Auto Update 2024/12/18 12:33:40

This commit is contained in:
motikan2010-bot 2024-12-18 21:33:40 +09:00
parent 8d0e780348
commit bffeae9d1b
42 changed files with 233 additions and 161 deletions

View file

@ -417,10 +417,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false, "fork": false,
"created_at": "2024-08-29T06:38:16Z", "created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-18T03:58:22Z", "updated_at": "2024-12-18T06:14:07Z",
"pushed_at": "2024-11-13T03:12:58Z", "pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 160, "stargazers_count": 161,
"watchers_count": 160, "watchers_count": 161,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
@ -437,7 +437,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 14,
"watchers": 160, "watchers": 161,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -76,10 +76,10 @@
"description": "Unsigned driver loader using CVE-2018-19320", "description": "Unsigned driver loader using CVE-2018-19320",
"fork": false, "fork": false,
"created_at": "2022-11-12T05:48:13Z", "created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-12-16T08:40:23Z", "updated_at": "2024-12-18T08:16:20Z",
"pushed_at": "2023-04-09T13:50:29Z", "pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 213, "stargazers_count": 214,
"watchers_count": 213, "watchers_count": 214,
"has_discussions": false, "has_discussions": false,
"forks_count": 57, "forks_count": 57,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 57, "forks": 57,
"watchers": 213, "watchers": 214,
"score": 0, "score": 0,
"subscribers_count": 9 "subscribers_count": 9
} }

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-17T16:20:26Z", "updated_at": "2024-12-18T12:07:09Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4145, "stargazers_count": 4147,
"watchers_count": 4145, "watchers_count": 4147,
"has_discussions": false, "has_discussions": false,
"forks_count": 1100, "forks_count": 1100,
"allow_forking": true, "allow_forking": true,
@ -77,7 +77,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1100, "forks": 1100,
"watchers": 4145, "watchers": 4147,
"score": 0, "score": 0,
"subscribers_count": 149 "subscribers_count": 149
}, },

View file

@ -176,10 +176,10 @@
"description": "Exploit for zerologon cve-2020-1472", "description": "Exploit for zerologon cve-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-14T19:19:07Z", "created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-12-16T19:07:57Z", "updated_at": "2024-12-18T07:36:32Z",
"pushed_at": "2020-10-15T18:31:15Z", "pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 637, "stargazers_count": 638,
"watchers_count": 637, "watchers_count": 638,
"has_discussions": false, "has_discussions": false,
"forks_count": 146, "forks_count": 146,
"allow_forking": true, "allow_forking": true,
@ -188,7 +188,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 146, "forks": 146,
"watchers": 637, "watchers": 638,
"score": 0, "score": 0,
"subscribers_count": 12 "subscribers_count": 12
}, },

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-17T16:20:26Z", "updated_at": "2024-12-18T12:07:09Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4145, "stargazers_count": 4147,
"watchers_count": 4145, "watchers_count": 4147,
"has_discussions": false, "has_discussions": false,
"forks_count": 1100, "forks_count": 1100,
"allow_forking": true, "allow_forking": true,
@ -46,7 +46,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1100, "forks": 1100,
"watchers": 4145, "watchers": 4147,
"score": 0, "score": 0,
"subscribers_count": 149 "subscribers_count": 149
}, },

View file

@ -236,13 +236,13 @@
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 10, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 11,
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -2232,6 +2232,37 @@
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
{
"id": 447314257,
"name": "CVE-2021-41773-exploiter",
"full_name": "norrig\/CVE-2021-41773-exploiter",
"owner": {
"login": "norrig",
"id": 5526261,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4",
"html_url": "https:\/\/github.com\/norrig",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter",
"description": "School project - Please use other repos for actual testing",
"fork": false,
"created_at": "2022-01-12T17:42:36Z",
"updated_at": "2022-01-12T18:26:57Z",
"pushed_at": "2022-01-13T16:18:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{ {
"id": 452242021, "id": 452242021,
"name": "CVE-2021-41773-exercise", "name": "CVE-2021-41773-exercise",

View file

@ -12597,37 +12597,6 @@
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
{
"id": 815657442,
"name": "cve-2021-44228",
"full_name": "cve-2021-44228\/cve-2021-44228",
"owner": {
"login": "cve-2021-44228",
"id": 66845682,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66845682?v=4",
"html_url": "https:\/\/github.com\/cve-2021-44228",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cve-2021-44228\/cve-2021-44228",
"description": null,
"fork": false,
"created_at": "2024-06-15T18:39:23Z",
"updated_at": "2024-11-29T07:17:14Z",
"pushed_at": "2024-11-29T07:17:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{ {
"id": 834267924, "id": 834267924,
"name": "CVE-2021-44228", "name": "CVE-2021-44228",

33
2022/CVE-2022-20120.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 905192929,
"name": "ABL_ROP",
"full_name": "boredpentester\/ABL_ROP",
"owner": {
"login": "boredpentester",
"id": 47897567,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47897567?v=4",
"html_url": "https:\/\/github.com\/boredpentester",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/boredpentester\/ABL_ROP",
"description": "Experimenting with CVE-2022-20120 (Pixel Bootloader \/ ABL) using Unicorn, derived from eShard's emulator at https:\/\/github.com\/eshard\/pixel6-boot\/blob\/main\/run_abl_public.ipynb",
"fork": false,
"created_at": "2024-12-18T10:44:34Z",
"updated_at": "2024-12-18T11:27:39Z",
"pushed_at": "2024-12-18T11:00:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)", "description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false, "fork": false,
"created_at": "2023-03-23T10:25:59Z", "created_at": "2023-03-23T10:25:59Z",
"updated_at": "2024-12-05T10:40:19Z", "updated_at": "2024-12-18T09:33:56Z",
"pushed_at": "2023-05-27T15:39:41Z", "pushed_at": "2023-05-27T15:39:41Z",
"stargazers_count": 235, "stargazers_count": 236,
"watchers_count": 235, "watchers_count": 236,
"has_discussions": false, "has_discussions": false,
"forks_count": 32, "forks_count": 32,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 32, "forks": 32,
"watchers": 235, "watchers": 236,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7
} }

View file

@ -14,10 +14,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-01-05T17:29:10Z", "created_at": "2023-01-05T17:29:10Z",
"updated_at": "2024-09-28T15:55:34Z", "updated_at": "2024-12-18T07:27:21Z",
"pushed_at": "2023-01-05T17:40:18Z", "pushed_at": "2023-01-05T17:40:18Z",
"stargazers_count": 102, "stargazers_count": 103,
"watchers_count": 102, "watchers_count": 103,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 102, "watchers": 103,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },

View file

@ -339,13 +339,13 @@
"stargazers_count": 9, "stargazers_count": 9,
"watchers_count": 9, "watchers_count": 9,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 2,
"watchers": 9, "watchers": 9,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": "POC for Veeam Backup and Replication CVE-2023-27532", "description": "POC for Veeam Backup and Replication CVE-2023-27532",
"fork": false, "fork": false,
"created_at": "2023-03-18T16:20:53Z", "created_at": "2023-03-18T16:20:53Z",
"updated_at": "2024-11-20T10:29:15Z", "updated_at": "2024-12-18T08:53:23Z",
"pushed_at": "2023-03-28T18:21:55Z", "pushed_at": "2023-03-28T18:21:55Z",
"stargazers_count": 62, "stargazers_count": 63,
"watchers_count": 62, "watchers_count": 63,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 62, "watchers": 63,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability", "description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false, "fork": false,
"created_at": "2023-06-28T13:22:26Z", "created_at": "2023-06-28T13:22:26Z",
"updated_at": "2024-12-18T05:16:26Z", "updated_at": "2024-12-18T08:36:04Z",
"pushed_at": "2023-07-28T13:20:45Z", "pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 468, "stargazers_count": 469,
"watchers_count": 468, "watchers_count": 469,
"has_discussions": false, "has_discussions": false,
"forks_count": 39, "forks_count": 39,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 39, "forks": 39,
"watchers": 468, "watchers": 469,
"score": 0, "score": 0,
"subscribers_count": 15 "subscribers_count": 15
} }

View file

@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false, "fork": false,
"created_at": "2024-10-05T20:32:45Z", "created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-17T21:02:40Z", "updated_at": "2024-12-18T11:54:19Z",
"pushed_at": "2024-10-05T20:37:02Z", "pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 37, "stargazers_count": 40,
"watchers_count": 37, "watchers_count": 40,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -37,7 +37,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 37, "watchers": 40,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-09-21T05:22:51Z", "created_at": "2023-09-21T05:22:51Z",
"updated_at": "2024-12-14T11:31:32Z", "updated_at": "2024-12-18T10:57:15Z",
"pushed_at": "2023-12-18T04:25:00Z", "pushed_at": "2023-12-18T04:25:00Z",
"stargazers_count": 314, "stargazers_count": 315,
"watchers_count": 314, "watchers_count": 315,
"has_discussions": false, "has_discussions": false,
"forks_count": 48, "forks_count": 48,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 48, "forks": 48,
"watchers": 314, "watchers": 315,
"score": 0, "score": 0,
"subscribers_count": 15 "subscribers_count": 15
}, },
@ -200,10 +200,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-11-11T06:51:03Z", "created_at": "2023-11-11T06:51:03Z",
"updated_at": "2024-06-08T08:18:54Z", "updated_at": "2024-12-18T11:01:56Z",
"pushed_at": "2024-06-08T08:18:51Z", "pushed_at": "2024-06-08T08:18:51Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -212,7 +212,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -417,5 +417,36 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 905152305,
"name": "CVE-2023-4966-exploit",
"full_name": "akshthejo\/CVE-2023-4966-exploit",
"owner": {
"login": "akshthejo",
"id": 192083618,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192083618?v=4",
"html_url": "https:\/\/github.com\/akshthejo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/akshthejo\/CVE-2023-4966-exploit",
"description": "CVE-2023-4966-exploit",
"fork": false,
"created_at": "2024-12-18T09:09:20Z",
"updated_at": "2024-12-18T09:14:49Z",
"pushed_at": "2024-12-18T09:14:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -19,7 +19,7 @@
"stargazers_count": 10, "stargazers_count": 10,
"watchers_count": 10, "watchers_count": 10,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": true, "is_template": true,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -34,7 +34,7 @@
"poc" "poc"
], ],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 5,
"watchers": 10, "watchers": 10,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -297,10 +297,10 @@
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app", "description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
"fork": false, "fork": false,
"created_at": "2024-09-27T09:02:08Z", "created_at": "2024-09-27T09:02:08Z",
"updated_at": "2024-12-08T07:08:32Z", "updated_at": "2024-12-18T11:05:52Z",
"pushed_at": "2024-09-30T12:48:08Z", "pushed_at": "2024-09-30T12:48:08Z",
"stargazers_count": 123, "stargazers_count": 124,
"watchers_count": 123, "watchers_count": 124,
"has_discussions": false, "has_discussions": false,
"forks_count": 17, "forks_count": 17,
"allow_forking": true, "allow_forking": true,
@ -309,7 +309,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 17, "forks": 17,
"watchers": 123, "watchers": 124,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -152,6 +152,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -206,10 +206,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-16T17:33:13Z", "created_at": "2024-12-16T17:33:13Z",
"updated_at": "2024-12-16T17:38:28Z", "updated_at": "2024-12-18T11:44:02Z",
"pushed_at": "2024-12-16T17:38:23Z", "pushed_at": "2024-12-16T17:38:23Z",
"stargazers_count": 0, "stargazers_count": 6,
"watchers_count": 0, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -218,7 +218,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -118,7 +118,7 @@
"stargazers_count": 18, "stargazers_count": 18,
"watchers_count": 18, "watchers_count": 18,
"has_discussions": false, "has_discussions": false,
"forks_count": 13, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -133,7 +133,7 @@
"wordpress" "wordpress"
], ],
"visibility": "public", "visibility": "public",
"forks": 13, "forks": 14,
"watchers": 18, "watchers": 18,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -14,8 +14,8 @@
"description": "Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthenticated Plugin Installation", "description": "Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthenticated Plugin Installation",
"fork": false, "fork": false,
"created_at": "2024-12-15T23:54:15Z", "created_at": "2024-12-15T23:54:15Z",
"updated_at": "2024-12-16T11:22:09Z", "updated_at": "2024-12-18T07:17:04Z",
"pushed_at": "2024-12-16T10:06:26Z", "pushed_at": "2024-12-18T07:17:01Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver", "description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false, "fork": false,
"created_at": "2024-10-13T19:30:20Z", "created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-12-18T03:53:40Z", "updated_at": "2024-12-18T11:10:58Z",
"pushed_at": "2024-11-29T16:56:23Z", "pushed_at": "2024-11-29T16:56:23Z",
"stargazers_count": 234, "stargazers_count": 236,
"watchers_count": 234, "watchers_count": 236,
"has_discussions": false, "has_discussions": false,
"forks_count": 50, "forks_count": 50,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 50, "forks": 50,
"watchers": 234, "watchers": 236,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -14,10 +14,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-03T08:56:59Z", "created_at": "2024-12-03T08:56:59Z",
"updated_at": "2024-12-17T07:35:23Z", "updated_at": "2024-12-18T10:56:35Z",
"pushed_at": "2024-11-18T23:48:31Z", "pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 42, "stargazers_count": 44,
"watchers_count": 42, "watchers_count": 44,
"has_discussions": false, "has_discussions": false,
"forks_count": 24, "forks_count": 24,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 24, "forks": 24,
"watchers": 42, "watchers": 44,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability", "description": "CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability",
"fork": false, "fork": false,
"created_at": "2024-09-24T19:24:55Z", "created_at": "2024-09-24T19:24:55Z",
"updated_at": "2024-12-16T18:49:12Z", "updated_at": "2024-12-18T10:43:13Z",
"pushed_at": "2024-12-09T22:58:22Z", "pushed_at": "2024-12-09T22:58:22Z",
"stargazers_count": 130, "stargazers_count": 131,
"watchers_count": 130, "watchers_count": 131,
"has_discussions": false, "has_discussions": false,
"forks_count": 26, "forks_count": 26,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 26, "forks": 26,
"watchers": 130, "watchers": 131,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false, "fork": false,
"created_at": "2024-10-05T20:32:45Z", "created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-17T21:02:40Z", "updated_at": "2024-12-18T11:54:19Z",
"pushed_at": "2024-10-05T20:37:02Z", "pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 37, "stargazers_count": 40,
"watchers_count": 37, "watchers_count": 40,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -68,7 +68,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 37, "watchers": 40,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-14T09:22:33Z", "created_at": "2024-12-14T09:22:33Z",
"updated_at": "2024-12-18T03:58:06Z", "updated_at": "2024-12-18T08:29:08Z",
"pushed_at": "2024-12-14T10:13:45Z", "pushed_at": "2024-12-14T10:13:45Z",
"stargazers_count": 26, "stargazers_count": 27,
"watchers_count": 26, "watchers_count": 27,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 26, "watchers": 27,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.", "description": "CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.",
"fork": false, "fork": false,
"created_at": "2024-07-19T03:51:54Z", "created_at": "2024-07-19T03:51:54Z",
"updated_at": "2024-12-18T05:17:33Z", "updated_at": "2024-12-18T08:59:18Z",
"pushed_at": "2024-07-19T04:01:13Z", "pushed_at": "2024-07-19T04:01:13Z",
"stargazers_count": 65, "stargazers_count": 66,
"watchers_count": 65, "watchers_count": 66,
"has_discussions": false, "has_discussions": false,
"forks_count": 12, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 12,
"watchers": 65, "watchers": 66,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -14,8 +14,8 @@
"description": "How to \"recover\" a CloudPanel server affected by the CVE-2024-44765 vulnerability", "description": "How to \"recover\" a CloudPanel server affected by the CVE-2024-44765 vulnerability",
"fork": false, "fork": false,
"created_at": "2024-12-17T13:29:38Z", "created_at": "2024-12-17T13:29:38Z",
"updated_at": "2024-12-18T05:30:44Z", "updated_at": "2024-12-18T07:17:58Z",
"pushed_at": "2024-12-18T05:30:41Z", "pushed_at": "2024-12-18T07:17:55Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -38,7 +38,7 @@
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
}, },
{ {
"id": 904964693, "id": 904964693,
@ -69,6 +69,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -262,8 +262,8 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-18T03:39:57Z", "created_at": "2024-12-18T03:39:57Z",
"updated_at": "2024-12-18T03:58:57Z", "updated_at": "2024-12-18T12:25:18Z",
"pushed_at": "2024-12-18T03:58:54Z", "pushed_at": "2024-12-18T12:25:14Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module", "description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module",
"fork": false, "fork": false,
"created_at": "2024-12-18T01:06:54Z", "created_at": "2024-12-18T01:06:54Z",
"updated_at": "2024-12-18T01:59:58Z", "updated_at": "2024-12-18T10:14:23Z",
"pushed_at": "2024-12-18T01:17:11Z", "pushed_at": "2024-12-18T01:17:11Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -14,19 +14,19 @@
"description": "CyberPanel authenticated RCE < 2.3.8", "description": "CyberPanel authenticated RCE < 2.3.8",
"fork": false, "fork": false,
"created_at": "2024-12-15T22:40:52Z", "created_at": "2024-12-15T22:40:52Z",
"updated_at": "2024-12-18T02:19:18Z", "updated_at": "2024-12-18T08:12:19Z",
"pushed_at": "2024-12-15T23:04:43Z", "pushed_at": "2024-12-15T23:04:43Z",
"stargazers_count": 2, "stargazers_count": 4,
"watchers_count": 2, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 2, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -28,7 +28,7 @@
"forks": 2, "forks": 2,
"watchers": 4, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 4
}, },
{ {
"id": 902994077, "id": 902994077,
@ -45,21 +45,21 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false, "fork": false,
"created_at": "2024-12-13T17:42:55Z", "created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-18T06:16:55Z", "updated_at": "2024-12-18T08:01:02Z",
"pushed_at": "2024-12-18T03:54:48Z", "pushed_at": "2024-12-18T03:54:48Z",
"stargazers_count": 47, "stargazers_count": 49,
"watchers_count": 47, "watchers_count": 49,
"has_discussions": false, "has_discussions": false,
"forks_count": 19, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 19, "forks": 20,
"watchers": 47, "watchers": 49,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 3
}, },
{ {
"id": 904496445, "id": 904496445,
@ -90,7 +90,7 @@
"forks": 1, "forks": 1,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
}, },
{ {
"id": 904573736, "id": 904573736,
@ -121,7 +121,7 @@
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
}, },
{ {
"id": 905018620, "id": 905018620,

View file

@ -28,7 +28,7 @@
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
}, },
{ {
"id": 904942447, "id": 904942447,
@ -59,6 +59,6 @@
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -481,7 +481,7 @@
"forks": 1, "forks": 1,
"watchers": 10, "watchers": 10,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
}, },
{ {
"id": 822884531, "id": 822884531,
@ -1355,10 +1355,10 @@
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ", "description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ",
"fork": false, "fork": false,
"created_at": "2024-07-02T18:32:46Z", "created_at": "2024-07-02T18:32:46Z",
"updated_at": "2024-12-15T09:25:34Z", "updated_at": "2024-12-18T11:21:29Z",
"pushed_at": "2024-07-05T15:19:28Z", "pushed_at": "2024-07-05T15:19:28Z",
"stargazers_count": 65, "stargazers_count": 67,
"watchers_count": 65, "watchers_count": 67,
"has_discussions": false, "has_discussions": false,
"forks_count": 27, "forks_count": 27,
"allow_forking": true, "allow_forking": true,
@ -1376,7 +1376,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 27, "forks": 27,
"watchers": 65, "watchers": 67,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -31,6 +31,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -8700,6 +8700,7 @@
- [jmussmann/cve-2023-4966-iocs](https://github.com/jmussmann/cve-2023-4966-iocs) - [jmussmann/cve-2023-4966-iocs](https://github.com/jmussmann/cve-2023-4966-iocs)
- [morganwdavis/overread](https://github.com/morganwdavis/overread) - [morganwdavis/overread](https://github.com/morganwdavis/overread)
- [LucasOneZ/CVE-2023-4966](https://github.com/LucasOneZ/CVE-2023-4966) - [LucasOneZ/CVE-2023-4966](https://github.com/LucasOneZ/CVE-2023-4966)
- [akshthejo/CVE-2023-4966-exploit](https://github.com/akshthejo/CVE-2023-4966-exploit)
### CVE-2023-5024 (2023-09-17) ### CVE-2023-5024 (2023-09-17)
@ -17109,6 +17110,13 @@
- [szymonh/android-gadget](https://github.com/szymonh/android-gadget) - [szymonh/android-gadget](https://github.com/szymonh/android-gadget)
### CVE-2022-20120 (2022-05-10)
<code>Product: AndroidVersions: Android kernelAndroid ID: A-203213034References: N/A
</code>
- [boredpentester/ABL_ROP](https://github.com/boredpentester/ABL_ROP)
### CVE-2022-20126 (2022-06-15) ### CVE-2022-20126 (2022-06-15)
<code>In setScanMode of AdapterService.java, there is a possible way to enable Bluetooth discovery mode without user interaction due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-203431023 <code>In setScanMode of AdapterService.java, there is a possible way to enable Bluetooth discovery mode without user interaction due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-203431023
@ -27773,6 +27781,7 @@
- [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773) - [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773)
- [xMohamed0/CVE-2021-41773](https://github.com/xMohamed0/CVE-2021-41773) - [xMohamed0/CVE-2021-41773](https://github.com/xMohamed0/CVE-2021-41773)
- [i6c/MASS_CVE-2021-41773](https://github.com/i6c/MASS_CVE-2021-41773) - [i6c/MASS_CVE-2021-41773](https://github.com/i6c/MASS_CVE-2021-41773)
- [norrig/CVE-2021-41773-exploiter](https://github.com/norrig/CVE-2021-41773-exploiter)
- [m96dg/CVE-2021-41773-exercise](https://github.com/m96dg/CVE-2021-41773-exercise) - [m96dg/CVE-2021-41773-exercise](https://github.com/m96dg/CVE-2021-41773-exercise)
- [skentagon/CVE-2021-41773](https://github.com/skentagon/CVE-2021-41773) - [skentagon/CVE-2021-41773](https://github.com/skentagon/CVE-2021-41773)
- [mauricelambert/CVE-2021-41773](https://github.com/mauricelambert/CVE-2021-41773) - [mauricelambert/CVE-2021-41773](https://github.com/mauricelambert/CVE-2021-41773)
@ -28971,7 +28980,6 @@
- [YangHyperData/LOGJ4_PocShell_CVE-2021-44228](https://github.com/YangHyperData/LOGJ4_PocShell_CVE-2021-44228) - [YangHyperData/LOGJ4_PocShell_CVE-2021-44228](https://github.com/YangHyperData/LOGJ4_PocShell_CVE-2021-44228)
- [Hoanle396/CVE-2021-44228-demo](https://github.com/Hoanle396/CVE-2021-44228-demo) - [Hoanle396/CVE-2021-44228-demo](https://github.com/Hoanle396/CVE-2021-44228-demo)
- [tadash10/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment](https://github.com/tadash10/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment) - [tadash10/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment](https://github.com/tadash10/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment)
- [cve-2021-44228/cve-2021-44228](https://github.com/cve-2021-44228/cve-2021-44228)
- [asd58584388/CVE-2021-44228](https://github.com/asd58584388/CVE-2021-44228) - [asd58584388/CVE-2021-44228](https://github.com/asd58584388/CVE-2021-44228)
- [OtisSymbos/CVE-2021-44228-Log4Shell-](https://github.com/OtisSymbos/CVE-2021-44228-Log4Shell-) - [OtisSymbos/CVE-2021-44228-Log4Shell-](https://github.com/OtisSymbos/CVE-2021-44228-Log4Shell-)
- [safeer-accuknox/log4j-shell-poc](https://github.com/safeer-accuknox/log4j-shell-poc) - [safeer-accuknox/log4j-shell-poc](https://github.com/safeer-accuknox/log4j-shell-poc)