Auto Update 2024/11/04 18:31:37

This commit is contained in:
motikan2010-bot 2024-11-05 03:31:37 +09:00
parent 141ce20e38
commit b810924096
30 changed files with 260 additions and 152 deletions

95
2015/CVE-2015-3239.json Normal file
View file

@ -0,0 +1,95 @@
[
{
"id": 883117003,
"name": "libunwind_CVE-2015-3239",
"full_name": "RenukaSelvar\/libunwind_CVE-2015-3239",
"owner": {
"login": "RenukaSelvar",
"id": 165150685,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165150685?v=4",
"html_url": "https:\/\/github.com\/RenukaSelvar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RenukaSelvar\/libunwind_CVE-2015-3239",
"description": null,
"fork": false,
"created_at": "2024-11-04T12:06:20Z",
"updated_at": "2024-11-04T12:31:12Z",
"pushed_at": "2024-11-04T12:31:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 883132068,
"name": "libunwind_CVE-2015-3239_AfterPatch",
"full_name": "RenukaSelvar\/libunwind_CVE-2015-3239_AfterPatch",
"owner": {
"login": "RenukaSelvar",
"id": 165150685,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165150685?v=4",
"html_url": "https:\/\/github.com\/RenukaSelvar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RenukaSelvar\/libunwind_CVE-2015-3239_AfterPatch",
"description": null,
"fork": false,
"created_at": "2024-11-04T12:38:55Z",
"updated_at": "2024-11-04T12:40:52Z",
"pushed_at": "2024-11-04T12:40:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 883138310,
"name": "libunwind_CVE-2015-3239_After",
"full_name": "RenukaSelvar\/libunwind_CVE-2015-3239_After",
"owner": {
"login": "RenukaSelvar",
"id": 165150685,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165150685?v=4",
"html_url": "https:\/\/github.com\/RenukaSelvar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RenukaSelvar\/libunwind_CVE-2015-3239_After",
"description": null,
"fork": false,
"created_at": "2024-11-04T12:52:16Z",
"updated_at": "2024-11-04T12:57:03Z",
"pushed_at": "2024-11-04T12:57:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)",
"fork": false,
"created_at": "2021-02-25T21:57:24Z",
"updated_at": "2024-02-21T03:19:53Z",
"updated_at": "2024-11-04T15:30:48Z",
"pushed_at": "2021-02-25T22:04:14Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -1,35 +1,4 @@
[
{
"id": 324646528,
"name": "jwtToken-CVE-2016-10555",
"full_name": "thepcn3rd\/jwtToken-CVE-2016-10555",
"owner": {
"login": "thepcn3rd",
"id": 3376911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3376911?v=4",
"html_url": "https:\/\/github.com\/thepcn3rd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/thepcn3rd\/jwtToken-CVE-2016-10555",
"description": "Exploiting the CVE-2016-10555",
"fork": false,
"created_at": "2020-12-26T22:37:53Z",
"updated_at": "2023-11-03T10:16:58Z",
"pushed_at": "2022-03-30T16:41:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 3
},
{
"id": 376896027,
"name": "poc-cve-2016-10555",

View file

@ -355,10 +355,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-11-02T06:09:20Z",
"updated_at": "2024-11-04T15:23:33Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 199,
"watchers_count": 199,
"stargazers_count": 200,
"watchers_count": 200,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -367,7 +367,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 199,
"watchers": 200,
"score": 0,
"subscribers_count": 4
},

View file

@ -107,10 +107,10 @@
"description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.",
"fork": false,
"created_at": "2021-01-29T16:08:35Z",
"updated_at": "2024-10-28T12:14:42Z",
"updated_at": "2024-11-04T13:46:31Z",
"pushed_at": "2021-01-29T16:22:39Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 97,
"watchers": 98,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "[CVE-2017-9822] DotNetNuke Cookie Deserialization Remote Code Execution (RCE)",
"fork": false,
"created_at": "2020-08-28T12:45:44Z",
"updated_at": "2024-09-25T02:27:08Z",
"updated_at": "2024-11-04T15:35:54Z",
"pushed_at": "2020-08-30T00:27:40Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,8 +45,8 @@
"description": "A tool for retrieving login credentials from Netwave IP cameras using a memory dump vulnerability (CVE-2018-17240)",
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-10-23T13:31:02Z",
"pushed_at": "2024-11-04T09:09:00Z",
"updated_at": "2024-11-04T16:57:18Z",
"pushed_at": "2024-11-04T16:57:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -2993,10 +2993,10 @@
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false,
"created_at": "2019-09-30T19:46:21Z",
"updated_at": "2024-08-12T22:49:35Z",
"updated_at": "2024-11-04T16:40:49Z",
"pushed_at": "2021-02-06T00:24:21Z",
"stargazers_count": 235,
"watchers_count": 235,
"stargazers_count": 234,
"watchers_count": 234,
"has_discussions": false,
"forks_count": 74,
"allow_forking": true,
@ -3005,7 +3005,7 @@
"topics": [],
"visibility": "public",
"forks": 74,
"watchers": 235,
"watchers": 234,
"score": 0,
"subscribers_count": 22
},
@ -3179,10 +3179,10 @@
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
"fork": false,
"created_at": "2020-03-15T19:33:53Z",
"updated_at": "2024-10-05T02:33:43Z",
"updated_at": "2024-11-04T17:17:19Z",
"pushed_at": "2022-03-28T04:10:20Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -3191,7 +3191,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 129,
"watchers": 130,
"score": 0,
"subscribers_count": 4
},

View file

@ -888,10 +888,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-11-02T06:09:20Z",
"updated_at": "2024-11-04T15:23:33Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 199,
"watchers_count": 199,
"stargazers_count": 200,
"watchers_count": 200,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -900,7 +900,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 199,
"watchers": 200,
"score": 0,
"subscribers_count": 4
},

View file

@ -244,10 +244,10 @@
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2024-10-16T14:32:33Z",
"updated_at": "2024-11-04T12:29:26Z",
"pushed_at": "2024-05-19T16:25:52Z",
"stargazers_count": 784,
"watchers_count": 784,
"stargazers_count": 785,
"watchers_count": 785,
"has_discussions": false,
"forks_count": 121,
"allow_forking": true,
@ -256,7 +256,7 @@
"topics": [],
"visibility": "public",
"forks": 121,
"watchers": 784,
"watchers": 785,
"score": 0,
"subscribers_count": 10
},
@ -638,10 +638,10 @@
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
"fork": false,
"created_at": "2022-08-23T20:20:45Z",
"updated_at": "2024-10-04T14:25:46Z",
"updated_at": "2024-11-04T15:22:18Z",
"pushed_at": "2022-12-17T16:10:46Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -650,7 +650,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 104,
"watchers": 106,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,19 +14,19 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2024-10-28T12:50:09Z",
"updated_at": "2024-11-04T17:56:04Z",
"pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 684,
"watchers_count": 684,
"stargazers_count": 685,
"watchers_count": 685,
"has_discussions": false,
"forks_count": 104,
"forks_count": 105,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 104,
"watchers": 684,
"forks": 105,
"watchers": 685,
"score": 0,
"subscribers_count": 26
},

View file

@ -76,8 +76,8 @@
"description": null,
"fork": false,
"created_at": "2024-11-04T04:47:55Z",
"updated_at": "2024-11-04T04:48:49Z",
"pushed_at": "2024-11-04T04:48:01Z",
"updated_at": "2024-11-04T14:32:47Z",
"pushed_at": "2024-11-04T14:32:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -45,10 +45,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2024-10-22T05:41:22Z",
"updated_at": "2024-11-04T14:09:27Z",
"pushed_at": "2024-05-16T07:42:00Z",
"stargazers_count": 213,
"watchers_count": 213,
"stargazers_count": 214,
"watchers_count": 214,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 213,
"watchers": 214,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-11-03T22:37:25Z",
"updated_at": "2024-11-04T12:44:08Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1249,
"watchers_count": 1249,
"stargazers_count": 1250,
"watchers_count": 1250,
"has_discussions": false,
"forks_count": 209,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 209,
"watchers": 1249,
"watchers": 1250,
"score": 0,
"subscribers_count": 20
},

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-07-21T20:15:10Z",
"updated_at": "2024-10-13T22:44:38Z",
"updated_at": "2024-11-04T17:52:52Z",
"pushed_at": "2024-08-25T11:26:15Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 17,
"forks": 3,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -107,10 +107,10 @@
"description": "CVE-2024-21413 PoC for THM Lab",
"fork": false,
"created_at": "2024-02-17T14:52:52Z",
"updated_at": "2024-11-03T20:04:03Z",
"updated_at": "2024-11-04T14:13:03Z",
"pushed_at": "2024-03-13T02:44:28Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,19 +14,19 @@
"description": "basic concept for the latest windows wifi driver CVE",
"fork": false,
"created_at": "2024-11-04T03:40:01Z",
"updated_at": "2024-11-04T03:49:33Z",
"updated_at": "2024-11-04T14:45:50Z",
"pushed_at": "2024-11-04T03:49:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -983,10 +983,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-11-04T11:31:33Z",
"updated_at": "2024-11-04T18:13:22Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3494,
"watchers_count": 3494,
"stargazers_count": 3495,
"watchers_count": 3495,
"has_discussions": false,
"forks_count": 239,
"allow_forking": true,
@ -995,7 +995,7 @@
"topics": [],
"visibility": "public",
"forks": 239,
"watchers": 3494,
"watchers": 3495,
"score": 0,
"subscribers_count": 38
},

View file

@ -86,10 +86,10 @@
"description": "CVE-2024-32113 Apache OFBIZ Batch Scanning",
"fork": false,
"created_at": "2024-08-07T07:12:56Z",
"updated_at": "2024-08-12T14:24:05Z",
"updated_at": "2024-11-04T15:16:47Z",
"pushed_at": "2024-08-07T07:16:26Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -98,7 +98,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-11-02T20:21:51Z",
"updated_at": "2024-11-04T13:26:25Z",
"pushed_at": "2024-10-17T18:36:54Z",
"stargazers_count": 194,
"watchers_count": 194,
"stargazers_count": 195,
"watchers_count": 195,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 194,
"watchers": 195,
"score": 0,
"subscribers_count": 6
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 227,
"forks_count": 224,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 227,
"forks": 224,
"watchers": 5,
"score": 0,
"subscribers_count": 0

View file

@ -14,10 +14,10 @@
"description": "Hacking Windows through iTunes - Local Privilege Escalation 0-day",
"fork": false,
"created_at": "2024-10-04T14:20:15Z",
"updated_at": "2024-11-02T23:37:00Z",
"updated_at": "2024-11-04T18:00:47Z",
"pushed_at": "2024-10-04T14:59:50Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 80,
"watchers": 81,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": "CVE-2024-44258",
"fork": false,
"created_at": "2024-10-29T09:45:03Z",
"updated_at": "2024-11-04T09:41:54Z",
"updated_at": "2024-11-04T18:21:57Z",
"pushed_at": "2024-11-02T19:20:44Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 1,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 18,
"forks": 3,
"watchers": 24,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "Proof-of-Concept for CVE-2024-46538",
"fork": false,
"created_at": "2024-10-23T10:50:01Z",
"updated_at": "2024-11-04T12:29:14Z",
"updated_at": "2024-11-04T12:48:07Z",
"pushed_at": "2024-11-04T06:30:35Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-50526.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 883255514,
"name": "CVE-2024-50526-Private-POC",
"full_name": "hatvix1\/CVE-2024-50526-Private-POC",
"owner": {
"login": "hatvix1",
"id": 186392026,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186392026?v=4",
"html_url": "https:\/\/github.com\/hatvix1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hatvix1\/CVE-2024-50526-Private-POC",
"description": "Unrestricted Upload of File with Dangerous Type",
"fork": false,
"created_at": "2024-11-04T16:37:51Z",
"updated_at": "2024-11-04T17:06:33Z",
"pushed_at": "2024-11-04T16:58:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6s upgrademysqlstatus endpoint, bypassing CSRF protections.",
"fork": false,
"created_at": "2024-10-31T21:55:57Z",
"updated_at": "2024-11-01T10:48:45Z",
"updated_at": "2024-11-04T13:54:31Z",
"pushed_at": "2024-11-01T10:48:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -719,10 +719,10 @@
"description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.",
"fork": false,
"created_at": "2024-07-02T06:53:35Z",
"updated_at": "2024-11-03T06:22:50Z",
"updated_at": "2024-11-04T16:14:01Z",
"pushed_at": "2024-07-04T20:04:30Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -731,7 +731,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 1
},
@ -2277,10 +2277,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-11-03T07:26:15Z",
"updated_at": "2024-11-04T15:10:18Z",
"pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -2289,7 +2289,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 41,
"watchers": 43,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,8 +14,8 @@
"description": "CVE-2024-7988-Private-POC",
"fork": false,
"created_at": "2024-11-03T13:22:45Z",
"updated_at": "2024-11-04T10:35:55Z",
"pushed_at": "2024-11-03T13:37:14Z",
"updated_at": "2024-11-04T16:53:55Z",
"pushed_at": "2024-11-04T16:53:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -1,8 +1,8 @@
[
{
"id": 883069940,
"name": "CVE-2024-9988",
"full_name": "hatvix1\/CVE-2024-9988",
"name": "CVE-2024-9537",
"full_name": "hatvix1\/CVE-2024-9537",
"owner": {
"login": "hatvix1",
"id": 186392026,
@ -10,12 +10,12 @@
"html_url": "https:\/\/github.com\/hatvix1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hatvix1\/CVE-2024-9988",
"html_url": "https:\/\/github.com\/hatvix1\/CVE-2024-9537",
"description": "Authentication Bypass Using an Alternate Path or Channel",
"fork": false,
"created_at": "2024-11-04T10:22:47Z",
"updated_at": "2024-11-04T10:35:07Z",
"pushed_at": "2024-11-04T10:35:04Z",
"updated_at": "2024-11-04T16:53:33Z",
"pushed_at": "2024-11-04T16:53:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -1686,6 +1686,9 @@
### CVE-2024-9466
- [holypryx/CVE-2024-9466](https://github.com/holypryx/CVE-2024-9466)
### CVE-2024-9537
- [hatvix1/CVE-2024-9537](https://github.com/hatvix1/CVE-2024-9537)
### CVE-2024-9570
- [dylvie/CVE-2024-9570_D-Link-DIR-619L-bof](https://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof)
@ -1715,9 +1718,6 @@
### CVE-2024-9955
- [amfg145/CVE-2024-9955-POC](https://github.com/amfg145/CVE-2024-9955-POC)
### CVE-2024-9988
- [hatvix1/CVE-2024-9988](https://github.com/hatvix1/CVE-2024-9988)
### CVE-2024-10140
- [holypryx/CVE-2024-10140](https://github.com/holypryx/CVE-2024-10140)
@ -5803,6 +5803,9 @@
### CVE-2024-50476
- [RandomRobbieBF/CVE-2024-50476](https://github.com/RandomRobbieBF/CVE-2024-50476)
### CVE-2024-50526
- [hatvix1/CVE-2024-50526-Private-POC](https://github.com/hatvix1/CVE-2024-50526-Private-POC)
### CVE-2024-50550
- [AleksaZatezalo/CVE-2024-50550](https://github.com/AleksaZatezalo/CVE-2024-50550)
@ -43960,7 +43963,6 @@
<code>Since &quot;algorithm&quot; isn't enforced in jwt.decode()in jwt-simple 0.3.0 and earlier, a malicious user could choose what algorithm is sent sent to the server. If the server is expecting RSA but is sent HMAC-SHA with RSA's public key, the server will think the public key is actually an HMAC private key. This could be used to forge any data an attacker wants.
</code>
- [thepcn3rd/jwtToken-CVE-2016-10555](https://github.com/thepcn3rd/jwtToken-CVE-2016-10555)
- [CircuitSoul/poc-cve-2016-10555](https://github.com/CircuitSoul/poc-cve-2016-10555)
- [scent2d/PoC-CVE-2016-10555](https://github.com/scent2d/PoC-CVE-2016-10555)
@ -44466,6 +44468,15 @@
- [0xEval/cve-2015-3224](https://github.com/0xEval/cve-2015-3224)
- [n000xy/CVE-2015-3224-](https://github.com/n000xy/CVE-2015-3224-)
### CVE-2015-3239 (2015-08-26)
<code>Off-by-one error in the dwarf_to_unw_regnum function in include/dwarf_i.h in libunwind 1.1 allows local users to have unspecified impact via invalid dwarf opcodes.
</code>
- [RenukaSelvar/libunwind_CVE-2015-3239](https://github.com/RenukaSelvar/libunwind_CVE-2015-3239)
- [RenukaSelvar/libunwind_CVE-2015-3239_AfterPatch](https://github.com/RenukaSelvar/libunwind_CVE-2015-3239_AfterPatch)
- [RenukaSelvar/libunwind_CVE-2015-3239_After](https://github.com/RenukaSelvar/libunwind_CVE-2015-3239_After)
### CVE-2015-3306 (2015-05-18)
<code>The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.