Auto Update 2024/09/15 18:29:42

This commit is contained in:
motikan2010-bot 2024-09-16 03:29:42 +09:00
parent c09fdb1a58
commit b2e748e1f6
28 changed files with 190 additions and 92 deletions

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-09-14T03:36:03Z",
"updated_at": "2024-09-15T13:52:05Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4098,
"watchers_count": 4098,
"stargazers_count": 4099,
"watchers_count": 4099,
"has_discussions": false,
"forks_count": 1090,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1090,
"watchers": 4098,
"watchers": 4099,
"score": 0,
"subscribers_count": 148
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-09-14T03:36:03Z",
"updated_at": "2024-09-15T13:52:05Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4098,
"watchers_count": 4098,
"stargazers_count": 4099,
"watchers_count": 4099,
"has_discussions": false,
"forks_count": 1090,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1090,
"watchers": 4098,
"watchers": 4099,
"score": 0,
"subscribers_count": 148
},

View file

@ -28,5 +28,35 @@
"watchers": 30,
"score": 0,
"subscribers_count": 5
},
{
"id": 857806320,
"name": "browser-crash-tool",
"full_name": "lyonzon2\/browser-crash-tool",
"owner": {
"login": "lyonzon2",
"id": 67530243,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67530243?v=4",
"html_url": "https:\/\/github.com\/lyonzon2"
},
"html_url": "https:\/\/github.com\/lyonzon2\/browser-crash-tool",
"description": "A Bash script for Kali Linux that exploits an iOS WebKit vulnerability (CVE-2020-27950) using Metasploit and ngrok. Automates payload delivery with a public URL via ngrok, checks for required tools, handles errors, and provides an easy way to crash browsers for educational purposes only.",
"fork": false,
"created_at": "2024-09-15T16:54:03Z",
"updated_at": "2024-09-15T16:59:49Z",
"pushed_at": "2024-09-15T16:59:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2021-02-10T14:38:05Z",
"updated_at": "2024-08-12T20:10:15Z",
"updated_at": "2024-09-15T12:45:05Z",
"pushed_at": "2021-02-10T14:39:04Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 7
}

View file

@ -103,10 +103,10 @@
"description": "CVE-2021-22005批量验证python脚本",
"fork": false,
"created_at": "2021-09-25T07:19:42Z",
"updated_at": "2024-08-12T20:16:42Z",
"updated_at": "2024-09-15T12:36:18Z",
"pushed_at": "2021-09-25T07:58:15Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 13,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -168,13 +168,13 @@
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 3,
"watchers": 10,
"score": 0,
"subscribers_count": 1

View file

@ -18,13 +18,13 @@
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 117,
"score": 0,
"subscribers_count": 8
@ -48,13 +48,13 @@
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 34,
"score": 0,
"subscribers_count": 3

View file

@ -1463,10 +1463,10 @@
"description": "cve-2021-41773 即 cve-2021-42013 批量检测脚本",
"fork": false,
"created_at": "2021-10-09T11:33:56Z",
"updated_at": "2024-08-12T20:17:07Z",
"updated_at": "2024-09-15T12:36:18Z",
"pushed_at": "2021-10-09T12:14:29Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1475,7 +1475,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -285,10 +285,10 @@
"html_url": "https:\/\/github.com\/btar1gan"
},
"html_url": "https:\/\/github.com\/btar1gan\/exploit_CVE-2022-24112",
"description": "New exploit for Apache APISIX 2.12.1 - Remote code execution (RCE)",
"description": "New exploit for Apache APISIX v2.12.1 - Remote code execution (RCE)",
"fork": false,
"created_at": "2024-06-03T17:33:59Z",
"updated_at": "2024-09-13T20:28:29Z",
"updated_at": "2024-09-15T17:20:39Z",
"pushed_at": "2024-06-07T05:09:49Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-25375 - Demo exploit of RNDIS USB Gadget",
"fork": false,
"created_at": "2022-02-17T14:02:58Z",
"updated_at": "2024-08-12T20:20:41Z",
"updated_at": "2024-09-15T12:30:43Z",
"pushed_at": "2022-02-20T19:56:48Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
}

View file

@ -118,5 +118,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 857813726,
"name": "exploit_CVE-2023-0297",
"full_name": "btar1gan\/exploit_CVE-2023-0297",
"owner": {
"login": "btar1gan",
"id": 92728059,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92728059?v=4",
"html_url": "https:\/\/github.com\/btar1gan"
},
"html_url": "https:\/\/github.com\/btar1gan\/exploit_CVE-2023-0297",
"description": "New exploit for pyLoad v0.5.0 - Unauthenticated remote code excecution",
"fork": false,
"created_at": "2024-09-15T17:15:33Z",
"updated_at": "2024-09-15T17:19:52Z",
"pushed_at": "2024-09-15T17:18:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,12 +13,12 @@
"description": "MOC3ingbird Exploit for Live2D (CVE-2023-27566)",
"fork": false,
"created_at": "2023-03-03T01:57:28Z",
"updated_at": "2024-08-20T16:35:03Z",
"updated_at": "2024-09-15T14:51:28Z",
"pushed_at": "2023-09-19T01:12:41Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": true,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"security-vulnerability"
],
"visibility": "public",
"forks": 5,
"watchers": 77,
"forks": 6,
"watchers": 78,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-04T07:48:13Z",
"updated_at": "2024-08-16T09:36:35Z",
"updated_at": "2024-09-15T14:13:58Z",
"pushed_at": "2024-01-08T03:34:51Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 127,
"watchers": 128,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-27T12:22:05Z",
"updated_at": "2024-09-06T00:21:34Z",
"updated_at": "2024-09-15T15:28:05Z",
"pushed_at": "2023-07-10T16:57:44Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 170,
"watchers_count": 170,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 171,
"watchers": 170,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-09-12T12:44:28Z",
"updated_at": "2024-09-15T17:41:39Z",
"pushed_at": "2024-07-25T18:12:57Z",
"stargazers_count": 218,
"watchers_count": 218,
"stargazers_count": 219,
"watchers_count": 219,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 218,
"watchers": 219,
"score": 0,
"subscribers_count": 5
},

View file

@ -283,19 +283,24 @@
"description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ",
"fork": false,
"created_at": "2024-09-15T12:15:35Z",
"updated_at": "2024-09-15T12:30:15Z",
"pushed_at": "2024-09-15T12:30:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-09-15T14:24:25Z",
"pushed_at": "2024-09-15T14:24:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve-2024-23692",
"rce-exploit",
"rejetto-http-file-server",
"unauthenticated-rce"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "Auto exploitation tool for CVE-2024-24401. ",
"fork": false,
"created_at": "2024-02-18T20:05:46Z",
"updated_at": "2024-09-14T04:38:57Z",
"updated_at": "2024-09-15T17:28:35Z",
"pushed_at": "2024-09-07T03:02:43Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 1
}

View file

@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 857770278,
"name": "CVE-2024-27564",
"full_name": "Quantum-Hacker\/CVE-2024-27564",
"owner": {
"login": "Quantum-Hacker",
"id": 140636140,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140636140?v=4",
"html_url": "https:\/\/github.com\/Quantum-Hacker"
},
"html_url": "https:\/\/github.com\/Quantum-Hacker\/CVE-2024-27564",
"description": null,
"fork": false,
"created_at": "2024-09-15T15:11:54Z",
"updated_at": "2024-09-15T15:54:24Z",
"pushed_at": "2024-09-15T15:54:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,8 +43,8 @@
"description": null,
"fork": false,
"created_at": "2024-09-14T16:08:56Z",
"updated_at": "2024-09-14T16:53:31Z",
"pushed_at": "2024-09-14T16:53:28Z",
"updated_at": "2024-09-15T15:53:54Z",
"pushed_at": "2024-09-15T15:53:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -18,13 +18,13 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 8,
"score": 0,
"subscribers_count": 4

View file

@ -13,10 +13,10 @@
"description": "PoC of CVE-2024-33883, RCE vulnerability of ejs.",
"fork": false,
"created_at": "2024-06-25T18:40:31Z",
"updated_at": "2024-09-02T02:15:25Z",
"updated_at": "2024-09-15T16:58:40Z",
"pushed_at": "2024-07-06T19:51:36Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -1,19 +1,19 @@
[
{
"id": 800659974,
"name": "CVE-2024-34716_PoC",
"full_name": "aelmokhtar\/CVE-2024-34716_PoC",
"name": "CVE-2024-34716",
"full_name": "aelmokhtar\/CVE-2024-34716",
"owner": {
"login": "aelmokhtar",
"id": 66908023,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66908023?v=4",
"html_url": "https:\/\/github.com\/aelmokhtar"
},
"html_url": "https:\/\/github.com\/aelmokhtar\/CVE-2024-34716_PoC",
"html_url": "https:\/\/github.com\/aelmokhtar\/CVE-2024-34716",
"description": null,
"fork": false,
"created_at": "2024-05-14T18:48:41Z",
"updated_at": "2024-05-15T18:21:48Z",
"updated_at": "2024-09-15T15:32:19Z",
"pushed_at": "2024-05-15T18:21:45Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
"fork": false,
"created_at": "2024-07-06T00:49:40Z",
"updated_at": "2024-09-11T09:38:54Z",
"updated_at": "2024-09-15T14:09:02Z",
"pushed_at": "2024-07-12T00:41:36Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 106,
"watchers": 107,
"score": 0,
"subscribers_count": 2
},

View file

@ -256,10 +256,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-09-15T07:47:50Z",
"updated_at": "2024-09-15T17:05:39Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 570,
"watchers_count": 570,
"stargazers_count": 572,
"watchers_count": 572,
"has_discussions": false,
"forks_count": 103,
"allow_forking": true,
@ -268,7 +268,7 @@
"topics": [],
"visibility": "public",
"forks": 103,
"watchers": 570,
"watchers": 572,
"score": 0,
"subscribers_count": 4
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -140,10 +140,10 @@
"description": "PoC RCE in OpenSSH",
"fork": false,
"created_at": "2024-07-01T12:51:18Z",
"updated_at": "2024-09-04T22:58:20Z",
"updated_at": "2024-09-15T17:00:44Z",
"pushed_at": "2024-07-01T13:34:47Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -152,7 +152,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)",
"fork": false,
"created_at": "2024-09-14T06:27:11Z",
"updated_at": "2024-09-15T12:24:26Z",
"pushed_at": "2024-09-14T06:32:51Z",
"stargazers_count": 9,
"watchers_count": 9,
"updated_at": "2024-09-15T17:24:13Z",
"pushed_at": "2024-09-15T15:32:42Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 13,
"score": 0,
"subscribers_count": 3
}

View file

@ -2923,6 +2923,7 @@
</code>
- [MuhammadWaseem29/SSRF-Exploit-CVE-2024-27564](https://github.com/MuhammadWaseem29/SSRF-Exploit-CVE-2024-27564)
- [Quantum-Hacker/CVE-2024-27564](https://github.com/Quantum-Hacker/CVE-2024-27564)
### CVE-2024-27619 (2024-03-29)
@ -3987,7 +3988,7 @@
<code>PrestaShop is an open source e-commerce web application. A cross-site scripting (XSS) vulnerability that only affects PrestaShops with customer-thread feature flag enabled is present starting from PrestaShop 8.1.0 and prior to PrestaShop 8.1.6. When the customer thread feature flag is enabled through the front-office contact form, a hacker can upload a malicious file containing an XSS that will be executed when an admin opens the attached file in back office. The script injected can access the session and the security token, which allows it to perform any authenticated action in the scope of the administrator's right. This vulnerability is patched in 8.1.6. A workaround is to disable the customer-thread feature-flag.
</code>
- [aelmokhtar/CVE-2024-34716_PoC](https://github.com/aelmokhtar/CVE-2024-34716_PoC)
- [aelmokhtar/CVE-2024-34716](https://github.com/aelmokhtar/CVE-2024-34716)
### CVE-2024-34831 (2024-09-10)
@ -5042,6 +5043,7 @@
- [Small-ears/CVE-2023-0297](https://github.com/Small-ears/CVE-2023-0297)
- [JacobEbben/CVE-2023-0297](https://github.com/JacobEbben/CVE-2023-0297)
- [overgrowncarrot1/CVE-2023-0297](https://github.com/overgrowncarrot1/CVE-2023-0297)
- [btar1gan/exploit_CVE-2023-0297](https://github.com/btar1gan/exploit_CVE-2023-0297)
### CVE-2023-0315 (2023-01-16)
@ -31259,6 +31261,7 @@
</code>
- [synacktiv/CVE-2020-27950](https://github.com/synacktiv/CVE-2020-27950)
- [lyonzon2/browser-crash-tool](https://github.com/lyonzon2/browser-crash-tool)
### CVE-2020-27955 (2020-11-05)