Auto Update 2025/01/07 00:46:58

This commit is contained in:
motikan2010-bot 2025-01-07 09:46:58 +09:00
parent c29f62214c
commit b74083110b
26 changed files with 278 additions and 105 deletions

View file

@ -60,5 +60,36 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 912989719,
"name": "Drupalgeddon-Python3",
"full_name": "RasmusKnothNielsen\/Drupalgeddon-Python3",
"owner": {
"login": "RasmusKnothNielsen",
"id": 12834690,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12834690?v=4",
"html_url": "https:\/\/github.com\/RasmusKnothNielsen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RasmusKnothNielsen\/Drupalgeddon-Python3",
"description": "An rewritten POC on the CVE-2014-3704 ",
"fork": false,
"created_at": "2025-01-06T20:04:24Z",
"updated_at": "2025-01-06T20:18:35Z",
"pushed_at": "2025-01-06T20:18:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -19,13 +19,13 @@
"stargazers_count": 510, "stargazers_count": 510,
"watchers_count": 510, "watchers_count": 510,
"has_discussions": false, "has_discussions": false,
"forks_count": 454, "forks_count": 453,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 454, "forks": 453,
"watchers": 510, "watchers": 510,
"score": 0, "score": 0,
"subscribers_count": 57 "subscribers_count": 57

View file

@ -33,7 +33,7 @@
"forks": 24, "forks": 24,
"watchers": 154, "watchers": 154,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 12
}, },
{ {
"id": 244758802, "id": 244758802,

View file

@ -28,6 +28,6 @@
"forks": 38, "forks": 38,
"watchers": 71, "watchers": 71,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 6
} }
] ]

View file

@ -139,5 +139,41 @@
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
},
{
"id": 913003270,
"name": "poc-cve-2020-35489",
"full_name": "gh202503\/poc-cve-2020-35489",
"owner": {
"login": "gh202503",
"id": 193975604,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193975604?v=4",
"html_url": "https:\/\/github.com\/gh202503",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gh202503\/poc-cve-2020-35489",
"description": "poc-CVE-2020-35489",
"fork": false,
"created_at": "2025-01-06T20:45:48Z",
"updated_at": "2025-01-06T21:24:55Z",
"pushed_at": "2025-01-06T21:24:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-35489",
"poc-cve-2020-35489",
"rce",
"rce-exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -14,10 +14,10 @@
"description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...", "description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false, "fork": false,
"created_at": "2021-03-22T11:53:57Z", "created_at": "2021-03-22T11:53:57Z",
"updated_at": "2024-11-11T16:02:36Z", "updated_at": "2025-01-06T18:55:22Z",
"pushed_at": "2021-03-22T18:24:20Z", "pushed_at": "2021-03-22T18:24:20Z",
"stargazers_count": 165, "stargazers_count": 164,
"watchers_count": 165, "watchers_count": 164,
"has_discussions": false, "has_discussions": false,
"forks_count": 26, "forks_count": 26,
"allow_forking": true, "allow_forking": true,
@ -41,7 +41,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 26, "forks": 26,
"watchers": 165, "watchers": 164,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
} }

View file

@ -45,10 +45,10 @@
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017", "description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
"fork": false, "fork": false,
"created_at": "2022-06-30T04:39:58Z", "created_at": "2022-06-30T04:39:58Z",
"updated_at": "2024-12-25T00:20:37Z", "updated_at": "2025-01-06T23:20:07Z",
"pushed_at": "2023-11-12T16:29:03Z", "pushed_at": "2023-11-12T16:29:03Z",
"stargazers_count": 100, "stargazers_count": 101,
"watchers_count": 100, "watchers_count": 101,
"has_discussions": false, "has_discussions": false,
"forks_count": 21, "forks_count": 21,
"allow_forking": true, "allow_forking": true,
@ -60,7 +60,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 21, "forks": 21,
"watchers": 100, "watchers": 101,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -29,36 +29,5 @@
"watchers": 3, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
},
{
"id": 912935660,
"name": "CVE-2021-26828",
"full_name": "voidvxvt\/CVE-2021-26828",
"owner": {
"login": "voidvxvt",
"id": 86536790,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86536790?v=4",
"html_url": "https:\/\/github.com\/voidvxvt",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/voidvxvt\/CVE-2021-26828",
"description": "python3 port of https:\/\/github.com\/hev0x\/CVE-2021-26828_ScadaBR_RCE\/blob\/main\/LinScada_RCE.py",
"fork": false,
"created_at": "2025-01-06T17:38:19Z",
"updated_at": "2025-01-06T17:40:18Z",
"pushed_at": "2025-01-06T17:40:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -12768,7 +12768,7 @@
"fork": false, "fork": false,
"created_at": "2025-01-03T10:15:17Z", "created_at": "2025-01-03T10:15:17Z",
"updated_at": "2025-01-03T10:15:21Z", "updated_at": "2025-01-03T10:15:21Z",
"pushed_at": "2025-01-03T16:36:23Z", "pushed_at": "2025-01-06T19:10:53Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -29,5 +29,36 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 448068658,
"name": "CVE-2021-46069",
"full_name": "plsanu\/CVE-2021-46069",
"owner": {
"login": "plsanu",
"id": 61007700,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
"html_url": "https:\/\/github.com\/plsanu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46069",
"description": "CVE-2021-46069 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.",
"fork": false,
"created_at": "2022-01-14T18:27:00Z",
"updated_at": "2023-12-30T08:24:23Z",
"pushed_at": "2022-01-14T18:27:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
} }
] ]

View file

@ -2897,5 +2897,36 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 913058800,
"name": "CTF-CVE-2022-0847",
"full_name": "JustinYe377\/CTF-CVE-2022-0847",
"owner": {
"login": "JustinYe377",
"id": 97569874,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97569874?v=4",
"html_url": "https:\/\/github.com\/JustinYe377",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JustinYe377\/CTF-CVE-2022-0847",
"description": null,
"fork": false,
"created_at": "2025-01-07T00:25:12Z",
"updated_at": "2025-01-07T00:25:13Z",
"pushed_at": "2025-01-07T00:25:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -14,12 +14,12 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false, "fork": false,
"created_at": "2022-02-08T17:25:44Z", "created_at": "2022-02-08T17:25:44Z",
"updated_at": "2024-12-29T06:32:48Z", "updated_at": "2025-01-06T20:22:58Z",
"pushed_at": "2022-02-09T16:54:09Z", "pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 777, "stargazers_count": 778,
"watchers_count": 777, "watchers_count": 778,
"has_discussions": false, "has_discussions": false,
"forks_count": 158, "forks_count": 159,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -28,8 +28,8 @@
"cve-2022-22718" "cve-2022-22718"
], ],
"visibility": "public", "visibility": "public",
"forks": 158, "forks": 159,
"watchers": 777, "watchers": 778,
"score": 0, "score": 0,
"subscribers_count": 15 "subscribers_count": 15
} }

View file

@ -107,10 +107,10 @@
"description": "CVE-2023-0386 analysis and Exp", "description": "CVE-2023-0386 analysis and Exp",
"fork": false, "fork": false,
"created_at": "2023-05-06T06:07:23Z", "created_at": "2023-05-06T06:07:23Z",
"updated_at": "2024-11-19T09:49:23Z", "updated_at": "2025-01-07T00:20:14Z",
"pushed_at": "2023-05-06T06:19:25Z", "pushed_at": "2023-05-06T06:19:25Z",
"stargazers_count": 117, "stargazers_count": 118,
"watchers_count": 117, "watchers_count": 118,
"has_discussions": false, "has_discussions": false,
"forks_count": 21, "forks_count": 21,
"allow_forking": true, "allow_forking": true,
@ -119,7 +119,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 21, "forks": 21,
"watchers": 117, "watchers": 118,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -383,5 +383,36 @@
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 912981235,
"name": "CVE-2023-41425",
"full_name": "samu21req\/CVE-2023-41425",
"owner": {
"login": "samu21req",
"id": 61760887,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61760887?v=4",
"html_url": "https:\/\/github.com\/samu21req",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/samu21req\/CVE-2023-41425",
"description": null,
"fork": false,
"created_at": "2025-01-06T19:38:36Z",
"updated_at": "2025-01-06T19:44:38Z",
"pushed_at": "2025-01-06T19:44:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)", "description": "CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)",
"fork": false, "fork": false,
"created_at": "2023-10-06T01:40:34Z", "created_at": "2023-10-06T01:40:34Z",
"updated_at": "2024-09-27T09:59:05Z", "updated_at": "2025-01-06T20:18:22Z",
"pushed_at": "2023-10-07T03:26:00Z", "pushed_at": "2023-10-07T03:26:00Z",
"stargazers_count": 5, "stargazers_count": 4,
"watchers_count": 5, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 5, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-06T08:21:21Z", "updated_at": "2025-01-06T23:35:29Z",
"pushed_at": "2024-08-18T08:26:46Z", "pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1362, "stargazers_count": 1364,
"watchers_count": 1362, "watchers_count": 1364,
"has_discussions": false, "has_discussions": false,
"forks_count": 230, "forks_count": 230,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 230, "forks": 230,
"watchers": 1362, "watchers": 1364,
"score": 0, "score": 0,
"subscribers_count": 21 "subscribers_count": 21
}, },

View file

@ -2,20 +2,20 @@
{ {
"id": 912223220, "id": 912223220,
"name": "CVE-2023-6931", "name": "CVE-2023-6931",
"full_name": "jungju817\/CVE-2023-6931", "full_name": "K0n9-log\/CVE-2023-6931",
"owner": { "owner": {
"login": "jungju817", "login": "K0n9-log",
"id": 102219883, "id": 102219883,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102219883?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102219883?v=4",
"html_url": "https:\/\/github.com\/jungju817", "html_url": "https:\/\/github.com\/K0n9-log",
"user_view_type": "public" "user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/jungju817\/CVE-2023-6931", "html_url": "https:\/\/github.com\/K0n9-log\/CVE-2023-6931",
"description": "CVE-2023-6931 kernel panic PoC", "description": "CVE-2023-6931 kernel panic PoC",
"fork": false, "fork": false,
"created_at": "2025-01-05T00:28:28Z", "created_at": "2025-01-05T00:28:28Z",
"updated_at": "2025-01-05T02:07:34Z", "updated_at": "2025-01-06T19:31:39Z",
"pushed_at": "2025-01-05T02:07:31Z", "pushed_at": "2025-01-06T19:31:35Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false, "fork": false,
"created_at": "2024-06-18T12:30:53Z", "created_at": "2024-06-18T12:30:53Z",
"updated_at": "2025-01-06T13:26:15Z", "updated_at": "2025-01-06T23:24:13Z",
"pushed_at": "2024-12-02T06:29:52Z", "pushed_at": "2024-12-02T06:29:52Z",
"stargazers_count": 269, "stargazers_count": 270,
"watchers_count": 269, "watchers_count": 270,
"has_discussions": false, "has_discussions": false,
"forks_count": 62, "forks_count": 62,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 62, "forks": 62,
"watchers": 269, "watchers": 270,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7
}, },
@ -297,10 +297,10 @@
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app", "description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
"fork": false, "fork": false,
"created_at": "2024-09-27T09:02:08Z", "created_at": "2024-09-27T09:02:08Z",
"updated_at": "2025-01-06T12:27:07Z", "updated_at": "2025-01-06T21:27:29Z",
"pushed_at": "2024-09-30T12:48:08Z", "pushed_at": "2024-09-30T12:48:08Z",
"stargazers_count": 132, "stargazers_count": 133,
"watchers_count": 132, "watchers_count": 133,
"has_discussions": false, "has_discussions": false,
"forks_count": 17, "forks_count": 17,
"allow_forking": true, "allow_forking": true,
@ -309,7 +309,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 17, "forks": 17,
"watchers": 132, "watchers": 133,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -14,7 +14,7 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2025-01-04T14:47:09Z", "created_at": "2025-01-04T14:47:09Z",
"updated_at": "2025-01-04T14:58:28Z", "updated_at": "2025-01-07T00:35:54Z",
"pushed_at": "2025-01-04T14:58:25Z", "pushed_at": "2025-01-04T14:58:25Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,

View file

@ -170,5 +170,36 @@
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 912544022,
"name": "CVE-2024-25641",
"full_name": "D3Ext\/CVE-2024-25641",
"owner": {
"login": "D3Ext",
"id": 67125397,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67125397?v=4",
"html_url": "https:\/\/github.com\/D3Ext",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D3Ext\/CVE-2024-25641",
"description": "POC exploit for CVE-2024-25641",
"fork": false,
"created_at": "2025-01-05T21:33:18Z",
"updated_at": "2025-01-06T22:33:40Z",
"pushed_at": "2025-01-06T18:50:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -76,8 +76,8 @@
"description": "CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk", "description": "CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk",
"fork": false, "fork": false,
"created_at": "2024-09-30T16:12:14Z", "created_at": "2024-09-30T16:12:14Z",
"updated_at": "2024-12-23T19:58:15Z", "updated_at": "2025-01-06T20:50:26Z",
"pushed_at": "2024-12-23T19:58:11Z", "pushed_at": "2025-01-06T20:50:22Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,

View file

@ -14,19 +14,19 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false, "fork": false,
"created_at": "2025-01-01T15:48:38Z", "created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-06T17:18:21Z", "updated_at": "2025-01-06T21:56:41Z",
"pushed_at": "2025-01-02T16:07:23Z", "pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 364, "stargazers_count": 366,
"watchers_count": 364, "watchers_count": 366,
"has_discussions": false, "has_discussions": false,
"forks_count": 85, "forks_count": 86,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 85, "forks": 86,
"watchers": 364, "watchers": 366,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp", "description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false, "fork": false,
"created_at": "2024-12-23T07:20:47Z", "created_at": "2024-12-23T07:20:47Z",
"updated_at": "2025-01-06T09:45:01Z", "updated_at": "2025-01-06T20:17:42Z",
"pushed_at": "2024-12-23T07:30:27Z", "pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 61, "stargazers_count": 62,
"watchers_count": 61, "watchers_count": 62,
"has_discussions": false, "has_discussions": false,
"forks_count": 15, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
@ -212,7 +212,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 15, "forks": 15,
"watchers": 61, "watchers": 62,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -14,10 +14,10 @@
"description": "A tool to exploit the CVE-2024-56512 vulnerability in Apache NiFi, which allows unauthorized access to sensitive data through improperly secured APIs.", "description": "A tool to exploit the CVE-2024-56512 vulnerability in Apache NiFi, which allows unauthorized access to sensitive data through improperly secured APIs.",
"fork": false, "fork": false,
"created_at": "2025-01-06T17:35:33Z", "created_at": "2025-01-06T17:35:33Z",
"updated_at": "2025-01-06T17:51:41Z", "updated_at": "2025-01-06T23:11:22Z",
"pushed_at": "2025-01-06T17:51:38Z", "pushed_at": "2025-01-06T17:51:38Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -2180,10 +2180,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false, "fork": false,
"created_at": "2024-07-08T11:27:49Z", "created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-12-29T22:55:53Z", "updated_at": "2025-01-06T19:43:51Z",
"pushed_at": "2024-08-22T08:50:25Z", "pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 63, "stargazers_count": 65,
"watchers_count": 63, "watchers_count": 65,
"has_discussions": false, "has_discussions": false,
"forks_count": 29, "forks_count": 29,
"allow_forking": true, "allow_forking": true,
@ -2192,7 +2192,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 29, "forks": 29,
"watchers": 63, "watchers": 65,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },
@ -2931,10 +2931,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2025-01-04T00:25:33Z", "created_at": "2025-01-04T00:25:33Z",
"updated_at": "2025-01-04T00:37:18Z", "updated_at": "2025-01-07T00:11:11Z",
"pushed_at": "2025-01-04T00:37:14Z", "pushed_at": "2025-01-04T00:37:14Z",
"stargazers_count": 0, "stargazers_count": 3,
"watchers_count": 0, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -2943,7 +2943,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 0, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -3864,6 +3864,7 @@
- [Safarchand/CVE-2024-25641](https://github.com/Safarchand/CVE-2024-25641) - [Safarchand/CVE-2024-25641](https://github.com/Safarchand/CVE-2024-25641)
- [StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26](https://github.com/StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26) - [StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26](https://github.com/StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26)
- [XiaomingX/cve-2024-25641-poc](https://github.com/XiaomingX/cve-2024-25641-poc) - [XiaomingX/cve-2024-25641-poc](https://github.com/XiaomingX/cve-2024-25641-poc)
- [D3Ext/CVE-2024-25641](https://github.com/D3Ext/CVE-2024-25641)
### CVE-2024-25723 (2024-02-27) ### CVE-2024-25723 (2024-02-27)
@ -6846,7 +6847,11 @@
- [ooooooo-q/puma_header_normalization-CVE-2024-45614](https://github.com/ooooooo-q/puma_header_normalization-CVE-2024-45614) - [ooooooo-q/puma_header_normalization-CVE-2024-45614](https://github.com/ooooooo-q/puma_header_normalization-CVE-2024-45614)
### CVE-2024-46209 ### CVE-2024-46209 (2025-01-06)
<code>A stored cross-site scripting (XSS) vulnerability in the component /media/test.html of REDAXO CMS v5.17.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the password parameter.
</code>
- [h4ckr4v3n/CVE-2024-46209](https://github.com/h4ckr4v3n/CVE-2024-46209) - [h4ckr4v3n/CVE-2024-46209](https://github.com/h4ckr4v3n/CVE-2024-46209)
### CVE-2024-46256 (2024-09-27) ### CVE-2024-46256 (2024-09-27)
@ -9545,7 +9550,7 @@
<code>A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.\n\n <code>A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.\n\n
</code> </code>
- [jungju817/CVE-2023-6931](https://github.com/jungju817/CVE-2023-6931) - [K0n9-log/CVE-2023-6931](https://github.com/K0n9-log/CVE-2023-6931)
### CVE-2023-6933 (2024-02-05) ### CVE-2023-6933 (2024-02-05)
@ -14186,6 +14191,7 @@
- [Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE](https://github.com/Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE) - [Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE](https://github.com/Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE)
- [0x0d3ad/CVE-2023-41425](https://github.com/0x0d3ad/CVE-2023-41425) - [0x0d3ad/CVE-2023-41425](https://github.com/0x0d3ad/CVE-2023-41425)
- [xpltive/CVE-2023-41425](https://github.com/xpltive/CVE-2023-41425) - [xpltive/CVE-2023-41425](https://github.com/xpltive/CVE-2023-41425)
- [samu21req/CVE-2023-41425](https://github.com/samu21req/CVE-2023-41425)
### CVE-2023-41436 (2023-09-15) ### CVE-2023-41436 (2023-09-15)
@ -16824,6 +16830,7 @@
- [xsxtw/CVE-2022-0847](https://github.com/xsxtw/CVE-2022-0847) - [xsxtw/CVE-2022-0847](https://github.com/xsxtw/CVE-2022-0847)
- [muhammad1596/CVE-2022-0847-dirty-pipe-checker](https://github.com/muhammad1596/CVE-2022-0847-dirty-pipe-checker) - [muhammad1596/CVE-2022-0847-dirty-pipe-checker](https://github.com/muhammad1596/CVE-2022-0847-dirty-pipe-checker)
- [muhammad1596/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/muhammad1596/CVE-2022-0847-DirtyPipe-Exploits) - [muhammad1596/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/muhammad1596/CVE-2022-0847-DirtyPipe-Exploits)
- [JustinYe377/CTF-CVE-2022-0847](https://github.com/JustinYe377/CTF-CVE-2022-0847)
### CVE-2022-0848 (2022-03-04) ### CVE-2022-0848 (2022-03-04)
@ -25887,7 +25894,6 @@
</code> </code>
- [hev0x/CVE-2021-26828_ScadaBR_RCE](https://github.com/hev0x/CVE-2021-26828_ScadaBR_RCE) - [hev0x/CVE-2021-26828_ScadaBR_RCE](https://github.com/hev0x/CVE-2021-26828_ScadaBR_RCE)
- [voidvxvt/CVE-2021-26828](https://github.com/voidvxvt/CVE-2021-26828)
### CVE-2021-26832 (2021-04-14) ### CVE-2021-26832 (2021-04-14)
@ -26056,7 +26062,11 @@
- [synacktiv/CVE-2021-27246_Pwn2Own2020](https://github.com/synacktiv/CVE-2021-27246_Pwn2Own2020) - [synacktiv/CVE-2021-27246_Pwn2Own2020](https://github.com/synacktiv/CVE-2021-27246_Pwn2Own2020)
### CVE-2021-27285 ### CVE-2021-27285 (2025-01-06)
<code>An issue was discovered in Inspur ClusterEngine v4.0 that allows attackers to gain escalated Local privileges and execute arbitrary commands via /opt/tsce4/torque6/bin/getJobsByShell.
</code>
- [fjh1997/CVE-2021-27285](https://github.com/fjh1997/CVE-2021-27285) - [fjh1997/CVE-2021-27285](https://github.com/fjh1997/CVE-2021-27285)
### CVE-2021-27328 (2021-02-19) ### CVE-2021-27328 (2021-02-19)
@ -29857,6 +29867,7 @@
</code> </code>
- [plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS) - [plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS)
- [plsanu/CVE-2021-46069](https://github.com/plsanu/CVE-2021-46069)
### CVE-2021-46070 (2022-01-06) ### CVE-2021-46070 (2022-01-06)
@ -35198,6 +35209,7 @@
- [X0UCYB3R/Check-WP-CVE-2020-35489](https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489) - [X0UCYB3R/Check-WP-CVE-2020-35489](https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489)
- [reneoliveirajr/wp_CVE-2020-35489_checker](https://github.com/reneoliveirajr/wp_CVE-2020-35489_checker) - [reneoliveirajr/wp_CVE-2020-35489_checker](https://github.com/reneoliveirajr/wp_CVE-2020-35489_checker)
- [Cappricio-Securities/CVE-2020-35489](https://github.com/Cappricio-Securities/CVE-2020-35489) - [Cappricio-Securities/CVE-2020-35489](https://github.com/Cappricio-Securities/CVE-2020-35489)
- [gh202503/poc-cve-2020-35489](https://github.com/gh202503/poc-cve-2020-35489)
### CVE-2020-35498 (2021-02-11) ### CVE-2020-35498 (2021-02-11)
@ -47978,6 +47990,7 @@
- [happynote3966/CVE-2014-3704](https://github.com/happynote3966/CVE-2014-3704) - [happynote3966/CVE-2014-3704](https://github.com/happynote3966/CVE-2014-3704)
- [AleDiBen/Drupalgeddon](https://github.com/AleDiBen/Drupalgeddon) - [AleDiBen/Drupalgeddon](https://github.com/AleDiBen/Drupalgeddon)
- [RasmusKnothNielsen/Drupalgeddon-Python3](https://github.com/RasmusKnothNielsen/Drupalgeddon-Python3)
### CVE-2014-4014 (2014-06-23) ### CVE-2014-4014 (2014-06-23)