Auto Update 2024/05/16 06:28:54

This commit is contained in:
motikan2010-bot 2024-05-16 15:28:54 +09:00
parent 2e0bd417b2
commit bb6c1fde61
52 changed files with 265 additions and 188 deletions

View file

@ -295,7 +295,7 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -310,7 +310,7 @@
"vsftpd-exploit"
],
"visibility": "public",
"forks": 2,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": ":unlock: CVE-2011-4919 -- mpack information disclosure demo (C)",
"fork": false,
"created_at": "2015-02-01T00:26:07Z",
"updated_at": "2016-09-05T04:27:12Z",
"updated_at": "2024-05-16T04:34:27Z",
"pushed_at": "2015-02-01T00:27:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 3
}

View file

@ -601,10 +601,10 @@
"description": "CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow",
"fork": false,
"created_at": "2017-01-20T05:28:04Z",
"updated_at": "2024-05-13T09:30:40Z",
"updated_at": "2024-05-16T01:55:09Z",
"pushed_at": "2017-01-27T10:04:07Z",
"stargazers_count": 261,
"watchers_count": 261,
"stargazers_count": 262,
"watchers_count": 262,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
@ -613,7 +613,7 @@
"topics": [],
"visibility": "public",
"forks": 98,
"watchers": 261,
"watchers": 262,
"score": 0,
"subscribers_count": 23
},

View file

@ -650,10 +650,10 @@
"description": "CVE-2017-11882通杀Office 2003到2016",
"fork": false,
"created_at": "2019-08-14T11:55:00Z",
"updated_at": "2023-09-28T11:05:07Z",
"updated_at": "2024-05-16T03:00:14Z",
"pushed_at": "2020-12-22T07:23:03Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -662,7 +662,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -343,10 +343,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-05-15T06:25:53Z",
"updated_at": "2024-05-16T02:37:48Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 146,
"watchers": 147,
"score": 0,
"subscribers_count": 4
},

View file

@ -73,10 +73,10 @@
"description": "Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber",
"fork": false,
"created_at": "2017-10-19T20:02:56Z",
"updated_at": "2024-04-25T06:46:25Z",
"updated_at": "2024-05-16T06:02:15Z",
"pushed_at": "2018-09-04T21:35:36Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 15
},

View file

@ -280,11 +280,11 @@
"html_url": "https:\/\/github.com\/geozin"
},
"html_url": "https:\/\/github.com\/geozin\/POC-CVE-2018-25031",
"description": null,
"description": "A simple POC (CVE-2018-25031",
"fork": false,
"created_at": "2024-05-15T23:21:58Z",
"updated_at": "2024-05-15T23:25:19Z",
"pushed_at": "2024-05-15T23:25:16Z",
"updated_at": "2024-05-16T02:16:36Z",
"pushed_at": "2024-05-16T02:16:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,7 +13,7 @@
"description": "ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063",
"fork": false,
"created_at": "2019-03-29T06:01:49Z",
"updated_at": "2024-03-10T20:25:06Z",
"updated_at": "2024-05-16T02:37:56Z",
"pushed_at": "2019-08-27T04:23:24Z",
"stargazers_count": 24,
"watchers_count": 24,

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-05-15T12:06:14Z",
"updated_at": "2024-05-16T03:50:20Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4030,
"watchers_count": 4030,
"stargazers_count": 4032,
"watchers_count": 4032,
"has_discussions": false,
"forks_count": 1080,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1080,
"watchers": 4030,
"watchers": 4032,
"score": 0,
"subscribers_count": 151
},

View file

@ -13,10 +13,10 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2024-05-13T06:41:55Z",
"updated_at": "2024-05-16T01:41:10Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 716,
"watchers_count": 716,
"stargazers_count": 717,
"watchers_count": 717,
"has_discussions": false,
"forks_count": 176,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 176,
"watchers": 716,
"watchers": 717,
"score": 0,
"subscribers_count": 19
},

View file

@ -133,10 +133,10 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2024-05-15T10:21:42Z",
"updated_at": "2024-05-16T02:28:13Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 652,
"watchers_count": 652,
"stargazers_count": 653,
"watchers_count": 653,
"has_discussions": false,
"forks_count": 198,
"allow_forking": true,
@ -147,7 +147,7 @@
],
"visibility": "public",
"forks": 198,
"watchers": 652,
"watchers": 653,
"score": 0,
"subscribers_count": 26
},

View file

@ -13,10 +13,10 @@
"description": "writeup of CVE-2020-1362",
"fork": false,
"created_at": "2020-07-17T07:35:05Z",
"updated_at": "2024-03-14T10:53:30Z",
"updated_at": "2024-05-16T03:19:34Z",
"pushed_at": "2020-07-17T07:54:26Z",
"stargazers_count": 231,
"watchers_count": 231,
"stargazers_count": 232,
"watchers_count": 232,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 231,
"watchers": 232,
"score": 0,
"subscribers_count": 12
}

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-05-15T12:06:14Z",
"updated_at": "2024-05-16T03:50:20Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4030,
"watchers_count": 4030,
"stargazers_count": 4032,
"watchers_count": 4032,
"has_discussions": false,
"forks_count": 1080,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1080,
"watchers": 4030,
"watchers": 4032,
"score": 0,
"subscribers_count": 151
},

View file

@ -889,10 +889,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-05-15T06:25:53Z",
"updated_at": "2024-05-16T02:37:48Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -901,7 +901,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 146,
"watchers": 147,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)",
"fork": false,
"created_at": "2020-08-13T09:03:40Z",
"updated_at": "2023-12-28T12:31:34Z",
"updated_at": "2024-05-16T03:55:38Z",
"pushed_at": "2023-09-19T10:38:28Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 48,
"watchers": 49,
"score": 0,
"subscribers_count": 2
}

View file

@ -163,10 +163,10 @@
"description": "Read my blog for more info - ",
"fork": false,
"created_at": "2021-04-25T12:55:15Z",
"updated_at": "2024-02-24T11:42:31Z",
"updated_at": "2024-05-16T02:44:41Z",
"pushed_at": "2021-04-27T21:13:18Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 2
},

View file

@ -145,13 +145,13 @@
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 38,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"forks": 37,
"watchers": 113,
"score": 0,
"subscribers_count": 4

View file

@ -13,10 +13,10 @@
"description": "SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE",
"fork": false,
"created_at": "2021-10-23T01:35:42Z",
"updated_at": "2023-03-13T15:26:35Z",
"updated_at": "2024-05-16T01:48:37Z",
"pushed_at": "2021-10-23T01:44:54Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 2
}

View file

@ -7073,7 +7073,7 @@
"fork": false,
"created_at": "2021-12-15T21:09:00Z",
"updated_at": "2023-06-22T04:46:02Z",
"pushed_at": "2024-05-10T00:48:45Z",
"pushed_at": "2024-05-16T00:52:42Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T20:03:51Z",
"updated_at": "2024-04-25T14:05:16Z",
"updated_at": "2024-05-16T05:49:05Z",
"pushed_at": "2024-01-12T20:15:47Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 5
}

View file

@ -91,7 +91,7 @@
"forks": 0,
"watchers": 9,
"score": 0,
"subscribers_count": 3
"subscribers_count": 2
},
{
"id": 580447745,

View file

@ -311,7 +311,7 @@
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 4
"subscribers_count": 3
},
{
"id": 498457928,

View file

@ -48,13 +48,13 @@
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 10,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 8,
"watchers": 18,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T20:03:51Z",
"updated_at": "2024-04-25T14:05:16Z",
"updated_at": "2024-05-16T05:49:05Z",
"pushed_at": "2024-01-12T20:15:47Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 5
}

View file

@ -27,7 +27,7 @@
"forks": 164,
"watchers": 468,
"score": 0,
"subscribers_count": 9
"subscribers_count": 10
},
{
"id": 612032133,
@ -335,6 +335,6 @@
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -586,10 +586,10 @@
"description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理",
"fork": false,
"created_at": "2024-02-26T02:34:44Z",
"updated_at": "2024-05-15T15:06:47Z",
"updated_at": "2024-05-16T05:02:11Z",
"pushed_at": "2024-04-24T02:34:16Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -598,7 +598,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects both username-password and PIN authentication.",
"fork": false,
"created_at": "2023-01-24T08:33:19Z",
"updated_at": "2024-05-10T18:04:20Z",
"updated_at": "2024-05-16T06:02:25Z",
"pushed_at": "2023-06-15T14:38:07Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 81,
"watchers": 82,
"score": 0,
"subscribers_count": 2
}

View file

@ -57,7 +57,7 @@
"forks": 38,
"watchers": 254,
"score": 0,
"subscribers_count": 8
"subscribers_count": 7
},
{
"id": 594744538,

View file

@ -13,10 +13,10 @@
"description": "Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (Mass Add Admin + PHP File Upload)",
"fork": false,
"created_at": "2023-09-19T04:59:01Z",
"updated_at": "2024-05-15T06:21:53Z",
"updated_at": "2024-05-16T01:40:28Z",
"pushed_at": "2023-09-20T11:41:02Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "rce",
"fork": false,
"created_at": "2023-06-14T09:43:31Z",
"updated_at": "2024-05-14T01:54:12Z",
"updated_at": "2024-05-16T02:06:22Z",
"pushed_at": "2023-06-15T01:35:51Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 124,
"watchers": 125,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Vulnerability POC for CVE-2023-34845",
"fork": false,
"created_at": "2024-03-03T10:50:16Z",
"updated_at": "2024-03-03T10:50:17Z",
"updated_at": "2024-05-16T06:07:14Z",
"pushed_at": "2024-03-03T10:51:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -103,10 +103,10 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-10-23T18:33:41Z",
"updated_at": "2024-05-10T10:51:53Z",
"updated_at": "2024-05-16T05:36:34Z",
"pushed_at": "2023-10-26T11:44:46Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 101,
"watchers": 102,
"score": 0,
"subscribers_count": 3
}

View file

@ -27,7 +27,7 @@
"forks": 34,
"watchers": 184,
"score": 0,
"subscribers_count": 9
"subscribers_count": 10
},
{
"id": 705738898,

View file

@ -13,7 +13,7 @@
"description": "DLink DIR-846 Authenticated Remote Code Execution",
"fork": false,
"created_at": "2023-10-04T13:07:37Z",
"updated_at": "2023-12-03T18:01:47Z",
"updated_at": "2024-05-16T03:37:47Z",
"pushed_at": "2023-10-04T13:31:59Z",
"stargazers_count": 18,
"watchers_count": 18,

View file

@ -13,10 +13,10 @@
"description": "A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering them ineffective, working for both x32 and x64(CVE-2023-44976).",
"fork": false,
"created_at": "2023-10-01T18:24:38Z",
"updated_at": "2024-05-15T06:21:53Z",
"updated_at": "2024-05-16T02:02:19Z",
"pushed_at": "2024-01-27T01:35:24Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-05-16T00:11:18Z",
"pushed_at": "2024-05-16T00:10:31Z",
"stargazers_count": 646,
"watchers_count": 646,
"updated_at": "2024-05-16T06:16:04Z",
"pushed_at": "2024-05-16T05:05:18Z",
"stargazers_count": 651,
"watchers_count": 651,
"has_discussions": false,
"forks_count": 110,
"allow_forking": true,
@ -25,9 +25,9 @@
"topics": [],
"visibility": "public",
"forks": 110,
"watchers": 646,
"watchers": 651,
"score": 0,
"subscribers_count": 9
"subscribers_count": 11
},
{
"id": 743886715,

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-46604",
"fork": false,
"created_at": "2023-10-26T03:25:05Z",
"updated_at": "2024-04-26T09:15:58Z",
"updated_at": "2024-05-16T02:37:15Z",
"pushed_at": "2023-10-26T03:28:14Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 1
},
@ -73,10 +73,10 @@
"description": "CVE-2023-46604",
"fork": false,
"created_at": "2023-10-27T12:22:43Z",
"updated_at": "2024-04-25T09:10:50Z",
"updated_at": "2024-05-16T02:39:23Z",
"pushed_at": "2023-11-03T14:14:31Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-09-21T05:22:51Z",
"updated_at": "2024-05-16T00:01:17Z",
"updated_at": "2024-05-16T05:03:07Z",
"pushed_at": "2023-12-18T04:25:00Z",
"stargazers_count": 297,
"watchers_count": 297,
"stargazers_count": 298,
"watchers_count": 298,
"has_discussions": false,
"forks_count": 46,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 297,
"forks": 47,
"watchers": 298,
"score": 0,
"subscribers_count": 15
},

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-05-15T12:40:02Z",
"updated_at": "2024-05-16T04:41:36Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 1926,
"watchers_count": 1926,
"stargazers_count": 1928,
"watchers_count": 1928,
"has_discussions": false,
"forks_count": 239,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 239,
"watchers": 1926,
"watchers": 1928,
"score": 0,
"subscribers_count": 21
},

View file

@ -48,13 +48,13 @@
"stargazers_count": 607,
"watchers_count": 607,
"has_discussions": false,
"forks_count": 134,
"forks_count": 135,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 134,
"forks": 135,
"watchers": 607,
"score": 0,
"subscribers_count": 9

View file

@ -18,15 +18,15 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": " env of CVE-2024-22243&CVE-2024-22234",
"fork": false,
"created_at": "2024-02-23T10:09:51Z",
"updated_at": "2024-05-09T09:33:48Z",
"updated_at": "2024-05-16T01:31:27Z",
"pushed_at": "2024-02-28T06:55:26Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
}

View file

@ -256,10 +256,10 @@
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
"fork": false,
"created_at": "2024-01-27T19:34:48Z",
"updated_at": "2024-05-11T04:13:03Z",
"updated_at": "2024-05-16T06:13:55Z",
"pushed_at": "2024-03-16T07:55:41Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -272,7 +272,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,21 +13,21 @@
"description": "Plantronics Desktop Hub LPE",
"fork": false,
"created_at": "2024-05-12T09:53:07Z",
"updated_at": "2024-05-15T16:16:49Z",
"updated_at": "2024-05-16T01:46:46Z",
"pushed_at": "2024-05-15T15:12:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 799923080,

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-27804",
"fork": false,
"created_at": "2024-05-14T14:17:06Z",
"updated_at": "2024-05-15T22:41:59Z",
"updated_at": "2024-05-16T05:39:51Z",
"pushed_at": "2024-05-14T14:55:23Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 74,
"watchers": 78,
"score": 0,
"subscribers_count": 2
}

View file

@ -198,10 +198,10 @@
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
"fork": false,
"created_at": "2024-05-14T14:21:49Z",
"updated_at": "2024-05-15T23:49:36Z",
"pushed_at": "2024-05-15T17:51:02Z",
"stargazers_count": 31,
"watchers_count": 31,
"updated_at": "2024-05-16T05:49:51Z",
"pushed_at": "2024-05-16T05:49:47Z",
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -230,7 +230,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 31,
"watchers": 33,
"score": 0,
"subscribers_count": 1
},
@ -262,6 +262,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,19 +13,19 @@
"description": "CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2024-04-08T18:50:02Z",
"updated_at": "2024-05-15T06:22:07Z",
"updated_at": "2024-05-16T03:42:53Z",
"pushed_at": "2024-04-08T19:16:28Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 11,
"forks": 2,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds",
"fork": false,
"created_at": "2024-05-15T13:11:45Z",
"updated_at": "2024-05-15T21:46:06Z",
"updated_at": "2024-05-16T04:26:41Z",
"pushed_at": "2024-05-15T21:40:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -34,7 +34,37 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 801392594,
"name": "CVE-2024-29895",
"full_name": "secunnix\/CVE-2024-29895",
"owner": {
"login": "secunnix",
"id": 104568161,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104568161?v=4",
"html_url": "https:\/\/github.com\/secunnix"
},
"html_url": "https:\/\/github.com\/secunnix\/CVE-2024-29895",
"description": "Cacti CVE-2024-29895 POC",
"fork": false,
"created_at": "2024-05-16T06:29:21Z",
"updated_at": "2024-05-16T06:31:45Z",
"pushed_at": "2024-05-16T06:31:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}

View file

@ -1012,7 +1012,7 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-05-15T21:48:30Z",
"updated_at": "2024-05-16T03:54:18Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3461,
"watchers_count": 3461,

43
2024/CVE-2024-32640.json Normal file
View file

@ -0,0 +1,43 @@
[
{
"id": 801300321,
"name": "CVE-2024-32640-SQLI-MuraCMS",
"full_name": "Stuub\/CVE-2024-32640-SQLI-MuraCMS",
"owner": {
"login": "Stuub",
"id": 60468836,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4",
"html_url": "https:\/\/github.com\/Stuub"
},
"html_url": "https:\/\/github.com\/Stuub\/CVE-2024-32640-SQLI-MuraCMS",
"description": "CVE-2024-32640 | Automated SQLi PoC",
"fork": false,
"created_at": "2024-05-16T01:02:32Z",
"updated_at": "2024-05-16T01:20:01Z",
"pushed_at": "2024-05-16T01:18:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0day",
"cve",
"cve-2024",
"cve-2024-32640",
"cve-2024-32640-poc",
"masacms",
"muracms",
"poc",
"rce",
"sqli"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -133,19 +133,19 @@
"description": null,
"fork": false,
"created_at": "2024-04-14T15:16:16Z",
"updated_at": "2024-05-15T17:03:10Z",
"updated_at": "2024-05-16T05:33:26Z",
"pushed_at": "2024-04-14T15:20:34Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"forks": 4,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},
@ -223,10 +223,10 @@
"description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect",
"fork": false,
"created_at": "2024-04-16T01:43:24Z",
"updated_at": "2024-04-18T11:01:24Z",
"updated_at": "2024-05-16T04:15:21Z",
"pushed_at": "2024-04-16T02:08:47Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
@ -1048,8 +1048,8 @@
"description": "Find rows contain specific IP addresses in large files and then, extract them. This tool make for investigating logs for cve-2024-3400",
"fork": false,
"created_at": "2024-05-15T15:50:32Z",
"updated_at": "2024-05-15T15:52:19Z",
"pushed_at": "2024-05-15T15:52:15Z",
"updated_at": "2024-05-16T00:52:11Z",
"pushed_at": "2024-05-16T00:52:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -1062,6 +1062,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1729,6 +1729,7 @@
</code>
- [Stuub/CVE-2024-29895-CactiRCE-PoC](https://github.com/Stuub/CVE-2024-29895-CactiRCE-PoC)
- [secunnix/CVE-2024-29895](https://github.com/secunnix/CVE-2024-29895)
### CVE-2024-29988 (2024-04-09)
@ -1898,6 +1899,9 @@
### CVE-2024-32523
- [truonghuuphuc/CVE-2024-32523-Poc](https://github.com/truonghuuphuc/CVE-2024-32523-Poc)
### CVE-2024-32640
- [Stuub/CVE-2024-32640-SQLI-MuraCMS](https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS)
### CVE-2024-32709 (2024-04-24)
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.\n\n