Auto Update 2024/12/04 18:32:59

This commit is contained in:
motikan2010-bot 2024-12-05 03:32:59 +09:00
parent 088987f975
commit a81adc1cfe
41 changed files with 278 additions and 213 deletions

View file

@ -14,10 +14,10 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2024-10-26T07:00:18Z",
"updated_at": "2024-12-04T13:06:28Z",
"pushed_at": "2024-05-03T22:24:07Z",
"stargazers_count": 186,
"watchers_count": 186,
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 186,
"watchers": 187,
"score": 0,
"subscribers_count": 8
}

View file

@ -14,10 +14,10 @@
"description": "Exploit PoC for Spring RCE issue (CVE-2011-2894)",
"fork": false,
"created_at": "2013-07-31T08:48:19Z",
"updated_at": "2024-08-12T19:22:43Z",
"updated_at": "2024-12-04T13:48:05Z",
"pushed_at": "2023-12-17T23:28:49Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 41,
"watchers": 42,
"score": 0,
"subscribers_count": 4
}

View file

@ -596,10 +596,10 @@
"description": "OpenSSH 2.3 < 7.7 - Username Enumeration",
"fork": false,
"created_at": "2020-11-29T17:36:11Z",
"updated_at": "2024-11-29T03:21:01Z",
"updated_at": "2024-12-04T16:01:30Z",
"pushed_at": "2023-09-04T20:57:42Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -608,7 +608,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 40,
"watchers": 41,
"score": 0,
"subscribers_count": 3
},

View file

@ -481,6 +481,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -45,8 +45,8 @@
"description": "A tool for retrieving login credentials from Netwave IP cameras using a memory dump vulnerability (CVE-2018-17240)",
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-12-02T17:21:33Z",
"pushed_at": "2024-12-04T09:38:17Z",
"updated_at": "2024-12-04T16:36:36Z",
"pushed_at": "2024-12-04T16:36:35Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -107,8 +107,8 @@
"description": "CVE-2018-25031 tests",
"fork": false,
"created_at": "2023-06-28T13:41:22Z",
"updated_at": "2024-10-01T11:51:08Z",
"pushed_at": "2024-10-01T11:51:04Z",
"updated_at": "2024-12-04T13:45:34Z",
"pushed_at": "2024-12-04T13:45:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -83,10 +83,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2024-12-03T02:18:25Z",
"updated_at": "2024-12-04T15:23:57Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 580,
"watchers_count": 580,
"stargazers_count": 581,
"watchers_count": 581,
"has_discussions": false,
"forks_count": 173,
"allow_forking": true,
@ -105,7 +105,7 @@
],
"visibility": "public",
"forks": 173,
"watchers": 580,
"watchers": 581,
"score": 0,
"subscribers_count": 23
},

View file

@ -1618,10 +1618,10 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2024-12-04T08:31:06Z",
"updated_at": "2024-12-04T14:42:22Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 897,
"watchers_count": 897,
"stargazers_count": 898,
"watchers_count": 898,
"has_discussions": false,
"forks_count": 242,
"allow_forking": true,
@ -1630,7 +1630,7 @@
"topics": [],
"visibility": "public",
"forks": 242,
"watchers": 897,
"watchers": 898,
"score": 0,
"subscribers_count": 55
},

File diff suppressed because one or more lines are too long

View file

@ -510,10 +510,10 @@
"description": "This is a Python 3 version of this exploit. Hope it works!!!",
"fork": false,
"created_at": "2024-06-20T10:04:13Z",
"updated_at": "2024-07-25T13:41:37Z",
"updated_at": "2024-12-04T16:46:23Z",
"pushed_at": "2024-07-25T13:41:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -522,7 +522,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -233,10 +233,10 @@
"description": "Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215",
"fork": false,
"created_at": "2020-06-07T15:03:07Z",
"updated_at": "2024-12-01T16:37:55Z",
"updated_at": "2024-12-04T12:15:00Z",
"pushed_at": "2022-09-04T14:16:50Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -250,7 +250,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 57,
"watchers": 58,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "Demo Android application for CVE-2019-9465",
"fork": false,
"created_at": "2020-02-19T13:57:11Z",
"updated_at": "2024-01-16T16:26:24Z",
"updated_at": "2024-12-04T12:15:09Z",
"pushed_at": "2020-02-19T13:57:29Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},

View file

@ -200,10 +200,10 @@
"description": "A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)",
"fork": false,
"created_at": "2023-08-28T09:20:38Z",
"updated_at": "2024-12-04T12:14:41Z",
"updated_at": "2024-12-04T12:15:16Z",
"pushed_at": "2023-11-21T13:32:01Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -227,7 +227,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 12,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

View file

@ -1004,10 +1004,10 @@
"description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)",
"fork": false,
"created_at": "2021-09-26T13:53:10Z",
"updated_at": "2024-11-26T06:33:17Z",
"updated_at": "2024-12-04T12:19:38Z",
"pushed_at": "2021-10-17T13:29:56Z",
"stargazers_count": 182,
"watchers_count": 182,
"stargazers_count": 181,
"watchers_count": 181,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -1019,7 +1019,7 @@
],
"visibility": "public",
"forks": 30,
"watchers": 182,
"watchers": 181,
"score": 0,
"subscribers_count": 6
},

View file

@ -1088,37 +1088,6 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 447489190,
"name": "CVE-2021-26084",
"full_name": "ZZ-SOCMAP\/CVE-2021-26084",
"owner": {
"login": "ZZ-SOCMAP",
"id": 98105412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
"html_url": "https:\/\/github.com\/ZZ-SOCMAP",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2021-26084",
"description": "POC of CVE-2021-26084, which is Atlassian Confluence Server OGNL(Object-Graph Navigation Language) Pre-Auth RCE Injection Vulneralibity.",
"fork": false,
"created_at": "2022-01-13T06:29:51Z",
"updated_at": "2024-09-19T01:54:41Z",
"pushed_at": "2022-01-14T04:21:27Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 661577991,
"name": "CVE-2021-26084-EXP",

View file

@ -922,5 +922,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 898590201,
"name": "hoh4",
"full_name": "Prabesh01\/hoh4",
"owner": {
"login": "Prabesh01",
"id": 51240439,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51240439?v=4",
"html_url": "https:\/\/github.com\/Prabesh01",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Prabesh01\/hoh4",
"description": "Modified version of laravel ignition RCE (CVE-2021-3129) exploit script for Hour of Hack Session-4",
"fork": false,
"created_at": "2024-12-04T17:04:03Z",
"updated_at": "2024-12-04T18:08:39Z",
"pushed_at": "2024-12-04T18:08:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -82,19 +82,19 @@
"description": null,
"fork": false,
"created_at": "2021-07-02T12:10:49Z",
"updated_at": "2024-12-03T20:36:34Z",
"updated_at": "2024-12-04T15:34:42Z",
"pushed_at": "2021-07-02T12:17:50Z",
"stargazers_count": 263,
"watchers_count": 263,
"stargazers_count": 264,
"watchers_count": 264,
"has_discussions": false,
"forks_count": 67,
"forks_count": 68,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 67,
"watchers": 263,
"forks": 68,
"watchers": 264,
"score": 0,
"subscribers_count": 11
},

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-12-03T21:56:46Z",
"updated_at": "2024-12-04T13:16:44Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 812,
"watchers_count": 812,
"stargazers_count": 813,
"watchers_count": 813,
"has_discussions": false,
"forks_count": 124,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 124,
"watchers": 812,
"watchers": 813,
"score": 0,
"subscribers_count": 13
},

View file

@ -129,5 +129,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 898463801,
"name": "CVE-2022-1386",
"full_name": "lamcodeofpwnosec\/CVE-2022-1386",
"owner": {
"login": "lamcodeofpwnosec",
"id": 47277287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47277287?v=4",
"html_url": "https:\/\/github.com\/lamcodeofpwnosec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lamcodeofpwnosec\/CVE-2022-1386",
"description": "Fusion Builder < 3.6.2 - Unauthenticated SSRF",
"fork": false,
"created_at": "2024-12-04T12:48:53Z",
"updated_at": "2024-12-04T12:51:24Z",
"pushed_at": "2024-12-04T12:51:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Apache CouchDB 3.2.1 - Remote Code Execution (RCE)",
"fork": false,
"created_at": "2022-05-20T04:28:51Z",
"updated_at": "2024-08-12T20:23:25Z",
"updated_at": "2024-12-04T13:36:36Z",
"pushed_at": "2022-05-20T04:32:13Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},

View file

@ -1,33 +0,0 @@
[
{
"id": 572578872,
"name": "CVE-2022-41049-POC",
"full_name": "Nathan01110011\/CVE-2022-41049-POC",
"owner": {
"login": "Nathan01110011",
"id": 43985198,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43985198?v=4",
"html_url": "https:\/\/github.com\/Nathan01110011",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nathan01110011\/CVE-2022-41049-POC",
"description": "POC of Microcorp vuln",
"fork": false,
"created_at": "2022-11-30T15:19:43Z",
"updated_at": "2023-11-18T03:11:21Z",
"pushed_at": "2022-11-30T15:28:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-23192",
"fork": false,
"created_at": "2023-03-20T08:06:55Z",
"updated_at": "2024-02-02T09:11:31Z",
"updated_at": "2024-12-04T18:15:39Z",
"pushed_at": "2023-03-27T07:42:56Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -358,8 +358,8 @@
"description": null,
"fork": false,
"created_at": "2024-12-04T11:57:35Z",
"updated_at": "2024-12-04T12:25:03Z",
"pushed_at": "2024-12-04T12:24:59Z",
"updated_at": "2024-12-04T12:53:41Z",
"pushed_at": "2024-12-04T12:53:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet",
"fork": false,
"created_at": "2023-09-01T20:16:28Z",
"updated_at": "2024-12-02T07:08:37Z",
"updated_at": "2024-12-04T18:15:42Z",
"pushed_at": "2024-02-12T03:18:54Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 2
}

View file

@ -138,10 +138,10 @@
"description": null,
"fork": false,
"created_at": "2023-11-04T11:58:21Z",
"updated_at": "2024-11-21T12:27:37Z",
"updated_at": "2024-12-04T14:17:30Z",
"pushed_at": "2023-11-06T07:26:30Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},
@ -233,10 +233,10 @@
"description": null,
"fork": false,
"created_at": "2023-11-09T11:27:20Z",
"updated_at": "2023-11-15T10:22:43Z",
"updated_at": "2024-12-04T14:17:17Z",
"pushed_at": "2023-11-09T11:36:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -245,7 +245,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -236,7 +236,7 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -247,7 +247,7 @@
"paloaltonetworks"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-12-04T10:06:57Z",
"updated_at": "2024-12-04T15:02:41Z",
"pushed_at": "2024-12-02T06:29:52Z",
"stargazers_count": 262,
"watchers_count": 262,
"stargazers_count": 263,
"watchers_count": 263,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 262,
"watchers": 263,
"score": 0,
"subscribers_count": 7
},

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-12-03T07:17:07Z",
"updated_at": "2024-12-04T17:39:32Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2294,
"watchers_count": 2294,
"stargazers_count": 2297,
"watchers_count": 2297,
"has_discussions": false,
"forks_count": 299,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 299,
"watchers": 2294,
"watchers": 2297,
"score": 0,
"subscribers_count": 26
},

View file

@ -610,19 +610,19 @@
"description": "POC for CVE-2024-23897 Jenkins File-Read ",
"fork": false,
"created_at": "2024-02-16T07:16:04Z",
"updated_at": "2024-12-03T15:06:34Z",
"updated_at": "2024-12-04T18:06:10Z",
"pushed_at": "2024-02-17T16:39:19Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 17,
"forks": 3,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,7 +14,7 @@
"description": "Auto exploitation tool for CVE-2024-24401. ",
"fork": false,
"created_at": "2024-02-18T20:05:46Z",
"updated_at": "2024-11-24T15:15:19Z",
"updated_at": "2024-12-04T17:52:45Z",
"pushed_at": "2024-09-07T03:02:43Z",
"stargazers_count": 29,
"watchers_count": 29,

View file

@ -1907,8 +1907,8 @@
"description": "hihihihaa",
"fork": false,
"created_at": "2024-10-08T10:57:17Z",
"updated_at": "2024-11-21T12:20:22Z",
"pushed_at": "2024-11-21T12:20:19Z",
"updated_at": "2024-12-04T16:21:49Z",
"pushed_at": "2024-12-04T16:21:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -642,5 +642,45 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 898539017,
"name": "magento2-encryption-key-manager-cli",
"full_name": "wubinworks\/magento2-encryption-key-manager-cli",
"owner": {
"login": "wubinworks",
"id": 127310257,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127310257?v=4",
"html_url": "https:\/\/github.com\/wubinworks",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wubinworks\/magento2-encryption-key-manager-cli",
"description": "A utility for Magento 2 encryption key rotation and management. CVE-2024-34102(aka Cosmic Sting) victims can use it as an aftercare.",
"fork": false,
"created_at": "2024-12-04T15:19:19Z",
"updated_at": "2024-12-04T15:52:29Z",
"pushed_at": "2024-12-04T15:47:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cli",
"cosmic-sting",
"cve-2024-34102",
"deployment-automation",
"encryption-key",
"key-generation",
"key-rotation",
"magento2"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-18T23:34:34Z",
"updated_at": "2024-12-04T12:22:21Z",
"updated_at": "2024-12-04T15:35:36Z",
"pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 24,
"watchers": 30,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": "cve-2024-42327 ZBX-25623",
"fork": false,
"created_at": "2024-12-01T00:15:27Z",
"updated_at": "2024-12-04T12:15:06Z",
"updated_at": "2024-12-04T18:29:22Z",
"pushed_at": "2024-12-01T01:18:36Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 12,
"forks": 8,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},
@ -45,19 +45,19 @@
"description": "PoC for CVE-2024-42327 \/ ZBX-25623",
"fork": false,
"created_at": "2024-12-03T12:44:07Z",
"updated_at": "2024-12-04T11:43:42Z",
"updated_at": "2024-12-04T14:31:56Z",
"pushed_at": "2024-12-03T12:56:52Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"forks": 2,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -515,7 +515,7 @@
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 10,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -528,7 +528,7 @@
"redteam"
],
"visibility": "public",
"forks": 10,
"forks": 9,
"watchers": 24,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Proof-of-Concept for CVE-2024-46538",
"fork": false,
"created_at": "2024-10-23T10:50:01Z",
"updated_at": "2024-11-15T17:31:24Z",
"updated_at": "2024-12-04T15:38:53Z",
"pushed_at": "2024-11-06T10:56:41Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -36,8 +36,39 @@
],
"visibility": "public",
"forks": 9,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 1
},
{
"id": 898555204,
"name": "CVE-2024-46538",
"full_name": "LauLeysen\/CVE-2024-46538",
"owner": {
"login": "LauLeysen",
"id": 54813361,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54813361?v=4",
"html_url": "https:\/\/github.com\/LauLeysen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LauLeysen\/CVE-2024-46538",
"description": "based on [EQSTLab](https:\/\/github.com\/EQSTLab)",
"fork": false,
"created_at": "2024-12-04T15:51:40Z",
"updated_at": "2024-12-04T16:00:54Z",
"pushed_at": "2024-12-04T16:00:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,19 +14,19 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-04T12:19:36Z",
"updated_at": "2024-12-04T18:26:55Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 46,
"forks": 13,
"watchers": 52,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": "TP-Link Archer AXE75 Authenticated Command Injection",
"fork": false,
"created_at": "2024-10-04T12:49:19Z",
"updated_at": "2024-12-03T09:01:03Z",
"updated_at": "2024-12-04T16:57:38Z",
"pushed_at": "2024-11-23T00:33:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Proof-of-Concept for CVE-2024-5932",
"fork": false,
"created_at": "2024-08-25T11:51:36Z",
"updated_at": "2024-11-27T14:59:21Z",
"updated_at": "2024-12-04T15:53:47Z",
"pushed_at": "2024-08-29T02:13:12Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 51,
"watchers": 52,
"score": 0,
"subscribers_count": 1
},

View file

@ -4835,6 +4835,7 @@
- [EQSTLab/CVE-2024-34102](https://github.com/EQSTLab/CVE-2024-34102)
- [dream434/CVE-2024-34102](https://github.com/dream434/CVE-2024-34102)
- [bka/magento-cve-2024-34102-exploit-cosmicstring](https://github.com/bka/magento-cve-2024-34102-exploit-cosmicstring)
- [wubinworks/magento2-encryption-key-manager-cli](https://github.com/wubinworks/magento2-encryption-key-manager-cli)
### CVE-2024-34144 (2024-05-02)
@ -6536,6 +6537,7 @@
</code>
- [EQSTLab/CVE-2024-46538](https://github.com/EQSTLab/CVE-2024-46538)
- [LauLeysen/CVE-2024-46538](https://github.com/LauLeysen/CVE-2024-46538)
### CVE-2024-46627 (2024-09-26)
@ -16192,6 +16194,7 @@
- [im-hanzou/fubucker](https://github.com/im-hanzou/fubucker)
- [zycoder0day/CVE-2022-1386-Mass_Vulnerability](https://github.com/zycoder0day/CVE-2022-1386-Mass_Vulnerability)
- [satyasai1460/CVE-2022-1386](https://github.com/satyasai1460/CVE-2022-1386)
- [lamcodeofpwnosec/CVE-2022-1386](https://github.com/lamcodeofpwnosec/CVE-2022-1386)
### CVE-2022-1388 (2022-05-05)
@ -21215,13 +21218,6 @@
- [TaroballzChen/CVE-2022-41040-metasploit-ProxyNotShell](https://github.com/TaroballzChen/CVE-2022-41040-metasploit-ProxyNotShell)
- [0-Gram/CVE-2022-41040](https://github.com/0-Gram/CVE-2022-41040)
### CVE-2022-41049 (2022-11-09)
<code>Windows Mark of the Web Security Feature Bypass Vulnerability
</code>
- [Nathan01110011/CVE-2022-41049-POC](https://github.com/Nathan01110011/CVE-2022-41049-POC)
### CVE-2022-41080 (2022-11-09)
<code>Microsoft Exchange Server Elevation of Privilege Vulnerability
@ -23206,6 +23202,7 @@
- [piperpwn/CVE-2021-3129-](https://github.com/piperpwn/CVE-2021-3129-)
- [0x0d3ad/CVE-2021-3129](https://github.com/0x0d3ad/CVE-2021-3129)
- [GodOfServer/CVE-2021-3129](https://github.com/GodOfServer/CVE-2021-3129)
- [Prabesh01/hoh4](https://github.com/Prabesh01/hoh4)
### CVE-2021-3130 (2021-01-20)
@ -24876,7 +24873,6 @@
- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
- [30579096/Confluence-CVE-2021-26084](https://github.com/30579096/Confluence-CVE-2021-26084)
- [ZZ-SOCMAP/CVE-2021-26084](https://github.com/ZZ-SOCMAP/CVE-2021-26084)
- [vpxuser/CVE-2021-26084-EXP](https://github.com/vpxuser/CVE-2021-26084-EXP)
- [nahcusira/CVE-2021-26084](https://github.com/nahcusira/CVE-2021-26084)
- [BBD-YZZ/Confluence-RCE](https://github.com/BBD-YZZ/Confluence-RCE)
@ -36674,7 +36670,7 @@
### CVE-2019-11881 (2019-06-10)
<code>A vulnerability exists in Rancher 2.1.4 in the login component, where the errorMsg parameter can be tampered to display arbitrary content, filtering tags but not special characters or symbols. There's no other limitation of the message, allowing malicious users to lure legitimate users to visit phishing sites with scare tactics, e.g., displaying a &quot;This version of Rancher is outdated, please visit https://malicious.rancher.site/upgrading&quot; message.
<code>A vulnerability exists in Rancher before 2.2.4 in the login component, where the errorMsg parameter can be tampered to display arbitrary content, filtering tags but not special characters or symbols. There's no other limitation of the message, allowing malicious users to lure legitimate users to visit phishing sites with scare tactics, e.g., displaying a &quot;This version of Rancher is outdated, please visit https://malicious.rancher.site/upgrading&quot; message.
</code>
- [MauroEldritch/VanCleef](https://github.com/MauroEldritch/VanCleef)