Auto Update 2024/12/09 12:32:55

This commit is contained in:
motikan2010-bot 2024-12-09 21:32:55 +09:00
parent db2879baff
commit bbdd0dc9ce
34 changed files with 215 additions and 139 deletions

View file

@ -14,10 +14,10 @@
"description": "This Python script helps to detect the Etherleak (CVE-2003-0001) vulnerability on a target host by analyzing the padding data in network packets. The script uses Scapy to send various types of requests (ICMP, ARP, or TCP) and checks if the responses contain any padding data that could potentially leak sensitive memory contents.", "description": "This Python script helps to detect the Etherleak (CVE-2003-0001) vulnerability on a target host by analyzing the padding data in network packets. The script uses Scapy to send various types of requests (ICMP, ARP, or TCP) and checks if the responses contain any padding data that could potentially leak sensitive memory contents.",
"fork": false, "fork": false,
"created_at": "2024-10-01T14:03:30Z", "created_at": "2024-10-01T14:03:30Z",
"updated_at": "2024-10-08T15:25:48Z", "updated_at": "2024-12-09T09:32:10Z",
"pushed_at": "2024-10-01T14:12:30Z", "pushed_at": "2024-10-01T14:12:30Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -153,5 +153,36 @@
"watchers": 9, "watchers": 9,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 900659776,
"name": "CVE-2012-1823-Analyze",
"full_name": "Jimmy01240397\/CVE-2012-1823-Analyze",
"owner": {
"login": "Jimmy01240397",
"id": 57281249,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57281249?v=4",
"html_url": "https:\/\/github.com\/Jimmy01240397",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jimmy01240397\/CVE-2012-1823-Analyze",
"description": null,
"fork": false,
"created_at": "2024-12-09T08:31:04Z",
"updated_at": "2024-12-09T08:32:04Z",
"pushed_at": "2024-12-09T08:32:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -355,10 +355,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false, "fork": false,
"created_at": "2022-11-13T11:01:41Z", "created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-12-09T00:56:39Z", "updated_at": "2024-12-09T08:01:15Z",
"pushed_at": "2022-11-15T09:05:50Z", "pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 205, "stargazers_count": 206,
"watchers_count": 205, "watchers_count": 206,
"has_discussions": false, "has_discussions": false,
"forks_count": 18, "forks_count": 18,
"allow_forking": true, "allow_forking": true,
@ -367,7 +367,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 18, "forks": 18,
"watchers": 205, "watchers": 206,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -76,10 +76,10 @@
"description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets", "description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets",
"fork": false, "fork": false,
"created_at": "2024-08-05T16:55:40Z", "created_at": "2024-08-05T16:55:40Z",
"updated_at": "2024-11-21T05:20:35Z", "updated_at": "2024-12-09T06:35:04Z",
"pushed_at": "2024-08-05T18:31:16Z", "pushed_at": "2024-08-05T18:31:16Z",
"stargazers_count": 13, "stargazers_count": 14,
"watchers_count": 13, "watchers_count": 14,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 13, "watchers": 14,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -76,10 +76,10 @@
"description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215", "description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215",
"fork": false, "fork": false,
"created_at": "2019-10-14T17:27:37Z", "created_at": "2019-10-14T17:27:37Z",
"updated_at": "2024-12-04T05:26:29Z", "updated_at": "2024-12-09T09:14:21Z",
"pushed_at": "2019-10-15T01:04:08Z", "pushed_at": "2019-10-15T01:04:08Z",
"stargazers_count": 110, "stargazers_count": 111,
"watchers_count": 110, "watchers_count": 111,
"has_discussions": false, "has_discussions": false,
"forks_count": 48, "forks_count": 48,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 48, "forks": 48,
"watchers": 110, "watchers": 111,
"score": 0, "score": 0,
"subscribers_count": 9 "subscribers_count": 9
}, },

View file

@ -107,10 +107,10 @@
"description": "CVE-2019-3396 confluence SSTI RCE", "description": "CVE-2019-3396 confluence SSTI RCE",
"fork": false, "fork": false,
"created_at": "2019-04-10T02:15:47Z", "created_at": "2019-04-10T02:15:47Z",
"updated_at": "2024-09-12T12:36:30Z", "updated_at": "2024-12-09T11:39:34Z",
"pushed_at": "2020-10-01T08:40:07Z", "pushed_at": "2020-10-01T08:40:07Z",
"stargazers_count": 173, "stargazers_count": 174,
"watchers_count": 173, "watchers_count": 174,
"has_discussions": false, "has_discussions": false,
"forks_count": 66, "forks_count": 66,
"allow_forking": true, "allow_forking": true,
@ -124,7 +124,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 66, "forks": 66,
"watchers": 173, "watchers": 174,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },

View file

@ -2,15 +2,15 @@
{ {
"id": 334947839, "id": 334947839,
"name": "CVE-2019-8943", "name": "CVE-2019-8943",
"full_name": "v0lck3r\/CVE-2019-8943", "full_name": "oussama-rahali\/CVE-2019-8943",
"owner": { "owner": {
"login": "v0lck3r", "login": "oussama-rahali",
"id": 61425261, "id": 61425261,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61425261?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61425261?v=4",
"html_url": "https:\/\/github.com\/v0lck3r", "html_url": "https:\/\/github.com\/oussama-rahali",
"user_view_type": "public" "user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/v0lck3r\/CVE-2019-8943", "html_url": "https:\/\/github.com\/oussama-rahali\/CVE-2019-8943",
"description": "Exploit of CVE-2019-8942 and CVE-2019-8943 ", "description": "Exploit of CVE-2019-8942 and CVE-2019-8943 ",
"fork": false, "fork": false,
"created_at": "2021-02-01T12:47:28Z", "created_at": "2021-02-01T12:47:28Z",

View file

@ -888,10 +888,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false, "fork": false,
"created_at": "2022-11-13T11:01:41Z", "created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-12-09T00:56:39Z", "updated_at": "2024-12-09T08:01:15Z",
"pushed_at": "2022-11-15T09:05:50Z", "pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 205, "stargazers_count": 206,
"watchers_count": 205, "watchers_count": 206,
"has_discussions": false, "has_discussions": false,
"forks_count": 18, "forks_count": 18,
"allow_forking": true, "allow_forking": true,
@ -900,7 +900,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 18, "forks": 18,
"watchers": 205, "watchers": 206,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -972,7 +972,7 @@
"stargazers_count": 1088, "stargazers_count": 1088,
"watchers_count": 1088, "watchers_count": 1088,
"has_discussions": false, "has_discussions": false,
"forks_count": 189, "forks_count": 190,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -980,7 +980,7 @@
"cve-2021-4034" "cve-2021-4034"
], ],
"visibility": "public", "visibility": "public",
"forks": 189, "forks": 190,
"watchers": 1088, "watchers": 1088,
"score": 0, "score": 0,
"subscribers_count": 13 "subscribers_count": 13

View file

@ -935,10 +935,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false, "fork": false,
"created_at": "2021-12-10T23:19:28Z", "created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-11-30T15:57:11Z", "updated_at": "2024-12-09T06:19:58Z",
"pushed_at": "2024-02-12T22:37:25Z", "pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1810, "stargazers_count": 1811,
"watchers_count": 1810, "watchers_count": 1811,
"has_discussions": false, "has_discussions": false,
"forks_count": 529, "forks_count": 529,
"allow_forking": true, "allow_forking": true,
@ -952,7 +952,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 529, "forks": 529,
"watchers": 1810, "watchers": 1811,
"score": 0, "score": 0,
"subscribers_count": 26 "subscribers_count": 26
}, },

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false, "fork": false,
"created_at": "2022-02-08T17:25:44Z", "created_at": "2022-02-08T17:25:44Z",
"updated_at": "2024-12-07T00:14:01Z", "updated_at": "2024-12-09T10:33:10Z",
"pushed_at": "2022-02-09T16:54:09Z", "pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 776, "stargazers_count": 777,
"watchers_count": 776, "watchers_count": 777,
"has_discussions": false, "has_discussions": false,
"forks_count": 160, "forks_count": 160,
"allow_forking": true, "allow_forking": true,
@ -29,7 +29,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 160, "forks": 160,
"watchers": 776, "watchers": 777,
"score": 0, "score": 0,
"subscribers_count": 15 "subscribers_count": 15
} }

View file

@ -14,10 +14,10 @@
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965", "description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
"fork": false, "fork": false,
"created_at": "2022-03-30T07:54:45Z", "created_at": "2022-03-30T07:54:45Z",
"updated_at": "2024-11-27T06:47:37Z", "updated_at": "2024-12-09T09:21:05Z",
"pushed_at": "2022-11-09T15:46:06Z", "pushed_at": "2022-11-09T15:46:06Z",
"stargazers_count": 361, "stargazers_count": 362,
"watchers_count": 361, "watchers_count": 362,
"has_discussions": false, "has_discussions": false,
"forks_count": 105, "forks_count": 105,
"allow_forking": true, "allow_forking": true,
@ -35,7 +35,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 105, "forks": 105,
"watchers": 361, "watchers": 362,
"score": 0, "score": 0,
"subscribers_count": 18 "subscribers_count": 18
}, },

View file

@ -14,10 +14,10 @@
"description": "Let's control Secure Boot Chain ourselves.", "description": "Let's control Secure Boot Chain ourselves.",
"fork": false, "fork": false,
"created_at": "2023-12-01T07:32:18Z", "created_at": "2023-12-01T07:32:18Z",
"updated_at": "2024-11-29T18:12:25Z", "updated_at": "2024-12-09T12:18:55Z",
"pushed_at": "2024-02-20T09:05:59Z", "pushed_at": "2024-02-20T09:05:59Z",
"stargazers_count": 41, "stargazers_count": 42,
"watchers_count": 41, "watchers_count": 42,
"has_discussions": false, "has_discussions": false,
"forks_count": 10, "forks_count": 10,
"allow_forking": true, "allow_forking": true,
@ -29,7 +29,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 10,
"watchers": 41, "watchers": 42,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
} }

View file

@ -332,10 +332,10 @@
"description": "CobaltStrike <= 4.7.1 RCE", "description": "CobaltStrike <= 4.7.1 RCE",
"fork": false, "fork": false,
"created_at": "2022-10-14T11:46:01Z", "created_at": "2022-10-14T11:46:01Z",
"updated_at": "2024-11-25T09:21:07Z", "updated_at": "2024-12-09T09:21:36Z",
"pushed_at": "2022-10-25T05:32:54Z", "pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 376, "stargazers_count": 377,
"watchers_count": 376, "watchers_count": 377,
"has_discussions": false, "has_discussions": false,
"forks_count": 77, "forks_count": 77,
"allow_forking": true, "allow_forking": true,
@ -344,7 +344,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 77, "forks": 77,
"watchers": 376, "watchers": 377,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7
}, },

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-21554 Windows MessageQueuing PoC分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/", "description": "CVE-2023-21554 Windows MessageQueuing PoC分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
"fork": false, "fork": false,
"created_at": "2023-05-18T10:30:49Z", "created_at": "2023-05-18T10:30:49Z",
"updated_at": "2024-11-18T13:26:39Z", "updated_at": "2024-12-09T09:20:31Z",
"pushed_at": "2023-05-18T10:38:57Z", "pushed_at": "2023-05-18T10:38:57Z",
"stargazers_count": 54, "stargazers_count": 55,
"watchers_count": 54, "watchers_count": 55,
"has_discussions": false, "has_discussions": false,
"forks_count": 15, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 15, "forks": 15,
"watchers": 54, "watchers": 55,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -19,13 +19,13 @@
"stargazers_count": 189, "stargazers_count": 189,
"watchers_count": 189, "watchers_count": 189,
"has_discussions": false, "has_discussions": false,
"forks_count": 38, "forks_count": 37,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 38, "forks": 37,
"watchers": 189, "watchers": 189,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4

View file

@ -45,10 +45,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021", "description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
"fork": false, "fork": false,
"created_at": "2023-10-14T09:35:07Z", "created_at": "2023-10-14T09:35:07Z",
"updated_at": "2024-12-06T05:37:00Z", "updated_at": "2024-12-09T07:21:54Z",
"pushed_at": "2024-05-16T07:42:00Z", "pushed_at": "2024-05-16T07:42:00Z",
"stargazers_count": 222, "stargazers_count": 223,
"watchers_count": 222, "watchers_count": 223,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
@ -61,7 +61,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 222, "watchers": 223,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -14,10 +14,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-05-01T03:08:48Z", "created_at": "2024-05-01T03:08:48Z",
"updated_at": "2024-11-20T16:30:45Z", "updated_at": "2024-12-09T09:17:34Z",
"pushed_at": "2024-05-05T09:40:22Z", "pushed_at": "2024-05-05T09:40:22Z",
"stargazers_count": 11, "stargazers_count": 12,
"watchers_count": 11, "watchers_count": 12,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 11, "watchers": 12,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -45,10 +45,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability", "description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false, "fork": false,
"created_at": "2024-02-16T15:17:59Z", "created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-12-08T11:39:29Z", "updated_at": "2024-12-09T09:21:37Z",
"pushed_at": "2024-02-19T20:00:35Z", "pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 706, "stargazers_count": 707,
"watchers_count": 706, "watchers_count": 707,
"has_discussions": false, "has_discussions": false,
"forks_count": 153, "forks_count": 153,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 153, "forks": 153,
"watchers": 706, "watchers": 707,
"score": 0, "score": 0,
"subscribers_count": 10 "subscribers_count": 10
}, },
@ -448,8 +448,8 @@
"description": "CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC", "description": "CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC",
"fork": false, "fork": false,
"created_at": "2024-08-31T13:18:43Z", "created_at": "2024-08-31T13:18:43Z",
"updated_at": "2024-10-25T10:52:39Z", "updated_at": "2024-12-09T11:37:25Z",
"pushed_at": "2024-10-24T16:38:25Z", "pushed_at": "2024-12-09T11:37:20Z",
"stargazers_count": 8, "stargazers_count": 8,
"watchers_count": 8, "watchers_count": 8,
"has_discussions": false, "has_discussions": false,

View file

@ -76,10 +76,10 @@
"description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1", "description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1",
"fork": false, "fork": false,
"created_at": "2024-03-18T20:39:27Z", "created_at": "2024-03-18T20:39:27Z",
"updated_at": "2024-12-02T12:25:59Z", "updated_at": "2024-12-09T08:33:20Z",
"pushed_at": "2024-03-19T06:37:30Z", "pushed_at": "2024-03-19T06:37:30Z",
"stargazers_count": 12, "stargazers_count": 13,
"watchers_count": 12, "watchers_count": 13,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 12, "watchers": 13,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -107,10 +107,10 @@
"description": "aiohttp LFI (CVE-2024-23334)", "description": "aiohttp LFI (CVE-2024-23334)",
"fork": false, "fork": false,
"created_at": "2024-03-19T16:28:56Z", "created_at": "2024-03-19T16:28:56Z",
"updated_at": "2024-07-29T18:47:24Z", "updated_at": "2024-12-09T08:17:11Z",
"pushed_at": "2024-03-19T17:06:26Z", "pushed_at": "2024-03-19T17:06:26Z",
"stargazers_count": 22, "stargazers_count": 23,
"watchers_count": 22, "watchers_count": 23,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -119,7 +119,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 22, "watchers": 23,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -342,5 +342,36 @@
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 900621696,
"name": "CVE-2024-23334-PoC",
"full_name": "Betan423\/CVE-2024-23334-PoC",
"owner": {
"login": "Betan423",
"id": 125627171,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125627171?v=4",
"html_url": "https:\/\/github.com\/Betan423",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Betan423\/CVE-2024-23334-PoC",
"description": "This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt to replicate the bug in aiohttp that leads to Local File Inclusion (LFI).",
"fork": false,
"created_at": "2024-12-09T06:51:13Z",
"updated_at": "2024-12-09T09:25:20Z",
"pushed_at": "2024-12-09T09:25:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -1074,6 +1074,6 @@
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -288,10 +288,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information", "description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information",
"fork": false, "fork": false,
"created_at": "2024-04-22T22:14:24Z", "created_at": "2024-04-22T22:14:24Z",
"updated_at": "2024-11-24T06:18:34Z", "updated_at": "2024-12-09T06:46:31Z",
"pushed_at": "2024-07-19T14:42:24Z", "pushed_at": "2024-07-19T14:42:24Z",
"stargazers_count": 26, "stargazers_count": 27,
"watchers_count": 26, "watchers_count": 27,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -311,7 +311,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 26, "watchers": 27,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,10 +14,10 @@
"description": "Arbitrary Code Execution on FuguHub 8.4", "description": "Arbitrary Code Execution on FuguHub 8.4",
"fork": false, "fork": false,
"created_at": "2024-03-09T22:24:03Z", "created_at": "2024-03-09T22:24:03Z",
"updated_at": "2024-11-28T09:26:23Z", "updated_at": "2024-12-09T12:16:00Z",
"pushed_at": "2024-03-11T03:09:35Z", "pushed_at": "2024-03-11T03:09:35Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 5, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -121,7 +121,7 @@
"forks": 31, "forks": 31,
"watchers": 427, "watchers": 427,
"score": 0, "score": 0,
"subscribers_count": 19 "subscribers_count": 20
}, },
{ {
"id": 834461917, "id": 834461917,

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver", "description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false, "fork": false,
"created_at": "2024-10-13T19:30:20Z", "created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-12-07T06:30:14Z", "updated_at": "2024-12-09T08:36:38Z",
"pushed_at": "2024-11-29T16:56:23Z", "pushed_at": "2024-11-29T16:56:23Z",
"stargazers_count": 216, "stargazers_count": 217,
"watchers_count": 216, "watchers_count": 217,
"has_discussions": false, "has_discussions": false,
"forks_count": 46, "forks_count": 46,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 46, "forks": 46,
"watchers": 216, "watchers": 217,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -362,10 +362,10 @@
"description": "geoserver图形化漏洞利用工具", "description": "geoserver图形化漏洞利用工具",
"fork": false, "fork": false,
"created_at": "2024-10-05T10:08:55Z", "created_at": "2024-10-05T10:08:55Z",
"updated_at": "2024-12-04T05:26:55Z", "updated_at": "2024-12-09T06:55:27Z",
"pushed_at": "2024-10-08T03:16:26Z", "pushed_at": "2024-10-08T03:16:26Z",
"stargazers_count": 21, "stargazers_count": 22,
"watchers_count": 21, "watchers_count": 22,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -374,7 +374,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 21, "watchers": 22,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -420,10 +420,10 @@
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)", "description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
"fork": false, "fork": false,
"created_at": "2024-08-31T13:56:26Z", "created_at": "2024-08-31T13:56:26Z",
"updated_at": "2024-11-24T20:48:28Z", "updated_at": "2024-12-09T08:30:58Z",
"pushed_at": "2024-11-24T10:59:13Z", "pushed_at": "2024-12-09T07:16:33Z",
"stargazers_count": 15, "stargazers_count": 16,
"watchers_count": 15, "watchers_count": 16,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -432,7 +432,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 15, "watchers": 16,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,19 +14,19 @@
"description": "poc code for CVE-2024-38080", "description": "poc code for CVE-2024-38080",
"fork": false, "fork": false,
"created_at": "2024-09-01T11:25:22Z", "created_at": "2024-09-01T11:25:22Z",
"updated_at": "2024-12-05T12:34:41Z", "updated_at": "2024-12-09T07:04:48Z",
"pushed_at": "2024-09-01T11:35:25Z", "pushed_at": "2024-09-01T11:35:25Z",
"stargazers_count": 28, "stargazers_count": 29,
"watchers_count": 28, "watchers_count": 29,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 9,
"watchers": 28, "watchers": 29,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -14,19 +14,19 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-03T08:56:59Z", "created_at": "2024-12-03T08:56:59Z",
"updated_at": "2024-12-09T06:13:16Z", "updated_at": "2024-12-09T11:39:03Z",
"pushed_at": "2024-11-18T23:48:31Z", "pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 7, "stargazers_count": 14,
"watchers_count": 7, "watchers_count": 14,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 11,
"watchers": 7, "watchers": 14,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -14,10 +14,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-05T06:13:57Z", "created_at": "2024-12-05T06:13:57Z",
"updated_at": "2024-12-07T12:14:47Z", "updated_at": "2024-12-09T07:52:01Z",
"pushed_at": "2024-12-05T07:55:04Z", "pushed_at": "2024-12-05T07:55:04Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 9, "watchers": 10,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": "The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.", "description": "The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.",
"fork": false, "fork": false,
"created_at": "2024-08-08T08:28:26Z", "created_at": "2024-08-08T08:28:26Z",
"updated_at": "2024-12-02T12:24:10Z", "updated_at": "2024-12-09T08:34:29Z",
"pushed_at": "2024-08-08T09:32:00Z", "pushed_at": "2024-08-08T09:32:00Z",
"stargazers_count": 11, "stargazers_count": 12,
"watchers_count": 11, "watchers_count": 12,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -30,7 +30,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 11, "watchers": 12,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -80,10 +80,10 @@
"description": "CVE-2024-43044的利用方式", "description": "CVE-2024-43044的利用方式",
"fork": false, "fork": false,
"created_at": "2024-08-13T07:32:35Z", "created_at": "2024-08-13T07:32:35Z",
"updated_at": "2024-10-16T01:14:36Z", "updated_at": "2024-12-09T08:34:51Z",
"pushed_at": "2024-08-13T07:43:22Z", "pushed_at": "2024-08-13T07:43:22Z",
"stargazers_count": 15, "stargazers_count": 16,
"watchers_count": 15, "watchers_count": 16,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -92,7 +92,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 15, "watchers": 16,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,19 +14,19 @@
"description": "PoC for CVE-2024-48990", "description": "PoC for CVE-2024-48990",
"fork": false, "fork": false,
"created_at": "2024-11-20T18:41:25Z", "created_at": "2024-11-20T18:41:25Z",
"updated_at": "2024-12-06T00:28:40Z", "updated_at": "2024-12-09T08:38:49Z",
"pushed_at": "2024-11-20T18:49:33Z", "pushed_at": "2024-11-20T18:49:33Z",
"stargazers_count": 85, "stargazers_count": 87,
"watchers_count": 85, "watchers_count": 87,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 15,
"watchers": 85, "watchers": 87,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false, "fork": false,
"created_at": "2024-11-19T08:57:18Z", "created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-09T04:09:57Z", "updated_at": "2024-12-09T08:10:55Z",
"pushed_at": "2024-11-19T09:15:26Z", "pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 82, "stargazers_count": 83,
"watchers_count": 82, "watchers_count": 83,
"has_discussions": false, "has_discussions": false,
"forks_count": 18, "forks_count": 18,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 18, "forks": 18,
"watchers": 82, "watchers": 83,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -2952,6 +2952,7 @@
- [Pylonet/CVE-2024-23334](https://github.com/Pylonet/CVE-2024-23334) - [Pylonet/CVE-2024-23334](https://github.com/Pylonet/CVE-2024-23334)
- [Arc4he/CVE-2024-23334-PoC](https://github.com/Arc4he/CVE-2024-23334-PoC) - [Arc4he/CVE-2024-23334-PoC](https://github.com/Arc4he/CVE-2024-23334-PoC)
- [TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC](https://github.com/TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC) - [TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC](https://github.com/TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC)
- [Betan423/CVE-2024-23334-PoC](https://github.com/Betan423/CVE-2024-23334-PoC)
### CVE-2024-23339 (2024-01-22) ### CVE-2024-23339 (2024-01-22)
@ -6634,7 +6635,11 @@
- [jackalkarlos/CVE-2024-46658](https://github.com/jackalkarlos/CVE-2024-46658) - [jackalkarlos/CVE-2024-46658](https://github.com/jackalkarlos/CVE-2024-46658)
### CVE-2024-46901 ### CVE-2024-46901 (2024-12-09)
<code>Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository.\n\nAll versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue.\n\nRepositories served via other access methods are not affected.
</code>
- [devhaozi/CVE-2024-46901](https://github.com/devhaozi/CVE-2024-46901) - [devhaozi/CVE-2024-46901](https://github.com/devhaozi/CVE-2024-46901)
### CVE-2024-46986 (2024-09-18) ### CVE-2024-46986 (2024-09-18)
@ -11040,7 +11045,11 @@
- [Toxich4/CVE-2023-30459](https://github.com/Toxich4/CVE-2023-30459) - [Toxich4/CVE-2023-30459](https://github.com/Toxich4/CVE-2023-30459)
### CVE-2023-30486 ### CVE-2023-30486 (2024-12-09)
<code>Missing Authorization vulnerability in HashThemes Square allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Square: from n/a through 2.0.0.
</code>
- [RandomRobbieBF/CVE-2023-30486](https://github.com/RandomRobbieBF/CVE-2023-30486) - [RandomRobbieBF/CVE-2023-30486](https://github.com/RandomRobbieBF/CVE-2023-30486)
### CVE-2023-30533 (2023-04-24) ### CVE-2023-30533 (2023-04-24)
@ -11390,7 +11399,11 @@
- [jmrcsnchz/CVE-2023-32073](https://github.com/jmrcsnchz/CVE-2023-32073) - [jmrcsnchz/CVE-2023-32073](https://github.com/jmrcsnchz/CVE-2023-32073)
### CVE-2023-32117 ### CVE-2023-32117 (2024-12-09)
<code>Missing Authorization vulnerability in SoftLab Integrate Google Drive allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Integrate Google Drive: from n/a through 1.1.99.
</code>
- [RandomRobbieBF/CVE-2023-32117](https://github.com/RandomRobbieBF/CVE-2023-32117) - [RandomRobbieBF/CVE-2023-32117](https://github.com/RandomRobbieBF/CVE-2023-32117)
### CVE-2023-32162 (2023-09-06) ### CVE-2023-32162 (2023-09-06)
@ -36126,7 +36139,7 @@
<code>WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring. <code>WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.
</code> </code>
- [v0lck3r/CVE-2019-8943](https://github.com/v0lck3r/CVE-2019-8943) - [oussama-rahali/CVE-2019-8943](https://github.com/oussama-rahali/CVE-2019-8943)
- [hadrian3689/wordpress_cropimage](https://github.com/hadrian3689/wordpress_cropimage) - [hadrian3689/wordpress_cropimage](https://github.com/hadrian3689/wordpress_cropimage)
### CVE-2019-8956 (2019-04-01) ### CVE-2019-8956 (2019-04-01)
@ -48152,6 +48165,7 @@
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2) - [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
- [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823) - [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823)
- [0xl0k1/CVE-2012-1823](https://github.com/0xl0k1/CVE-2012-1823) - [0xl0k1/CVE-2012-1823](https://github.com/0xl0k1/CVE-2012-1823)
- [Jimmy01240397/CVE-2012-1823-Analyze](https://github.com/Jimmy01240397/CVE-2012-1823-Analyze)
### CVE-2012-1831 (2012-07-05) ### CVE-2012-1831 (2012-07-05)