Auto Update 2025/01/14 18:32:54

This commit is contained in:
motikan2010-bot 2025-01-15 03:32:54 +09:00
parent 4fe083fbab
commit ca59258b41
56 changed files with 889 additions and 455 deletions

View file

@ -526,37 +526,6 @@
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
{
"id": 479844525,
"name": "CVE-2007-2447",
"full_name": "banomaly\/CVE-2007-2447",
"owner": {
"login": "banomaly",
"id": 51972282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
"html_url": "https:\/\/github.com\/banomaly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/banomaly\/CVE-2007-2447",
"description": null,
"fork": false,
"created_at": "2022-04-09T21:12:11Z",
"updated_at": "2022-04-09T21:12:43Z",
"pushed_at": "2024-07-09T18:10:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{ {
"id": 490631750, "id": 490631750,
"name": "Samba-Usermap-exploit", "name": "Samba-Usermap-exploit",
@ -928,5 +897,36 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 826416402,
"name": "CVE-2007-2447",
"full_name": "foudadev\/CVE-2007-2447",
"owner": {
"login": "foudadev",
"id": 40678747,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40678747?v=4",
"html_url": "https:\/\/github.com\/foudadev",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/foudadev\/CVE-2007-2447",
"description": null,
"fork": false,
"created_at": "2024-07-09T17:04:54Z",
"updated_at": "2024-07-09T17:04:54Z",
"pushed_at": "2024-07-09T17:05:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -99,37 +99,6 @@
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
{
"id": 476225528,
"name": "CVE-2009-2265",
"full_name": "banomaly\/CVE-2009-2265",
"owner": {
"login": "banomaly",
"id": 51972282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
"html_url": "https:\/\/github.com\/banomaly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/banomaly\/CVE-2009-2265",
"description": "ColdFusion 8.0.1 - Arbitrary File Upload to RCE",
"fork": false,
"created_at": "2022-03-31T08:52:08Z",
"updated_at": "2023-01-29T06:58:32Z",
"pushed_at": "2022-04-14T02:55:54Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{ {
"id": 905388637, "id": 905388637,
"name": "Adobe-ColdFusion-8-RCE-CVE-2009-2265", "name": "Adobe-ColdFusion-8-RCE-CVE-2009-2265",

View file

@ -29,36 +29,5 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
},
{
"id": 478822980,
"name": "CVE-2012-4869",
"full_name": "banomaly\/CVE-2012-4869",
"owner": {
"login": "banomaly",
"id": 51972282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
"html_url": "https:\/\/github.com\/banomaly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/banomaly\/CVE-2012-4869",
"description": null,
"fork": false,
"created_at": "2022-04-07T04:13:13Z",
"updated_at": "2024-10-03T05:16:14Z",
"pushed_at": "2022-04-14T02:56:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
} }
] ]

View file

@ -182,7 +182,7 @@
"fork": false, "fork": false,
"created_at": "2024-11-14T04:35:59Z", "created_at": "2024-11-14T04:35:59Z",
"updated_at": "2025-01-05T15:26:10Z", "updated_at": "2025-01-05T15:26:10Z",
"pushed_at": "2025-01-13T19:05:30Z", "pushed_at": "2025-01-14T12:58:33Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -1917,37 +1917,6 @@
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },
{
"id": 479846687,
"name": "CVE-2014-6271",
"full_name": "banomaly\/CVE-2014-6271",
"owner": {
"login": "banomaly",
"id": 51972282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
"html_url": "https:\/\/github.com\/banomaly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/banomaly\/CVE-2014-6271",
"description": null,
"fork": false,
"created_at": "2022-04-09T21:24:12Z",
"updated_at": "2022-04-09T21:24:47Z",
"pushed_at": "2022-04-14T02:56:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{ {
"id": 506769957, "id": 506769957,
"name": "cgi-bin-shellshock", "name": "cgi-bin-shellshock",

View file

@ -76,8 +76,8 @@
"description": "kernel exploit", "description": "kernel exploit",
"fork": false, "fork": false,
"created_at": "2022-02-07T10:52:51Z", "created_at": "2022-02-07T10:52:51Z",
"updated_at": "2025-01-11T23:46:45Z", "updated_at": "2025-01-14T12:55:49Z",
"pushed_at": "2022-02-07T14:33:56Z", "pushed_at": "2025-01-14T12:55:45Z",
"stargazers_count": 9, "stargazers_count": 9,
"watchers_count": 9, "watchers_count": 9,
"has_discussions": false, "has_discussions": false,

View file

@ -30,37 +30,6 @@
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
{
"id": 481433279,
"name": "CVE-2015-6967",
"full_name": "banomaly\/CVE-2015-6967",
"owner": {
"login": "banomaly",
"id": 51972282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
"html_url": "https:\/\/github.com\/banomaly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/banomaly\/CVE-2015-6967",
"description": null,
"fork": false,
"created_at": "2022-04-14T01:57:39Z",
"updated_at": "2024-08-19T17:35:43Z",
"pushed_at": "2022-04-14T02:59:42Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{ {
"id": 658921245, "id": 658921245,
"name": "CVE-2015-6967", "name": "CVE-2015-6967",

View file

@ -2068,37 +2068,6 @@
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
{
"id": 481444491,
"name": "CVE-2017-5638",
"full_name": "banomaly\/CVE-2017-5638",
"owner": {
"login": "banomaly",
"id": 51972282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
"html_url": "https:\/\/github.com\/banomaly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/banomaly\/CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2022-04-14T02:48:22Z",
"updated_at": "2024-07-01T10:35:27Z",
"pushed_at": "2022-04-14T02:52:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{ {
"id": 580942836, "id": 580942836,
"name": "Exploit-CVE-2017-5638", "name": "Exploit-CVE-2017-5638",

View file

@ -989,37 +989,6 @@
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
{
"id": 477484512,
"name": "CVE-2018-7600",
"full_name": "banomaly\/CVE-2018-7600",
"owner": {
"login": "banomaly",
"id": 51972282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
"html_url": "https:\/\/github.com\/banomaly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/banomaly\/CVE-2018-7600",
"description": null,
"fork": false,
"created_at": "2022-04-03T22:45:53Z",
"updated_at": "2023-03-13T21:35:37Z",
"pushed_at": "2022-04-14T02:56:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{ {
"id": 485290659, "id": 485290659,
"name": "CVE-2018-7600", "name": "CVE-2018-7600",

View file

@ -1902,10 +1902,10 @@
"description": "Proof of concept for CVE-2019-0708", "description": "Proof of concept for CVE-2019-0708",
"fork": false, "fork": false,
"created_at": "2019-05-29T16:53:54Z", "created_at": "2019-05-29T16:53:54Z",
"updated_at": "2025-01-07T11:26:39Z", "updated_at": "2025-01-14T12:14:41Z",
"pushed_at": "2021-12-02T12:00:46Z", "pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1175, "stargazers_count": 1176,
"watchers_count": 1175, "watchers_count": 1176,
"has_discussions": false, "has_discussions": false,
"forks_count": 345, "forks_count": 345,
"allow_forking": true, "allow_forking": true,
@ -1914,7 +1914,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 345, "forks": 345,
"watchers": 1175, "watchers": 1176,
"score": 0, "score": 0,
"subscribers_count": 69 "subscribers_count": 69
}, },
@ -2497,10 +2497,10 @@
"description": "Public work for CVE-2019-0708", "description": "Public work for CVE-2019-0708",
"fork": false, "fork": false,
"created_at": "2019-07-23T03:15:53Z", "created_at": "2019-07-23T03:15:53Z",
"updated_at": "2024-08-24T09:50:01Z", "updated_at": "2025-01-14T12:19:03Z",
"pushed_at": "2019-11-19T02:43:38Z", "pushed_at": "2019-11-19T02:43:38Z",
"stargazers_count": 289, "stargazers_count": 290,
"watchers_count": 289, "watchers_count": 290,
"has_discussions": false, "has_discussions": false,
"forks_count": 91, "forks_count": 91,
"allow_forking": true, "allow_forking": true,
@ -2509,7 +2509,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 91, "forks": 91,
"watchers": 289, "watchers": 290,
"score": 0, "score": 0,
"subscribers_count": 21 "subscribers_count": 21
}, },
@ -2962,10 +2962,10 @@
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )", "description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false, "fork": false,
"created_at": "2019-09-30T19:46:21Z", "created_at": "2019-09-30T19:46:21Z",
"updated_at": "2024-11-04T16:40:49Z", "updated_at": "2025-01-14T12:23:12Z",
"pushed_at": "2021-02-06T00:24:21Z", "pushed_at": "2021-02-06T00:24:21Z",
"stargazers_count": 234, "stargazers_count": 235,
"watchers_count": 234, "watchers_count": 235,
"has_discussions": false, "has_discussions": false,
"forks_count": 74, "forks_count": 74,
"allow_forking": true, "allow_forking": true,
@ -2974,7 +2974,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 74, "forks": 74,
"watchers": 234, "watchers": 235,
"score": 0, "score": 0,
"subscribers_count": 22 "subscribers_count": 22
}, },
@ -3024,10 +3024,10 @@
"description": "CVE-2019-0708 (BlueKeep)", "description": "CVE-2019-0708 (BlueKeep)",
"fork": false, "fork": false,
"created_at": "2019-12-07T10:13:11Z", "created_at": "2019-12-07T10:13:11Z",
"updated_at": "2024-12-25T11:28:16Z", "updated_at": "2025-01-14T12:19:27Z",
"pushed_at": "2020-07-07T15:28:13Z", "pushed_at": "2020-07-07T15:28:13Z",
"stargazers_count": 105, "stargazers_count": 106,
"watchers_count": 105, "watchers_count": 106,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
@ -3036,7 +3036,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 105, "watchers": 106,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },

View file

@ -171,37 +171,6 @@
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },
{
"id": 481430471,
"name": "CVE-2019-11447",
"full_name": "banomaly\/CVE-2019-11447",
"owner": {
"login": "banomaly",
"id": 51972282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
"html_url": "https:\/\/github.com\/banomaly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/banomaly\/CVE-2019-11447",
"description": null,
"fork": false,
"created_at": "2022-04-14T01:45:04Z",
"updated_at": "2022-04-14T01:56:44Z",
"pushed_at": "2022-04-14T02:52:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{ {
"id": 736750785, "id": 736750785,
"name": "CVE-2019-11447_reverse_shell_upload", "name": "CVE-2019-11447_reverse_shell_upload",

View file

@ -107,10 +107,10 @@
"description": "AppXSvc Arbitrary File Security Descriptor Overwrite EoP", "description": "AppXSvc Arbitrary File Security Descriptor Overwrite EoP",
"fork": false, "fork": false,
"created_at": "2019-09-11T23:28:59Z", "created_at": "2019-09-11T23:28:59Z",
"updated_at": "2024-08-12T19:52:55Z", "updated_at": "2025-01-14T18:02:41Z",
"pushed_at": "2019-09-15T17:09:51Z", "pushed_at": "2019-09-15T17:09:51Z",
"stargazers_count": 19, "stargazers_count": 20,
"watchers_count": 19, "watchers_count": 20,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
@ -126,7 +126,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 19, "watchers": 20,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -155,35 +155,35 @@
"subscribers_count": 0 "subscribers_count": 0
}, },
{ {
"id": 300985470, "id": 302162339,
"name": "CVE-2019-16113", "name": "CVE-2019-16113",
"full_name": "banomaly\/CVE-2019-16113", "full_name": "m4rm0k\/CVE-2019-16113",
"owner": { "owner": {
"login": "banomaly", "login": "m4rm0k",
"id": 51972282, "id": 3755563,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3755563?v=4",
"html_url": "https:\/\/github.com\/banomaly", "html_url": "https:\/\/github.com\/m4rm0k",
"user_view_type": "public" "user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/banomaly\/CVE-2019-16113", "html_url": "https:\/\/github.com\/m4rm0k\/CVE-2019-16113",
"description": "Bludit 3.9.2 - Remote command execution - CVE-2019-16113", "description": "Bludit 3.9.2 - Remote command execution - CVE-2019-16113",
"fork": false, "fork": false,
"created_at": "2020-10-03T21:38:39Z", "created_at": "2020-10-07T21:16:53Z",
"updated_at": "2024-10-24T22:21:49Z", "updated_at": "2020-10-07T21:16:55Z",
"pushed_at": "2020-10-12T19:01:20Z", "pushed_at": "2020-10-03T21:48:34Z",
"stargazers_count": 3, "stargazers_count": 0,
"watchers_count": 3, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 2,
"watchers": 3, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 0
}, },
{ {
"id": 336189382, "id": 336189382,
@ -216,37 +216,6 @@
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
{
"id": 478819535,
"name": "CVE-2019-16113_",
"full_name": "banomaly\/CVE-2019-16113_",
"owner": {
"login": "banomaly",
"id": 51972282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
"html_url": "https:\/\/github.com\/banomaly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/banomaly\/CVE-2019-16113_",
"description": null,
"fork": false,
"created_at": "2022-04-07T03:57:15Z",
"updated_at": "2024-10-17T07:18:21Z",
"pushed_at": "2022-04-14T02:56:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{ {
"id": 778977291, "id": 778977291,
"name": "CVE-2019-16113", "name": "CVE-2019-16113",

View file

@ -14,10 +14,10 @@
"description": "WordPress Backup Guard Authenticated Remote Code Execution Exploit", "description": "WordPress Backup Guard Authenticated Remote Code Execution Exploit",
"fork": false, "fork": false,
"created_at": "2021-07-30T11:28:53Z", "created_at": "2021-07-30T11:28:53Z",
"updated_at": "2024-08-12T20:15:08Z", "updated_at": "2025-01-14T15:04:50Z",
"pushed_at": "2021-07-30T11:35:54Z", "pushed_at": "2021-07-30T11:35:54Z",
"stargazers_count": 10, "stargazers_count": 11,
"watchers_count": 10, "watchers_count": 11,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 10, "watchers": 11,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -333,10 +333,10 @@
"description": "Polkit D-Bus Authentication Bypass Exploit", "description": "Polkit D-Bus Authentication Bypass Exploit",
"fork": false, "fork": false,
"created_at": "2021-07-30T11:41:34Z", "created_at": "2021-07-30T11:41:34Z",
"updated_at": "2024-08-12T20:15:08Z", "updated_at": "2025-01-14T15:04:50Z",
"pushed_at": "2021-07-30T11:43:32Z", "pushed_at": "2021-07-30T11:43:32Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -345,7 +345,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 9, "watchers": 10,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -231,10 +231,10 @@
"description": "CVE-2021-40444 PoC", "description": "CVE-2021-40444 PoC",
"fork": false, "fork": false,
"created_at": "2021-09-10T16:55:53Z", "created_at": "2021-09-10T16:55:53Z",
"updated_at": "2025-01-13T00:52:10Z", "updated_at": "2025-01-14T13:26:52Z",
"pushed_at": "2021-12-25T18:31:02Z", "pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1609, "stargazers_count": 1610,
"watchers_count": 1609, "watchers_count": 1610,
"has_discussions": false, "has_discussions": false,
"forks_count": 481, "forks_count": 481,
"allow_forking": true, "allow_forking": true,
@ -243,7 +243,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 481, "forks": 481,
"watchers": 1609, "watchers": 1610,
"score": 0, "score": 0,
"subscribers_count": 28 "subscribers_count": 28
}, },

View file

@ -9179,43 +9179,6 @@
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },
{
"id": 440154999,
"name": "log4j-dork-scanner",
"full_name": "cergo123\/log4j-dork-scanner",
"owner": {
"login": "cergo123",
"id": 41321155,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41321155?v=4",
"html_url": "https:\/\/github.com\/cergo123",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cergo123\/log4j-dork-scanner",
"description": "A script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks",
"fork": false,
"created_at": "2021-12-20T12:01:52Z",
"updated_at": "2024-08-23T22:44:57Z",
"pushed_at": "2021-12-20T12:03:48Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-44228",
"dork-scanner",
"log4j",
"python-script",
"scanner"
],
"visibility": "public",
"forks": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},
{ {
"id": 440177006, "id": 440177006,
"name": "log4shell-war-fixer", "name": "log4shell-war-fixer",

View file

@ -19,13 +19,13 @@
"stargazers_count": 30, "stargazers_count": 30,
"watchers_count": 30, "watchers_count": 30,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 8,
"watchers": 30, "watchers": 30,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -19,7 +19,7 @@
"stargazers_count": 320, "stargazers_count": 320,
"watchers_count": 320, "watchers_count": 320,
"has_discussions": true, "has_discussions": true,
"forks_count": 47, "forks_count": 48,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -28,7 +28,7 @@
"unisoc" "unisoc"
], ],
"visibility": "public", "visibility": "public",
"forks": 47, "forks": 48,
"watchers": 320, "watchers": 320,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8

View file

@ -138,10 +138,10 @@
"description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe", "description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe",
"fork": false, "fork": false,
"created_at": "2024-01-22T10:38:02Z", "created_at": "2024-01-22T10:38:02Z",
"updated_at": "2025-01-02T22:31:57Z", "updated_at": "2025-01-14T16:35:23Z",
"pushed_at": "2024-01-24T13:45:56Z", "pushed_at": "2024-01-24T13:45:56Z",
"stargazers_count": 53, "stargazers_count": 54,
"watchers_count": 53, "watchers_count": 54,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -150,7 +150,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 53, "watchers": 54,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

33
2023/CVE-2023-32590.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 915586971,
"name": "CVE-2023-32590",
"full_name": "RandomRobbieBF\/CVE-2023-32590",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-32590",
"description": "Subscribe to Category <= 2.7.4 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2025-01-12T09:03:52Z",
"updated_at": "2025-01-14T12:42:54Z",
"pushed_at": "2025-01-12T09:04:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-14T00:54:58Z", "updated_at": "2025-01-14T17:20:49Z",
"pushed_at": "2024-08-18T08:26:46Z", "pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1382, "stargazers_count": 1384,
"watchers_count": 1382, "watchers_count": 1384,
"has_discussions": false, "has_discussions": false,
"forks_count": 238, "forks_count": 238,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 238, "forks": 238,
"watchers": 1382, "watchers": 1384,
"score": 0, "score": 0,
"subscribers_count": 21 "subscribers_count": 21
}, },

View file

@ -255,5 +255,36 @@
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 916614674,
"name": "pulse-meter",
"full_name": "rxwx\/pulse-meter",
"owner": {
"login": "rxwx",
"id": 2202542,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
"html_url": "https:\/\/github.com\/rxwx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rxwx\/pulse-meter",
"description": "Parses the System Snapshot from an Ivanti Connect Secure applicance to identify possible IOCs related to CVE-2023-46805, CVE-2024-21887 and CVE-2025-0282.",
"fork": false,
"created_at": "2025-01-14T12:54:19Z",
"updated_at": "2025-01-14T13:36:46Z",
"pushed_at": "2025-01-14T13:36:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -262,10 +262,10 @@
"description": "CVE-2024-0044", "description": "CVE-2024-0044",
"fork": false, "fork": false,
"created_at": "2024-08-19T02:51:14Z", "created_at": "2024-08-19T02:51:14Z",
"updated_at": "2025-01-09T14:50:12Z", "updated_at": "2025-01-14T13:34:13Z",
"pushed_at": "2024-08-24T06:32:58Z", "pushed_at": "2024-08-24T06:32:58Z",
"stargazers_count": 6, "stargazers_count": 7,
"watchers_count": 6, "watchers_count": 7,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -278,7 +278,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 6, "watchers": 7,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

33
2024/CVE-2024-10571.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 916037793,
"name": "CVE-2024-10571",
"full_name": "RandomRobbieBF\/CVE-2024-10571",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10571",
"description": "Chartify WordPress Chart Plugin <= 2.9.5 - Unauthenticated Local File Inclusion via source",
"fork": false,
"created_at": "2025-01-13T10:38:31Z",
"updated_at": "2025-01-14T12:39:22Z",
"pushed_at": "2025-01-13T10:38:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-11396.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 916075937,
"name": "CVE-2024-11396",
"full_name": "RandomRobbieBF\/CVE-2024-11396",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-11396",
"description": "Event monster <= 1.4.3 - Information Exposure Via Visitors List Export",
"fork": false,
"created_at": "2025-01-13T12:12:12Z",
"updated_at": "2025-01-14T12:38:39Z",
"pushed_at": "2025-01-13T12:12:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-12157.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 913334922,
"name": "CVE-2024-12157",
"full_name": "RandomRobbieBF\/CVE-2024-12157",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12157",
"description": "Popup MailChimp, GetResponse and ActiveCampaign Intergrations <= 3.2.6 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2025-01-07T13:40:05Z",
"updated_at": "2025-01-14T12:42:29Z",
"pushed_at": "2025-01-07T13:41:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-12252.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 913410162,
"name": "CVE-2024-12252",
"full_name": "RandomRobbieBF\/CVE-2024-12252",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12252",
"description": "SEO LAT Auto Post <= 2.2.1 - Missing Authorization to File Overwrite\/Upload (Remote Code Execution)",
"fork": false,
"created_at": "2025-01-07T16:22:35Z",
"updated_at": "2025-01-14T12:42:05Z",
"pushed_at": "2025-01-07T16:28:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-12404.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 914905137,
"name": "CVE-2024-12404",
"full_name": "RandomRobbieBF\/CVE-2024-12404",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12404",
"description": "CF Internal Link Shortcode <= 1.1.0 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2025-01-10T14:52:22Z",
"updated_at": "2025-01-14T12:41:00Z",
"pushed_at": "2025-01-10T14:53:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-12535.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 913375484,
"name": "CVE-2024-12535",
"full_name": "RandomRobbieBF\/CVE-2024-12535",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12535",
"description": "Host PHP Info <= 1.0.4 - Missing Authorization to Unauthenticated Sensitive Information Disclosure",
"fork": false,
"created_at": "2025-01-07T15:08:14Z",
"updated_at": "2025-01-14T12:42:19Z",
"pushed_at": "2025-01-07T15:09:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -215,5 +215,36 @@
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 916614674,
"name": "pulse-meter",
"full_name": "rxwx\/pulse-meter",
"owner": {
"login": "rxwx",
"id": 2202542,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
"html_url": "https:\/\/github.com\/rxwx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rxwx\/pulse-meter",
"description": "Parses the System Snapshot from an Ivanti Connect Secure applicance to identify possible IOCs related to CVE-2023-46805, CVE-2024-21887 and CVE-2025-0282.",
"fork": false,
"created_at": "2025-01-14T12:54:19Z",
"updated_at": "2025-01-14T13:36:46Z",
"pushed_at": "2025-01-14T13:36:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -76,12 +76,12 @@
"description": "Exploit PoC for CVE-2024-32002", "description": "Exploit PoC for CVE-2024-32002",
"fork": false, "fork": false,
"created_at": "2024-05-17T19:33:08Z", "created_at": "2024-05-17T19:33:08Z",
"updated_at": "2025-01-13T20:13:25Z", "updated_at": "2025-01-14T14:41:23Z",
"pushed_at": "2024-05-19T07:12:00Z", "pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 520, "stargazers_count": 521,
"watchers_count": 520, "watchers_count": 521,
"has_discussions": false, "has_discussions": false,
"forks_count": 146, "forks_count": 147,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -92,8 +92,8 @@
"rce" "rce"
], ],
"visibility": "public", "visibility": "public",
"forks": 146, "forks": 147,
"watchers": 520, "watchers": 521,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -111,8 +111,8 @@
"description": "CVE-2024-35250 PoC - Optimized & Condensed Form of Varwara's PoC", "description": "CVE-2024-35250 PoC - Optimized & Condensed Form of Varwara's PoC",
"fork": false, "fork": false,
"created_at": "2025-01-13T18:24:48Z", "created_at": "2025-01-13T18:24:48Z",
"updated_at": "2025-01-13T18:37:11Z", "updated_at": "2025-01-14T16:51:38Z",
"pushed_at": "2025-01-13T18:38:26Z", "pushed_at": "2025-01-14T16:51:35Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

33
2024/CVE-2024-3605.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 915570014,
"name": "CVE-2024-3605",
"full_name": "RandomRobbieBF\/CVE-2024-3605",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-3605",
"description": "WP Hotel Booking <= 2.1.0 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2025-01-12T07:53:02Z",
"updated_at": "2025-01-14T12:40:20Z",
"pushed_at": "2025-01-12T07:54:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -501,15 +501,15 @@
{ {
"id": 851683675, "id": 851683675,
"name": "Cve-2024-38063", "name": "Cve-2024-38063",
"full_name": "Brownpanda29\/Cve-2024-38063", "full_name": "brownpanda29\/Cve-2024-38063",
"owner": { "owner": {
"login": "Brownpanda29", "login": "brownpanda29",
"id": 147920175, "id": 147920175,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147920175?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147920175?v=4",
"html_url": "https:\/\/github.com\/Brownpanda29", "html_url": "https:\/\/github.com\/brownpanda29",
"user_view_type": "public" "user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Brownpanda29\/Cve-2024-38063", "html_url": "https:\/\/github.com\/brownpanda29\/Cve-2024-38063",
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-09-03T14:36:35Z", "created_at": "2024-09-03T14:36:35Z",

View file

@ -14,10 +14,10 @@
"description": "Makes IDA (most versions) to crash upon opening it. ", "description": "Makes IDA (most versions) to crash upon opening it. ",
"fork": false, "fork": false,
"created_at": "2024-08-25T12:33:14Z", "created_at": "2024-08-25T12:33:14Z",
"updated_at": "2025-01-09T06:39:31Z", "updated_at": "2025-01-14T15:52:54Z",
"pushed_at": "2024-08-30T09:58:12Z", "pushed_at": "2024-08-30T09:58:12Z",
"stargazers_count": 76, "stargazers_count": 77,
"watchers_count": 76, "watchers_count": 77,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 76, "watchers": 77,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module", "description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module",
"fork": false, "fork": false,
"created_at": "2025-01-08T01:56:41Z", "created_at": "2025-01-08T01:56:41Z",
"updated_at": "2025-01-11T05:59:03Z", "updated_at": "2025-01-14T15:20:53Z",
"pushed_at": "2025-01-11T05:59:00Z", "pushed_at": "2025-01-11T05:59:00Z",
"stargazers_count": 0, "stargazers_count": 2,
"watchers_count": 0, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -45,10 +45,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2025-01-03T07:05:33Z", "created_at": "2025-01-03T07:05:33Z",
"updated_at": "2025-01-13T09:53:17Z", "updated_at": "2025-01-14T18:05:52Z",
"pushed_at": "2025-01-03T08:20:03Z", "pushed_at": "2025-01-03T08:20:03Z",
"stargazers_count": 9, "stargazers_count": 8,
"watchers_count": 9, "watchers_count": 8,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 9, "watchers": 8,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -384,13 +384,13 @@
"stargazers_count": 8, "stargazers_count": 8,
"watchers_count": 8, "watchers_count": 8,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 3,
"watchers": 8, "watchers": 8,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

33
2024/CVE-2024-49699.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 914941212,
"name": "CVE-2024-49699",
"full_name": "RandomRobbieBF\/CVE-2024-49699",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-49699",
"description": "ARPrice <= 4.0.3 - Authenticated (Subscriber+) PHP Object Injection",
"fork": false,
"created_at": "2025-01-10T16:15:07Z",
"updated_at": "2025-01-14T12:40:49Z",
"pushed_at": "2025-01-10T16:18:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -262,10 +262,10 @@
"description": "CVE-2024-50379-exp", "description": "CVE-2024-50379-exp",
"fork": false, "fork": false,
"created_at": "2024-12-25T02:41:31Z", "created_at": "2024-12-25T02:41:31Z",
"updated_at": "2025-01-14T11:50:00Z", "updated_at": "2025-01-14T18:05:32Z",
"pushed_at": "2024-12-31T07:11:13Z", "pushed_at": "2024-12-31T07:11:13Z",
"stargazers_count": 8, "stargazers_count": 7,
"watchers_count": 8, "watchers_count": 7,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -274,7 +274,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 8, "watchers": 7,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

33
2024/CVE-2024-50491.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 915564003,
"name": "CVE-2024-50491",
"full_name": "RandomRobbieBF\/CVE-2024-50491",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50491",
"description": "RSVP ME <= 1.9.9 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2025-01-12T07:26:48Z",
"updated_at": "2025-01-14T12:40:35Z",
"pushed_at": "2025-01-12T07:27:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-5124 poc", "description": "CVE-2024-5124 poc",
"fork": false, "fork": false,
"created_at": "2024-12-03T03:18:48Z", "created_at": "2024-12-03T03:18:48Z",
"updated_at": "2025-01-13T18:16:21Z", "updated_at": "2025-01-14T18:04:03Z",
"pushed_at": "2024-12-03T04:01:32Z", "pushed_at": "2024-12-03T04:01:32Z",
"stargazers_count": 8, "stargazers_count": 7,
"watchers_count": 8, "watchers_count": 7,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 8, "watchers": 7,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

33
2024/CVE-2024-51818.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 914288330,
"name": "CVE-2024-51818",
"full_name": "RandomRobbieBF\/CVE-2024-51818",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-51818",
"description": "Fancy Product Designer <= 6.4.3 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2025-01-09T10:00:30Z",
"updated_at": "2025-01-14T12:41:40Z",
"pushed_at": "2025-01-09T10:01:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "CyberPanel authenticated RCE < 2.3.8", "description": "CyberPanel authenticated RCE < 2.3.8",
"fork": false, "fork": false,
"created_at": "2024-12-15T22:40:52Z", "created_at": "2024-12-15T22:40:52Z",
"updated_at": "2025-01-09T08:56:12Z", "updated_at": "2025-01-14T18:05:01Z",
"pushed_at": "2024-12-19T09:36:58Z", "pushed_at": "2024-12-19T09:36:58Z",
"stargazers_count": 7, "stargazers_count": 6,
"watchers_count": 7, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 7, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

33
2024/CVE-2024-54292.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 913434304,
"name": "CVE-2024-54292",
"full_name": "RandomRobbieBF\/CVE-2024-54292",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54292",
"description": "Appsplate <= 2.1.3 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2025-01-07T17:14:57Z",
"updated_at": "2025-01-14T12:41:56Z",
"pushed_at": "2025-01-07T17:15:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Escape macOS Sandbox using sharedfilelistd exploit", "description": "Escape macOS Sandbox using sharedfilelistd exploit",
"fork": false, "fork": false,
"created_at": "2025-01-08T09:55:44Z", "created_at": "2025-01-08T09:55:44Z",
"updated_at": "2025-01-14T11:32:32Z", "updated_at": "2025-01-14T18:13:40Z",
"pushed_at": "2025-01-09T06:34:50Z", "pushed_at": "2025-01-09T06:34:50Z",
"stargazers_count": 43, "stargazers_count": 45,
"watchers_count": 43, "watchers_count": 45,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 43, "watchers": 45,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

33
2024/CVE-2024-56058.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 916058182,
"name": "CVE-2024-56058",
"full_name": "RandomRobbieBF\/CVE-2024-56058",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56058",
"description": "VRPConnector <= 2.0.1 - Unauthenticated PHP Object Injection",
"fork": false,
"created_at": "2025-01-13T11:27:53Z",
"updated_at": "2025-01-14T12:39:13Z",
"pushed_at": "2025-01-13T11:30:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-56059.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 916073116,
"name": "CVE-2024-56059",
"full_name": "RandomRobbieBF\/CVE-2024-56059",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56059",
"description": "Partners <= 0.2.0 - Unauthenticated PHP Object Injection",
"fork": false,
"created_at": "2025-01-13T12:05:21Z",
"updated_at": "2025-01-14T12:38:58Z",
"pushed_at": "2025-01-13T12:05:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-56064.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 914434121,
"name": "CVE-2024-56064",
"full_name": "RandomRobbieBF\/CVE-2024-56064",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56064",
"description": "WP SuperBackup <= 2.3.3 - Unauthenticated Arbitrary File Upload",
"fork": false,
"created_at": "2025-01-09T15:35:39Z",
"updated_at": "2025-01-14T12:41:11Z",
"pushed_at": "2025-01-09T15:36:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-56067.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 914305639,
"name": "CVE-2024-56067",
"full_name": "RandomRobbieBF\/CVE-2024-56067",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56067",
"description": "WP SuperBackup <= 2.3.3 - Missing Authorization to Unauthenticated Back-Up File Download",
"fork": false,
"created_at": "2025-01-09T10:40:33Z",
"updated_at": "2025-01-14T12:41:21Z",
"pushed_at": "2025-01-09T10:42:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled", "description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
"fork": false, "fork": false,
"created_at": "2024-12-20T03:34:01Z", "created_at": "2024-12-20T03:34:01Z",
"updated_at": "2025-01-12T18:35:39Z", "updated_at": "2025-01-14T18:05:18Z",
"pushed_at": "2024-12-23T12:51:54Z", "pushed_at": "2024-12-23T12:51:54Z",
"stargazers_count": 37, "stargazers_count": 36,
"watchers_count": 37, "watchers_count": 36,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 37, "watchers": 36,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -19,13 +19,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 2,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -76,10 +76,10 @@
"description": "Proof of Concept Exploit for CVE-2024-9465", "description": "Proof of Concept Exploit for CVE-2024-9465",
"fork": false, "fork": false,
"created_at": "2024-12-03T12:16:44Z", "created_at": "2024-12-03T12:16:44Z",
"updated_at": "2025-01-13T18:16:00Z", "updated_at": "2025-01-14T18:04:05Z",
"pushed_at": "2024-12-03T12:21:35Z", "pushed_at": "2024-12-03T12:21:35Z",
"stargazers_count": 7, "stargazers_count": 6,
"watchers_count": 7, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 7, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -45,10 +45,10 @@
"description": "Safely detect if an Ivanti server is vulnerable to CVE-2025-0282", "description": "Safely detect if an Ivanti server is vulnerable to CVE-2025-0282",
"fork": false, "fork": false,
"created_at": "2025-01-09T18:43:08Z", "created_at": "2025-01-09T18:43:08Z",
"updated_at": "2025-01-13T22:15:51Z", "updated_at": "2025-01-14T14:23:44Z",
"pushed_at": "2025-01-10T21:27:47Z", "pushed_at": "2025-01-10T21:27:47Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 5, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
}, },
@ -107,10 +107,10 @@
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.", "description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
"fork": false, "fork": false,
"created_at": "2025-01-11T02:06:51Z", "created_at": "2025-01-11T02:06:51Z",
"updated_at": "2025-01-14T02:14:50Z", "updated_at": "2025-01-14T15:03:56Z",
"pushed_at": "2025-01-11T23:54:06Z", "pushed_at": "2025-01-11T23:54:06Z",
"stargazers_count": 27, "stargazers_count": 28,
"watchers_count": 27, "watchers_count": 28,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
@ -119,7 +119,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 27, "watchers": 28,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
}, },
@ -153,5 +153,36 @@
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
},
{
"id": 916614674,
"name": "pulse-meter",
"full_name": "rxwx\/pulse-meter",
"owner": {
"login": "rxwx",
"id": 2202542,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
"html_url": "https:\/\/github.com\/rxwx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rxwx\/pulse-meter",
"description": "Parses the System Snapshot from an Ivanti Connect Secure applicance to identify possible IOCs related to CVE-2023-46805, CVE-2024-21887 and CVE-2025-0282.",
"fork": false,
"created_at": "2025-01-14T12:54:19Z",
"updated_at": "2025-01-14T13:36:46Z",
"pushed_at": "2025-01-14T13:36:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

122
README.md
View file

@ -11,6 +11,7 @@
- [NyxanGoat/CVE-2025-0282-PoC](https://github.com/NyxanGoat/CVE-2025-0282-PoC) - [NyxanGoat/CVE-2025-0282-PoC](https://github.com/NyxanGoat/CVE-2025-0282-PoC)
- [absholi7ly/CVE-2025-0282-Ivanti-exploit](https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit) - [absholi7ly/CVE-2025-0282-Ivanti-exploit](https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit)
- [AnonStorks/CVE-2025-0282-Full-version](https://github.com/AnonStorks/CVE-2025-0282-Full-version) - [AnonStorks/CVE-2025-0282-Full-version](https://github.com/AnonStorks/CVE-2025-0282-Full-version)
- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter)
### CVE-2025-22352 (2025-01-07) ### CVE-2025-22352 (2025-01-07)
@ -866,6 +867,13 @@
- [alperenugurlu/CVE-2024-3596-Detector](https://github.com/alperenugurlu/CVE-2024-3596-Detector) - [alperenugurlu/CVE-2024-3596-Detector](https://github.com/alperenugurlu/CVE-2024-3596-Detector)
### CVE-2024-3605 (2024-06-20)
<code>The WP Hotel Booking plugin for WordPress is vulnerable to SQL Injection via the 'room_type' parameter of the /wphb/v1/rooms/search-rooms REST API endpoint in all versions up to, and including, 2.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
</code>
- [RandomRobbieBF/CVE-2024-3605](https://github.com/RandomRobbieBF/CVE-2024-3605)
### CVE-2024-3656 (2024-10-09) ### CVE-2024-3656 (2024-10-09)
<code>A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise. <code>A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.
@ -2231,6 +2239,13 @@
- [bevennyamande/CVE-2024-10557](https://github.com/bevennyamande/CVE-2024-10557) - [bevennyamande/CVE-2024-10557](https://github.com/bevennyamande/CVE-2024-10557)
### CVE-2024-10571 (2024-11-14)
<code>The Chartify WordPress Chart Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.9.5 via the 'source' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
</code>
- [RandomRobbieBF/CVE-2024-10571](https://github.com/RandomRobbieBF/CVE-2024-10571)
### CVE-2024-10586 (2024-11-09) ### CVE-2024-10586 (2024-11-09)
<code>The Debug Tool plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the dbt_pull_image() function and missing file type validation in all versions up to, and including, 2.2. This makes it possible for unauthenticated attackers to to create arbitrary files such as .php files that can be leveraged for remote code execution. <code>The Debug Tool plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the dbt_pull_image() function and missing file type validation in all versions up to, and including, 2.2. This makes it possible for unauthenticated attackers to to create arbitrary files such as .php files that can be leveraged for remote code execution.
@ -2412,6 +2427,13 @@
- [Piyush-Bhor/CVE-2024-11394](https://github.com/Piyush-Bhor/CVE-2024-11394) - [Piyush-Bhor/CVE-2024-11394](https://github.com/Piyush-Bhor/CVE-2024-11394)
### CVE-2024-11396 (2025-01-13)
<code>The Event Monster Event Management, Tickets Booking, Upcoming Event plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.4.3 via the Visitors List Export file. During the export, a CSV file is created in the wp-content folder with a hardcoded filename that is publicly accessible. This makes it possible for unauthenticated attackers to extract data about event visitors, that includes first and last names, email, and phone number.
</code>
- [RandomRobbieBF/CVE-2024-11396](https://github.com/RandomRobbieBF/CVE-2024-11396)
### CVE-2024-11412 (2024-11-21) ### CVE-2024-11412 (2024-11-21)
<code>The Shine PDF Embeder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'shinepdf' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. <code>The Shine PDF Embeder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'shinepdf' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
@ -2503,6 +2525,13 @@
- [McTavishSue/CVE-2024-12155](https://github.com/McTavishSue/CVE-2024-12155) - [McTavishSue/CVE-2024-12155](https://github.com/McTavishSue/CVE-2024-12155)
### CVE-2024-12157 (2025-01-07)
<code>The Popup MailChimp, GetResponse and ActiveCampaign Intergrations plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter of the 'upc_delete_db_record' AJAX action in all versions up to, and including, 3.2.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
</code>
- [RandomRobbieBF/CVE-2024-12157](https://github.com/RandomRobbieBF/CVE-2024-12157)
### CVE-2024-12172 (2024-12-12) ### CVE-2024-12172 (2024-12-12)
<code>The WP Courses LMS Online Courses Builder, eLearning Courses, Courses Solution, Education Courses plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpc_update_user_meta_option() function in all versions up to, and including, 3.2.21. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary user's metadata which can be levereged to block an administrator from accessing their site when wp_capabilities is set to 0. <code>The WP Courses LMS Online Courses Builder, eLearning Courses, Courses Solution, Education Courses plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpc_update_user_meta_option() function in all versions up to, and including, 3.2.21. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary user's metadata which can be levereged to block an administrator from accessing their site when wp_capabilities is set to 0.
@ -2518,6 +2547,13 @@
- [RandomRobbieBF/CVE-2024-12209](https://github.com/RandomRobbieBF/CVE-2024-12209) - [RandomRobbieBF/CVE-2024-12209](https://github.com/RandomRobbieBF/CVE-2024-12209)
- [Nxploited/CVE-2024-12209](https://github.com/Nxploited/CVE-2024-12209) - [Nxploited/CVE-2024-12209](https://github.com/Nxploited/CVE-2024-12209)
### CVE-2024-12252 (2025-01-07)
<code>The SEO LAT Auto Post plugin for WordPress is vulnerable to file overwrite due to a missing capability check on the remote_update AJAX action in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to overwrite the seo-beginner-auto-post.php file which can be leveraged to achieve remote code execution.
</code>
- [RandomRobbieBF/CVE-2024-12252](https://github.com/RandomRobbieBF/CVE-2024-12252)
### CVE-2024-12270 (2024-12-07) ### CVE-2024-12270 (2024-12-07)
<code>The Beautiful taxonomy filters plugin for WordPress is vulnerable to SQL Injection via the 'selects[0][term]' parameter in all versions up to, and including, 2.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. <code>The Beautiful taxonomy filters plugin for WordPress is vulnerable to SQL Injection via the 'selects[0][term]' parameter in all versions up to, and including, 2.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
@ -2528,6 +2564,13 @@
### CVE-2024-12345 ### CVE-2024-12345
- [RoyaRadin/CVE-2024-12345-POC](https://github.com/RoyaRadin/CVE-2024-12345-POC) - [RoyaRadin/CVE-2024-12345-POC](https://github.com/RoyaRadin/CVE-2024-12345-POC)
### CVE-2024-12404 (2025-01-11)
<code>The CF Internal Link Shortcode plugin for WordPress is vulnerable to SQL Injection via the 'post_title' parameter in all versions up to, and including, 1.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
</code>
- [RandomRobbieBF/CVE-2024-12404](https://github.com/RandomRobbieBF/CVE-2024-12404)
### CVE-2024-12471 (2025-01-07) ### CVE-2024-12471 (2025-01-07)
<code>The Post Saint: ChatGPT, GPT4, DALL-E, Stable Diffusion, Pexels, Dezgo AI Text &amp; Image Generator plugin for WordPress is vulnerable to arbitrary files uploads due to a missing capability check and file type validation on the add_image_to_library AJAX action function in all versions up to, and including, 1.3.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files that make remote code execution possible. <code>The Post Saint: ChatGPT, GPT4, DALL-E, Stable Diffusion, Pexels, Dezgo AI Text &amp; Image Generator plugin for WordPress is vulnerable to arbitrary files uploads due to a missing capability check and file type validation on the add_image_to_library AJAX action function in all versions up to, and including, 1.3.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files that make remote code execution possible.
@ -2542,6 +2585,13 @@
- [LiChaser/CVE-2024-12484](https://github.com/LiChaser/CVE-2024-12484) - [LiChaser/CVE-2024-12484](https://github.com/LiChaser/CVE-2024-12484)
### CVE-2024-12535 (2025-01-07)
<code>The Host PHP Info plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited.
</code>
- [RandomRobbieBF/CVE-2024-12535](https://github.com/RandomRobbieBF/CVE-2024-12535)
### CVE-2024-12542 (2025-01-09) ### CVE-2024-12542 (2025-01-09)
<code>The linkID plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 0.1.2. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited. <code>The linkID plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 0.1.2. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited.
@ -2957,6 +3007,7 @@
- [seajaysec/Ivanti-Connect-Around-Scan](https://github.com/seajaysec/Ivanti-Connect-Around-Scan) - [seajaysec/Ivanti-Connect-Around-Scan](https://github.com/seajaysec/Ivanti-Connect-Around-Scan)
- [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped) - [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped)
- [tucommenceapousser/CVE-2024-21887](https://github.com/tucommenceapousser/CVE-2024-21887) - [tucommenceapousser/CVE-2024-21887](https://github.com/tucommenceapousser/CVE-2024-21887)
- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter)
### CVE-2024-21893 (2024-01-31) ### CVE-2024-21893 (2024-01-31)
@ -5891,7 +5942,7 @@
- [ThemeHackers/CVE-2024-38063](https://github.com/ThemeHackers/CVE-2024-38063) - [ThemeHackers/CVE-2024-38063](https://github.com/ThemeHackers/CVE-2024-38063)
- [KernelKraze/CVE-2024-38063_PoC](https://github.com/KernelKraze/CVE-2024-38063_PoC) - [KernelKraze/CVE-2024-38063_PoC](https://github.com/KernelKraze/CVE-2024-38063_PoC)
- [ps-interactive/cve-2024-38063](https://github.com/ps-interactive/cve-2024-38063) - [ps-interactive/cve-2024-38063](https://github.com/ps-interactive/cve-2024-38063)
- [Brownpanda29/Cve-2024-38063](https://github.com/Brownpanda29/Cve-2024-38063) - [brownpanda29/Cve-2024-38063](https://github.com/brownpanda29/Cve-2024-38063)
- [FrancescoDiSalesGithub/quick-fix-cve-2024-38063](https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063) - [FrancescoDiSalesGithub/quick-fix-cve-2024-38063](https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063)
- [Faizan-Khanx/CVE-2024-38063](https://github.com/Faizan-Khanx/CVE-2024-38063) - [Faizan-Khanx/CVE-2024-38063](https://github.com/Faizan-Khanx/CVE-2024-38063)
- [ArenaldyP/CVE-2024-38063-Medium](https://github.com/ArenaldyP/CVE-2024-38063-Medium) - [ArenaldyP/CVE-2024-38063-Medium](https://github.com/ArenaldyP/CVE-2024-38063-Medium)
@ -7441,6 +7492,9 @@
- [RandomRobbieBF/CVE-2024-49681](https://github.com/RandomRobbieBF/CVE-2024-49681) - [RandomRobbieBF/CVE-2024-49681](https://github.com/RandomRobbieBF/CVE-2024-49681)
### CVE-2024-49699
- [RandomRobbieBF/CVE-2024-49699](https://github.com/RandomRobbieBF/CVE-2024-49699)
### CVE-2024-50251 (2024-11-09) ### CVE-2024-50251 (2024-11-09)
<code>In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_payload: sanitize offset and length before calling skb_checksum()\n\nIf access to offset + length is larger than the skbuff length, then\nskb_checksum() triggers BUG_ON().\n\nskb_checksum() internally subtracts the length parameter while iterating\nover skbuff, BUG_ON(len) at the end of it checks that the expected\nlength to be included in the checksum calculation is fully consumed. <code>In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_payload: sanitize offset and length before calling skb_checksum()\n\nIf access to offset + length is larger than the skbuff length, then\nskb_checksum() triggers BUG_ON().\n\nskb_checksum() internally subtracts the length parameter while iterating\nover skbuff, BUG_ON(len) at the end of it checks that the expected\nlength to be included in the checksum calculation is fully consumed.
@ -7577,6 +7631,13 @@
- [RandomRobbieBF/CVE-2024-50490](https://github.com/RandomRobbieBF/CVE-2024-50490) - [RandomRobbieBF/CVE-2024-50490](https://github.com/RandomRobbieBF/CVE-2024-50490)
### CVE-2024-50491 (2024-10-28)
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Micah Blu RSVP ME allows SQL Injection.This issue affects RSVP ME: from n/a through 1.9.9.
</code>
- [RandomRobbieBF/CVE-2024-50491](https://github.com/RandomRobbieBF/CVE-2024-50491)
### CVE-2024-50493 (2024-10-29) ### CVE-2024-50493 (2024-10-29)
<code>Unrestricted Upload of File with Dangerous Type vulnerability in masterhomepage Automatic Translation allows Upload a Web Shell to a Web Server.This issue affects Automatic Translation: from n/a through 1.0.4. <code>Unrestricted Upload of File with Dangerous Type vulnerability in masterhomepage Automatic Translation allows Upload a Web Shell to a Web Server.This issue affects Automatic Translation: from n/a through 1.0.4.
@ -7845,6 +7906,9 @@
- [l20170217b/CVE-2024-51747](https://github.com/l20170217b/CVE-2024-51747) - [l20170217b/CVE-2024-51747](https://github.com/l20170217b/CVE-2024-51747)
### CVE-2024-51818
- [RandomRobbieBF/CVE-2024-51818](https://github.com/RandomRobbieBF/CVE-2024-51818)
### CVE-2024-52002 (2024-11-08) ### CVE-2024-52002 (2024-11-08)
<code>Combodo iTop is a simple, web based IT Service Management tool. Several url endpoints are subject to a Cross-Site Request Forgery (CSRF) vulnerability. Please refer to the linked GHSA for the complete list. This issue has been addressed in version 3.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. <code>Combodo iTop is a simple, web based IT Service Management tool. Several url endpoints are subject to a Cross-Site Request Forgery (CSRF) vulnerability. Please refer to the linked GHSA for the complete list. This issue has been addressed in version 3.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
@ -8049,6 +8113,13 @@
- [RandomRobbieBF/CVE-2024-54262](https://github.com/RandomRobbieBF/CVE-2024-54262) - [RandomRobbieBF/CVE-2024-54262](https://github.com/RandomRobbieBF/CVE-2024-54262)
### CVE-2024-54292 (2024-12-13)
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Appsplate Appsplate allows SQL Injection.This issue affects Appsplate: from n/a through 2.1.3.
</code>
- [RandomRobbieBF/CVE-2024-54292](https://github.com/RandomRobbieBF/CVE-2024-54292)
### CVE-2024-54330 (2024-12-13) ### CVE-2024-54330 (2024-12-13)
<code>Server-Side Request Forgery (SSRF) vulnerability in Hep Hep Hurra (HHH) Hurrakify allows Server Side Request Forgery.This issue affects Hurrakify: from n/a through 2.4. <code>Server-Side Request Forgery (SSRF) vulnerability in Hep Hep Hurra (HHH) Hurrakify allows Server Side Request Forgery.This issue affects Hurrakify: from n/a through 2.4.
@ -8220,6 +8291,34 @@
- [RandomRobbieBF/CVE-2024-55988](https://github.com/RandomRobbieBF/CVE-2024-55988) - [RandomRobbieBF/CVE-2024-55988](https://github.com/RandomRobbieBF/CVE-2024-55988)
### CVE-2024-56058 (2024-12-18)
<code>Deserialization of Untrusted Data vulnerability in Gueststream VRPConnector allows Object Injection.This issue affects VRPConnector: from n/a through 2.0.1.
</code>
- [RandomRobbieBF/CVE-2024-56058](https://github.com/RandomRobbieBF/CVE-2024-56058)
### CVE-2024-56059 (2024-12-18)
<code>Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability in Mighty Digital Partners allows Object Injection.This issue affects Partners: from n/a through 0.2.0.
</code>
- [RandomRobbieBF/CVE-2024-56059](https://github.com/RandomRobbieBF/CVE-2024-56059)
### CVE-2024-56064 (2024-12-31)
<code>Unrestricted Upload of File with Dangerous Type vulnerability in Azzaroco WP SuperBackup allows Upload a Web Shell to a Web Server.This issue affects WP SuperBackup: from n/a through 2.3.3.
</code>
- [RandomRobbieBF/CVE-2024-56064](https://github.com/RandomRobbieBF/CVE-2024-56064)
### CVE-2024-56067 (2024-12-31)
<code>Missing Authorization vulnerability in Azzaroco WP SuperBackup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP SuperBackup: from n/a through 2.3.3.
</code>
- [RandomRobbieBF/CVE-2024-56067](https://github.com/RandomRobbieBF/CVE-2024-56067)
### CVE-2024-56115 (2024-12-18) ### CVE-2024-56115 (2024-12-18)
<code>A vulnerability in Amiro.CMS before 7.8.4 exists due to the failure to take measures to neutralize special elements. It allows remote attackers to conduct a Cross-Site Scripting (XSS) attack. <code>A vulnerability in Amiro.CMS before 7.8.4 exists due to the failure to take measures to neutralize special elements. It allows remote attackers to conduct a Cross-Site Scripting (XSS) attack.
@ -12520,6 +12619,13 @@
- [Tris0n/CVE-2023-32571-POC](https://github.com/Tris0n/CVE-2023-32571-POC) - [Tris0n/CVE-2023-32571-POC](https://github.com/Tris0n/CVE-2023-32571-POC)
- [vert16x/CVE-2023-32571-POC](https://github.com/vert16x/CVE-2023-32571-POC) - [vert16x/CVE-2023-32571-POC](https://github.com/vert16x/CVE-2023-32571-POC)
### CVE-2023-32590 (2023-12-20)
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Daniel Söderström / Sidney van de Stouwe Subscribe to Category.This issue affects Subscribe to Category: from n/a through 2.7.4.\n\n
</code>
- [RandomRobbieBF/CVE-2023-32590](https://github.com/RandomRobbieBF/CVE-2023-32590)
### CVE-2023-32629 (2023-07-26) ### CVE-2023-32629 (2023-07-26)
<code>Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels <code>Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels
@ -15733,6 +15839,7 @@
- [Chocapikk/CVE-2023-46805](https://github.com/Chocapikk/CVE-2023-46805) - [Chocapikk/CVE-2023-46805](https://github.com/Chocapikk/CVE-2023-46805)
- [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped) - [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped)
- [w2xim3/CVE-2023-46805](https://github.com/w2xim3/CVE-2023-46805) - [w2xim3/CVE-2023-46805](https://github.com/w2xim3/CVE-2023-46805)
- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter)
### CVE-2023-46813 (2023-10-27) ### CVE-2023-46813 (2023-10-27)
@ -29737,7 +29844,6 @@
- [TotallyNotAHaxxer/f-for-java](https://github.com/TotallyNotAHaxxer/f-for-java) - [TotallyNotAHaxxer/f-for-java](https://github.com/TotallyNotAHaxxer/f-for-java)
- [spasam/log4j2-exploit](https://github.com/spasam/log4j2-exploit) - [spasam/log4j2-exploit](https://github.com/spasam/log4j2-exploit)
- [bumheehan/cve-2021-44228-log4j-test](https://github.com/bumheehan/cve-2021-44228-log4j-test) - [bumheehan/cve-2021-44228-log4j-test](https://github.com/bumheehan/cve-2021-44228-log4j-test)
- [cergo123/log4j-dork-scanner](https://github.com/cergo123/log4j-dork-scanner)
- [dmitsuo/log4shell-war-fixer](https://github.com/dmitsuo/log4shell-war-fixer) - [dmitsuo/log4shell-war-fixer](https://github.com/dmitsuo/log4shell-war-fixer)
- [Y0-kan/Log4jShell-Scan](https://github.com/Y0-kan/Log4jShell-Scan) - [Y0-kan/Log4jShell-Scan](https://github.com/Y0-kan/Log4jShell-Scan)
- [julian911015/Log4j-Scanner-Exploit](https://github.com/julian911015/Log4j-Scanner-Exploit) - [julian911015/Log4j-Scanner-Exploit](https://github.com/julian911015/Log4j-Scanner-Exploit)
@ -37766,7 +37872,6 @@
- [dinesh876/CVE-2019-11447-POC](https://github.com/dinesh876/CVE-2019-11447-POC) - [dinesh876/CVE-2019-11447-POC](https://github.com/dinesh876/CVE-2019-11447-POC)
- [ColdFusionX/CVE-2019-11447_CuteNews-AvatarUploadRCE](https://github.com/ColdFusionX/CVE-2019-11447_CuteNews-AvatarUploadRCE) - [ColdFusionX/CVE-2019-11447_CuteNews-AvatarUploadRCE](https://github.com/ColdFusionX/CVE-2019-11447_CuteNews-AvatarUploadRCE)
- [thewhiteh4t/cve-2019-11447](https://github.com/thewhiteh4t/cve-2019-11447) - [thewhiteh4t/cve-2019-11447](https://github.com/thewhiteh4t/cve-2019-11447)
- [banomaly/CVE-2019-11447](https://github.com/banomaly/CVE-2019-11447)
- [substing/CVE-2019-11447_reverse_shell_upload](https://github.com/substing/CVE-2019-11447_reverse_shell_upload) - [substing/CVE-2019-11447_reverse_shell_upload](https://github.com/substing/CVE-2019-11447_reverse_shell_upload)
- [CRFSlick/CVE-2019-11447-POC](https://github.com/CRFSlick/CVE-2019-11447-POC) - [CRFSlick/CVE-2019-11447-POC](https://github.com/CRFSlick/CVE-2019-11447-POC)
- [ojo5/CVE-2019-11447.c](https://github.com/ojo5/CVE-2019-11447.c) - [ojo5/CVE-2019-11447.c](https://github.com/ojo5/CVE-2019-11447.c)
@ -38837,9 +38942,8 @@
- [hg8/CVE-2019-16113-PoC](https://github.com/hg8/CVE-2019-16113-PoC) - [hg8/CVE-2019-16113-PoC](https://github.com/hg8/CVE-2019-16113-PoC)
- [Kenun99/CVE-2019-16113-Dockerfile](https://github.com/Kenun99/CVE-2019-16113-Dockerfile) - [Kenun99/CVE-2019-16113-Dockerfile](https://github.com/Kenun99/CVE-2019-16113-Dockerfile)
- [dldygnl/CVE-2019-16113](https://github.com/dldygnl/CVE-2019-16113) - [dldygnl/CVE-2019-16113](https://github.com/dldygnl/CVE-2019-16113)
- [banomaly/CVE-2019-16113](https://github.com/banomaly/CVE-2019-16113) - [m4rm0k/CVE-2019-16113](https://github.com/m4rm0k/CVE-2019-16113)
- [DXY0411/CVE-2019-16113](https://github.com/DXY0411/CVE-2019-16113) - [DXY0411/CVE-2019-16113](https://github.com/DXY0411/CVE-2019-16113)
- [banomaly/CVE-2019-16113_](https://github.com/banomaly/CVE-2019-16113_)
- [mind2hex/CVE-2019-16113](https://github.com/mind2hex/CVE-2019-16113) - [mind2hex/CVE-2019-16113](https://github.com/mind2hex/CVE-2019-16113)
- [tronghoang89/cve-2019-16113](https://github.com/tronghoang89/cve-2019-16113) - [tronghoang89/cve-2019-16113](https://github.com/tronghoang89/cve-2019-16113)
@ -41012,7 +41116,6 @@
- [0xAJ2K/CVE-2018-7600](https://github.com/0xAJ2K/CVE-2018-7600) - [0xAJ2K/CVE-2018-7600](https://github.com/0xAJ2K/CVE-2018-7600)
- [rafaelcaria/drupalgeddon2-CVE-2018-7600](https://github.com/rafaelcaria/drupalgeddon2-CVE-2018-7600) - [rafaelcaria/drupalgeddon2-CVE-2018-7600](https://github.com/rafaelcaria/drupalgeddon2-CVE-2018-7600)
- [vphnguyen/ANM_CVE-2018-7600](https://github.com/vphnguyen/ANM_CVE-2018-7600) - [vphnguyen/ANM_CVE-2018-7600](https://github.com/vphnguyen/ANM_CVE-2018-7600)
- [banomaly/CVE-2018-7600](https://github.com/banomaly/CVE-2018-7600)
- [anldori/CVE-2018-7600](https://github.com/anldori/CVE-2018-7600) - [anldori/CVE-2018-7600](https://github.com/anldori/CVE-2018-7600)
- [r0lh/CVE-2018-7600](https://github.com/r0lh/CVE-2018-7600) - [r0lh/CVE-2018-7600](https://github.com/r0lh/CVE-2018-7600)
- [killeveee/CVE-2018-7600](https://github.com/killeveee/CVE-2018-7600) - [killeveee/CVE-2018-7600](https://github.com/killeveee/CVE-2018-7600)
@ -43869,7 +43972,6 @@
- [testpilot031/vulnerability_struts-2.3.31](https://github.com/testpilot031/vulnerability_struts-2.3.31) - [testpilot031/vulnerability_struts-2.3.31](https://github.com/testpilot031/vulnerability_struts-2.3.31)
- [readloud/CVE-2017-5638](https://github.com/readloud/CVE-2017-5638) - [readloud/CVE-2017-5638](https://github.com/readloud/CVE-2017-5638)
- [Tankirat/CVE-2017-5638](https://github.com/Tankirat/CVE-2017-5638) - [Tankirat/CVE-2017-5638](https://github.com/Tankirat/CVE-2017-5638)
- [banomaly/CVE-2017-5638](https://github.com/banomaly/CVE-2017-5638)
- [mfdev-solution/Exploit-CVE-2017-5638](https://github.com/mfdev-solution/Exploit-CVE-2017-5638) - [mfdev-solution/Exploit-CVE-2017-5638](https://github.com/mfdev-solution/Exploit-CVE-2017-5638)
- [mritunjay-k/CVE-2017-5638](https://github.com/mritunjay-k/CVE-2017-5638) - [mritunjay-k/CVE-2017-5638](https://github.com/mritunjay-k/CVE-2017-5638)
- [FredBrave/CVE-2017-5638-ApacheStruts2.3.5](https://github.com/FredBrave/CVE-2017-5638-ApacheStruts2.3.5) - [FredBrave/CVE-2017-5638-ApacheStruts2.3.5](https://github.com/FredBrave/CVE-2017-5638-ApacheStruts2.3.5)
@ -47701,7 +47803,6 @@
</code> </code>
- [dix0nym/CVE-2015-6967](https://github.com/dix0nym/CVE-2015-6967) - [dix0nym/CVE-2015-6967](https://github.com/dix0nym/CVE-2015-6967)
- [banomaly/CVE-2015-6967](https://github.com/banomaly/CVE-2015-6967)
- [FredBrave/CVE-2015-6967](https://github.com/FredBrave/CVE-2015-6967) - [FredBrave/CVE-2015-6967](https://github.com/FredBrave/CVE-2015-6967)
- [3mpir3Albert/HTB_Nibbles](https://github.com/3mpir3Albert/HTB_Nibbles) - [3mpir3Albert/HTB_Nibbles](https://github.com/3mpir3Albert/HTB_Nibbles)
@ -48534,7 +48635,6 @@
- [b4keSn4ke/CVE-2014-6271](https://github.com/b4keSn4ke/CVE-2014-6271) - [b4keSn4ke/CVE-2014-6271](https://github.com/b4keSn4ke/CVE-2014-6271)
- [hadrian3689/shellshock](https://github.com/hadrian3689/shellshock) - [hadrian3689/shellshock](https://github.com/hadrian3689/shellshock)
- [akr3ch/CVE-2014-6271](https://github.com/akr3ch/CVE-2014-6271) - [akr3ch/CVE-2014-6271](https://github.com/akr3ch/CVE-2014-6271)
- [banomaly/CVE-2014-6271](https://github.com/banomaly/CVE-2014-6271)
- [Gurguii/cgi-bin-shellshock](https://github.com/Gurguii/cgi-bin-shellshock) - [Gurguii/cgi-bin-shellshock](https://github.com/Gurguii/cgi-bin-shellshock)
- [anujbhan/shellshock-victim-host](https://github.com/anujbhan/shellshock-victim-host) - [anujbhan/shellshock-victim-host](https://github.com/anujbhan/shellshock-victim-host)
- [FilipStudeny/-CVE-2014-6271-Shellshock-Remote-Command-Injection-](https://github.com/FilipStudeny/-CVE-2014-6271-Shellshock-Remote-Command-Injection-) - [FilipStudeny/-CVE-2014-6271-Shellshock-Remote-Command-Injection-](https://github.com/FilipStudeny/-CVE-2014-6271-Shellshock-Remote-Command-Injection-)
@ -49409,7 +49509,6 @@
</code> </code>
- [bitc0de/Elastix-Remote-Code-Execution](https://github.com/bitc0de/Elastix-Remote-Code-Execution) - [bitc0de/Elastix-Remote-Code-Execution](https://github.com/bitc0de/Elastix-Remote-Code-Execution)
- [banomaly/CVE-2012-4869](https://github.com/banomaly/CVE-2012-4869)
### CVE-2012-4929 (2012-09-15) ### CVE-2012-4929 (2012-09-15)
@ -49981,7 +50080,6 @@
- [zaphoxx/zaphoxx-coldfusion](https://github.com/zaphoxx/zaphoxx-coldfusion) - [zaphoxx/zaphoxx-coldfusion](https://github.com/zaphoxx/zaphoxx-coldfusion)
- [n3rdh4x0r/CVE-2009-2265](https://github.com/n3rdh4x0r/CVE-2009-2265) - [n3rdh4x0r/CVE-2009-2265](https://github.com/n3rdh4x0r/CVE-2009-2265)
- [p1ckzi/CVE-2009-2265](https://github.com/p1ckzi/CVE-2009-2265) - [p1ckzi/CVE-2009-2265](https://github.com/p1ckzi/CVE-2009-2265)
- [banomaly/CVE-2009-2265](https://github.com/banomaly/CVE-2009-2265)
- [0xDTC/Adobe-ColdFusion-8-RCE-CVE-2009-2265](https://github.com/0xDTC/Adobe-ColdFusion-8-RCE-CVE-2009-2265) - [0xDTC/Adobe-ColdFusion-8-RCE-CVE-2009-2265](https://github.com/0xDTC/Adobe-ColdFusion-8-RCE-CVE-2009-2265)
### CVE-2009-2692 (2009-08-14) ### CVE-2009-2692 (2009-08-14)
@ -50266,7 +50364,6 @@
- [3t4n/samba-3.0.24-CVE-2007-2447-vunerable-](https://github.com/3t4n/samba-3.0.24-CVE-2007-2447-vunerable-) - [3t4n/samba-3.0.24-CVE-2007-2447-vunerable-](https://github.com/3t4n/samba-3.0.24-CVE-2007-2447-vunerable-)
- [xbufu/CVE-2007-2447](https://github.com/xbufu/CVE-2007-2447) - [xbufu/CVE-2007-2447](https://github.com/xbufu/CVE-2007-2447)
- [s4msec/CVE-2007-2447](https://github.com/s4msec/CVE-2007-2447) - [s4msec/CVE-2007-2447](https://github.com/s4msec/CVE-2007-2447)
- [banomaly/CVE-2007-2447](https://github.com/banomaly/CVE-2007-2447)
- [Nosferatuvjr/Samba-Usermap-exploit](https://github.com/Nosferatuvjr/Samba-Usermap-exploit) - [Nosferatuvjr/Samba-Usermap-exploit](https://github.com/Nosferatuvjr/Samba-Usermap-exploit)
- [testaross4/CVE-2007-2447](https://github.com/testaross4/CVE-2007-2447) - [testaross4/CVE-2007-2447](https://github.com/testaross4/CVE-2007-2447)
- [mr-l0n3lly/CVE-2007-2447](https://github.com/mr-l0n3lly/CVE-2007-2447) - [mr-l0n3lly/CVE-2007-2447](https://github.com/mr-l0n3lly/CVE-2007-2447)
@ -50279,6 +50376,7 @@
- [ShivamDey/Samba-CVE-2007-2447-Exploit](https://github.com/ShivamDey/Samba-CVE-2007-2447-Exploit) - [ShivamDey/Samba-CVE-2007-2447-Exploit](https://github.com/ShivamDey/Samba-CVE-2007-2447-Exploit)
- [Juantos/cve-2007-2447](https://github.com/Juantos/cve-2007-2447) - [Juantos/cve-2007-2447](https://github.com/Juantos/cve-2007-2447)
- [IamLucif3r/CVE-2007-2447-Exploit](https://github.com/IamLucif3r/CVE-2007-2447-Exploit) - [IamLucif3r/CVE-2007-2447-Exploit](https://github.com/IamLucif3r/CVE-2007-2447-Exploit)
- [foudadev/CVE-2007-2447](https://github.com/foudadev/CVE-2007-2447)
### CVE-2007-3280 (2007-06-19) ### CVE-2007-3280 (2007-06-19)