Auto Update 2025/01/21 06:32:20

This commit is contained in:
motikan2010-bot 2025-01-21 15:32:20 +09:00
parent 54cc276b0e
commit b7dcc51bf8
53 changed files with 262 additions and 158 deletions

View file

@ -143,13 +143,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -181,8 +181,8 @@
"description": "Test code for poodle attack (CVE-2014-3566)", "description": "Test code for poodle attack (CVE-2014-3566)",
"fork": false, "fork": false,
"created_at": "2024-11-14T04:35:59Z", "created_at": "2024-11-14T04:35:59Z",
"updated_at": "2025-01-05T15:26:10Z", "updated_at": "2025-01-21T04:18:14Z",
"pushed_at": "2025-01-19T11:50:12Z", "pushed_at": "2025-01-21T04:18:11Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-16T10:10:29Z", "updated_at": "2025-01-21T05:58:48Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2020, "stargazers_count": 2021,
"watchers_count": 2020, "watchers_count": 2021,
"has_discussions": true, "has_discussions": true,
"forks_count": 339, "forks_count": 339,
"allow_forking": true, "allow_forking": true,
@ -78,7 +78,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 339, "forks": 339,
"watchers": 2020, "watchers": 2021,
"score": 0, "score": 0,
"subscribers_count": 38 "subscribers_count": 38
}, },

View file

@ -174,13 +174,13 @@
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 3,
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-16T10:10:29Z", "updated_at": "2025-01-21T05:58:48Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2020, "stargazers_count": 2021,
"watchers_count": 2020, "watchers_count": 2021,
"has_discussions": true, "has_discussions": true,
"forks_count": 339, "forks_count": 339,
"allow_forking": true, "allow_forking": true,
@ -47,7 +47,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 339, "forks": 339,
"watchers": 2020, "watchers": 2021,
"score": 0, "score": 0,
"subscribers_count": 38 "subscribers_count": 38
}, },

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-16T10:10:29Z", "updated_at": "2025-01-21T05:58:48Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2020, "stargazers_count": 2021,
"watchers_count": 2020, "watchers_count": 2021,
"has_discussions": true, "has_discussions": true,
"forks_count": 339, "forks_count": 339,
"allow_forking": true, "allow_forking": true,
@ -78,7 +78,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 339, "forks": 339,
"watchers": 2020, "watchers": 2021,
"score": 0, "score": 0,
"subscribers_count": 38 "subscribers_count": 38
}, },

View file

@ -576,10 +576,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-16T10:10:29Z", "updated_at": "2025-01-21T05:58:48Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2020, "stargazers_count": 2021,
"watchers_count": 2020, "watchers_count": 2021,
"has_discussions": true, "has_discussions": true,
"forks_count": 339, "forks_count": 339,
"allow_forking": true, "allow_forking": true,
@ -609,7 +609,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 339, "forks": 339,
"watchers": 2020, "watchers": 2021,
"score": 0, "score": 0,
"subscribers_count": 38 "subscribers_count": 38
}, },

View file

@ -399,13 +399,13 @@
"stargazers_count": 115, "stargazers_count": 115,
"watchers_count": 115, "watchers_count": 115,
"has_discussions": false, "has_discussions": false,
"forks_count": 60, "forks_count": 61,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 60, "forks": 61,
"watchers": 115, "watchers": 115,
"score": 0, "score": 0,
"subscribers_count": 13 "subscribers_count": 13

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2025-01-16T10:30:17Z", "updated_at": "2025-01-21T06:09:03Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4155, "stargazers_count": 4156,
"watchers_count": 4155, "watchers_count": 4156,
"has_discussions": false, "has_discussions": false,
"forks_count": 1101, "forks_count": 1101,
"allow_forking": true, "allow_forking": true,
@ -77,7 +77,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1101, "forks": 1101,
"watchers": 4155, "watchers": 4156,
"score": 0, "score": 0,
"subscribers_count": 149 "subscribers_count": 149
}, },

View file

@ -50,13 +50,13 @@
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 5,
"watchers": 4, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4

View file

@ -200,10 +200,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-16T10:10:29Z", "updated_at": "2025-01-21T05:58:48Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2020, "stargazers_count": 2021,
"watchers_count": 2020, "watchers_count": 2021,
"has_discussions": true, "has_discussions": true,
"forks_count": 339, "forks_count": 339,
"allow_forking": true, "allow_forking": true,
@ -233,7 +233,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 339, "forks": 339,
"watchers": 2020, "watchers": 2021,
"score": 0, "score": 0,
"subscribers_count": 38 "subscribers_count": 38
} }

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2025-01-16T10:30:17Z", "updated_at": "2025-01-21T06:09:03Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4155, "stargazers_count": 4156,
"watchers_count": 4155, "watchers_count": 4156,
"has_discussions": false, "has_discussions": false,
"forks_count": 1101, "forks_count": 1101,
"allow_forking": true, "allow_forking": true,
@ -46,7 +46,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1101, "forks": 1101,
"watchers": 4155, "watchers": 4156,
"score": 0, "score": 0,
"subscribers_count": 149 "subscribers_count": 149
}, },

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-16T10:10:29Z", "updated_at": "2025-01-21T05:58:48Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2020, "stargazers_count": 2021,
"watchers_count": 2020, "watchers_count": 2021,
"has_discussions": true, "has_discussions": true,
"forks_count": 339, "forks_count": 339,
"allow_forking": true, "allow_forking": true,
@ -47,7 +47,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 339, "forks": 339,
"watchers": 2020, "watchers": 2021,
"score": 0, "score": 0,
"subscribers_count": 38 "subscribers_count": 38
}, },

View file

@ -76,10 +76,10 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE", "description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false, "fork": false,
"created_at": "2020-03-07T18:58:09Z", "created_at": "2020-03-07T18:58:09Z",
"updated_at": "2024-11-01T02:37:52Z", "updated_at": "2025-01-21T00:59:40Z",
"pushed_at": "2022-12-15T00:36:55Z", "pushed_at": "2022-12-15T00:36:55Z",
"stargazers_count": 176, "stargazers_count": 177,
"watchers_count": 176, "watchers_count": 177,
"has_discussions": false, "has_discussions": false,
"forks_count": 56, "forks_count": 56,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 56, "forks": 56,
"watchers": 176, "watchers": 177,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -431,6 +431,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -146,13 +146,13 @@
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -204,10 +204,10 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)", "description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false, "fork": false,
"created_at": "2021-02-18T05:42:13Z", "created_at": "2021-02-18T05:42:13Z",
"updated_at": "2024-12-28T07:43:36Z", "updated_at": "2025-01-21T03:28:34Z",
"pushed_at": "2021-12-14T05:12:17Z", "pushed_at": "2021-12-14T05:12:17Z",
"stargazers_count": 150, "stargazers_count": 151,
"watchers_count": 150, "watchers_count": 151,
"has_discussions": false, "has_discussions": false,
"forks_count": 58, "forks_count": 58,
"allow_forking": true, "allow_forking": true,
@ -216,7 +216,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 58, "forks": 58,
"watchers": 150, "watchers": 151,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -546,7 +546,7 @@
"stargazers_count": 806, "stargazers_count": 806,
"watchers_count": 806, "watchers_count": 806,
"has_discussions": false, "has_discussions": false,
"forks_count": 170, "forks_count": 171,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -559,7 +559,7 @@
"remote-code-execution" "remote-code-execution"
], ],
"visibility": "public", "visibility": "public",
"forks": 170, "forks": 171,
"watchers": 806, "watchers": 806,
"score": 0, "score": 0,
"subscribers_count": 18 "subscribers_count": 18

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false, "fork": false,
"created_at": "2021-12-13T10:28:12Z", "created_at": "2021-12-13T10:28:12Z",
"updated_at": "2025-01-20T01:29:05Z", "updated_at": "2025-01-21T02:47:29Z",
"pushed_at": "2023-01-29T03:31:27Z", "pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 829, "stargazers_count": 830,
"watchers_count": 829, "watchers_count": 830,
"has_discussions": false, "has_discussions": false,
"forks_count": 125, "forks_count": 125,
"allow_forking": true, "allow_forking": true,
@ -62,7 +62,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 125, "forks": 125,
"watchers": 829, "watchers": 830,
"score": 0, "score": 0,
"subscribers_count": 13 "subscribers_count": 13
}, },

View file

@ -208,10 +208,10 @@
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.", "description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false, "fork": false,
"created_at": "2021-12-07T15:11:34Z", "created_at": "2021-12-07T15:11:34Z",
"updated_at": "2025-01-01T19:14:43Z", "updated_at": "2025-01-21T04:37:41Z",
"pushed_at": "2024-07-12T14:17:27Z", "pushed_at": "2024-07-12T14:17:27Z",
"stargazers_count": 248, "stargazers_count": 249,
"watchers_count": 248, "watchers_count": 249,
"has_discussions": false, "has_discussions": false,
"forks_count": 36, "forks_count": 36,
"allow_forking": true, "allow_forking": true,
@ -224,7 +224,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 36, "forks": 36,
"watchers": 248, "watchers": 249,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -12713,6 +12713,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -143,13 +143,13 @@
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 3, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -757,7 +757,7 @@
"forks": 16, "forks": 16,
"watchers": 56, "watchers": 56,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 7
}, },
{ {
"id": 917925392, "id": 917925392,
@ -805,8 +805,8 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group", "description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false, "fork": false,
"created_at": "2025-01-18T15:32:21Z", "created_at": "2025-01-18T15:32:21Z",
"updated_at": "2025-01-21T00:19:32Z", "updated_at": "2025-01-21T06:11:21Z",
"pushed_at": "2025-01-21T00:19:28Z", "pushed_at": "2025-01-21T06:11:17Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -549,13 +549,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 2,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -223,6 +223,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -45,10 +45,10 @@
"description": "PoC for CVE-2023-4911", "description": "PoC for CVE-2023-4911",
"fork": false, "fork": false,
"created_at": "2023-10-04T14:12:16Z", "created_at": "2023-10-04T14:12:16Z",
"updated_at": "2025-01-14T01:45:57Z", "updated_at": "2025-01-21T06:00:30Z",
"pushed_at": "2023-10-04T14:16:36Z", "pushed_at": "2023-10-04T14:16:36Z",
"stargazers_count": 383, "stargazers_count": 384,
"watchers_count": 383, "watchers_count": 384,
"has_discussions": false, "has_discussions": false,
"forks_count": 59, "forks_count": 59,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 59, "forks": 59,
"watchers": 383, "watchers": 384,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },

View file

@ -19,13 +19,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -282,7 +282,7 @@
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -292,7 +292,7 @@
"rce-exploit" "rce-exploit"
], ],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 4, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -19,13 +19,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -19,13 +19,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

33
2024/CVE-2024-12084.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 919782397,
"name": "cve-2024-12084",
"full_name": "themirze\/cve-2024-12084",
"owner": {
"login": "themirze",
"id": 107270233,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107270233?v=4",
"html_url": "https:\/\/github.com\/themirze",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/themirze\/cve-2024-12084",
"description": null,
"fork": false,
"created_at": "2025-01-21T02:13:14Z",
"updated_at": "2025-01-21T02:13:42Z",
"pushed_at": "2025-01-21T02:13:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -522,13 +522,13 @@
"stargazers_count": 19, "stargazers_count": 19,
"watchers_count": 19, "watchers_count": 19,
"has_discussions": true, "has_discussions": true,
"forks_count": 4, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 5,
"watchers": 19, "watchers": 19,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
@ -1056,7 +1056,7 @@
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -1071,7 +1071,7 @@
"laboratory" "laboratory"
], ],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -50,13 +50,13 @@
"stargazers_count": 6, "stargazers_count": 6,
"watchers_count": 6, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 3,
"watchers": 6, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -875,13 +875,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit", "description": "CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit",
"fork": false, "fork": false,
"created_at": "2024-07-13T19:54:27Z", "created_at": "2024-07-13T19:54:27Z",
"updated_at": "2025-01-20T21:18:51Z", "updated_at": "2025-01-21T02:49:16Z",
"pushed_at": "2024-09-11T20:00:46Z", "pushed_at": "2024-09-11T20:00:46Z",
"stargazers_count": 49, "stargazers_count": 50,
"watchers_count": 49, "watchers_count": 50,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 49, "watchers": 50,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -60,5 +60,36 @@
"watchers": 6, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
},
{
"id": 919853961,
"name": "Havoc-C2-SSRF-to-RCE",
"full_name": "sebr-dev\/Havoc-C2-SSRF-to-RCE",
"owner": {
"login": "sebr-dev",
"id": 192042130,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192042130?v=4",
"html_url": "https:\/\/github.com\/sebr-dev",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sebr-dev\/Havoc-C2-SSRF-to-RCE",
"description": "This is a modified version of the CVE-2024-41570 SSRF PoC from @chebuya chained with the auth RCE PoC from @hyperreality. This exploit is made to execute code remotely due to multiple vulnerabilities on Havoc C2 Framework. (https:\/\/github.com\/HavocFramework\/Havoc) ",
"fork": false,
"created_at": "2025-01-21T06:12:33Z",
"updated_at": "2025-01-21T06:16:12Z",
"pushed_at": "2025-01-21T06:13:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -81,13 +81,13 @@
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
@ -112,13 +112,13 @@
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-11-26T12:39:44Z", "created_at": "2024-11-26T12:39:44Z",
"updated_at": "2025-01-20T15:18:59Z", "updated_at": "2025-01-21T00:31:22Z",
"pushed_at": "2025-01-16T09:48:07Z", "pushed_at": "2025-01-16T09:48:07Z",
"stargazers_count": 45, "stargazers_count": 46,
"watchers_count": 45, "watchers_count": 46,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 45, "watchers": 46,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
}, },

View file

@ -14,10 +14,10 @@
"description": "Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation \/ Arbitrary Code Execution Vulnerability", "description": "Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation \/ Arbitrary Code Execution Vulnerability",
"fork": false, "fork": false,
"created_at": "2024-08-24T08:51:08Z", "created_at": "2024-08-24T08:51:08Z",
"updated_at": "2025-01-11T16:49:41Z", "updated_at": "2025-01-21T01:11:35Z",
"pushed_at": "2024-11-05T02:57:25Z", "pushed_at": "2024-11-05T02:57:25Z",
"stargazers_count": 183, "stargazers_count": 181,
"watchers_count": 183, "watchers_count": 181,
"has_discussions": false, "has_discussions": false,
"forks_count": 30, "forks_count": 30,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 30, "forks": 30,
"watchers": 183, "watchers": 181,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
} }

View file

@ -236,13 +236,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false, "fork": false,
"created_at": "2025-01-01T15:48:38Z", "created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-20T17:51:19Z", "updated_at": "2025-01-21T04:57:02Z",
"pushed_at": "2025-01-02T16:07:23Z", "pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 454, "stargazers_count": 455,
"watchers_count": 454, "watchers_count": 455,
"has_discussions": false, "has_discussions": false,
"forks_count": 105, "forks_count": 105,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 105, "forks": 105,
"watchers": 454, "watchers": 455,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -14,12 +14,12 @@
"description": "POC exploit for CVE-2024-49138", "description": "POC exploit for CVE-2024-49138",
"fork": false, "fork": false,
"created_at": "2025-01-15T00:43:37Z", "created_at": "2025-01-15T00:43:37Z",
"updated_at": "2025-01-21T00:31:01Z", "updated_at": "2025-01-21T06:28:23Z",
"pushed_at": "2025-01-20T12:16:52Z", "pushed_at": "2025-01-20T12:16:52Z",
"stargazers_count": 175, "stargazers_count": 182,
"watchers_count": 175, "watchers_count": 182,
"has_discussions": false, "has_discussions": false,
"forks_count": 34, "forks_count": 35,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -30,9 +30,40 @@
"windows" "windows"
], ],
"visibility": "public", "visibility": "public",
"forks": 34, "forks": 35,
"watchers": 175, "watchers": 182,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
},
{
"id": 919776614,
"name": "CVE-2024-49138-POC",
"full_name": "bananoname\/CVE-2024-49138-POC",
"owner": {
"login": "bananoname",
"id": 177087379,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177087379?v=4",
"html_url": "https:\/\/github.com\/bananoname",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bananoname\/CVE-2024-49138-POC",
"description": null,
"fork": false,
"created_at": "2025-01-21T01:50:34Z",
"updated_at": "2025-01-21T02:06:03Z",
"pushed_at": "2025-01-21T02:06:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -169,19 +169,19 @@
"description": "RCE through a race condition in Apache Tomcat", "description": "RCE through a race condition in Apache Tomcat",
"fork": false, "fork": false,
"created_at": "2024-12-21T05:54:29Z", "created_at": "2024-12-21T05:54:29Z",
"updated_at": "2025-01-06T16:53:23Z", "updated_at": "2025-01-21T04:21:37Z",
"pushed_at": "2024-12-21T08:56:44Z", "pushed_at": "2024-12-21T08:56:44Z",
"stargazers_count": 47, "stargazers_count": 48,
"watchers_count": 47, "watchers_count": 48,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 6,
"watchers": 47, "watchers": 48,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -19,13 +19,13 @@
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Escape macOS Sandbox using sharedfilelistd exploit", "description": "Escape macOS Sandbox using sharedfilelistd exploit",
"fork": false, "fork": false,
"created_at": "2025-01-08T09:55:44Z", "created_at": "2025-01-08T09:55:44Z",
"updated_at": "2025-01-15T11:50:05Z", "updated_at": "2025-01-21T02:02:48Z",
"pushed_at": "2025-01-09T06:34:50Z", "pushed_at": "2025-01-09T06:34:50Z",
"stargazers_count": 52, "stargazers_count": 53,
"watchers_count": 52, "watchers_count": 53,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 52, "watchers": 53,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -19,13 +19,13 @@
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 3, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -45,10 +45,10 @@
"description": "Checks for authentication bypass vulnerability inFortinet's FortiOS, potentially exploited by remote attackers.", "description": "Checks for authentication bypass vulnerability inFortinet's FortiOS, potentially exploited by remote attackers.",
"fork": false, "fork": false,
"created_at": "2025-01-18T15:17:07Z", "created_at": "2025-01-18T15:17:07Z",
"updated_at": "2025-01-21T00:19:33Z", "updated_at": "2025-01-21T06:28:57Z",
"pushed_at": "2025-01-21T00:19:30Z", "pushed_at": "2025-01-21T06:28:54Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -112,13 +112,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Time Clock <= 1.2.2 & Time Clock Pro <= 1.1.4 - Unauthenticated (Limited) Remote Code Execution", "description": "Time Clock <= 1.2.2 & Time Clock Pro <= 1.1.4 - Unauthenticated (Limited) Remote Code Execution",
"fork": false, "fork": false,
"created_at": "2024-10-18T09:11:03Z", "created_at": "2024-10-18T09:11:03Z",
"updated_at": "2024-10-18T17:57:05Z", "updated_at": "2025-01-21T06:06:05Z",
"pushed_at": "2024-10-18T09:14:40Z", "pushed_at": "2024-10-18T09:14:40Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -107,10 +107,10 @@
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)", "description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
"fork": false, "fork": false,
"created_at": "2025-01-15T18:27:12Z", "created_at": "2025-01-15T18:27:12Z",
"updated_at": "2025-01-20T17:39:52Z", "updated_at": "2025-01-21T00:33:20Z",
"pushed_at": "2025-01-18T16:59:07Z", "pushed_at": "2025-01-18T16:59:07Z",
"stargazers_count": 17, "stargazers_count": 18,
"watchers_count": 17, "watchers_count": 18,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -119,7 +119,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 17, "watchers": 18,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
}, },

View file

@ -14,19 +14,19 @@
"description": "Proof of concept & details for CVE-2025-21298", "description": "Proof of concept & details for CVE-2025-21298",
"fork": false, "fork": false,
"created_at": "2025-01-20T18:16:51Z", "created_at": "2025-01-20T18:16:51Z",
"updated_at": "2025-01-20T18:22:29Z", "updated_at": "2025-01-21T05:03:51Z",
"pushed_at": "2025-01-20T18:22:01Z", "pushed_at": "2025-01-20T18:22:01Z",
"stargazers_count": 0, "stargazers_count": 2,
"watchers_count": 0, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 2,
"watchers": 0, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -2572,6 +2572,13 @@
- [RandomRobbieBF/CVE-2024-12025](https://github.com/RandomRobbieBF/CVE-2024-12025) - [RandomRobbieBF/CVE-2024-12025](https://github.com/RandomRobbieBF/CVE-2024-12025)
### CVE-2024-12084 (2025-01-15)
<code>A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
</code>
- [themirze/cve-2024-12084](https://github.com/themirze/cve-2024-12084)
### CVE-2024-12155 (2024-12-06) ### CVE-2024-12155 (2024-12-06)
<code>The SV100 Companion plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the settings_import() function in all versions up to, and including, 2.0.02. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. <code>The SV100 Companion plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the settings_import() function in all versions up to, and including, 2.0.02. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
@ -6620,6 +6627,7 @@
- [chebuya/Havoc-C2-SSRF-poc](https://github.com/chebuya/Havoc-C2-SSRF-poc) - [chebuya/Havoc-C2-SSRF-poc](https://github.com/chebuya/Havoc-C2-SSRF-poc)
- [HimmeL-Byte/CVE-2024-41570-SSRF-RCE](https://github.com/HimmeL-Byte/CVE-2024-41570-SSRF-RCE) - [HimmeL-Byte/CVE-2024-41570-SSRF-RCE](https://github.com/HimmeL-Byte/CVE-2024-41570-SSRF-RCE)
- [sebr-dev/Havoc-C2-SSRF-to-RCE](https://github.com/sebr-dev/Havoc-C2-SSRF-to-RCE)
### CVE-2024-41628 (2024-07-26) ### CVE-2024-41628 (2024-07-26)
@ -7550,6 +7558,7 @@
</code> </code>
- [MrAle98/CVE-2024-49138-POC](https://github.com/MrAle98/CVE-2024-49138-POC) - [MrAle98/CVE-2024-49138-POC](https://github.com/MrAle98/CVE-2024-49138-POC)
- [bananoname/CVE-2024-49138-POC](https://github.com/bananoname/CVE-2024-49138-POC)
### CVE-2024-49203 (2024-11-20) ### CVE-2024-49203 (2024-11-20)