Auto Update 2024/12/18 12:33:40

This commit is contained in:
motikan2010-bot 2024-12-18 21:33:40 +09:00
parent 8d0e780348
commit bffeae9d1b
42 changed files with 233 additions and 161 deletions

View file

@ -417,10 +417,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-18T03:58:22Z",
"updated_at": "2024-12-18T06:14:07Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 161,
"watchers_count": 161,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 160,
"watchers": 161,
"score": 0,
"subscribers_count": 2
},

View file

@ -76,10 +76,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-12-16T08:40:23Z",
"updated_at": "2024-12-18T08:16:20Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 213,
"watchers_count": 213,
"stargazers_count": 214,
"watchers_count": 214,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 213,
"watchers": 214,
"score": 0,
"subscribers_count": 9
}

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-17T16:20:26Z",
"updated_at": "2024-12-18T12:07:09Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4145,
"watchers_count": 4145,
"stargazers_count": 4147,
"watchers_count": 4147,
"has_discussions": false,
"forks_count": 1100,
"allow_forking": true,
@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1100,
"watchers": 4145,
"watchers": 4147,
"score": 0,
"subscribers_count": 149
},

View file

@ -176,10 +176,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-12-16T19:07:57Z",
"updated_at": "2024-12-18T07:36:32Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 637,
"watchers_count": 637,
"stargazers_count": 638,
"watchers_count": 638,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
@ -188,7 +188,7 @@
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 637,
"watchers": 638,
"score": 0,
"subscribers_count": 12
},

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-17T16:20:26Z",
"updated_at": "2024-12-18T12:07:09Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4145,
"watchers_count": 4145,
"stargazers_count": 4147,
"watchers_count": 4147,
"has_discussions": false,
"forks_count": 1100,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1100,
"watchers": 4145,
"watchers": 4147,
"score": 0,
"subscribers_count": 149
},

View file

@ -236,13 +236,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 2,
"score": 0,
"subscribers_count": 2

View file

@ -2232,6 +2232,37 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 447314257,
"name": "CVE-2021-41773-exploiter",
"full_name": "norrig\/CVE-2021-41773-exploiter",
"owner": {
"login": "norrig",
"id": 5526261,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4",
"html_url": "https:\/\/github.com\/norrig",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter",
"description": "School project - Please use other repos for actual testing",
"fork": false,
"created_at": "2022-01-12T17:42:36Z",
"updated_at": "2022-01-12T18:26:57Z",
"pushed_at": "2022-01-13T16:18:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 452242021,
"name": "CVE-2021-41773-exercise",

View file

@ -12597,37 +12597,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 815657442,
"name": "cve-2021-44228",
"full_name": "cve-2021-44228\/cve-2021-44228",
"owner": {
"login": "cve-2021-44228",
"id": 66845682,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66845682?v=4",
"html_url": "https:\/\/github.com\/cve-2021-44228",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cve-2021-44228\/cve-2021-44228",
"description": null,
"fork": false,
"created_at": "2024-06-15T18:39:23Z",
"updated_at": "2024-11-29T07:17:14Z",
"pushed_at": "2024-11-29T07:17:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 834267924,
"name": "CVE-2021-44228",

33
2022/CVE-2022-20120.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 905192929,
"name": "ABL_ROP",
"full_name": "boredpentester\/ABL_ROP",
"owner": {
"login": "boredpentester",
"id": 47897567,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47897567?v=4",
"html_url": "https:\/\/github.com\/boredpentester",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/boredpentester\/ABL_ROP",
"description": "Experimenting with CVE-2022-20120 (Pixel Bootloader \/ ABL) using Unicorn, derived from eShard's emulator at https:\/\/github.com\/eshard\/pixel6-boot\/blob\/main\/run_abl_public.ipynb",
"fork": false,
"created_at": "2024-12-18T10:44:34Z",
"updated_at": "2024-12-18T11:27:39Z",
"pushed_at": "2024-12-18T11:00:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
"updated_at": "2024-12-05T10:40:19Z",
"updated_at": "2024-12-18T09:33:56Z",
"pushed_at": "2023-05-27T15:39:41Z",
"stargazers_count": 235,
"watchers_count": 235,
"stargazers_count": 236,
"watchers_count": 236,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 235,
"watchers": 236,
"score": 0,
"subscribers_count": 7
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-05T17:29:10Z",
"updated_at": "2024-09-28T15:55:34Z",
"updated_at": "2024-12-18T07:27:21Z",
"pushed_at": "2023-01-05T17:40:18Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 102,
"watchers": 103,
"score": 0,
"subscribers_count": 5
},

View file

@ -339,13 +339,13 @@
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 9,
"score": 0,
"subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": "POC for Veeam Backup and Replication CVE-2023-27532",
"fork": false,
"created_at": "2023-03-18T16:20:53Z",
"updated_at": "2024-11-20T10:29:15Z",
"updated_at": "2024-12-18T08:53:23Z",
"pushed_at": "2023-03-28T18:21:55Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 62,
"watchers": 63,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2024-12-18T05:16:26Z",
"updated_at": "2024-12-18T08:36:04Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 468,
"watchers_count": 468,
"stargazers_count": 469,
"watchers_count": 469,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 468,
"watchers": 469,
"score": 0,
"subscribers_count": 15
}

View file

@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-17T21:02:40Z",
"updated_at": "2024-12-18T11:54:19Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 37,
"watchers": 40,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-21T05:22:51Z",
"updated_at": "2024-12-14T11:31:32Z",
"updated_at": "2024-12-18T10:57:15Z",
"pushed_at": "2023-12-18T04:25:00Z",
"stargazers_count": 314,
"watchers_count": 314,
"stargazers_count": 315,
"watchers_count": 315,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 314,
"watchers": 315,
"score": 0,
"subscribers_count": 15
},
@ -200,10 +200,10 @@
"description": null,
"fork": false,
"created_at": "2023-11-11T06:51:03Z",
"updated_at": "2024-06-08T08:18:54Z",
"updated_at": "2024-12-18T11:01:56Z",
"pushed_at": "2024-06-08T08:18:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -417,5 +417,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 905152305,
"name": "CVE-2023-4966-exploit",
"full_name": "akshthejo\/CVE-2023-4966-exploit",
"owner": {
"login": "akshthejo",
"id": 192083618,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192083618?v=4",
"html_url": "https:\/\/github.com\/akshthejo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/akshthejo\/CVE-2023-4966-exploit",
"description": "CVE-2023-4966-exploit",
"fork": false,
"created_at": "2024-12-18T09:09:20Z",
"updated_at": "2024-12-18T09:14:49Z",
"pushed_at": "2024-12-18T09:14:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -19,7 +19,7 @@
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": true,
"web_commit_signoff_required": false,
@ -34,7 +34,7 @@
"poc"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 10,
"score": 0,
"subscribers_count": 2

View file

@ -297,10 +297,10 @@
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
"fork": false,
"created_at": "2024-09-27T09:02:08Z",
"updated_at": "2024-12-08T07:08:32Z",
"updated_at": "2024-12-18T11:05:52Z",
"pushed_at": "2024-09-30T12:48:08Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -309,7 +309,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 123,
"watchers": 124,
"score": 0,
"subscribers_count": 3
},

View file

@ -152,6 +152,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -206,10 +206,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-16T17:33:13Z",
"updated_at": "2024-12-16T17:38:28Z",
"updated_at": "2024-12-18T11:44:02Z",
"pushed_at": "2024-12-16T17:38:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -218,7 +218,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -118,7 +118,7 @@
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -133,7 +133,7 @@
"wordpress"
],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 18,
"score": 0,
"subscribers_count": 1

View file

@ -14,8 +14,8 @@
"description": "Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthenticated Plugin Installation",
"fork": false,
"created_at": "2024-12-15T23:54:15Z",
"updated_at": "2024-12-16T11:22:09Z",
"pushed_at": "2024-12-16T10:06:26Z",
"updated_at": "2024-12-18T07:17:04Z",
"pushed_at": "2024-12-18T07:17:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-12-18T03:53:40Z",
"updated_at": "2024-12-18T11:10:58Z",
"pushed_at": "2024-11-29T16:56:23Z",
"stargazers_count": 234,
"watchers_count": 234,
"stargazers_count": 236,
"watchers_count": 236,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 234,
"watchers": 236,
"score": 0,
"subscribers_count": 6
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-03T08:56:59Z",
"updated_at": "2024-12-17T07:35:23Z",
"updated_at": "2024-12-18T10:56:35Z",
"pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 42,
"watchers": 44,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability",
"fork": false,
"created_at": "2024-09-24T19:24:55Z",
"updated_at": "2024-12-16T18:49:12Z",
"updated_at": "2024-12-18T10:43:13Z",
"pushed_at": "2024-12-09T22:58:22Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 131,
"watchers_count": 131,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 130,
"watchers": 131,
"score": 0,
"subscribers_count": 2
}

View file

@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-17T21:02:40Z",
"updated_at": "2024-12-18T11:54:19Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 37,
"watchers": 40,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-14T09:22:33Z",
"updated_at": "2024-12-18T03:58:06Z",
"updated_at": "2024-12-18T08:29:08Z",
"pushed_at": "2024-12-14T10:13:45Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.",
"fork": false,
"created_at": "2024-07-19T03:51:54Z",
"updated_at": "2024-12-18T05:17:33Z",
"updated_at": "2024-12-18T08:59:18Z",
"pushed_at": "2024-07-19T04:01:13Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 65,
"watchers": 66,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,8 +14,8 @@
"description": "How to \"recover\" a CloudPanel server affected by the CVE-2024-44765 vulnerability",
"fork": false,
"created_at": "2024-12-17T13:29:38Z",
"updated_at": "2024-12-18T05:30:44Z",
"pushed_at": "2024-12-18T05:30:41Z",
"updated_at": "2024-12-18T07:17:58Z",
"pushed_at": "2024-12-18T07:17:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -38,7 +38,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 904964693,
@ -69,6 +69,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -262,8 +262,8 @@
"description": null,
"fork": false,
"created_at": "2024-12-18T03:39:57Z",
"updated_at": "2024-12-18T03:58:57Z",
"pushed_at": "2024-12-18T03:58:54Z",
"updated_at": "2024-12-18T12:25:18Z",
"pushed_at": "2024-12-18T12:25:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module",
"fork": false,
"created_at": "2024-12-18T01:06:54Z",
"updated_at": "2024-12-18T01:59:58Z",
"updated_at": "2024-12-18T10:14:23Z",
"pushed_at": "2024-12-18T01:17:11Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,19 +14,19 @@
"description": "CyberPanel authenticated RCE < 2.3.8",
"fork": false,
"created_at": "2024-12-15T22:40:52Z",
"updated_at": "2024-12-18T02:19:18Z",
"updated_at": "2024-12-18T08:12:19Z",
"pushed_at": "2024-12-15T23:04:43Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -28,7 +28,7 @@
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 902994077,
@ -45,21 +45,21 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-18T06:16:55Z",
"updated_at": "2024-12-18T08:01:02Z",
"pushed_at": "2024-12-18T03:54:48Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 19,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 47,
"forks": 20,
"watchers": 49,
"score": 0,
"subscribers_count": 1
"subscribers_count": 3
},
{
"id": 904496445,
@ -90,7 +90,7 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 904573736,
@ -121,7 +121,7 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 905018620,

View file

@ -28,7 +28,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 904942447,
@ -59,6 +59,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -481,7 +481,7 @@
"forks": 1,
"watchers": 10,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 822884531,
@ -1355,10 +1355,10 @@
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ",
"fork": false,
"created_at": "2024-07-02T18:32:46Z",
"updated_at": "2024-12-15T09:25:34Z",
"updated_at": "2024-12-18T11:21:29Z",
"pushed_at": "2024-07-05T15:19:28Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -1376,7 +1376,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 65,
"watchers": 67,
"score": 0,
"subscribers_count": 2
},

View file

@ -31,6 +31,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -8700,6 +8700,7 @@
- [jmussmann/cve-2023-4966-iocs](https://github.com/jmussmann/cve-2023-4966-iocs)
- [morganwdavis/overread](https://github.com/morganwdavis/overread)
- [LucasOneZ/CVE-2023-4966](https://github.com/LucasOneZ/CVE-2023-4966)
- [akshthejo/CVE-2023-4966-exploit](https://github.com/akshthejo/CVE-2023-4966-exploit)
### CVE-2023-5024 (2023-09-17)
@ -17109,6 +17110,13 @@
- [szymonh/android-gadget](https://github.com/szymonh/android-gadget)
### CVE-2022-20120 (2022-05-10)
<code>Product: AndroidVersions: Android kernelAndroid ID: A-203213034References: N/A
</code>
- [boredpentester/ABL_ROP](https://github.com/boredpentester/ABL_ROP)
### CVE-2022-20126 (2022-06-15)
<code>In setScanMode of AdapterService.java, there is a possible way to enable Bluetooth discovery mode without user interaction due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-203431023
@ -27773,6 +27781,7 @@
- [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773)
- [xMohamed0/CVE-2021-41773](https://github.com/xMohamed0/CVE-2021-41773)
- [i6c/MASS_CVE-2021-41773](https://github.com/i6c/MASS_CVE-2021-41773)
- [norrig/CVE-2021-41773-exploiter](https://github.com/norrig/CVE-2021-41773-exploiter)
- [m96dg/CVE-2021-41773-exercise](https://github.com/m96dg/CVE-2021-41773-exercise)
- [skentagon/CVE-2021-41773](https://github.com/skentagon/CVE-2021-41773)
- [mauricelambert/CVE-2021-41773](https://github.com/mauricelambert/CVE-2021-41773)
@ -28971,7 +28980,6 @@
- [YangHyperData/LOGJ4_PocShell_CVE-2021-44228](https://github.com/YangHyperData/LOGJ4_PocShell_CVE-2021-44228)
- [Hoanle396/CVE-2021-44228-demo](https://github.com/Hoanle396/CVE-2021-44228-demo)
- [tadash10/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment](https://github.com/tadash10/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment)
- [cve-2021-44228/cve-2021-44228](https://github.com/cve-2021-44228/cve-2021-44228)
- [asd58584388/CVE-2021-44228](https://github.com/asd58584388/CVE-2021-44228)
- [OtisSymbos/CVE-2021-44228-Log4Shell-](https://github.com/OtisSymbos/CVE-2021-44228-Log4Shell-)
- [safeer-accuknox/log4j-shell-poc](https://github.com/safeer-accuknox/log4j-shell-poc)