Auto Update 2024/12/08 12:31:42

This commit is contained in:
motikan2010-bot 2024-12-08 21:31:42 +09:00
parent e96ae8f322
commit b99b5fd7c5
25 changed files with 170 additions and 129 deletions

View file

@ -14,10 +14,10 @@
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ", "description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
"fork": false, "fork": false,
"created_at": "2021-06-05T18:59:28Z", "created_at": "2021-06-05T18:59:28Z",
"updated_at": "2024-11-22T12:31:54Z", "updated_at": "2024-12-08T10:20:00Z",
"pushed_at": "2021-06-06T09:41:51Z", "pushed_at": "2021-06-06T09:41:51Z",
"stargazers_count": 56, "stargazers_count": 57,
"watchers_count": 56, "watchers_count": 57,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 56, "watchers": 57,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -355,10 +355,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false, "fork": false,
"created_at": "2022-11-13T11:01:41Z", "created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-11-21T08:56:26Z", "updated_at": "2024-12-08T09:30:49Z",
"pushed_at": "2022-11-15T09:05:50Z", "pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 203, "stargazers_count": 204,
"watchers_count": 203, "watchers_count": 204,
"has_discussions": false, "has_discussions": false,
"forks_count": 18, "forks_count": 18,
"allow_forking": true, "allow_forking": true,
@ -367,7 +367,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 18, "forks": 18,
"watchers": 203, "watchers": 204,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },
@ -417,10 +417,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false, "fork": false,
"created_at": "2024-08-29T06:38:16Z", "created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-06T03:29:54Z", "updated_at": "2024-12-08T08:50:03Z",
"pushed_at": "2024-11-13T03:12:58Z", "pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 156, "stargazers_count": 157,
"watchers_count": 156, "watchers_count": 157,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
@ -437,7 +437,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 14,
"watchers": 156, "watchers": 157,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -15,11 +15,11 @@
"fork": false, "fork": false,
"created_at": "2023-01-11T10:20:27Z", "created_at": "2023-01-11T10:20:27Z",
"updated_at": "2024-12-05T14:23:33Z", "updated_at": "2024-12-05T14:23:33Z",
"pushed_at": "2024-12-05T14:23:30Z", "pushed_at": "2024-12-08T10:54:53Z",
"stargazers_count": 13, "stargazers_count": 13,
"watchers_count": 13, "watchers_count": 13,
"has_discussions": false, "has_discussions": false,
"forks_count": 12, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": true, "web_commit_signoff_required": true,
@ -29,7 +29,7 @@
"send" "send"
], ],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 11,
"watchers": 13, "watchers": 13,
"score": 0, "score": 0,
"subscribers_count": 12 "subscribers_count": 12

View file

@ -888,10 +888,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false, "fork": false,
"created_at": "2022-11-13T11:01:41Z", "created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-11-21T08:56:26Z", "updated_at": "2024-12-08T09:30:49Z",
"pushed_at": "2022-11-15T09:05:50Z", "pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 203, "stargazers_count": 204,
"watchers_count": 203, "watchers_count": 204,
"has_discussions": false, "has_discussions": false,
"forks_count": 18, "forks_count": 18,
"allow_forking": true, "allow_forking": true,
@ -900,7 +900,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 18, "forks": 18,
"watchers": 203, "watchers": 204,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },
@ -981,10 +981,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false, "fork": false,
"created_at": "2024-08-29T06:38:16Z", "created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-06T03:29:54Z", "updated_at": "2024-12-08T08:50:03Z",
"pushed_at": "2024-11-13T03:12:58Z", "pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 156, "stargazers_count": 157,
"watchers_count": 156, "watchers_count": 157,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
@ -1001,7 +1001,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 14,
"watchers": 156, "watchers": 157,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -125,5 +125,36 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 900254066,
"name": "CVE-2021-23017-POC",
"full_name": "z3usx01\/CVE-2021-23017-POC",
"owner": {
"login": "z3usx01",
"id": 112891506,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112891506?v=4",
"html_url": "https:\/\/github.com\/z3usx01",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z3usx01\/CVE-2021-23017-POC",
"description": "The issue only affects nginx if the \"resolver\" directive is used in the configuration file. Further, the attack is only possible if an attacker is able to forge UDP packets from the DNS server.",
"fork": false,
"created_at": "2024-12-08T09:47:52Z",
"updated_at": "2024-12-08T09:52:26Z",
"pushed_at": "2024-12-08T09:52:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -204,10 +204,10 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)", "description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false, "fork": false,
"created_at": "2021-02-18T05:42:13Z", "created_at": "2021-02-18T05:42:13Z",
"updated_at": "2024-12-04T09:45:01Z", "updated_at": "2024-12-08T07:44:09Z",
"pushed_at": "2021-12-14T05:12:17Z", "pushed_at": "2021-12-14T05:12:17Z",
"stargazers_count": 147, "stargazers_count": 148,
"watchers_count": 147, "watchers_count": 148,
"has_discussions": false, "has_discussions": false,
"forks_count": 58, "forks_count": 58,
"allow_forking": true, "allow_forking": true,
@ -216,7 +216,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 58, "forks": 58,
"watchers": 147, "watchers": 148,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -60,36 +60,5 @@
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
},
{
"id": 447857478,
"name": "CVE-2021-35211",
"full_name": "BishopFox\/CVE-2021-35211",
"owner": {
"login": "BishopFox",
"id": 4523757,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4",
"html_url": "https:\/\/github.com\/BishopFox",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BishopFox\/CVE-2021-35211",
"description": null,
"fork": false,
"created_at": "2022-01-14T05:52:17Z",
"updated_at": "2024-12-03T03:14:04Z",
"pushed_at": "2022-01-14T05:56:09Z",
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 35,
"score": 0,
"subscribers_count": 4
} }
] ]

View file

@ -14,10 +14,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false, "fork": false,
"created_at": "2021-12-11T15:10:30Z", "created_at": "2021-12-11T15:10:30Z",
"updated_at": "2024-12-06T19:14:02Z", "updated_at": "2024-12-08T09:34:30Z",
"pushed_at": "2022-07-10T22:23:13Z", "pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 989, "stargazers_count": 990,
"watchers_count": 989, "watchers_count": 990,
"has_discussions": false, "has_discussions": false,
"forks_count": 190, "forks_count": 190,
"allow_forking": true, "allow_forking": true,
@ -31,7 +31,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 190, "forks": 190,
"watchers": 989, "watchers": 990,
"score": 0, "score": 0,
"subscribers_count": 24 "subscribers_count": 24
}, },

View file

@ -107,10 +107,10 @@
"description": "Remote Code Injection In Log4j", "description": "Remote Code Injection In Log4j",
"fork": false, "fork": false,
"created_at": "2021-12-10T05:23:44Z", "created_at": "2021-12-10T05:23:44Z",
"updated_at": "2024-11-25T03:42:23Z", "updated_at": "2024-12-08T07:27:57Z",
"pushed_at": "2022-01-18T12:01:52Z", "pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 459, "stargazers_count": 460,
"watchers_count": 459, "watchers_count": 460,
"has_discussions": false, "has_discussions": false,
"forks_count": 124, "forks_count": 124,
"allow_forking": true, "allow_forking": true,
@ -119,7 +119,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 124, "forks": 124,
"watchers": 459, "watchers": 460,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
}, },

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false, "fork": false,
"created_at": "2022-05-31T07:44:01Z", "created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-12-06T05:41:39Z", "updated_at": "2024-12-08T11:14:01Z",
"pushed_at": "2023-02-26T14:06:05Z", "pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1174, "stargazers_count": 1176,
"watchers_count": 1174, "watchers_count": 1176,
"has_discussions": true, "has_discussions": true,
"forks_count": 190, "forks_count": 190,
"allow_forking": true, "allow_forking": true,
@ -46,7 +46,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 190, "forks": 190,
"watchers": 1174, "watchers": 1176,
"score": 0, "score": 0,
"subscribers_count": 19 "subscribers_count": 19
}, },

View file

@ -14,10 +14,10 @@
"description": "Apache Shiro CVE-2022-32532", "description": "Apache Shiro CVE-2022-32532",
"fork": false, "fork": false,
"created_at": "2022-06-29T01:05:33Z", "created_at": "2022-06-29T01:05:33Z",
"updated_at": "2024-09-04T08:17:13Z", "updated_at": "2024-12-08T06:41:12Z",
"pushed_at": "2022-06-28T22:46:43Z", "pushed_at": "2022-06-28T22:46:43Z",
"stargazers_count": 11, "stargazers_count": 12,
"watchers_count": 11, "watchers_count": 12,
"has_discussions": false, "has_discussions": false,
"forks_count": 27, "forks_count": 27,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 27, "forks": 27,
"watchers": 11, "watchers": 12,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -203,10 +203,10 @@
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read", "description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
"fork": false, "fork": false,
"created_at": "2023-02-05T18:42:27Z", "created_at": "2023-02-05T18:42:27Z",
"updated_at": "2024-12-05T09:17:47Z", "updated_at": "2024-12-08T11:46:06Z",
"pushed_at": "2023-02-05T19:35:03Z", "pushed_at": "2023-02-05T19:35:03Z",
"stargazers_count": 216, "stargazers_count": 215,
"watchers_count": 216, "watchers_count": 215,
"has_discussions": false, "has_discussions": false,
"forks_count": 25, "forks_count": 25,
"allow_forking": true, "allow_forking": true,
@ -215,7 +215,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 25, "forks": 25,
"watchers": 216, "watchers": 215,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -584,10 +584,10 @@
"description": "An exploitation demo of Outlook Elevation of Privilege Vulnerability", "description": "An exploitation demo of Outlook Elevation of Privilege Vulnerability",
"fork": false, "fork": false,
"created_at": "2023-03-24T19:47:42Z", "created_at": "2023-03-24T19:47:42Z",
"updated_at": "2023-03-24T19:47:42Z", "updated_at": "2024-12-08T08:26:48Z",
"pushed_at": "2023-03-24T19:51:39Z", "pushed_at": "2023-03-24T19:51:39Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -596,7 +596,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -19,13 +19,13 @@
"stargazers_count": 420, "stargazers_count": 420,
"watchers_count": 420, "watchers_count": 420,
"has_discussions": false, "has_discussions": false,
"forks_count": 76, "forks_count": 75,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 76, "forks": 75,
"watchers": 420, "watchers": 420,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false, "fork": false,
"created_at": "2024-06-18T12:30:53Z", "created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-12-04T15:02:41Z", "updated_at": "2024-12-08T09:14:20Z",
"pushed_at": "2024-12-02T06:29:52Z", "pushed_at": "2024-12-02T06:29:52Z",
"stargazers_count": 263, "stargazers_count": 264,
"watchers_count": 263, "watchers_count": 264,
"has_discussions": false, "has_discussions": false,
"forks_count": 60, "forks_count": 60,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 60, "forks": 60,
"watchers": 263, "watchers": 264,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7
}, },
@ -297,19 +297,19 @@
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app", "description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
"fork": false, "fork": false,
"created_at": "2024-09-27T09:02:08Z", "created_at": "2024-09-27T09:02:08Z",
"updated_at": "2024-12-08T01:02:18Z", "updated_at": "2024-12-08T07:08:32Z",
"pushed_at": "2024-09-30T12:48:08Z", "pushed_at": "2024-09-30T12:48:08Z",
"stargazers_count": 122, "stargazers_count": 123,
"watchers_count": 122, "watchers_count": 123,
"has_discussions": false, "has_discussions": false,
"forks_count": 16, "forks_count": 17,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 16, "forks": 17,
"watchers": 122, "watchers": 123,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
} }

View file

@ -19,13 +19,13 @@
"stargazers_count": 15, "stargazers_count": 15,
"watchers_count": 15, "watchers_count": 15,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 5,
"watchers": 15, "watchers": 15,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -45,10 +45,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability", "description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false, "fork": false,
"created_at": "2024-02-16T15:17:59Z", "created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-12-06T23:45:26Z", "updated_at": "2024-12-08T11:39:29Z",
"pushed_at": "2024-02-19T20:00:35Z", "pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 705, "stargazers_count": 706,
"watchers_count": 705, "watchers_count": 706,
"has_discussions": false, "has_discussions": false,
"forks_count": 153, "forks_count": 153,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 153, "forks": 153,
"watchers": 705, "watchers": 706,
"score": 0, "score": 0,
"subscribers_count": 10 "subscribers_count": 10
}, },

View file

@ -1035,5 +1035,45 @@
"watchers": 7, "watchers": 7,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 900230397,
"name": "CVE-2024-23897-Vulnerabilidad-Jenkins",
"full_name": "D1se0\/CVE-2024-23897-Vulnerabilidad-Jenkins",
"owner": {
"login": "D1se0",
"id": 164921056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4",
"html_url": "https:\/\/github.com\/D1se0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D1se0\/CVE-2024-23897-Vulnerabilidad-Jenkins",
"description": null,
"fork": false,
"created_at": "2024-12-08T08:13:34Z",
"updated_at": "2024-12-08T08:46:39Z",
"pushed_at": "2024-12-08T08:46:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"auto-mount",
"cve-2024-23897",
"docker",
"docker-container",
"ethical-hacking",
"hacking",
"jenkins",
"laboratory"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -76,10 +76,10 @@
"description": "Exploit PoC for CVE-2024-32002", "description": "Exploit PoC for CVE-2024-32002",
"fork": false, "fork": false,
"created_at": "2024-05-17T19:33:08Z", "created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-12-07T23:52:05Z", "updated_at": "2024-12-08T06:37:07Z",
"pushed_at": "2024-05-19T07:12:00Z", "pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 517, "stargazers_count": 518,
"watchers_count": 517, "watchers_count": 518,
"has_discussions": false, "has_discussions": false,
"forks_count": 144, "forks_count": 144,
"allow_forking": true, "allow_forking": true,
@ -93,7 +93,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 144, "forks": 144,
"watchers": 517, "watchers": 518,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -14,10 +14,10 @@
"description": "BlueStacks privilege escalation through VM backdooring", "description": "BlueStacks privilege escalation through VM backdooring",
"fork": false, "fork": false,
"created_at": "2024-07-16T07:38:19Z", "created_at": "2024-07-16T07:38:19Z",
"updated_at": "2024-11-20T16:30:56Z", "updated_at": "2024-12-08T12:11:30Z",
"pushed_at": "2024-07-16T09:12:57Z", "pushed_at": "2024-07-16T09:12:57Z",
"stargazers_count": 20, "stargazers_count": 19,
"watchers_count": 20, "watchers_count": 19,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -34,7 +34,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 20, "watchers": 19,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": "cve-2024-42327 ZBX-25623", "description": "cve-2024-42327 ZBX-25623",
"fork": false, "fork": false,
"created_at": "2024-12-01T00:15:27Z", "created_at": "2024-12-01T00:15:27Z",
"updated_at": "2024-12-07T14:42:28Z", "updated_at": "2024-12-08T07:06:40Z",
"pushed_at": "2024-12-01T01:18:36Z", "pushed_at": "2024-12-01T01:18:36Z",
"stargazers_count": 22, "stargazers_count": 23,
"watchers_count": 22, "watchers_count": 23,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 22, "watchers": 23,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -107,8 +107,8 @@
"description": "POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method", "description": "POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method",
"fork": false, "fork": false,
"created_at": "2024-12-07T21:25:40Z", "created_at": "2024-12-07T21:25:40Z",
"updated_at": "2024-12-07T21:57:08Z", "updated_at": "2024-12-08T12:27:57Z",
"pushed_at": "2024-12-07T21:57:04Z", "pushed_at": "2024-12-08T12:27:53Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -14,19 +14,19 @@
"description": "Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation \/ Arbitrary Code Execution Vulnerability", "description": "Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation \/ Arbitrary Code Execution Vulnerability",
"fork": false, "fork": false,
"created_at": "2024-08-24T08:51:08Z", "created_at": "2024-08-24T08:51:08Z",
"updated_at": "2024-12-02T09:32:30Z", "updated_at": "2024-12-08T07:09:11Z",
"pushed_at": "2024-11-05T02:57:25Z", "pushed_at": "2024-11-05T02:57:25Z",
"stargazers_count": 176, "stargazers_count": 177,
"watchers_count": 176, "watchers_count": 177,
"has_discussions": false, "has_discussions": false,
"forks_count": 29, "forks_count": 30,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 29, "forks": 30,
"watchers": 176, "watchers": 177,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
} }

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-54679)", "description": "CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-54679)",
"fork": false, "fork": false,
"created_at": "2024-12-06T06:02:34Z", "created_at": "2024-12-06T06:02:34Z",
"updated_at": "2024-12-07T22:40:31Z", "updated_at": "2024-12-08T09:23:19Z",
"pushed_at": "2024-12-06T06:19:42Z", "pushed_at": "2024-12-06T06:19:42Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -2211,10 +2211,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false, "fork": false,
"created_at": "2024-07-08T11:27:49Z", "created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-12-08T05:38:03Z", "updated_at": "2024-12-08T08:25:24Z",
"pushed_at": "2024-08-22T08:50:25Z", "pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 56, "stargazers_count": 57,
"watchers_count": 56, "watchers_count": 57,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
@ -2223,7 +2223,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 56, "watchers": 57,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -3151,6 +3151,7 @@
- [BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety](https://github.com/BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety) - [BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety](https://github.com/BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety)
- [ShieldAuth-PHP/PBL05-CVE-Analsys](https://github.com/ShieldAuth-PHP/PBL05-CVE-Analsys) - [ShieldAuth-PHP/PBL05-CVE-Analsys](https://github.com/ShieldAuth-PHP/PBL05-CVE-Analsys)
- [verylazytech/CVE-2024-23897](https://github.com/verylazytech/CVE-2024-23897) - [verylazytech/CVE-2024-23897](https://github.com/verylazytech/CVE-2024-23897)
- [D1se0/CVE-2024-23897-Vulnerabilidad-Jenkins](https://github.com/D1se0/CVE-2024-23897-Vulnerabilidad-Jenkins)
### CVE-2024-23995 (2024-04-29) ### CVE-2024-23995 (2024-04-29)
@ -24555,6 +24556,7 @@
- [M507/CVE-2021-23017-PoC](https://github.com/M507/CVE-2021-23017-PoC) - [M507/CVE-2021-23017-PoC](https://github.com/M507/CVE-2021-23017-PoC)
- [lakshit1212/CVE-2021-23017-PoC](https://github.com/lakshit1212/CVE-2021-23017-PoC) - [lakshit1212/CVE-2021-23017-PoC](https://github.com/lakshit1212/CVE-2021-23017-PoC)
- [ShivamDey/CVE-2021-23017](https://github.com/ShivamDey/CVE-2021-23017) - [ShivamDey/CVE-2021-23017](https://github.com/ShivamDey/CVE-2021-23017)
- [z3usx01/CVE-2021-23017-POC](https://github.com/z3usx01/CVE-2021-23017-POC)
### CVE-2021-23132 (2021-03-04) ### CVE-2021-23132 (2021-03-04)
@ -26343,7 +26345,6 @@
- [NattiSamson/Serv-U-CVE-2021-35211](https://github.com/NattiSamson/Serv-U-CVE-2021-35211) - [NattiSamson/Serv-U-CVE-2021-35211](https://github.com/NattiSamson/Serv-U-CVE-2021-35211)
- [0xhaggis/CVE-2021-35211](https://github.com/0xhaggis/CVE-2021-35211) - [0xhaggis/CVE-2021-35211](https://github.com/0xhaggis/CVE-2021-35211)
- [BishopFox/CVE-2021-35211](https://github.com/BishopFox/CVE-2021-35211)
### CVE-2021-35215 (2021-09-01) ### CVE-2021-35215 (2021-09-01)