Auto Update 2024/12/22 18:31:29

This commit is contained in:
motikan2010-bot 2024-12-23 03:31:29 +09:00
parent eb0aabc047
commit ba18109659
32 changed files with 148 additions and 116 deletions

View file

@ -1859,10 +1859,10 @@
"description": "Proof of concept for exploiting the Heartbeat Extension bug detailed in the CVE-2014-0160. :old_key: :unlock:",
"fork": false,
"created_at": "2023-01-05T20:09:38Z",
"updated_at": "2023-02-12T14:07:52Z",
"updated_at": "2024-12-22T15:13:45Z",
"pushed_at": "2023-01-18T20:36:53Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1879,9 +1879,9 @@
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 632561462,

View file

@ -14,10 +14,10 @@
"description": "Proof of concept for CVE-2015-7547",
"fork": false,
"created_at": "2016-02-10T21:13:54Z",
"updated_at": "2024-12-20T06:31:13Z",
"updated_at": "2024-12-22T14:00:05Z",
"pushed_at": "2016-02-20T07:57:58Z",
"stargazers_count": 543,
"watchers_count": 543,
"stargazers_count": 544,
"watchers_count": 544,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 166,
"watchers": 543,
"watchers": 544,
"score": 0,
"subscribers_count": 62
},

View file

@ -245,6 +245,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2024-12-15T02:45:13Z",
"updated_at": "2024-12-22T13:59:54Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 463,
"watchers_count": 463,
"stargazers_count": 464,
"watchers_count": 464,
"has_discussions": false,
"forks_count": 185,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 185,
"watchers": 463,
"watchers": 464,
"score": 0,
"subscribers_count": 45
},

View file

@ -393,10 +393,10 @@
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
"fork": false,
"created_at": "2018-01-11T09:43:46Z",
"updated_at": "2024-09-27T06:14:01Z",
"updated_at": "2024-12-22T14:00:10Z",
"pushed_at": "2018-02-28T12:32:54Z",
"stargazers_count": 270,
"watchers_count": 270,
"stargazers_count": 271,
"watchers_count": 271,
"has_discussions": false,
"forks_count": 133,
"allow_forking": true,
@ -405,7 +405,7 @@
"topics": [],
"visibility": "public",
"forks": 133,
"watchers": 270,
"watchers": 271,
"score": 0,
"subscribers_count": 19
},

View file

@ -14,8 +14,8 @@
"description": "Fork of the send module to deal with CVE-2017-20165",
"fork": false,
"created_at": "2023-01-11T10:20:27Z",
"updated_at": "2024-12-16T20:04:38Z",
"pushed_at": "2024-12-16T20:04:36Z",
"updated_at": "2024-12-22T17:23:16Z",
"pushed_at": "2024-12-22T17:22:54Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,

View file

@ -205,10 +205,10 @@
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-09-14T10:04:39Z",
"updated_at": "2024-08-12T19:32:35Z",
"updated_at": "2024-12-22T14:00:32Z",
"pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 317,
"watchers_count": 317,
"stargazers_count": 318,
"watchers_count": 318,
"has_discussions": false,
"forks_count": 109,
"allow_forking": true,
@ -217,7 +217,7 @@
"topics": [],
"visibility": "public",
"forks": 109,
"watchers": 317,
"watchers": 318,
"score": 0,
"subscribers_count": 24
},

View file

@ -45,10 +45,10 @@
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
"fork": false,
"created_at": "2018-01-11T09:43:46Z",
"updated_at": "2024-09-27T06:14:01Z",
"updated_at": "2024-12-22T14:00:10Z",
"pushed_at": "2018-02-28T12:32:54Z",
"stargazers_count": 270,
"watchers_count": 270,
"stargazers_count": 271,
"watchers_count": 271,
"has_discussions": false,
"forks_count": 133,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 133,
"watchers": 270,
"watchers": 271,
"score": 0,
"subscribers_count": 19
},

View file

@ -1210,10 +1210,10 @@
"description": "dump",
"fork": false,
"created_at": "2019-05-21T06:57:19Z",
"updated_at": "2024-08-12T19:49:06Z",
"updated_at": "2024-12-22T14:00:00Z",
"pushed_at": "2019-06-01T05:15:11Z",
"stargazers_count": 491,
"watchers_count": 491,
"stargazers_count": 492,
"watchers_count": 492,
"has_discussions": false,
"forks_count": 178,
"allow_forking": true,
@ -1222,7 +1222,7 @@
"topics": [],
"visibility": "public",
"forks": 178,
"watchers": 491,
"watchers": 492,
"score": 0,
"subscribers_count": 34
},

View file

@ -45,10 +45,10 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2024-10-15T14:57:17Z",
"updated_at": "2024-12-22T14:00:19Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 571,
"watchers_count": 571,
"stargazers_count": 572,
"watchers_count": 572,
"has_discussions": false,
"forks_count": 129,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 129,
"watchers": 571,
"watchers": 572,
"score": 0,
"subscribers_count": 29
},

View file

@ -78,10 +78,10 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2024-11-16T09:50:14Z",
"updated_at": "2024-12-22T14:00:14Z",
"pushed_at": "2023-07-04T05:16:05Z",
"stargazers_count": 322,
"watchers_count": 322,
"stargazers_count": 323,
"watchers_count": 323,
"has_discussions": false,
"forks_count": 86,
"allow_forking": true,
@ -90,7 +90,7 @@
"topics": [],
"visibility": "public",
"forks": 86,
"watchers": 322,
"watchers": 323,
"score": 0,
"subscribers_count": 10
},

View file

@ -93,10 +93,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2024-12-19T02:07:29Z",
"updated_at": "2024-12-22T13:59:45Z",
"pushed_at": "2023-06-08T04:01:33Z",
"stargazers_count": 486,
"watchers_count": 486,
"stargazers_count": 487,
"watchers_count": 487,
"has_discussions": false,
"forks_count": 148,
"allow_forking": true,
@ -107,7 +107,7 @@
],
"visibility": "public",
"forks": 148,
"watchers": 486,
"watchers": 487,
"score": 0,
"subscribers_count": 8
},
@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-20T16:42:37Z",
"updated_at": "2024-12-22T12:19:10Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1346,
"watchers_count": 1346,
"stargazers_count": 1347,
"watchers_count": 1347,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1346,
"watchers": 1347,
"score": 0,
"subscribers_count": 15
}

View file

@ -723,10 +723,10 @@
"description": "Exploitation of the CVE-2021-3560 polkit vulnerability",
"fork": false,
"created_at": "2023-11-08T05:11:56Z",
"updated_at": "2024-06-30T22:01:58Z",
"updated_at": "2024-12-22T17:02:55Z",
"pushed_at": "2024-06-30T22:01:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -740,7 +740,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},

View file

@ -1982,10 +1982,10 @@
"description": "Proof of concept for pwnkit vulnerability",
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
"updated_at": "2024-12-12T11:00:34Z",
"updated_at": "2024-12-22T12:24:29Z",
"pushed_at": "2023-01-12T19:23:29Z",
"stargazers_count": 338,
"watchers_count": 338,
"stargazers_count": 339,
"watchers_count": 339,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -1994,7 +1994,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 338,
"watchers": 339,
"score": 0,
"subscribers_count": 6
},

View file

@ -8534,10 +8534,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-17T18:45:19Z",
"updated_at": "2024-08-12T20:18:58Z",
"updated_at": "2024-12-22T16:54:49Z",
"pushed_at": "2023-02-22T12:12:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -8546,7 +8546,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},

View file

@ -1163,10 +1163,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2024-12-17T19:11:36Z",
"updated_at": "2024-12-22T16:55:49Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 561,
"watchers_count": 561,
"stargazers_count": 562,
"watchers_count": 562,
"has_discussions": false,
"forks_count": 143,
"allow_forking": true,
@ -1175,7 +1175,7 @@
"topics": [],
"visibility": "public",
"forks": 143,
"watchers": 561,
"watchers": 562,
"score": 0,
"subscribers_count": 15
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-24T06:00:47Z",
"updated_at": "2024-09-18T13:54:55Z",
"updated_at": "2024-12-22T17:03:09Z",
"pushed_at": "2023-06-18T14:43:52Z",
"stargazers_count": 169,
"watchers_count": 169,
"stargazers_count": 170,
"watchers_count": 170,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 169,
"watchers": 170,
"score": 0,
"subscribers_count": 6
},

View file

@ -76,10 +76,10 @@
"description": "Proof of Concept Exploit for PaperCut CVE-2023-27350",
"fork": false,
"created_at": "2023-04-22T21:34:06Z",
"updated_at": "2024-12-12T04:39:28Z",
"updated_at": "2024-12-22T13:56:52Z",
"pushed_at": "2023-05-01T19:31:20Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 48,
"watchers": 49,
"score": 0,
"subscribers_count": 4
},

View file

@ -107,10 +107,10 @@
"description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE",
"fork": false,
"created_at": "2023-08-24T22:24:34Z",
"updated_at": "2024-11-28T15:09:40Z",
"updated_at": "2024-12-22T18:04:11Z",
"pushed_at": "2023-08-25T00:30:01Z",
"stargazers_count": 202,
"watchers_count": 202,
"stargazers_count": 203,
"watchers_count": 203,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 202,
"watchers": 203,
"score": 0,
"subscribers_count": 4
}

View file

@ -365,10 +365,10 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xpltive\/CVE-2023-41425",
"description": "Wonder CMS v3.2.0 - v3.4.2 XSS to RCE exploit",
"description": "WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit",
"fork": false,
"created_at": "2024-12-22T11:53:14Z",
"updated_at": "2024-12-22T12:26:24Z",
"updated_at": "2024-12-22T12:37:29Z",
"pushed_at": "2024-12-22T12:26:21Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -184,5 +184,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 906963385,
"name": "CVE-2023-50564",
"full_name": "xpltive\/CVE-2023-50564",
"owner": {
"login": "xpltive",
"id": 25474369,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25474369?v=4",
"html_url": "https:\/\/github.com\/xpltive",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xpltive\/CVE-2023-50564",
"description": "Pluck-CMS v4.7.18 RCE exploit",
"fork": false,
"created_at": "2024-12-22T12:41:05Z",
"updated_at": "2024-12-22T12:59:17Z",
"pushed_at": "2024-12-22T12:59:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -19,7 +19,7 @@
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": true,
"web_commit_signoff_required": false,
@ -34,7 +34,7 @@
"poc"
],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 10,
"score": 0,
"subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-11T03:59:28Z",
"updated_at": "2024-10-07T21:05:21Z",
"updated_at": "2024-12-22T15:07:10Z",
"pushed_at": "2024-08-09T15:02:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 12,
"score": 0,
"subscribers_count": 1

View file

@ -117,13 +117,13 @@
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 29,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 27,
"watchers": 15,
"score": 0,
"subscribers_count": 1
@ -1659,10 +1659,10 @@
"description": "PoC of CVE-2024-32002 - Remote Code Execution while cloning special-crafted local repositories",
"fork": false,
"created_at": "2024-07-30T14:58:00Z",
"updated_at": "2024-11-29T06:39:56Z",
"updated_at": "2024-12-22T16:18:14Z",
"pushed_at": "2024-07-30T16:01:17Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1671,7 +1671,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)",
"fork": false,
"created_at": "2024-08-08T02:40:56Z",
"updated_at": "2024-11-26T22:44:35Z",
"updated_at": "2024-12-22T14:51:44Z",
"pushed_at": "2024-10-02T15:59:28Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -138,10 +138,10 @@
"description": "RCE through a race condition in Apache Tomcat",
"fork": false,
"created_at": "2024-12-21T05:54:29Z",
"updated_at": "2024-12-21T08:57:38Z",
"updated_at": "2024-12-22T17:35:02Z",
"pushed_at": "2024-12-21T08:56:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-21T07:55:19Z",
"updated_at": "2024-12-22T16:31:23Z",
"pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 66,
"watchers": 67,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
"fork": false,
"created_at": "2024-12-20T03:34:01Z",
"updated_at": "2024-12-22T12:29:00Z",
"updated_at": "2024-12-22T16:09:40Z",
"pushed_at": "2024-12-22T12:28:56Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 24,
"watchers": 26,
"score": 0,
"subscribers_count": 1
},
@ -45,8 +45,8 @@
"description": "CVE-2024-56145 SSTI to RCE - twig templates ",
"fork": false,
"created_at": "2024-12-22T11:53:04Z",
"updated_at": "2024-12-22T12:18:57Z",
"pushed_at": "2024-12-22T12:18:54Z",
"updated_at": "2024-12-22T15:02:11Z",
"pushed_at": "2024-12-22T15:02:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.",
"fork": false,
"created_at": "2024-09-29T10:58:15Z",
"updated_at": "2024-12-19T09:47:20Z",
"updated_at": "2024-12-22T16:48:57Z",
"pushed_at": "2024-10-04T09:39:09Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 131,
"watchers_count": 131,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 130,
"watchers": 131,
"score": 0,
"subscribers_count": 1
}

View file

@ -15894,6 +15894,7 @@
- [thefizzyfish/CVE-2023-50564-pluck](https://github.com/thefizzyfish/CVE-2023-50564-pluck)
- [Mrterrestrial/CVE-2023-50564](https://github.com/Mrterrestrial/CVE-2023-50564)
- [0xDTC/Pluck-CMS-v4.7.18-Remote-Code-Execution-CVE-2023-50564](https://github.com/0xDTC/Pluck-CMS-v4.7.18-Remote-Code-Execution-CVE-2023-50564)
- [xpltive/CVE-2023-50564](https://github.com/xpltive/CVE-2023-50564)
### CVE-2023-50596
- [chandraprarikraj/CVE-2023-50596](https://github.com/chandraprarikraj/CVE-2023-50596)