Auto Update 2024/06/27 12:29:22

This commit is contained in:
motikan2010-bot 2024-06-27 21:29:22 +09:00
parent ed59d06109
commit c610d3896b
38 changed files with 245 additions and 191 deletions

View file

@ -163,10 +163,10 @@
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
"fork": false,
"created_at": "2014-04-08T10:10:43Z",
"updated_at": "2024-01-27T12:59:08Z",
"updated_at": "2024-06-27T11:19:05Z",
"pushed_at": "2015-07-02T14:47:31Z",
"stargazers_count": 570,
"watchers_count": 570,
"stargazers_count": 571,
"watchers_count": 571,
"has_discussions": false,
"forks_count": 216,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 216,
"watchers": 570,
"watchers": 571,
"score": 0,
"subscribers_count": 57
},

View file

@ -73,10 +73,10 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2024-04-17T13:53:57Z",
"updated_at": "2024-06-27T11:20:03Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 719,
"watchers_count": 719,
"stargazers_count": 720,
"watchers_count": 720,
"has_discussions": false,
"forks_count": 263,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 263,
"watchers": 719,
"watchers": 720,
"score": 0,
"subscribers_count": 48
},

View file

@ -343,10 +343,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-06-27T05:48:07Z",
"updated_at": "2024-06-27T06:38:06Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 163,
"watchers_count": 163,
"stargazers_count": 164,
"watchers_count": 164,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 163,
"watchers": 164,
"score": 0,
"subscribers_count": 4
},

View file

@ -86,7 +86,7 @@
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 11,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -104,7 +104,7 @@
"snyk-js-jquery-567880"
],
"visibility": "public",
"forks": 11,
"forks": 10,
"watchers": 24,
"score": 0,
"subscribers_count": 7

View file

@ -18,7 +18,7 @@
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 11,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -36,7 +36,7 @@
"snyk-js-jquery-567880"
],
"visibility": "public",
"forks": 11,
"forks": 10,
"watchers": 24,
"score": 0,
"subscribers_count": 7

View file

@ -889,10 +889,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2024-06-27T05:48:07Z",
"updated_at": "2024-06-27T06:38:06Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 163,
"watchers_count": 163,
"stargazers_count": 164,
"watchers_count": 164,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -901,7 +901,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 163,
"watchers": 164,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-03-30T05:21:26Z",
"updated_at": "2024-02-24T07:53:20Z",
"updated_at": "2024-06-27T09:48:40Z",
"pushed_at": "2021-03-30T05:31:22Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 6
}

View file

@ -368,5 +368,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 820862657,
"name": "CVE-2021-3493_CVE--2022-3357",
"full_name": "iamz24\/CVE-2021-3493_CVE--2022-3357",
"owner": {
"login": "iamz24",
"id": 97619614,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97619614?v=4",
"html_url": "https:\/\/github.com\/iamz24"
},
"html_url": "https:\/\/github.com\/iamz24\/CVE-2021-3493_CVE--2022-3357",
"description": null,
"fork": false,
"created_at": "2024-06-27T10:25:04Z",
"updated_at": "2024-06-27T11:04:45Z",
"pushed_at": "2024-06-27T11:04:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -938,10 +938,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-06-26T14:23:29Z",
"updated_at": "2024-06-27T09:41:31Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 1008,
"watchers_count": 1008,
"stargazers_count": 1009,
"watchers_count": 1009,
"has_discussions": false,
"forks_count": 180,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 180,
"watchers": 1008,
"watchers": 1009,
"score": 0,
"subscribers_count": 14
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-23277 POC to write a webshell to aspnet_client",
"fork": false,
"created_at": "2022-10-13T13:35:18Z",
"updated_at": "2024-01-28T07:47:17Z",
"updated_at": "2024-06-27T08:08:54Z",
"pushed_at": "2022-10-24T15:01:06Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-06-25T01:22:41Z",
"updated_at": "2024-06-27T08:59:23Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1139,
"watchers_count": 1139,
"stargazers_count": 1140,
"watchers_count": 1140,
"has_discussions": true,
"forks_count": 188,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 188,
"watchers": 1139,
"watchers": 1140,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-12T03:59:03Z",
"updated_at": "2024-04-21T08:47:20Z",
"updated_at": "2024-06-27T09:27:36Z",
"pushed_at": "2024-04-12T04:05:19Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-03T11:39:25Z",
"updated_at": "2023-12-11T06:17:23Z",
"updated_at": "2024-06-27T12:01:56Z",
"pushed_at": "2022-10-10T08:57:29Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 3
}

View file

@ -1,32 +1,32 @@
[
{
"id": 529181655,
"id": 529328915,
"name": "CVE-2022-38766",
"full_name": "AUTOCRYPT-RED\/CVE-2022-38766",
"full_name": "MalHyuk\/CVE-2022-38766",
"owner": {
"login": "AUTOCRYPT-RED",
"id": 112160559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112160559?v=4",
"html_url": "https:\/\/github.com\/AUTOCRYPT-RED"
"login": "MalHyuk",
"id": 59429883,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59429883?v=4",
"html_url": "https:\/\/github.com\/MalHyuk"
},
"html_url": "https:\/\/github.com\/AUTOCRYPT-RED\/CVE-2022-38766",
"html_url": "https:\/\/github.com\/MalHyuk\/CVE-2022-38766",
"description": "PoC for vulnerability in Renault ZOE Keyless System(CVE-2022-38766)",
"fork": false,
"created_at": "2022-08-26T08:43:40Z",
"updated_at": "2023-09-06T08:25:28Z",
"pushed_at": "2022-10-07T10:01:18Z",
"stargazers_count": 13,
"watchers_count": 13,
"created_at": "2022-08-26T16:23:44Z",
"updated_at": "2022-08-26T16:22:08Z",
"pushed_at": "2022-10-07T13:05:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 5,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 13,
"forks": 4,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "harbor unauthorized detection",
"fork": false,
"created_at": "2023-03-21T10:40:19Z",
"updated_at": "2024-06-26T01:29:18Z",
"updated_at": "2024-06-27T07:10:28Z",
"pushed_at": "2023-03-28T04:23:42Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "pocs & exploit for CVE-2023-24871 (rce + lpe)",
"fork": false,
"created_at": "2024-06-21T15:01:15Z",
"updated_at": "2024-06-26T16:29:16Z",
"updated_at": "2024-06-27T08:30:30Z",
"pushed_at": "2024-06-25T15:33:32Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 19,
"watchers": 21,
"score": 0,
"subscribers_count": 1
}

View file

@ -463,5 +463,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 820848497,
"name": "CVE-2023-27163-ssrf-to-port-scanning",
"full_name": "Rishabh-Kumar-Cyber-Sec\/CVE-2023-27163-ssrf-to-port-scanning",
"owner": {
"login": "Rishabh-Kumar-Cyber-Sec",
"id": 58937379,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58937379?v=4",
"html_url": "https:\/\/github.com\/Rishabh-Kumar-Cyber-Sec"
},
"html_url": "https:\/\/github.com\/Rishabh-Kumar-Cyber-Sec\/CVE-2023-27163-ssrf-to-port-scanning",
"description": "It is a simple script to automate internal port scanning dueto SSRF in requests-baskets v 1.2.1. this script can also assisst in solving 'SAU' machine from hackthebox",
"fork": false,
"created_at": "2024-06-27T09:48:14Z",
"updated_at": "2024-06-27T09:53:26Z",
"pushed_at": "2024-06-27T09:53:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "POC of CVE-2023-35086 only DoS",
"fork": false,
"created_at": "2023-07-25T01:36:07Z",
"updated_at": "2024-04-20T11:35:20Z",
"updated_at": "2024-06-27T12:00:02Z",
"pushed_at": "2023-07-25T01:42:02Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Ghostscript command injection vulnerability PoC (CVE-2023-36664)",
"fork": false,
"created_at": "2023-08-12T18:33:57Z",
"updated_at": "2024-06-12T22:34:15Z",
"updated_at": "2024-06-27T08:14:28Z",
"pushed_at": "2023-09-07T08:37:04Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 111,
"watchers": 112,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-25T07:28:06Z",
"updated_at": "2024-06-10T06:33:15Z",
"updated_at": "2024-06-27T09:27:13Z",
"pushed_at": "2023-08-25T09:38:05Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 110,
"watchers_count": 110,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 109,
"watchers": 110,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "😄 CVE-2023-38545堆溢出的POC和分析文章",
"fork": false,
"created_at": "2023-10-12T07:16:49Z",
"updated_at": "2024-01-10T09:09:22Z",
"updated_at": "2024-06-27T11:49:13Z",
"pushed_at": "2023-10-12T08:46:50Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 26,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-05-29T15:10:43Z",
"updated_at": "2024-06-11T09:27:26Z",
"updated_at": "2024-06-27T11:54:54Z",
"pushed_at": "2024-01-07T15:20:55Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 3
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-06-26T19:31:35Z",
"updated_at": "2024-06-27T11:42:52Z",
"pushed_at": "2024-06-19T12:24:50Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 86,
"watchers": 87,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,7 +13,7 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-06-27T02:52:42Z",
"updated_at": "2024-06-27T07:24:57Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2151,
"watchers_count": 2151,

View file

@ -13,10 +13,10 @@
"description": "Analysis of the vulnerability",
"fork": false,
"created_at": "2024-01-17T04:35:42Z",
"updated_at": "2024-06-21T00:11:55Z",
"updated_at": "2024-06-27T07:38:46Z",
"pushed_at": "2024-01-23T16:30:55Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 2
}

View file

@ -133,19 +133,19 @@
"description": null,
"fork": false,
"created_at": "2024-06-23T06:03:44Z",
"updated_at": "2024-06-26T16:06:50Z",
"updated_at": "2024-06-27T07:27:23Z",
"pushed_at": "2024-06-23T06:09:10Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 10,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 31,
"forks": 12,
"watchers": 32,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-06-27T05:20:45Z",
"updated_at": "2024-06-27T09:08:00Z",
"pushed_at": "2024-06-17T19:46:27Z",
"stargazers_count": 256,
"watchers_count": 256,
"stargazers_count": 257,
"watchers_count": 257,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 256,
"watchers": 257,
"score": 0,
"subscribers_count": 2
},
@ -103,10 +103,10 @@
"description": "Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从而控制受影响的系统、执行任意命令、安装恶意软件或访问敏感数据。 微软已发出警告成功利用此漏洞的攻击者可以获得 SYSTEM 权限,这是 Windows 系统上的最高访问级别。这增加了与 CVE-2024-26229 相关的风险,使其成为恶意行为者的主要目标。",
"fork": false,
"created_at": "2024-06-16T05:06:31Z",
"updated_at": "2024-06-27T02:56:07Z",
"updated_at": "2024-06-27T11:45:52Z",
"pushed_at": "2024-06-16T05:29:26Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2024-27130",
"fork": false,
"created_at": "2024-05-17T07:58:01Z",
"updated_at": "2024-06-24T13:55:18Z",
"updated_at": "2024-06-27T09:27:16Z",
"pushed_at": "2024-05-17T10:27:07Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 0
},

View file

@ -163,10 +163,10 @@
"description": "CVE-2024-28995 POC Vulnerability Scanner",
"fork": false,
"created_at": "2024-06-14T23:05:40Z",
"updated_at": "2024-06-24T04:37:07Z",
"updated_at": "2024-06-27T08:16:49Z",
"pushed_at": "2024-06-15T12:21:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,20 +13,50 @@
"description": null,
"fork": false,
"created_at": "2024-06-24T10:37:26Z",
"updated_at": "2024-06-27T06:21:10Z",
"updated_at": "2024-06-27T11:19:35Z",
"pushed_at": "2024-06-24T11:16:26Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 21,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 75,
"forks": 25,
"watchers": 95,
"score": 0,
"subscribers_count": 1
},
{
"id": 820782545,
"name": "CVE-2024-30088-",
"full_name": "NextGenPentesters\/CVE-2024-30088-",
"owner": {
"login": "NextGenPentesters",
"id": 169174200,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169174200?v=4",
"html_url": "https:\/\/github.com\/NextGenPentesters"
},
"html_url": "https:\/\/github.com\/NextGenPentesters\/CVE-2024-30088-",
"description": "🆘New Windows Kernel Priviledge Escalation Vulnerability",
"fork": false,
"created_at": "2024-06-27T07:05:46Z",
"updated_at": "2024-06-27T07:19:15Z",
"pushed_at": "2024-06-27T07:19:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -73,12 +73,12 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-06-27T06:05:29Z",
"updated_at": "2024-06-27T08:29:14Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 453,
"watchers_count": 453,
"stargazers_count": 454,
"watchers_count": 454,
"has_discussions": false,
"forks_count": 126,
"forks_count": 127,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -89,8 +89,8 @@
"rce"
],
"visibility": "public",
"forks": 126,
"watchers": 453,
"forks": 127,
"watchers": 454,
"score": 0,
"subscribers_count": 3
},
@ -1479,8 +1479,8 @@
"description": "exploit for CVE-2024-32002",
"fork": false,
"created_at": "2024-06-20T07:37:09Z",
"updated_at": "2024-06-26T14:38:27Z",
"pushed_at": "2024-06-26T14:38:24Z",
"updated_at": "2024-06-27T09:40:51Z",
"pushed_at": "2024-06-27T09:40:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "D-Link NAS CVE-2024-3273 Exploit Tool",
"fork": false,
"created_at": "2024-04-07T03:09:13Z",
"updated_at": "2024-05-28T18:16:36Z",
"updated_at": "2024-06-27T08:12:17Z",
"pushed_at": "2024-04-07T04:41:26Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 73,
"watchers": 74,
"score": 0,
"subscribers_count": 4
},

View file

@ -1,32 +0,0 @@
[
{
"id": 820411825,
"name": "CVE-2024-34102-RCE",
"full_name": "ex-arny\/CVE-2024-34102-RCE",
"owner": {
"login": "ex-arny",
"id": 173701847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173701847?v=4",
"html_url": "https:\/\/github.com\/ex-arny"
},
"html_url": "https:\/\/github.com\/ex-arny\/CVE-2024-34102-RCE",
"description": "CVE-2024-34102 unauthenticated RCE PoC for Magento\/adobe commerce",
"fork": false,
"created_at": "2024-06-26T12:18:24Z",
"updated_at": "2024-06-26T17:07:55Z",
"pushed_at": "2024-06-26T17:07:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Path traversal in Ollama with rogue registry server",
"fork": false,
"created_at": "2024-06-26T03:11:29Z",
"updated_at": "2024-06-27T06:21:50Z",
"updated_at": "2024-06-27T09:10:49Z",
"pushed_at": "2024-06-26T07:34:31Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -163,10 +163,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-06-26T10:26:25Z",
"updated_at": "2024-06-27T09:27:09Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 151,
"watchers_count": 151,
"stargazers_count": 152,
"watchers_count": 152,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 151,
"watchers": 152,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for the CVE-2024-5806",
"fork": false,
"created_at": "2024-06-24T16:28:35Z",
"updated_at": "2024-06-27T05:19:10Z",
"updated_at": "2024-06-27T11:25:44Z",
"pushed_at": "2024-06-24T16:52:12Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 19,
"watchers": 23,
"score": 0,
"subscribers_count": 0
}

View file

@ -2342,6 +2342,7 @@
</code>
- [tykawaii98/CVE-2024-30088](https://github.com/tykawaii98/CVE-2024-30088)
- [NextGenPentesters/CVE-2024-30088-](https://github.com/NextGenPentesters/CVE-2024-30088-)
### CVE-2024-30212 (2024-05-28)
@ -2723,13 +2724,6 @@
- [xbz0n/CVE-2024-33911](https://github.com/xbz0n/CVE-2024-33911)
### CVE-2024-34102 (2024-06-13)
<code>Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
</code>
- [ex-arny/CVE-2024-34102-RCE](https://github.com/ex-arny/CVE-2024-34102-RCE)
### CVE-2024-34220 (-)
<code>Sourcecodester Human Resource Management System 1.0 is vulnerable to SQL Injection via the 'leave' parameter.
@ -5787,6 +5781,7 @@
- [MasterCode112/CVE-2023-27163](https://github.com/MasterCode112/CVE-2023-27163)
- [Rubioo02/CVE-2023-27163](https://github.com/Rubioo02/CVE-2023-27163)
- [madhavmehndiratta/CVE-2023-27163](https://github.com/madhavmehndiratta/CVE-2023-27163)
- [Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning](https://github.com/Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning)
### CVE-2023-27216 (2023-04-12)
@ -15973,7 +15968,7 @@
<code>The remote keyless system on Renault ZOE 2021 vehicles sends 433.92 MHz RF signals from the same Rolling Codes set for each door-open request, which allows for a replay attack.
</code>
- [AUTOCRYPT-RED/CVE-2022-38766](https://github.com/AUTOCRYPT-RED/CVE-2022-38766)
- [MalHyuk/CVE-2022-38766](https://github.com/MalHyuk/CVE-2022-38766)
### CVE-2022-38789 (2022-09-15)
@ -18525,6 +18520,7 @@
- [pmihsan/OverlayFS-CVE-2021-3493](https://github.com/pmihsan/OverlayFS-CVE-2021-3493)
- [smallkill/CVE-2021-3493](https://github.com/smallkill/CVE-2021-3493)
- [ptkhai15/OverlayFS---CVE-2021-3493](https://github.com/ptkhai15/OverlayFS---CVE-2021-3493)
- [iamz24/CVE-2021-3493_CVE--2022-3357](https://github.com/iamz24/CVE-2021-3493_CVE--2022-3357)
### CVE-2021-3516 (2021-06-01)