Auto Update 2024/09/25 12:31:08

This commit is contained in:
motikan2010-bot 2024-09-25 21:31:08 +09:00
parent 4e0421439b
commit b0578fb16d
55 changed files with 494 additions and 210 deletions

View file

@ -2,14 +2,14 @@
{
"id": 382165102,
"name": "distccd_rce_CVE-2004-2687",
"full_name": "N3rdyN3xus\/distccd_rce_CVE-2004-2687",
"full_name": "NyxByt3\/distccd_rce_CVE-2004-2687",
"owner": {
"login": "N3rdyN3xus",
"login": "NyxByt3",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/N3rdyN3xus"
"html_url": "https:\/\/github.com\/NyxByt3"
},
"html_url": "https:\/\/github.com\/N3rdyN3xus\/distccd_rce_CVE-2004-2687",
"html_url": "https:\/\/github.com\/NyxByt3\/distccd_rce_CVE-2004-2687",
"description": null,
"fork": false,
"created_at": "2021-07-01T21:56:34Z",

View file

@ -692,14 +692,14 @@
{
"id": 557398595,
"name": "CVE-2007-2447",
"full_name": "N3rdyN3xus\/CVE-2007-2447",
"full_name": "NyxByt3\/CVE-2007-2447",
"owner": {
"login": "N3rdyN3xus",
"login": "NyxByt3",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/N3rdyN3xus"
"html_url": "https:\/\/github.com\/NyxByt3"
},
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2007-2447",
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2007-2447",
"description": "Exploit Samba smbd 3.0.20-Debian",
"fork": false,
"created_at": "2022-10-25T16:05:16Z",

View file

@ -32,14 +32,14 @@
{
"id": 386447803,
"name": "CVE-2009-2265",
"full_name": "N3rdyN3xus\/CVE-2009-2265",
"full_name": "NyxByt3\/CVE-2009-2265",
"owner": {
"login": "N3rdyN3xus",
"login": "NyxByt3",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/N3rdyN3xus"
"html_url": "https:\/\/github.com\/NyxByt3"
},
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2009-2265",
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2009-2265",
"description": null,
"fork": false,
"created_at": "2021-07-15T23:14:11Z",

View file

@ -32,14 +32,14 @@
{
"id": 384774726,
"name": "CVE-2011-1249",
"full_name": "N3rdyN3xus\/CVE-2011-1249",
"full_name": "NyxByt3\/CVE-2011-1249",
"owner": {
"login": "N3rdyN3xus",
"login": "NyxByt3",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/N3rdyN3xus"
"html_url": "https:\/\/github.com\/NyxByt3"
},
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2011-1249",
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2011-1249",
"description": null,
"fork": false,
"created_at": "2021-07-10T19:27:23Z",

View file

@ -1728,14 +1728,14 @@
{
"id": 485013657,
"name": "CVE-2014-0160_Heartbleed",
"full_name": "N3rdyN3xus\/CVE-2014-0160_Heartbleed",
"full_name": "NyxByt3\/CVE-2014-0160_Heartbleed",
"owner": {
"login": "N3rdyN3xus",
"login": "NyxByt3",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/N3rdyN3xus"
"html_url": "https:\/\/github.com\/NyxByt3"
},
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2014-0160_Heartbleed",
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2014-0160_Heartbleed",
"description": null,
"fork": false,
"created_at": "2022-04-24T11:53:16Z",

View file

@ -244,14 +244,14 @@
{
"id": 385080605,
"name": "CVE-2015-1635-POC",
"full_name": "N3rdyN3xus\/CVE-2015-1635-POC",
"full_name": "NyxByt3\/CVE-2015-1635-POC",
"owner": {
"login": "N3rdyN3xus",
"login": "NyxByt3",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/N3rdyN3xus"
"html_url": "https:\/\/github.com\/NyxByt3"
},
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2015-1635-POC",
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2015-1635-POC",
"description": null,
"fork": false,
"created_at": "2021-07-12T00:23:30Z",
@ -274,14 +274,14 @@
{
"id": 385082908,
"name": "CVE-2015-1635",
"full_name": "N3rdyN3xus\/CVE-2015-1635",
"full_name": "NyxByt3\/CVE-2015-1635",
"owner": {
"login": "N3rdyN3xus",
"login": "NyxByt3",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/N3rdyN3xus"
"html_url": "https:\/\/github.com\/NyxByt3"
},
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2015-1635",
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2015-1635",
"description": null,
"fork": false,
"created_at": "2021-07-12T00:37:54Z",

View file

@ -32,14 +32,14 @@
{
"id": 386433999,
"name": "CVE-2015-6668",
"full_name": "N3rdyN3xus\/CVE-2015-6668",
"full_name": "NyxByt3\/CVE-2015-6668",
"owner": {
"login": "N3rdyN3xus",
"login": "NyxByt3",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/N3rdyN3xus"
"html_url": "https:\/\/github.com\/NyxByt3"
},
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2015-6668",
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2015-6668",
"description": null,
"fork": false,
"created_at": "2021-07-15T21:58:15Z",

View file

@ -2,14 +2,14 @@
{
"id": 615366361,
"name": "CVE-2016-1531",
"full_name": "N3rdyN3xus\/CVE-2016-1531",
"full_name": "NyxByt3\/CVE-2016-1531",
"owner": {
"login": "N3rdyN3xus",
"login": "NyxByt3",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/N3rdyN3xus"
"html_url": "https:\/\/github.com\/NyxByt3"
},
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2016-1531",
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2016-1531",
"description": null,
"fork": false,
"created_at": "2023-03-17T14:30:15Z",

View file

@ -43,10 +43,10 @@
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
"fork": false,
"created_at": "2018-06-21T15:44:29Z",
"updated_at": "2024-08-12T19:39:29Z",
"updated_at": "2024-09-25T11:21:13Z",
"pushed_at": "2024-02-15T22:16:16Z",
"stargazers_count": 200,
"watchers_count": 200,
"stargazers_count": 201,
"watchers_count": 201,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 68,
"watchers": 200,
"watchers": 201,
"score": 0,
"subscribers_count": 8
},

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-09-19T00:29:58Z",
"pushed_at": "2024-09-19T00:29:57Z",
"pushed_at": "2024-09-25T08:45:17Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -509,10 +509,10 @@
"description": "This repository provides a dockerized infrastructure and a python implementation of the CVE-2019-11043 exploit.",
"fork": false,
"created_at": "2020-05-05T09:43:44Z",
"updated_at": "2024-07-14T10:37:16Z",
"updated_at": "2024-09-25T11:31:52Z",
"pushed_at": "2020-05-25T05:53:56Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -521,7 +521,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
"fork": false,
"created_at": "2019-11-21T06:26:27Z",
"updated_at": "2024-08-12T19:55:03Z",
"updated_at": "2024-09-25T12:05:37Z",
"pushed_at": "2019-11-21T09:27:59Z",
"stargazers_count": 185,
"watchers_count": 185,
"stargazers_count": 186,
"watchers_count": 186,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 185,
"watchers": 186,
"score": 0,
"subscribers_count": 4
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2020-02-27T04:09:29Z",
"updated_at": "2023-07-24T16:19:26Z",
"updated_at": "2024-09-25T09:59:05Z",
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false,
"created_at": "2020-02-11T16:42:34Z",
"updated_at": "2024-09-24T16:58:49Z",
"updated_at": "2024-09-25T10:00:17Z",
"pushed_at": "2021-12-23T16:28:28Z",
"stargazers_count": 336,
"watchers_count": 336,
"stargazers_count": 337,
"watchers_count": 337,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 336,
"watchers": 337,
"score": 0,
"subscribers_count": 9
}

View file

@ -1006,10 +1006,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2024-09-22T02:14:45Z",
"updated_at": "2024-09-25T10:01:21Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1296,
"watchers_count": 1296,
"stargazers_count": 1297,
"watchers_count": 1297,
"has_discussions": false,
"forks_count": 344,
"allow_forking": true,
@ -1024,7 +1024,7 @@
],
"visibility": "public",
"forks": 344,
"watchers": 1296,
"watchers": 1297,
"score": 0,
"subscribers_count": 34
},

View file

@ -1065,10 +1065,10 @@
"description": "CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)",
"fork": false,
"created_at": "2021-12-05T14:49:32Z",
"updated_at": "2024-08-19T05:58:41Z",
"updated_at": "2024-09-25T08:35:59Z",
"pushed_at": "2021-12-05T14:51:28Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -1077,7 +1077,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Exploit code for CVE-2021-1961",
"fork": false,
"created_at": "2022-09-03T13:31:13Z",
"updated_at": "2024-09-10T23:47:58Z",
"updated_at": "2024-09-25T07:44:16Z",
"pushed_at": "2022-09-07T11:47:56Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 105,
"watchers": 106,
"score": 0,
"subscribers_count": 8
}

32
2021/CVE-2021-24959.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 861757230,
"name": "CVE-2021-24959",
"full_name": "RandomRobbieBF\/CVE-2021-24959",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2021-24959",
"description": "WP Email Users <= 1.7.6 - SQL Injection",
"fork": false,
"created_at": "2024-09-23T13:15:34Z",
"updated_at": "2024-09-25T08:13:57Z",
"pushed_at": "2024-09-23T13:19:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -103,10 +103,10 @@
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
"fork": false,
"created_at": "2022-03-01T12:41:03Z",
"updated_at": "2024-08-26T13:49:24Z",
"updated_at": "2024-09-25T08:36:01Z",
"pushed_at": "2022-03-01T16:11:31Z",
"stargazers_count": 251,
"watchers_count": 251,
"stargazers_count": 252,
"watchers_count": 252,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 251,
"watchers": 252,
"score": 0,
"subscribers_count": 8
},

View file

@ -29,36 +29,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 444456600,
"name": "CVE-2021-42342",
"full_name": "Mr-xn\/CVE-2021-42342",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-42342",
"description": "CVE-2021-42342 RCE",
"fork": false,
"created_at": "2022-01-04T14:48:59Z",
"updated_at": "2024-08-12T20:19:29Z",
"pushed_at": "2022-01-04T14:54:39Z",
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 42,
"score": 0,
"subscribers_count": 4
},
{
"id": 711394073,
"name": "-zeroboo-Gohead-CVE-2021-42342-1",

View file

@ -18,7 +18,7 @@
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"shell"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 11,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
"fork": false,
"created_at": "2022-03-19T08:10:46Z",
"updated_at": "2024-08-15T14:16:50Z",
"updated_at": "2024-09-25T07:23:48Z",
"pushed_at": "2022-09-04T17:28:56Z",
"stargazers_count": 326,
"watchers_count": 326,
"stargazers_count": 327,
"watchers_count": 327,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 34,
"watchers": 326,
"watchers": 327,
"score": 0,
"subscribers_count": 6
},

View file

@ -403,10 +403,10 @@
"description": "The Dirty Pipe Vulnerability",
"fork": false,
"created_at": "2022-03-08T13:48:55Z",
"updated_at": "2024-07-19T15:31:53Z",
"updated_at": "2024-09-25T08:36:01Z",
"pushed_at": "2022-03-08T13:54:08Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -415,7 +415,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
"updated_at": "2024-09-20T20:33:06Z",
"updated_at": "2024-09-25T08:36:08Z",
"pushed_at": "2023-04-12T17:28:49Z",
"stargazers_count": 273,
"watchers_count": 273,
"stargazers_count": 274,
"watchers_count": 274,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 273,
"watchers": 274,
"score": 0,
"subscribers_count": 9
}

View file

@ -1284,10 +1284,10 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
"updated_at": "2024-08-31T17:19:11Z",
"updated_at": "2024-09-25T07:25:05Z",
"pushed_at": "2022-04-26T05:55:58Z",
"stargazers_count": 203,
"watchers_count": 203,
"stargazers_count": 204,
"watchers_count": 204,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -1296,7 +1296,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 203,
"watchers": 204,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "u think that it doesnt but it do",
"fork": false,
"created_at": "2022-10-15T00:29:38Z",
"updated_at": "2024-07-19T15:31:58Z",
"updated_at": "2024-09-25T08:36:07Z",
"pushed_at": "2022-10-15T00:46:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM",
"fork": false,
"created_at": "2022-08-17T16:45:13Z",
"updated_at": "2024-09-02T09:18:30Z",
"updated_at": "2024-09-25T06:37:01Z",
"pushed_at": "2022-12-24T10:29:08Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 161,
"watchers_count": 161,
"has_discussions": true,
"forks_count": 26,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 160,
"watchers": 161,
"score": 0,
"subscribers_count": 6
}

View file

@ -43,10 +43,10 @@
"description": "harbor unauthorized detection",
"fork": false,
"created_at": "2023-03-21T10:40:19Z",
"updated_at": "2024-08-22T08:25:31Z",
"updated_at": "2024-09-25T07:54:00Z",
"pushed_at": "2023-03-28T04:23:42Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 2
}

View file

@ -73,10 +73,10 @@
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
"fork": false,
"created_at": "2023-02-22T19:44:08Z",
"updated_at": "2024-09-06T00:15:50Z",
"updated_at": "2024-09-25T08:36:09Z",
"pushed_at": "2023-03-07T10:43:36Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 101,
"watchers": 102,
"score": 0,
"subscribers_count": 3
},

View file

@ -78,13 +78,13 @@
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 46,
"score": 0,
"subscribers_count": 4

View file

@ -174,13 +174,13 @@
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 20,
"score": 0,
"subscribers_count": 0

View file

@ -18,7 +18,7 @@
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"teamcity"
],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 44,
"score": 0,
"subscribers_count": 2

View file

@ -18,13 +18,13 @@
"stargazers_count": 1178,
"watchers_count": 1178,
"has_discussions": false,
"forks_count": 199,
"forks_count": 200,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 199,
"forks": 200,
"watchers": 1178,
"score": 0,
"subscribers_count": 21

View file

@ -89,10 +89,10 @@
"description": "A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass",
"fork": false,
"created_at": "2023-12-29T17:47:54Z",
"updated_at": "2024-08-03T02:03:13Z",
"updated_at": "2024-09-25T10:52:29Z",
"pushed_at": "2023-12-31T21:29:59Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -106,7 +106,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
@ -124,10 +124,10 @@
"description": "This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.",
"fork": false,
"created_at": "2024-01-02T14:20:10Z",
"updated_at": "2024-06-23T14:32:41Z",
"updated_at": "2024-09-25T10:55:06Z",
"pushed_at": "2024-03-24T18:20:52Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -136,7 +136,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 72,
"watchers": 73,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "a demo poc for CVE-2024-0015",
"fork": false,
"created_at": "2024-03-19T10:00:21Z",
"updated_at": "2024-09-12T06:20:31Z",
"updated_at": "2024-09-25T12:18:28Z",
"pushed_at": "2024-08-14T09:53:13Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "exploits for CVE-2024-20017",
"fork": false,
"created_at": "2024-08-30T05:54:36Z",
"updated_at": "2024-09-25T05:20:30Z",
"updated_at": "2024-09-25T10:01:43Z",
"pushed_at": "2024-09-07T10:11:22Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 80,
"watchers": 85,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Auto exploitation tool for CVE-2024-24401. ",
"fork": false,
"created_at": "2024-02-18T20:05:46Z",
"updated_at": "2024-09-15T17:28:35Z",
"updated_at": "2024-09-25T11:24:58Z",
"pushed_at": "2024-09-07T03:02:43Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 24,
"watchers": 26,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-09-18T22:48:02Z",
"updated_at": "2024-09-25T07:04:09Z",
"pushed_at": "2024-07-04T10:39:15Z",
"stargazers_count": 309,
"watchers_count": 309,
"stargazers_count": 310,
"watchers_count": 310,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 309,
"watchers": 310,
"score": 0,
"subscribers_count": 4
},

View file

@ -28,5 +28,35 @@
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 862512431,
"name": "CVE-2024-28987",
"full_name": "horizon3ai\/CVE-2024-28987",
"owner": {
"login": "horizon3ai",
"id": 79593994,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
"html_url": "https:\/\/github.com\/horizon3ai"
},
"html_url": "https:\/\/github.com\/horizon3ai\/CVE-2024-28987",
"description": "Proof of Concept Exploit for CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability",
"fork": false,
"created_at": "2024-09-24T18:12:38Z",
"updated_at": "2024-09-25T10:21:16Z",
"pushed_at": "2024-09-24T18:27:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -982,19 +982,19 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-09-24T17:47:50Z",
"updated_at": "2024-09-25T08:41:01Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3485,
"watchers_count": 3485,
"stargazers_count": 3486,
"watchers_count": 3486,
"has_discussions": false,
"forks_count": 236,
"forks_count": 237,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 236,
"watchers": 3485,
"forks": 237,
"watchers": 3486,
"score": 0,
"subscribers_count": 39
},

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
"fork": false,
"created_at": "2024-07-06T00:49:40Z",
"updated_at": "2024-09-20T13:23:52Z",
"updated_at": "2024-09-25T10:19:26Z",
"pushed_at": "2024-07-12T00:41:36Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 108,
"watchers": 109,
"score": 0,
"subscribers_count": 2
},

View file

@ -406,10 +406,10 @@
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
"fork": false,
"created_at": "2024-08-31T13:56:26Z",
"updated_at": "2024-09-22T02:29:01Z",
"updated_at": "2024-09-25T11:13:12Z",
"pushed_at": "2024-09-13T14:30:18Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -418,7 +418,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
@ -623,8 +623,8 @@
"description": null,
"fork": false,
"created_at": "2024-09-23T11:45:42Z",
"updated_at": "2024-09-23T11:47:02Z",
"pushed_at": "2024-09-23T11:46:58Z",
"updated_at": "2024-09-25T12:01:17Z",
"pushed_at": "2024-09-25T12:01:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 862846646,
"name": "CVE-2024-38816-PoC",
"full_name": "masa42\/CVE-2024-38816-PoC",
"owner": {
"login": "masa42",
"id": 46730934,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46730934?v=4",
"html_url": "https:\/\/github.com\/masa42"
},
"html_url": "https:\/\/github.com\/masa42\/CVE-2024-38816-PoC",
"description": "CVE-2024-38816 Proof of Concept",
"fork": false,
"created_at": "2024-09-25T09:36:59Z",
"updated_at": "2024-09-25T10:26:03Z",
"pushed_at": "2024-09-25T10:20:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-43998.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 855090098,
"name": "CVE-2024-43998",
"full_name": "RandomRobbieBF\/CVE-2024-43998",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-43998",
"description": "Blogpoet <= 1.0.2 - Missing Authorization via blogpoet_install_and_activate_plugins()",
"fork": false,
"created_at": "2024-09-10T09:38:20Z",
"updated_at": "2024-09-25T08:14:14Z",
"pushed_at": "2024-09-10T09:45:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "Public Disclosure",
"fork": false,
"created_at": "2024-09-13T10:27:23Z",
"updated_at": "2024-09-13T10:28:14Z",
"pushed_at": "2024-09-13T10:28:11Z",
"updated_at": "2024-09-25T06:45:26Z",
"pushed_at": "2024-09-25T06:45:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

32
2024/CVE-2024-46627.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 862873525,
"name": "CVE-2024-46627",
"full_name": "d4lyw\/CVE-2024-46627",
"owner": {
"login": "d4lyw",
"id": 53091736,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53091736?v=4",
"html_url": "https:\/\/github.com\/d4lyw"
},
"html_url": "https:\/\/github.com\/d4lyw\/CVE-2024-46627",
"description": "CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary commands via crafted web requests.",
"fork": false,
"created_at": "2024-09-25T10:32:53Z",
"updated_at": "2024-09-25T10:52:13Z",
"pushed_at": "2024-09-25T10:52:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept for CVE-2024-47066",
"fork": false,
"created_at": "2024-09-24T09:59:27Z",
"updated_at": "2024-09-24T23:56:49Z",
"updated_at": "2024-09-25T11:12:45Z",
"pushed_at": "2024-09-24T15:35:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -52,7 +52,7 @@
"description": "Hash Form Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution",
"fork": false,
"created_at": "2024-05-27T20:04:10Z",
"updated_at": "2024-09-18T22:48:01Z",
"updated_at": "2024-09-25T09:36:38Z",
"pushed_at": "2024-07-17T23:40:18Z",
"stargazers_count": 6,
"watchers_count": 6,

View file

@ -13,10 +13,10 @@
"description": "Guardian Code: A Script to Uncover CVE-2024-5274 Vulnerabilities",
"fork": false,
"created_at": "2024-07-10T02:15:56Z",
"updated_at": "2024-07-12T05:33:12Z",
"updated_at": "2024-09-25T07:17:42Z",
"pushed_at": "2024-07-10T08:56:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

36
2024/CVE-2024-5324.json Normal file
View file

@ -0,0 +1,36 @@
[
{
"id": 811264259,
"name": "CVE-2024-5324",
"full_name": "RandomRobbieBF\/CVE-2024-5324",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-5324",
"description": "Login\/Signup Popup ( Inline Form + Woocommerce ) 2.7.1 - 2.7.2 - Missing Authorization to Arbitrary Options Update",
"fork": false,
"created_at": "2024-06-06T09:01:46Z",
"updated_at": "2024-09-25T08:14:30Z",
"pushed_at": "2024-06-06T09:05:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-5324",
"easy-login-woocommerce",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-6592.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 858770133,
"name": "watchguard-sso-client",
"full_name": "RedTeamPentesting\/watchguard-sso-client",
"owner": {
"login": "RedTeamPentesting",
"id": 34096076,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34096076?v=4",
"html_url": "https:\/\/github.com\/RedTeamPentesting"
},
"html_url": "https:\/\/github.com\/RedTeamPentesting\/watchguard-sso-client",
"description": "Client Implementation for the WatchGuard SSO Agent Protocol used for Security Research (CVE-2024-6592, CVE-2024-6593, CVE-2024-6594)",
"fork": false,
"created_at": "2024-09-17T14:01:10Z",
"updated_at": "2024-09-25T11:54:25Z",
"pushed_at": "2024-09-17T14:12:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 862891732,
"name": "cve-2024-7646",
"full_name": "dovics\/cve-2024-7646",
"owner": {
"login": "dovics",
"id": 45029442,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45029442?v=4",
"html_url": "https:\/\/github.com\/dovics"
},
"html_url": "https:\/\/github.com\/dovics\/cve-2024-7646",
"description": "PoC CVE-2024-7646",
"fork": false,
"created_at": "2024-09-25T11:13:07Z",
"updated_at": "2024-09-25T11:15:30Z",
"pushed_at": "2024-09-25T11:13:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection",
"fork": false,
"created_at": "2024-09-16T15:33:46Z",
"updated_at": "2024-09-23T08:03:07Z",
"updated_at": "2024-09-25T06:53:56Z",
"pushed_at": "2024-09-16T15:43:44Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 5
}

32
2024/CVE-2024-8484.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 862372924,
"name": "CVE-2024-8484",
"full_name": "RandomRobbieBF\/CVE-2024-8484",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-8484",
"description": "REST API TO MiniProgram <= 4.7.1 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2024-09-24T13:46:02Z",
"updated_at": "2024-09-25T08:13:24Z",
"pushed_at": "2024-09-24T13:49:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1062,6 +1062,13 @@
- [Alchemist3dot14/CVE-2024-5274-Detection](https://github.com/Alchemist3dot14/CVE-2024-5274-Detection)
- [mistymntncop/CVE-2024-5274](https://github.com/mistymntncop/CVE-2024-5274)
### CVE-2024-5324 (2024-06-06)
<code>The Login/Signup Popup ( Inline Form + Woocommerce ) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'import_settings' function in versions 2.7.1 to 2.7.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator.
</code>
- [RandomRobbieBF/CVE-2024-5324](https://github.com/RandomRobbieBF/CVE-2024-5324)
### CVE-2024-5326 (2024-05-30)
<code>The Post Grid Gutenberg Blocks and WordPress Blog Plugin PostX plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'postx_presets_callback' function in all versions up to, and including, 4.1.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator.
@ -1317,6 +1324,9 @@
- [apena-ba/CVE-2024-6536](https://github.com/apena-ba/CVE-2024-6536)
### CVE-2024-6592
- [RedTeamPentesting/watchguard-sso-client](https://github.com/RedTeamPentesting/watchguard-sso-client)
### CVE-2024-6624 (2024-07-11)
<code>The JSON API User plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.9.3. This is due to improper controls on custom user meta fields. This makes it possible for unauthenticated attackers to register as administrators on the site. The plugin requires the JSON API plugin to also be installed.
@ -1404,6 +1414,7 @@
</code>
- [r0binak/CVE-2024-7646](https://github.com/r0binak/CVE-2024-7646)
- [dovics/cve-2024-7646](https://github.com/dovics/cve-2024-7646)
### CVE-2024-7703 (2024-08-17)
@ -1464,6 +1475,9 @@
### CVE-2024-8349
- [karlemilnikka/CVE-2024-8349-and-CVE-2024-8350](https://github.com/karlemilnikka/CVE-2024-8349-and-CVE-2024-8350)
### CVE-2024-8484
- [RandomRobbieBF/CVE-2024-8484](https://github.com/RandomRobbieBF/CVE-2024-8484)
### CVE-2024-8504 (2024-09-10)
<code>An attacker with authenticated access to VICIdial as an &quot;agent&quot; can execute arbitrary shell commands as the &quot;root&quot; user. This attack can be chained with CVE-2024-8503 to execute arbitrary shell commands starting from an unauthenticated perspective.
@ -3175,6 +3189,7 @@
</code>
- [fa-rrel/CVE-2024-28987-POC](https://github.com/fa-rrel/CVE-2024-28987-POC)
- [horizon3ai/CVE-2024-28987](https://github.com/horizon3ai/CVE-2024-28987)
### CVE-2024-28991 (2024-09-12)
@ -4521,6 +4536,7 @@
</code>
- [weliveby/cve-2024-38816-demo](https://github.com/weliveby/cve-2024-38816-demo)
- [masa42/CVE-2024-38816-PoC](https://github.com/masa42/CVE-2024-38816-PoC)
### CVE-2024-38856 (2024-08-05)
@ -4931,6 +4947,9 @@
- [KTN1990/CVE-2024-43918](https://github.com/KTN1990/CVE-2024-43918)
### CVE-2024-43998
- [RandomRobbieBF/CVE-2024-43998](https://github.com/RandomRobbieBF/CVE-2024-43998)
### CVE-2024-44000
- [absholi7ly/CVE-2024-44000-LiteSpeed-Cache](https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache)
- [gbrsh/CVE-2024-44000](https://github.com/gbrsh/CVE-2024-44000)
@ -5080,6 +5099,9 @@
- [vidura2/CVE-2024-46451](https://github.com/vidura2/CVE-2024-46451)
### CVE-2024-46627
- [d4lyw/CVE-2024-46627](https://github.com/d4lyw/CVE-2024-46627)
### CVE-2024-46986
- [vidura2/CVE-2024-46986](https://github.com/vidura2/CVE-2024-46986)
@ -22169,6 +22191,13 @@
- [dikalasenjadatang/CVE-2021-24917](https://github.com/dikalasenjadatang/CVE-2021-24917)
- [Cappricio-Securities/CVE-2021-24917](https://github.com/Cappricio-Securities/CVE-2021-24917)
### CVE-2021-24959 (2022-03-14)
<code>The WP Email Users WordPress plugin through 1.7.6 does not escape the data_raw parameter in the weu_selected_users_1 AJAX action, available to any authenticated users, allowing them to perform SQL injection attacks.
</code>
- [RandomRobbieBF/CVE-2021-24959](https://github.com/RandomRobbieBF/CVE-2021-24959)
### CVE-2021-25003 (2022-03-14)
<code>The WPCargo Track &amp; Trace WordPress plugin before 6.9.0 contains a file which could allow unauthenticated attackers to write a PHP file anywhere on the web server, leading to RCE
@ -25206,7 +25235,6 @@
</code>
- [kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-](https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-)
- [Mr-xn/CVE-2021-42342](https://github.com/Mr-xn/CVE-2021-42342)
- [ijh4723/-zeroboo-Gohead-CVE-2021-42342-1](https://github.com/ijh4723/-zeroboo-Gohead-CVE-2021-42342-1)
### CVE-2021-42362 (2021-11-17)
@ -42006,7 +42034,7 @@
<code>Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
</code>
- [N3rdyN3xus/CVE-2016-1531](https://github.com/N3rdyN3xus/CVE-2016-1531)
- [NyxByt3/CVE-2016-1531](https://github.com/NyxByt3/CVE-2016-1531)
### CVE-2016-1542 (2016-06-13)
@ -43292,8 +43320,8 @@
- [bongbongco/MS15-034](https://github.com/bongbongco/MS15-034)
- [aedoo/CVE-2015-1635-POC](https://github.com/aedoo/CVE-2015-1635-POC)
- [limkokholefork/CVE-2015-1635](https://github.com/limkokholefork/CVE-2015-1635)
- [N3rdyN3xus/CVE-2015-1635-POC](https://github.com/N3rdyN3xus/CVE-2015-1635-POC)
- [N3rdyN3xus/CVE-2015-1635](https://github.com/N3rdyN3xus/CVE-2015-1635)
- [NyxByt3/CVE-2015-1635-POC](https://github.com/NyxByt3/CVE-2015-1635-POC)
- [NyxByt3/CVE-2015-1635](https://github.com/NyxByt3/CVE-2015-1635)
- [w01ke/CVE-2015-1635-POC](https://github.com/w01ke/CVE-2015-1635-POC)
- [SkinAir/ms15-034-Scan](https://github.com/SkinAir/ms15-034-Scan)
- [Cappricio-Securities/CVE-2015-1635](https://github.com/Cappricio-Securities/CVE-2015-1635)
@ -43792,7 +43820,7 @@
</code>
- [G01d3nW01f/CVE-2015-6668](https://github.com/G01d3nW01f/CVE-2015-6668)
- [N3rdyN3xus/CVE-2015-6668](https://github.com/N3rdyN3xus/CVE-2015-6668)
- [NyxByt3/CVE-2015-6668](https://github.com/NyxByt3/CVE-2015-6668)
- [jimdiroffii/CVE-2015-6668](https://github.com/jimdiroffii/CVE-2015-6668)
### CVE-2015-6748 (2017-09-25)
@ -44113,7 +44141,7 @@
- [ingochris/heartpatch.us](https://github.com/ingochris/heartpatch.us)
- [BelminD/heartbleed](https://github.com/BelminD/heartbleed)
- [pierceoneill/bleeding-heart](https://github.com/pierceoneill/bleeding-heart)
- [N3rdyN3xus/CVE-2014-0160_Heartbleed](https://github.com/N3rdyN3xus/CVE-2014-0160_Heartbleed)
- [NyxByt3/CVE-2014-0160_Heartbleed](https://github.com/NyxByt3/CVE-2014-0160_Heartbleed)
- [GardeniaWhite/fuzzing](https://github.com/GardeniaWhite/fuzzing)
- [undacmic/heartbleed-proof-of-concept](https://github.com/undacmic/heartbleed-proof-of-concept)
- [cbk914/heartbleed-checker](https://github.com/cbk914/heartbleed-checker)
@ -45596,7 +45624,7 @@
</code>
- [Madusanka99/OHTS](https://github.com/Madusanka99/OHTS)
- [N3rdyN3xus/CVE-2011-1249](https://github.com/N3rdyN3xus/CVE-2011-1249)
- [NyxByt3/CVE-2011-1249](https://github.com/NyxByt3/CVE-2011-1249)
### CVE-2011-1473 (2012-06-16)
@ -46050,7 +46078,7 @@
</code>
- [zaphoxx/zaphoxx-coldfusion](https://github.com/zaphoxx/zaphoxx-coldfusion)
- [N3rdyN3xus/CVE-2009-2265](https://github.com/N3rdyN3xus/CVE-2009-2265)
- [NyxByt3/CVE-2009-2265](https://github.com/NyxByt3/CVE-2009-2265)
- [p1ckzi/CVE-2009-2265](https://github.com/p1ckzi/CVE-2009-2265)
- [0xConstant/CVE-2009-2265](https://github.com/0xConstant/CVE-2009-2265)
@ -46349,7 +46377,7 @@
- [mr-l0n3lly/CVE-2007-2447](https://github.com/mr-l0n3lly/CVE-2007-2447)
- [HerculesRD/PyUsernameMapScriptRCE](https://github.com/HerculesRD/PyUsernameMapScriptRCE)
- [Aviksaikat/CVE-2007-2447](https://github.com/Aviksaikat/CVE-2007-2447)
- [N3rdyN3xus/CVE-2007-2447](https://github.com/N3rdyN3xus/CVE-2007-2447)
- [NyxByt3/CVE-2007-2447](https://github.com/NyxByt3/CVE-2007-2447)
- [bdunlap9/CVE-2007-2447_python](https://github.com/bdunlap9/CVE-2007-2447_python)
- [MikeRega7/CVE-2007-2447-RCE](https://github.com/MikeRega7/CVE-2007-2447-RCE)
- [0xTabun/CVE-2007-2447](https://github.com/0xTabun/CVE-2007-2447)
@ -46634,7 +46662,7 @@
<code>distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks.
</code>
- [N3rdyN3xus/distccd_rce_CVE-2004-2687](https://github.com/N3rdyN3xus/distccd_rce_CVE-2004-2687)
- [NyxByt3/distccd_rce_CVE-2004-2687](https://github.com/NyxByt3/distccd_rce_CVE-2004-2687)
- [k4miyo/CVE-2004-2687](https://github.com/k4miyo/CVE-2004-2687)
- [ss0wl/CVE-2004-2687_distcc_v1](https://github.com/ss0wl/CVE-2004-2687_distcc_v1)