Auto Update 2024/12/26 12:32:05

This commit is contained in:
motikan2010-bot 2024-12-26 21:32:05 +09:00
parent 65e6b93ee1
commit d19f91d5f8
30 changed files with 171 additions and 139 deletions

View file

@ -14,10 +14,10 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2024-12-06T09:40:30Z",
"updated_at": "2024-12-26T06:26:35Z",
"pushed_at": "2024-05-03T22:24:07Z",
"stargazers_count": 187,
"watchers_count": 187,
"stargazers_count": 186,
"watchers_count": 186,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 187,
"watchers": 186,
"score": 0,
"subscribers_count": 8
}

View file

@ -272,10 +272,10 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2024-12-18T13:41:48Z",
"updated_at": "2024-12-26T06:35:52Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 317,
"watchers_count": 317,
"stargazers_count": 318,
"watchers_count": 318,
"has_discussions": false,
"forks_count": 120,
"allow_forking": true,
@ -288,7 +288,7 @@
],
"visibility": "public",
"forks": 120,
"watchers": 317,
"watchers": 318,
"score": 0,
"subscribers_count": 16
},
@ -462,10 +462,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-12-12T05:15:53Z",
"updated_at": "2024-12-26T06:36:05Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 866,
"watchers_count": 866,
"stargazers_count": 867,
"watchers_count": 867,
"has_discussions": false,
"forks_count": 426,
"allow_forking": true,
@ -478,7 +478,7 @@
],
"visibility": "public",
"forks": 426,
"watchers": 866,
"watchers": 867,
"score": 0,
"subscribers_count": 9
},

View file

@ -1041,5 +1041,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 908465504,
"name": "Malware-Analysis-CVE-2017-11882",
"full_name": "yaseenibnakhtar\/Malware-Analysis-CVE-2017-11882",
"owner": {
"login": "yaseenibnakhtar",
"id": 167536932,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167536932?v=4",
"html_url": "https:\/\/github.com\/yaseenibnakhtar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yaseenibnakhtar\/Malware-Analysis-CVE-2017-11882",
"description": "Malware Analysis CVE-2017-11882",
"fork": false,
"created_at": "2024-12-26T06:23:27Z",
"updated_at": "2024-12-26T06:24:35Z",
"pushed_at": "2024-12-26T06:24:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-26T03:18:18Z",
"updated_at": "2024-12-26T10:35:31Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4146,
"watchers_count": 4146,
"stargazers_count": 4147,
"watchers_count": 4147,
"has_discussions": false,
"forks_count": 1099,
"allow_forking": true,
@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1099,
"watchers": 4146,
"watchers": 4147,
"score": 0,
"subscribers_count": 149
},

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-26T03:18:18Z",
"updated_at": "2024-12-26T10:35:31Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4146,
"watchers_count": 4146,
"stargazers_count": 4147,
"watchers_count": 4147,
"has_discussions": false,
"forks_count": 1099,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1099,
"watchers": 4146,
"watchers": 4147,
"score": 0,
"subscribers_count": 149
},

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-26T06:14:49Z",
"updated_at": "2024-12-26T08:17:55Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1351,
"watchers_count": 1351,
"stargazers_count": 1353,
"watchers_count": 1353,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1351,
"watchers": 1353,
"score": 0,
"subscribers_count": 15
}

View file

@ -293,10 +293,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-18T08:18:50Z",
"updated_at": "2024-12-03T11:47:16Z",
"updated_at": "2024-12-26T06:35:37Z",
"pushed_at": "2021-12-22T10:32:37Z",
"stargazers_count": 190,
"watchers_count": 190,
"stargazers_count": 191,
"watchers_count": 191,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -305,7 +305,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 190,
"watchers": 191,
"score": 0,
"subscribers_count": 5
},

View file

@ -215,5 +215,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 908543261,
"name": "Rocket-Chat-3.12.1-PoC-CVE-2021-22911-",
"full_name": "yoohhuu\/Rocket-Chat-3.12.1-PoC-CVE-2021-22911-",
"owner": {
"login": "yoohhuu",
"id": 155578268,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155578268?v=4",
"html_url": "https:\/\/github.com\/yoohhuu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yoohhuu\/Rocket-Chat-3.12.1-PoC-CVE-2021-22911-",
"description": null,
"fork": false,
"created_at": "2024-12-26T10:27:51Z",
"updated_at": "2024-12-26T10:56:24Z",
"pushed_at": "2024-12-26T10:56:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.",
"fork": false,
"created_at": "2021-11-28T13:12:38Z",
"updated_at": "2024-10-03T05:15:56Z",
"updated_at": "2024-12-26T06:26:36Z",
"pushed_at": "2021-12-05T16:54:16Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 29,
"watchers": 28,
"score": 0,
"subscribers_count": 2
}

View file

@ -2232,37 +2232,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 447314257,
"name": "CVE-2021-41773-exploiter",
"full_name": "norrig\/CVE-2021-41773-exploiter",
"owner": {
"login": "norrig",
"id": 5526261,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4",
"html_url": "https:\/\/github.com\/norrig",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter",
"description": "School project - Please use other repos for actual testing",
"fork": false,
"created_at": "2022-01-12T17:42:36Z",
"updated_at": "2022-01-12T18:26:57Z",
"pushed_at": "2022-01-13T16:18:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 452242021,
"name": "CVE-2021-41773-exercise",

View file

@ -1307,10 +1307,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-12-24T22:24:43Z",
"updated_at": "2024-12-26T10:20:43Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 806,
"watchers_count": 806,
"stargazers_count": 807,
"watchers_count": 807,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -1324,7 +1324,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 806,
"watchers": 807,
"score": 0,
"subscribers_count": 11
},

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-26T06:14:49Z",
"updated_at": "2024-12-26T08:17:55Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1351,
"watchers_count": 1351,
"stargazers_count": 1353,
"watchers_count": 1353,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1351,
"watchers": 1353,
"score": 0,
"subscribers_count": 15
}

View file

@ -2099,10 +2099,10 @@
"description": "CVE-2022-22965\\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具基于JavaFx开发图形化操作更简单提高效率。",
"fork": false,
"created_at": "2022-12-28T04:50:16Z",
"updated_at": "2024-12-22T06:16:30Z",
"updated_at": "2024-12-26T10:42:15Z",
"pushed_at": "2023-11-14T03:08:10Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -2111,7 +2111,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 100,
"watchers": 101,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2024-12-16T14:15:56Z",
"updated_at": "2024-12-26T08:40:19Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 427,
"watchers_count": 427,
"stargazers_count": 428,
"watchers_count": 428,
"has_discussions": false,
"forks_count": 83,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 427,
"watchers": 428,
"score": 0,
"subscribers_count": 6
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 11,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 10,
"watchers": 72,
"score": 0,
"subscribers_count": 4

View file

@ -14,7 +14,7 @@
"description": "CVE-2022-46463(Harbor 未授权)",
"fork": false,
"created_at": "2023-01-17T14:58:14Z",
"updated_at": "2024-10-23T10:06:01Z",
"updated_at": "2024-12-26T07:35:14Z",
"pushed_at": "2023-01-19T12:47:21Z",
"stargazers_count": 24,
"watchers_count": 24,

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-21554 Windows MessageQueuing PoC分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
"fork": false,
"created_at": "2023-05-18T10:30:49Z",
"updated_at": "2024-12-26T02:20:05Z",
"updated_at": "2024-12-26T10:57:27Z",
"pushed_at": "2023-05-18T10:38:57Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 2
},

View file

@ -179,19 +179,19 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2024-10-28T18:14:31Z",
"updated_at": "2024-12-26T11:47:54Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 340,
"watchers_count": 340,
"stargazers_count": 341,
"watchers_count": 341,
"has_discussions": false,
"forks_count": 63,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 340,
"forks": 64,
"watchers": 341,
"score": 0,
"subscribers_count": 5
},

View file

@ -76,10 +76,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-23T12:07:40Z",
"updated_at": "2024-11-15T16:48:23Z",
"updated_at": "2024-12-26T11:49:29Z",
"pushed_at": "2023-08-23T16:46:53Z",
"stargazers_count": 235,
"watchers_count": 235,
"stargazers_count": 236,
"watchers_count": 236,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 235,
"watchers": 236,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "[漏洞复现] 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
"fork": false,
"created_at": "2023-11-17T10:32:31Z",
"updated_at": "2024-12-19T09:49:49Z",
"updated_at": "2024-12-26T07:07:35Z",
"pushed_at": "2023-11-21T10:45:58Z",
"stargazers_count": 204,
"watchers_count": 204,
"stargazers_count": 205,
"watchers_count": 205,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 34,
"watchers": 204,
"watchers": 205,
"score": 0,
"subscribers_count": 3
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 225,
"watchers_count": 225,
"has_discussions": false,
"forks_count": 50,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 50,
"forks": 49,
"watchers": 225,
"score": 0,
"subscribers_count": 6
@ -146,10 +146,10 @@
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
"fork": false,
"created_at": "2023-10-13T23:55:32Z",
"updated_at": "2024-12-01T00:52:26Z",
"updated_at": "2024-12-26T11:20:04Z",
"pushed_at": "2023-10-30T20:22:37Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -158,7 +158,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 62,
"watchers": 63,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "Proof of concept for CVE-2023-45819",
"fork": false,
"created_at": "2024-12-17T15:19:33Z",
"updated_at": "2024-12-17T18:46:35Z",
"updated_at": "2024-12-26T10:08:48Z",
"pushed_at": "2024-12-17T15:26:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,7 +14,7 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-26T03:33:10Z",
"updated_at": "2024-12-26T11:15:44Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1312,
"watchers_count": 1312,

View file

@ -107,10 +107,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2024-12-24T15:17:30Z",
"updated_at": "2024-12-26T09:48:29Z",
"pushed_at": "2024-09-08T21:23:34Z",
"stargazers_count": 430,
"watchers_count": 430,
"stargazers_count": 431,
"watchers_count": 431,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 430,
"watchers": 431,
"score": 0,
"subscribers_count": 21
},

View file

@ -952,10 +952,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-12-26T06:26:44Z",
"updated_at": "2024-12-26T09:55:22Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3499,
"watchers_count": 3499,
"stargazers_count": 3500,
"watchers_count": 3500,
"has_discussions": false,
"forks_count": 240,
"allow_forking": true,
@ -964,7 +964,7 @@
"topics": [],
"visibility": "public",
"forks": 240,
"watchers": 3499,
"watchers": 3500,
"score": 0,
"subscribers_count": 38
},

View file

@ -451,7 +451,7 @@
"description": "This is a C language program designed to test the Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.",
"fork": false,
"created_at": "2024-09-01T09:20:02Z",
"updated_at": "2024-12-14T11:26:03Z",
"updated_at": "2024-12-26T09:45:42Z",
"pushed_at": "2024-09-08T07:12:26Z",
"stargazers_count": 5,
"watchers_count": 5,

View file

@ -14,19 +14,19 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-22T22:50:00Z",
"updated_at": "2024-12-26T12:29:10Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 99,
"forks": 22,
"watchers": 100,
"score": 0,
"subscribers_count": 1
},

View file

@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
"updated_at": "2024-12-26T03:14:09Z",
"updated_at": "2024-12-26T07:32:26Z",
"pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 38,
"watchers": 41,
"score": 0,
"subscribers_count": 3
},
@ -262,8 +262,8 @@
"description": "CVE-2024-50379-exp",
"fork": false,
"created_at": "2024-12-25T02:41:31Z",
"updated_at": "2024-12-26T06:28:50Z",
"pushed_at": "2024-12-26T06:28:46Z",
"updated_at": "2024-12-26T08:52:18Z",
"pushed_at": "2024-12-26T08:52:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -324,8 +324,8 @@
"description": "Testing the latset Apache Tomcat CVE-2024-50379 Vuln",
"fork": false,
"created_at": "2024-12-25T21:50:16Z",
"updated_at": "2024-12-25T21:51:40Z",
"pushed_at": "2024-12-25T21:51:37Z",
"updated_at": "2024-12-26T10:31:55Z",
"pushed_at": "2024-12-26T10:31:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-26T01:46:25Z",
"updated_at": "2024-12-26T06:46:12Z",
"pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 72,
"watchers": 73,
"score": 0,
"subscribers_count": 3
},

View file

@ -24983,6 +24983,7 @@
- [MrDottt/CVE-2021-22911](https://github.com/MrDottt/CVE-2021-22911)
- [overgrowncarrot1/CVE-2021-22911](https://github.com/overgrowncarrot1/CVE-2021-22911)
- [Weisant/CVE-2021-22911-EXP](https://github.com/Weisant/CVE-2021-22911-EXP)
- [yoohhuu/Rocket-Chat-3.12.1-PoC-CVE-2021-22911-](https://github.com/yoohhuu/Rocket-Chat-3.12.1-PoC-CVE-2021-22911-)
### CVE-2021-22924 (2021-08-05)
@ -28019,7 +28020,6 @@
- [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773)
- [xMohamed0/CVE-2021-41773](https://github.com/xMohamed0/CVE-2021-41773)
- [i6c/MASS_CVE-2021-41773](https://github.com/i6c/MASS_CVE-2021-41773)
- [norrig/CVE-2021-41773-exploiter](https://github.com/norrig/CVE-2021-41773-exploiter)
- [m96dg/CVE-2021-41773-exercise](https://github.com/m96dg/CVE-2021-41773-exercise)
- [skentagon/CVE-2021-41773](https://github.com/skentagon/CVE-2021-41773)
- [mauricelambert/CVE-2021-41773](https://github.com/mauricelambert/CVE-2021-41773)
@ -44248,6 +44248,7 @@
- [n18dcat053-luuvannga/DetectPacket-CVE-2017-11882](https://github.com/n18dcat053-luuvannga/DetectPacket-CVE-2017-11882)
- [nhuynhuy/cve-2017-11882](https://github.com/nhuynhuy/cve-2017-11882)
- [jadeapar/Dragonfish-s-Malware-Cyber-Analysis](https://github.com/jadeapar/Dragonfish-s-Malware-Cyber-Analysis)
- [yaseenibnakhtar/Malware-Analysis-CVE-2017-11882](https://github.com/yaseenibnakhtar/Malware-Analysis-CVE-2017-11882)
### CVE-2017-11907 (2017-12-12)