Auto Update 2024/12/28 06:31:19

This commit is contained in:
motikan2010-bot 2024-12-28 15:31:19 +09:00
parent ca20470f4f
commit ad93c6913d
31 changed files with 144 additions and 80 deletions

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2018-18500 - Firefox Use-After-Free",
"fork": false,
"created_at": "2019-04-18T00:26:10Z",
"updated_at": "2024-10-15T16:33:12Z",
"updated_at": "2024-12-28T02:11:09Z",
"pushed_at": "2019-04-18T20:32:46Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 58,
"watchers": 59,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)",
"fork": false,
"created_at": "2019-03-02T18:31:11Z",
"updated_at": "2024-09-25T13:33:26Z",
"updated_at": "2024-12-28T01:47:05Z",
"pushed_at": "2020-01-15T12:34:10Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 4
}

View file

@ -14,10 +14,10 @@
"description": "PoC Exploiting SQL Injection in Android's Download Provider (CVE-2018-9493)",
"fork": false,
"created_at": "2019-03-02T18:32:55Z",
"updated_at": "2024-08-12T19:46:17Z",
"updated_at": "2024-12-28T01:47:03Z",
"pushed_at": "2020-01-15T12:33:07Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 4
}

View file

@ -14,10 +14,10 @@
"description": "PoC Exploiting Headers Disclosure in Android's Download Provider (CVE-2018-9546)",
"fork": false,
"created_at": "2019-03-02T18:32:17Z",
"updated_at": "2024-08-12T19:46:17Z",
"updated_at": "2024-12-28T01:47:06Z",
"pushed_at": "2020-01-15T12:33:46Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 4
}

View file

@ -206,10 +206,10 @@
"description": "Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto.",
"fork": false,
"created_at": "2019-10-16T20:13:23Z",
"updated_at": "2024-12-19T04:52:25Z",
"updated_at": "2024-12-28T01:04:41Z",
"pushed_at": "2021-06-16T16:49:33Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -218,7 +218,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "POC for CVE-2020-13151",
"fork": false,
"created_at": "2020-08-01T14:29:59Z",
"updated_at": "2024-11-23T20:27:06Z",
"updated_at": "2024-12-28T04:04:39Z",
"pushed_at": "2020-08-03T18:55:37Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
}

View file

@ -2068,5 +2068,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 909197043,
"name": "ZerologonWithImpacket-CVE2020-1472",
"full_name": "TuanCui22\/ZerologonWithImpacket-CVE2020-1472",
"owner": {
"login": "TuanCui22",
"id": 124656776,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124656776?v=4",
"html_url": "https:\/\/github.com\/TuanCui22",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TuanCui22\/ZerologonWithImpacket-CVE2020-1472",
"description": "This project combines the Zerologon vulnerability exploit (CVE-2020-1472) with Impacket tools for streamlined exploitation and post-exploitation activities. It allows penetration testers to assess and demonstrate the impact of this critical vulnerability in a controlled and authorized environment.",
"fork": false,
"created_at": "2024-12-28T01:58:26Z",
"updated_at": "2024-12-28T02:43:41Z",
"pushed_at": "2024-12-28T02:43:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-27T09:08:06Z",
"updated_at": "2024-12-28T01:54:56Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1358,
"watchers_count": 1358,
"stargazers_count": 1359,
"watchers_count": 1359,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 1358,
"watchers": 1359,
"score": 0,
"subscribers_count": 15
}

View file

@ -386,7 +386,7 @@
"stargazers_count": 1110,
"watchers_count": 1110,
"has_discussions": false,
"forks_count": 536,
"forks_count": 535,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -394,7 +394,7 @@
"log4shell"
],
"visibility": "public",
"forks": 536,
"forks": 535,
"watchers": 1110,
"score": 0,
"subscribers_count": 23
@ -1574,7 +1574,7 @@
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2024-04-29T17:48:37Z",
"pushed_at": "2024-12-26T19:27:05Z",
"pushed_at": "2024-12-28T04:32:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-27T09:08:06Z",
"updated_at": "2024-12-28T01:54:56Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1358,
"watchers_count": 1358,
"stargazers_count": 1359,
"watchers_count": 1359,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 1358,
"watchers": 1359,
"score": 0,
"subscribers_count": 15
}

View file

@ -19,7 +19,7 @@
"stargazers_count": 362,
"watchers_count": 362,
"has_discussions": false,
"forks_count": 106,
"forks_count": 105,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -34,7 +34,7 @@
"tomcat"
],
"visibility": "public",
"forks": 106,
"forks": 105,
"watchers": 362,
"score": 0,
"subscribers_count": 18

View file

@ -14,10 +14,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-12-24T08:04:15Z",
"updated_at": "2024-12-28T04:24:02Z",
"pushed_at": "2024-08-01T15:09:15Z",
"stargazers_count": 311,
"watchers_count": 311,
"stargazers_count": 312,
"watchers_count": 312,
"has_discussions": true,
"forks_count": 46,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 46,
"watchers": 311,
"watchers": 312,
"score": 0,
"subscribers_count": 8
},

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -146,8 +146,8 @@
"description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.",
"fork": false,
"created_at": "2024-11-16T16:32:05Z",
"updated_at": "2024-12-27T15:54:38Z",
"pushed_at": "2024-12-27T15:54:34Z",
"updated_at": "2024-12-28T06:13:38Z",
"pushed_at": "2024-12-28T05:50:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -112,13 +112,13 @@
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 55,
"score": 0,
"subscribers_count": 1

View file

@ -107,10 +107,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-12-26T09:48:29Z",
"updated_at": "2024-12-28T03:53:59Z",
"pushed_at": "2024-09-08T21:23:34Z",
"stargazers_count": 431,
"watchers_count": 431,
"stargazers_count": 432,
"watchers_count": 432,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 431,
"watchers": 432,
"score": 0,
"subscribers_count": 21
},

View file

@ -952,10 +952,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-12-28T00:23:22Z",
"updated_at": "2024-12-28T03:44:43Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3502,
"watchers_count": 3502,
"stargazers_count": 3503,
"watchers_count": 3503,
"has_discussions": false,
"forks_count": 240,
"allow_forking": true,
@ -964,7 +964,7 @@
"topics": [],
"visibility": "public",
"forks": 240,
"watchers": 3502,
"watchers": 3503,
"score": 0,
"subscribers_count": 38
},

View file

@ -14,7 +14,7 @@
"description": "CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.",
"fork": false,
"created_at": "2024-07-19T03:51:54Z",
"updated_at": "2024-12-22T19:42:49Z",
"updated_at": "2024-12-28T05:47:37Z",
"pushed_at": "2024-07-19T04:01:13Z",
"stargazers_count": 68,
"watchers_count": 68,

View file

@ -14,7 +14,7 @@
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
"fork": false,
"created_at": "2024-06-07T05:50:23Z",
"updated_at": "2024-12-17T11:23:46Z",
"updated_at": "2024-12-28T05:47:39Z",
"pushed_at": "2024-06-11T04:46:42Z",
"stargazers_count": 78,
"watchers_count": 78,

View file

@ -262,19 +262,19 @@
"description": "CVE-2024-50379-exp",
"fork": false,
"created_at": "2024-12-25T02:41:31Z",
"updated_at": "2024-12-27T19:59:23Z",
"updated_at": "2024-12-28T06:28:45Z",
"pushed_at": "2024-12-26T08:52:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
@ -307,7 +307,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 908364457,

View file

@ -14,7 +14,7 @@
"description": "CVE-2024-52316 - Apache Tomcat Authentication Bypass Vulnerability",
"fork": false,
"created_at": "2024-11-20T10:22:50Z",
"updated_at": "2024-11-20T10:40:23Z",
"updated_at": "2024-12-28T05:47:37Z",
"pushed_at": "2024-11-20T10:40:20Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -14,7 +14,7 @@
"description": "CVE-2024-52317 - Apache Tomcat HTTP\/2 Data Leakage Vulnerability",
"fork": false,
"created_at": "2024-11-21T06:20:42Z",
"updated_at": "2024-12-11T03:48:06Z",
"updated_at": "2024-12-28T05:47:34Z",
"pushed_at": "2024-11-21T06:33:37Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -14,7 +14,7 @@
"description": "CVE-2024-52318 - Apache Tomcat XSS Vulnerability in Generated JSPs",
"fork": false,
"created_at": "2024-11-21T06:38:48Z",
"updated_at": "2024-11-21T06:44:43Z",
"updated_at": "2024-12-28T05:47:34Z",
"pushed_at": "2024-11-21T06:44:39Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-27T06:18:13Z",
"updated_at": "2024-12-28T05:47:35Z",
"pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 74,
"watchers": 76,
"score": 0,
"subscribers_count": 3
},

View file

@ -467,7 +467,7 @@
"description": "Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote code execution (RCE) with root privileges. This vulnerability, identified as CVE-2024-6387, resides in the OpenSSH server component (sshd), which is designed to listen for connections from client applications.",
"fork": false,
"created_at": "2024-07-02T02:51:37Z",
"updated_at": "2024-12-17T13:08:21Z",
"updated_at": "2024-12-28T05:47:38Z",
"pushed_at": "2024-07-02T03:23:00Z",
"stargazers_count": 10,
"watchers_count": 10,
@ -2180,7 +2180,7 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-12-27T20:08:20Z",
"updated_at": "2024-12-28T04:01:22Z",
"pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 61,
"watchers_count": 61,

View file

@ -215,5 +215,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 909188493,
"name": "RCE_CVE-2024-7954-",
"full_name": "0dayan0n\/RCE_CVE-2024-7954-",
"owner": {
"login": "0dayan0n",
"id": 170557167,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170557167?v=4",
"html_url": "https:\/\/github.com\/0dayan0n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0dayan0n\/RCE_CVE-2024-7954-",
"description": "The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. (CRITICAL)",
"fork": false,
"created_at": "2024-12-28T01:05:05Z",
"updated_at": "2024-12-28T01:20:15Z",
"pushed_at": "2024-12-28T01:20:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "WordPress File Upload插件任意文件读取漏洞CVE-2024-9047批量检测脚本",
"fork": false,
"created_at": "2024-12-25T05:19:17Z",
"updated_at": "2024-12-27T06:36:48Z",
"updated_at": "2024-12-28T01:11:14Z",
"pushed_at": "2024-12-25T05:28:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,8 +26,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -14,7 +14,7 @@
"description": "Nortek Linear eMerge E3 Pre-Auth RCE PoC (CVE-2024-9441)",
"fork": false,
"created_at": "2024-10-03T11:28:46Z",
"updated_at": "2024-10-16T04:34:58Z",
"updated_at": "2024-12-28T06:13:35Z",
"pushed_at": "2024-10-03T11:32:27Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1656,6 +1656,7 @@
- [MuhammadWaseem29/RCE-CVE-2024-7954](https://github.com/MuhammadWaseem29/RCE-CVE-2024-7954)
- [issamjr/CVE-2024-7954](https://github.com/issamjr/CVE-2024-7954)
- [zxj-hub/CVE-2024-7954POC](https://github.com/zxj-hub/CVE-2024-7954POC)
- [0dayan0n/RCE_CVE-2024-7954-](https://github.com/0dayan0n/RCE_CVE-2024-7954-)
### CVE-2024-7965 (2024-08-21)
@ -30659,6 +30660,7 @@
- [whoami-chmod777/Zerologon-Attack-CVE-2020-1472-POC](https://github.com/whoami-chmod777/Zerologon-Attack-CVE-2020-1472-POC)
- [JolynNgSC/Zerologon_CVE-2020-1472](https://github.com/JolynNgSC/Zerologon_CVE-2020-1472)
- [blackh00d/zerologon-poc](https://github.com/blackh00d/zerologon-poc)
- [TuanCui22/ZerologonWithImpacket-CVE2020-1472](https://github.com/TuanCui22/ZerologonWithImpacket-CVE2020-1472)
### CVE-2020-1493 (2020-08-17)