count": 349,
"stargazers_count": 350,
"watchers_count": 350,
"has_discussions": false,
"forks_count": 85,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 85,
"watchers": 349,
"watchers": 350,
"score": 0,
"subscribers_count": 13
},

View file

@ -200,10 +200,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-01T16:33:30Z",
"updated_at": "2025-01-04T06:15:01Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2013,
"watchers_count": 2013,
"stargazers_count": 2014,
"watchers_count": 2014,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -233,7 +233,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2013,
"watchers": 2014,
"score": 0,
"subscribers_count": 38
}

View file

@ -262,10 +262,10 @@
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
"fork": false,
"created_at": "2019-06-10T05:12:44Z",
"updated_at": "2024-12-22T09:35:21Z",
"updated_at": "2025-01-04T08:07:33Z",
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 190,
"watchers_count": 190,
"stargazers_count": 189,
"watchers_count": 189,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -274,7 +274,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 190,
"watchers": 189,
"score": 0,
"subscribers_count": 8
},

View file

@ -79,10 +79,10 @@
"description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts",
"fork": false,
"created_at": "2019-10-21T15:31:13Z",
"updated_at": "2024-11-13T06:49:42Z",
"updated_at": "2025-01-04T08:05:49Z",
"pushed_at": "2023-08-29T17:49:28Z",
"stargazers_count": 161,
"watchers_count": 161,
"stargazers_count": 160,
"watchers_count": 160,
"has_discussions": false,
"forks_count": 64,
"allow_forking": true,
@ -95,7 +95,7 @@
],
"visibility": "public",
"forks": 64,
"watchers": 161,
"watchers": 160,
"score": 0,
"subscribers_count": 7
},

View file

@ -14,10 +14,10 @@
"description": "PostgreSQL Remote Code Executuon",
"fork": false,
"created_at": "2020-02-12T00:17:58Z",
"updated_at": "2022-09-20T14:37:22Z",
"updated_at": "2025-01-04T08:07:10Z",
"pushed_at": "2021-04-16T05:57:37Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
@ -45,10 +45,10 @@
"description": "CVE-20199193 - PostgreSQL 9.3-12.3 Authenticated Remote Code Execution",
"fork": false,
"created_at": "2022-03-29T21:02:02Z",
"updated_at": "2024-09-28T21:21:50Z",
"updated_at": "2025-01-04T08:07:10Z",
"pushed_at": "2022-05-26T23:00:33Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -65,7 +65,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 18,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},

View file

@ -138,10 +138,10 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2024-12-26T20:23:23Z",
"updated_at": "2025-01-04T08:48:26Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 669,
"watchers_count": 669,
"stargazers_count": 668,
"watchers_count": 668,
"has_discussions": false,
"forks_count": 195,
"allow_forking": true,
@ -152,7 +152,7 @@
],
"visibility": "public",
"forks": 195,
"watchers": 669,
"watchers": 668,
"score": 0,
"subscribers_count": 26
},
@ -461,10 +461,10 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T18:34:40Z",
"updated_at": "2024-12-30T16:43:45Z",
"updated_at": "2025-01-04T08:48:27Z",
"pushed_at": "2023-02-26T07:01:03Z",
"stargazers_count": 323,
"watchers_count": 323,
"stargazers_count": 322,
"watchers_count": 322,
"has_discussions": false,
"forks_count": 121,
"allow_forking": true,
@ -478,7 +478,7 @@
],
"visibility": "public",
"forks": 121,
"watchers": 323,
"watchers": 322,
"score": 0,
"subscribers_count": 19
},

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2025-01-03T22:00:40Z",
"updated_at": "2025-01-04T09:02:22Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4152,
"watchers_count": 4152,
"stargazers_count": 4153,
"watchers_count": 4153,
"has_discussions": false,
"forks_count": 1099,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1099,
"watchers": 4152,
"watchers": 4153,
"score": 0,
"subscribers_count": 149
},

View file

@ -14,10 +14,10 @@
"description": "wpDiscuz 7.0.4 Remote Code Execution",
"fork": false,
"created_at": "2021-06-13T23:10:19Z",
"updated_at": "2024-12-07T00:01:09Z",
"updated_at": "2025-01-04T08:47:10Z",
"pushed_at": "2021-06-15T17:30:23Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 18,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-01T16:33:30Z",
"updated_at": "2025-01-04T06:15:01Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2013,
"watchers_count": 2013,
"stargazers_count": 2014,
"watchers_count": 2014,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2013,
"watchers": 2014,
"score": 0,
"subscribers_count": 38
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2021-02-26T14:18:13Z",
"updated_at": "2024-08-12T20:10:42Z",
"updated_at": "2025-01-04T08:07:55Z",
"pushed_at": "2021-02-27T09:57:00Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 44,
"watchers": 43,
"score": 0,
"subscribers_count": 1
},

View file

@ -138,10 +138,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2024-12-07T03:09:54Z",
"updated_at": "2025-01-04T08:07:12Z",
"pushed_at": "2022-11-16T08:14:33Z",
"stargazers_count": 267,
"watchers_count": 267,
"stargazers_count": 266,
"watchers_count": 266,
"has_discussions": false,
"forks_count": 99,
"allow_forking": true,
@ -152,7 +152,7 @@
],
"visibility": "public",
"forks": 99,
"watchers": 267,
"watchers": 266,
"score": 0,
"subscribers_count": 2
},

View file

@ -76,10 +76,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-25T08:42:28Z",
"updated_at": "2024-12-10T07:47:47Z",
"updated_at": "2025-01-04T08:46:41Z",
"pushed_at": "2021-01-25T08:49:59Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 72,
"watchers": 71,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,19 +45,19 @@
"description": "Exploiting a Cross-site request forgery (CSRF) attack to get a Remote Command Execution (RCE) through the Webmin's running process feature",
"fork": false,
"created_at": "2021-04-21T19:43:53Z",
"updated_at": "2022-12-05T03:51:06Z",
"updated_at": "2025-01-04T08:47:02Z",
"pushed_at": "2021-04-24T22:06:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 8,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 3,
"forks": 4,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2025-01-04T04:00:19Z",
"updated_at": "2025-01-04T09:07:09Z",
"pushed_at": "2023-07-10T16:41:49Z",
"stargazers_count": 296,
"watchers_count": 296,
"stargazers_count": 297,
"watchers_count": 297,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 296,
"watchers": 297,
"score": 0,
"subscribers_count": 8
},

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-12-30T06:52:08Z",
"updated_at": "2025-01-04T08:46:31Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 820,
"watchers_count": 820,
"stargazers_count": 819,
"watchers_count": 819,
"has_discussions": false,
"forks_count": 124,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 124,
"watchers": 820,
"watchers": 819,
"score": 0,
"subscribers_count": 13
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2025-01-04T01:27:44Z",
"updated_at": "2025-01-04T08:07:27Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1349,
"watchers_count": 1349,
"stargazers_count": 1348,
"watchers_count": 1348,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 323,
"watchers": 1349,
"watchers": 1348,
"score": 0,
"subscribers_count": 27
},

View file

@ -1307,10 +1307,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-12-26T10:20:43Z",
"updated_at": "2025-01-04T07:09:29Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 807,
"watchers_count": 807,
"stargazers_count": 808,
"watchers_count": 808,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -1324,7 +1324,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 807,
"watchers": 808,
"score": 0,
"subscribers_count": 11
},

View file

@ -54,10 +54,10 @@
"description": "CVE-2022-22965 : about spring core rce",
"fork": false,
"created_at": "2022-03-30T14:35:00Z",
"updated_at": "2024-09-14T07:13:20Z",
"updated_at": "2025-01-04T08:08:06Z",
"pushed_at": "2022-04-01T15:34:03Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 51,
"watchers": 50,
"score": 0,
"subscribers_count": 2
},
@ -163,10 +163,10 @@
"description": "spring-core单个图形化利用工具CVE-2022-22965及修复方案已出",
"fork": false,
"created_at": "2022-03-31T02:00:18Z",
"updated_at": "2024-09-05T01:33:20Z",
"updated_at": "2025-01-04T08:08:06Z",
"pushed_at": "2022-04-02T15:29:31Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 18,
"watchers": 17,
"score": 0,
"subscribers_count": 2
},
@ -230,10 +230,10 @@
"description": "spring框架RCE漏洞 CVE-2022-22965",
"fork": false,
"created_at": "2022-03-31T12:41:29Z",
"updated_at": "2024-08-27T06:57:53Z",
"updated_at": "2025-01-04T08:08:24Z",
"pushed_at": "2022-04-22T07:37:16Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -242,7 +242,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 29,
"watchers": 28,
"score": 0,
"subscribers_count": 1
},

View file

@ -76,10 +76,10 @@
"description": "cve-2022-23131 zabbix-saml-bypass-exp",
"fork": false,
"created_at": "2022-02-18T11:51:47Z",
"updated_at": "2024-11-30T15:51:22Z",
"updated_at": "2025-01-04T08:11:13Z",
"pushed_at": "2024-08-11T18:14:56Z",
"stargazers_count": 151,
"watchers_count": 151,
"stargazers_count": 150,
"watchers_count": 150,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 151,
"watchers": 150,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2024-12-26T08:40:19Z",
"updated_at": "2025-01-04T08:47:19Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 428,
"watchers_count": 428,
"stargazers_count": 427,
"watchers_count": 427,
"has_discussions": false,
"forks_count": 83,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 428,
"watchers": 427,
"score": 0,
"subscribers_count": 6
},

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2025-01-01T16:34:14Z",
"updated_at": "2025-01-04T09:08:42Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1172,
"watchers_count": 1172,
"stargazers_count": 1173,
"watchers_count": 1173,
"has_discussions": true,
"forks_count": 188,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 188,
"watchers": 1172,
"watchers": 1173,
"score": 0,
"subscribers_count": 19
},
@ -167,10 +167,10 @@
"description": "CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injection",
"fork": false,
"created_at": "2022-06-03T19:24:30Z",
"updated_at": "2024-11-02T04:07:36Z",
"updated_at": "2025-01-04T08:49:03Z",
"pushed_at": "2022-06-03T19:59:01Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -179,7 +179,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 32,
"watchers": 31,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-24T13:54:42Z",
"updated_at": "2025-01-03T10:27:47Z",
"updated_at": "2025-01-04T08:29:43Z",
"pushed_at": "2023-02-24T13:29:38Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 108,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 108,
"watchers": 60,
"watchers": 62,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-04T01:08:52Z",
"updated_at": "2025-01-04T07:29:58Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1335,
"watchers_count": 1335,
"stargazers_count": 1336,
"watchers_count": 1336,
"has_discussions": false,
"forks_count": 228,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 228,
"watchers": 1335,
"watchers": 1336,
"score": 0,
"subscribers_count": 21
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-31317",
"fork": false,
"created_at": "2024-12-05T01:36:59Z",
"updated_at": "2024-12-31T03:39:46Z",
"updated_at": "2025-01-04T07:07:09Z",
"pushed_at": "2024-12-05T01:52:45Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-3393.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 911931261,
"name": "-CVE-2024-3393",
"full_name": "FelixFoxf\/-CVE-2024-3393",
"owner": {
"login": "FelixFoxf",
"id": 114032917,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114032917?v=4",
"html_url": "https:\/\/github.com\/FelixFoxf",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FelixFoxf\/-CVE-2024-3393",
"description": " CVE-2024-3393 EXPLOIT",
"fork": false,
"created_at": "2025-01-04T08:18:06Z",
"updated_at": "2025-01-04T08:19:40Z",
"pushed_at": "2025-01-04T08:19:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,21 +14,21 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-04T01:38:15Z",
"updated_at": "2025-01-04T12:29:47Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 326,
"watchers_count": 326,
"stargazers_count": 328,
"watchers_count": 328,
"has_discussions": false,
"forks_count": 71,
"forks_count": 72,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 326,
"forks": 72,
"watchers": 328,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 911503737,
@ -59,6 +59,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -90,6 +90,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -276,6 +276,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -2945,6 +2945,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -754,6 +754,13 @@
- [truonghuuphuc/CVE-2024-3293-Poc](https://github.com/truonghuuphuc/CVE-2024-3293-Poc)
### CVE-2024-3393 (2024-12-27)
<code>A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.
</code>
- [FelixFoxf/-CVE-2024-3393](https://github.com/FelixFoxf/-CVE-2024-3393)
### CVE-2024-3400 (2024-04-12)
<code>A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.\n\nCloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.