Auto Update 2024/11/07 00:31:46

This commit is contained in:
motikan2010-bot 2024-11-07 09:31:46 +09:00
parent eabb7b3245
commit da9c0b1f83
55 changed files with 240 additions and 781 deletions

View file

@ -14,10 +14,10 @@
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
"fork": false,
"created_at": "2015-03-28T10:28:16Z",
"updated_at": "2024-10-28T13:52:49Z",
"updated_at": "2024-11-06T20:57:38Z",
"pushed_at": "2019-01-30T21:36:22Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 29,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 7
}

View file

@ -14,10 +14,10 @@
"description": "Scans NTP servers for CVE-2013-5211 NTP DDOS amplification vulnerability.",
"fork": false,
"created_at": "2014-09-07T16:02:25Z",
"updated_at": "2024-08-12T19:14:48Z",
"updated_at": "2024-11-06T23:16:07Z",
"pushed_at": "2014-09-07T18:41:42Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 16,
"watchers": 15,
"score": 0,
"subscribers_count": 3
},

View file

@ -1,33 +0,0 @@
[
{
"id": 883215413,
"name": "CVE-2018-14461_tcpdump_AOSP10_R33",
"full_name": "uthrasri\/CVE-2018-14461_tcpdump_AOSP10_R33",
"owner": {
"login": "uthrasri",
"id": 145666390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
"html_url": "https:\/\/github.com\/uthrasri",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/uthrasri\/CVE-2018-14461_tcpdump_AOSP10_R33",
"description": null,
"fork": false,
"created_at": "2024-11-04T15:18:33Z",
"updated_at": "2024-11-06T11:41:33Z",
"pushed_at": "2024-11-06T11:31:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -76,7 +76,7 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-11-06T15:00:10Z",
"updated_at": "2024-11-06T20:13:07Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 199,
"watchers_count": 199,

View file

@ -45,10 +45,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2024-11-06T12:46:00Z",
"updated_at": "2024-11-06T20:43:40Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 650,
"watchers_count": 650,
"stargazers_count": 649,
"watchers_count": 649,
"has_discussions": false,
"forks_count": 128,
"allow_forking": true,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 128,
"watchers": 650,
"watchers": 649,
"score": 0,
"subscribers_count": 16
},

View file

@ -742,10 +742,10 @@
"description": "WebMin Versions <= 1.920 [CVE-2019-15107] RCE PoC",
"fork": false,
"created_at": "2022-07-26T07:38:03Z",
"updated_at": "2024-07-30T10:26:49Z",
"updated_at": "2024-11-06T23:17:15Z",
"pushed_at": "2022-07-28T13:57:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -754,7 +754,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-11-06T07:59:57Z",
"updated_at": "2024-11-06T20:46:45Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4120,
"watchers_count": 4120,
"stargazers_count": 4118,
"watchers_count": 4118,
"has_discussions": false,
"forks_count": 1098,
"allow_forking": true,
@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1098,
"watchers": 4120,
"watchers": 4118,
"score": 0,
"subscribers_count": 149
},

View file

@ -45,10 +45,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-11-01T14:52:47Z",
"updated_at": "2024-11-06T20:46:51Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1727,
"watchers_count": 1727,
"stargazers_count": 1726,
"watchers_count": 1726,
"has_discussions": false,
"forks_count": 360,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 360,
"watchers": 1727,
"watchers": 1726,
"score": 0,
"subscribers_count": 86
},

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-11-06T07:59:57Z",
"updated_at": "2024-11-06T20:46:45Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4120,
"watchers_count": 4120,
"stargazers_count": 4118,
"watchers_count": 4118,
"has_discussions": false,
"forks_count": 1098,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1098,
"watchers": 4120,
"watchers": 4118,
"score": 0,
"subscribers_count": 149
},

View file

@ -28,7 +28,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 884191203,
@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,7 +28,7 @@
"forks": 31,
"watchers": 128,
"score": 0,
"subscribers_count": 8
"subscribers_count": 7
},
{
"id": 418578582,

View file

@ -28,7 +28,7 @@
"forks": 6,
"watchers": 16,
"score": 0,
"subscribers_count": 2
"subscribers_count": 1
},
{
"id": 421880973,
@ -59,7 +59,7 @@
"forks": 76,
"watchers": 252,
"score": 0,
"subscribers_count": 6
"subscribers_count": 5
},
{
"id": 424140037,
@ -90,7 +90,7 @@
"forks": 7,
"watchers": 16,
"score": 0,
"subscribers_count": 3
"subscribers_count": 2
},
{
"id": 437809411,
@ -138,10 +138,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2024-11-01T06:26:54Z",
"updated_at": "2024-11-06T23:16:25Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 143,
"watchers_count": 143,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -153,7 +153,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 144,
"watchers": 143,
"score": 0,
"subscribers_count": 2
},

View file

@ -1480,10 +1480,10 @@
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
"fork": false,
"created_at": "2021-10-09T03:32:18Z",
"updated_at": "2024-10-15T07:34:02Z",
"updated_at": "2024-11-06T23:16:22Z",
"pushed_at": "2021-10-09T03:49:21Z",
"stargazers_count": 149,
"watchers_count": 149,
"stargazers_count": 148,
"watchers_count": 148,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -1492,7 +1492,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 149,
"watchers": 148,
"score": 0,
"subscribers_count": 3
},

View file

@ -935,10 +935,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-11-03T19:52:06Z",
"updated_at": "2024-11-06T20:43:18Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1804,
"watchers_count": 1804,
"stargazers_count": 1803,
"watchers_count": 1803,
"has_discussions": false,
"forks_count": 525,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 525,
"watchers": 1804,
"watchers": 1803,
"score": 0,
"subscribers_count": 27
},

View file

@ -234,10 +234,10 @@
"description": "CVE-2021-45232-RCE-多线程批量漏洞检测",
"fork": false,
"created_at": "2022-01-05T04:13:10Z",
"updated_at": "2024-08-12T20:19:29Z",
"updated_at": "2024-11-06T23:16:26Z",
"pushed_at": "2022-01-13T05:12:49Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -246,7 +246,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 35,
"watchers": 34,
"score": 0,
"subscribers_count": 0
},

View file

@ -145,10 +145,10 @@
"description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测",
"fork": false,
"created_at": "2022-05-07T17:54:08Z",
"updated_at": "2024-09-20T18:32:56Z",
"updated_at": "2024-11-06T23:16:23Z",
"pushed_at": "2022-05-09T11:15:27Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -157,7 +157,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 94,
"watchers": 93,
"score": 0,
"subscribers_count": 1
},

View file

@ -2465,8 +2465,8 @@
"description": null,
"fork": false,
"created_at": "2024-11-05T16:30:00Z",
"updated_at": "2024-11-06T08:30:19Z",
"pushed_at": "2024-11-06T08:30:16Z",
"updated_at": "2024-11-06T23:04:42Z",
"pushed_at": "2024-11-06T23:04:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "phpMyAdmin XSS ",
"fork": false,
"created_at": "2022-02-01T17:02:03Z",
"updated_at": "2024-10-26T13:47:37Z",
"updated_at": "2024-11-06T19:28:08Z",
"pushed_at": "2024-10-26T13:47:33Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 113,
"watchers": 114,
"score": 0,
"subscribers_count": 3
}

View file

@ -76,10 +76,10 @@
"description": "Apache APISIX batch-requests RCE(CVE-2022-24112)",
"fork": false,
"created_at": "2022-02-25T15:17:28Z",
"updated_at": "2024-08-12T20:21:00Z",
"updated_at": "2024-11-06T23:16:14Z",
"pushed_at": "2022-02-25T15:30:08Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 9,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},

View file

@ -431,10 +431,10 @@
"description": "A bots loader for CVE-2022-29464 with multithreading",
"fork": false,
"created_at": "2022-05-15T08:51:16Z",
"updated_at": "2024-08-12T20:23:17Z",
"updated_at": "2024-11-06T23:17:18Z",
"pushed_at": "2022-08-08T15:31:54Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -451,7 +451,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-07T05:43:48Z",
"updated_at": "2024-11-01T02:54:26Z",
"updated_at": "2024-11-06T20:38:27Z",
"pushed_at": "2024-04-05T00:05:44Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
"fork": false,
"created_at": "2023-10-10T21:40:09Z",
"updated_at": "2024-11-05T06:34:21Z",
"updated_at": "2024-11-06T23:54:09Z",
"pushed_at": "2023-10-17T22:04:13Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -97,7 +97,7 @@
],
"visibility": "public",
"forks": 29,
"watchers": 128,
"watchers": 129,
"score": 0,
"subscribers_count": 4
},

View file

@ -237,36 +237,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 880297736,
"name": "CVE-2023-22518",
"full_name": "zgimszhd61\/CVE-2023-22518",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2023-22518",
"description": "Checker for CVE-2023-22518 vulnerability on Confluence",
"fork": false,
"created_at": "2024-10-29T13:29:15Z",
"updated_at": "2024-10-29T13:32:45Z",
"pushed_at": "2024-10-29T13:32:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -60,5 +60,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 884497009,
"name": "CVE-2023-2598",
"full_name": "LLfam\/CVE-2023-2598",
"owner": {
"login": "LLfam",
"id": 43279891,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43279891?v=4",
"html_url": "https:\/\/github.com\/LLfam",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LLfam\/CVE-2023-2598",
"description": null,
"fork": false,
"created_at": "2024-11-06T21:24:43Z",
"updated_at": "2024-11-06T21:27:24Z",
"pushed_at": "2024-11-06T21:27:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "Chamilo CVE-2023-34960 Batch scan\/exploit ",
"fork": false,
"created_at": "2023-07-09T11:24:33Z",
"updated_at": "2024-06-08T14:47:14Z",
"updated_at": "2024-11-06T23:16:30Z",
"pushed_at": "2023-07-09T11:57:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
@ -204,7 +204,7 @@
"description": "Automatic vuln scanner and exploiter for l7 ddos attacks using Chamilio CVE-2023-34960",
"fork": false,
"created_at": "2024-07-13T08:30:18Z",
"updated_at": "2024-10-21T18:24:31Z",
"updated_at": "2024-11-06T23:17:03Z",
"pushed_at": "2024-10-21T18:24:28Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -133,10 +133,10 @@
"description": "CVE-2023-4220 POC RCE",
"fork": false,
"created_at": "2024-07-08T07:31:35Z",
"updated_at": "2024-10-07T01:29:22Z",
"updated_at": "2024-11-06T23:17:18Z",
"pushed_at": "2024-08-07T23:36:20Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "exploit for f5-big-ip RCE cve-2023-46747",
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
"updated_at": "2024-10-30T23:33:18Z",
"updated_at": "2024-11-06T23:16:13Z",
"pushed_at": "2024-10-20T10:27:37Z",
"stargazers_count": 203,
"watchers_count": 203,
"stargazers_count": 202,
"watchers_count": 202,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 45,
"watchers": 203,
"watchers": 202,
"score": 0,
"subscribers_count": 2
},
@ -345,36 +345,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 881664533,
"name": "CVE-2023-46747-RCE-poc",
"full_name": "zgimszhd61\/CVE-2023-46747-RCE-poc",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2023-46747-RCE-poc",
"description": null,
"fork": false,
"created_at": "2024-11-01T01:52:51Z",
"updated_at": "2024-11-05T08:25:30Z",
"pushed_at": "2024-11-01T02:02:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 879357780,
"name": "CVE-2024-23112",
"full_name": "zgimszhd61\/CVE-2024-23112",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-23112",
"description": null,
"fork": false,
"created_at": "2024-10-27T17:36:45Z",
"updated_at": "2024-10-27T17:36:49Z",
"pushed_at": "2024-10-27T17:36:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -185,42 +185,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 879358553,
"name": "CVE-2024-23113",
"full_name": "zgimszhd61\/CVE-2024-23113",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-23113",
"description": "CVE-2024-23113 是存在于某特定软件或系统中的一个安全漏洞,该漏洞允许恶意攻击者在特定条件下利用系统中的缺陷实现未经授权的行为。这种行为可能包括但不限于远程代码执行、访问敏感信息或以更高权限执行操作。",
"fork": false,
"created_at": "2024-10-27T17:39:00Z",
"updated_at": "2024-11-01T23:01:44Z",
"pushed_at": "2024-10-29T08:21:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"exploit",
"poc",
"scanner"
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 881252874,
"name": "CVE-2024-23113",

View file

@ -1,33 +0,0 @@
[
{
"id": 879356168,
"name": "CVE-2024-23116",
"full_name": "zgimszhd61\/CVE-2024-23116",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-23116",
"description": null,
"fork": false,
"created_at": "2024-10-27T17:32:02Z",
"updated_at": "2024-10-27T17:32:07Z",
"pushed_at": "2024-10-27T17:32:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 879356726,
"name": "CVE-2024-23117",
"full_name": "zgimszhd61\/CVE-2024-23117",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-23117",
"description": null,
"fork": false,
"created_at": "2024-10-27T17:33:47Z",
"updated_at": "2024-10-27T17:33:51Z",
"pushed_at": "2024-10-27T17:33:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1097,36 +1097,5 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 881653321,
"name": "CVE-2024-23897-poc",
"full_name": "zgimszhd61\/CVE-2024-23897-poc",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-23897-poc",
"description": "CVE-2024-23897是一个影响Jenkins的严重安全漏洞",
"fork": false,
"created_at": "2024-11-01T01:16:49Z",
"updated_at": "2024-11-06T16:09:38Z",
"pushed_at": "2024-11-01T01:25:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -79,10 +79,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
"fork": false,
"created_at": "2024-03-06T03:15:03Z",
"updated_at": "2024-10-28T06:11:14Z",
"updated_at": "2024-11-06T23:16:14Z",
"pushed_at": "2024-03-11T07:57:40Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 143,
"watchers_count": 143,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -101,7 +101,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 144,
"watchers": 143,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "OpenMetadata_RCE (CVE-2024-28255) Batch scan\/exploit",
"fork": false,
"created_at": "2024-04-12T04:29:58Z",
"updated_at": "2024-06-08T05:02:23Z",
"updated_at": "2024-11-06T23:16:20Z",
"pushed_at": "2024-04-12T04:41:18Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Telesquare TLR-2005KSH_RCE (CVE-2024-29269) Batch scan\/exploit",
"fork": false,
"created_at": "2024-04-12T07:36:08Z",
"updated_at": "2024-06-08T14:54:09Z",
"updated_at": "2024-11-06T23:16:30Z",
"pushed_at": "2024-04-12T07:58:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -1,33 +0,0 @@
[
{
"id": 882922074,
"name": "CVE-2024-30078-POC_WIFI",
"full_name": "zgimszhd61\/CVE-2024-30078-POC_WIFI",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-30078-POC_WIFI",
"description": "basic concept for the latest windows wifi driver CVE",
"fork": false,
"created_at": "2024-11-04T03:40:01Z",
"updated_at": "2024-11-04T20:31:55Z",
"pushed_at": "2024-11-04T03:49:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -813,37 +813,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 780252942,
"name": "cve-2024-3094-detect-tool",
"full_name": "zgimszhd61\/cve-2024-3094-detect-tool",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/cve-2024-3094-detect-tool",
"description": null,
"fork": false,
"created_at": "2024-04-01T04:28:24Z",
"updated_at": "2024-04-03T02:34:34Z",
"pushed_at": "2024-04-01T04:35:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 780339519,
"name": "CVE-2024-3094-info",

View file

@ -130,37 +130,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 824852905,
"name": "CVE-2024-36401",
"full_name": "zgimszhd61\/CVE-2024-36401",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-36401",
"description": null,
"fork": false,
"created_at": "2024-07-06T06:04:41Z",
"updated_at": "2024-07-06T06:13:34Z",
"pushed_at": "2024-07-06T06:13:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 827686717,
"name": "CVE-2024-36401-GeoServer-RCE",

View file

@ -265,10 +265,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2024-11-03T04:07:57Z",
"updated_at": "2024-11-06T20:21:23Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 615,
"watchers_count": 615,
"stargazers_count": 616,
"watchers_count": 616,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -277,7 +277,7 @@
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 615,
"watchers": 616,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "Pre-Auth Exploit for CVE-2024-40711",
"fork": false,
"created_at": "2024-09-15T17:25:32Z",
"updated_at": "2024-11-06T11:03:07Z",
"updated_at": "2024-11-06T20:27:31Z",
"pushed_at": "2024-09-15T17:28:41Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 0
},

View file

@ -293,5 +293,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 884449297,
"name": "CVE-2024-4367-pdf-sample",
"full_name": "pedrochalegre7\/CVE-2024-4367-pdf-sample",
"owner": {
"login": "pedrochalegre7",
"id": 101287325,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101287325?v=4",
"html_url": "https:\/\/github.com\/pedrochalegre7",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pedrochalegre7\/CVE-2024-4367-pdf-sample",
"description": null,
"fork": false,
"created_at": "2024-11-06T19:15:38Z",
"updated_at": "2024-11-06T19:58:12Z",
"pushed_at": "2024-11-06T19:58:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -122,40 +122,5 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 881328617,
"name": "CVE-2024-44000",
"full_name": "zgimszhd61\/CVE-2024-44000",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-44000",
"description": "GenCookieSessionHijack 是一个用于利用不安全暴露的 WordPress 调试日志并提取会话 Cookie 的 PoC 工具。通过该工具,攻击者可以劫持活跃的管理员会话,从而未授权地访问 WordPress 管理控制台。",
"fork": false,
"created_at": "2024-10-31T11:03:26Z",
"updated_at": "2024-11-01T02:08:06Z",
"pushed_at": "2024-10-31T11:06:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"poc",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Makes IDA (most versions) to crash upon opening it. ",
"fork": false,
"created_at": "2024-08-25T12:33:14Z",
"updated_at": "2024-11-04T04:25:26Z",
"updated_at": "2024-11-06T20:21:42Z",
"pushed_at": "2024-08-30T09:58:12Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 60,
"watchers": 61,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,12 +14,12 @@
"description": "Proof-of-Concept for CVE-2024-46538",
"fork": false,
"created_at": "2024-10-23T10:50:01Z",
"updated_at": "2024-11-06T10:56:45Z",
"updated_at": "2024-11-06T20:32:15Z",
"pushed_at": "2024-11-06T10:56:41Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -35,8 +35,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 8,
"watchers": 37,
"forks": 9,
"watchers": 38,
"score": 0,
"subscribers_count": 1
}

View file

@ -123,37 +123,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 880370006,
"name": "CVE-2024-47575-POC",
"full_name": "zgimszhd61\/CVE-2024-47575-POC",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-47575-POC",
"description": "CVE-2024-47575 POC",
"fork": false,
"created_at": "2024-10-29T15:48:25Z",
"updated_at": "2024-10-31T08:08:35Z",
"pushed_at": "2024-10-29T15:48:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 881918245,
"name": "CVE-2024-47575",

View file

@ -1,37 +0,0 @@
[
{
"id": 881529468,
"name": "CVE-2024-48063-poc",
"full_name": "zgimszhd61\/CVE-2024-48063-poc",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-48063-poc",
"description": "PyTorch RemoteModule反序列化远程代码执行漏洞CVE-2024-48063是一个影响PyTorch 2.4.1及更早版本的严重安全漏洞",
"fork": false,
"created_at": "2024-10-31T18:54:54Z",
"updated_at": "2024-11-01T01:28:52Z",
"pushed_at": "2024-11-01T01:28:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"poc",
"security-tools"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2024/CVE-2024-48208.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 880590271,
"name": "CVE-2024-48208",
"full_name": "rohilchaudhry\/CVE-2024-48208",
"owner": {
"login": "rohilchaudhry",
"id": 146772664,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146772664?v=4",
"html_url": "https:\/\/github.com\/rohilchaudhry",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rohilchaudhry\/CVE-2024-48208",
"description": null,
"fork": false,
"created_at": "2024-10-30T01:44:32Z",
"updated_at": "2024-11-07T00:07:17Z",
"pushed_at": "2024-11-05T15:09:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -92,37 +92,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 828116872,
"name": "CVE-2024-4879",
"full_name": "zgimszhd61\/CVE-2024-4879",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-4879",
"description": null,
"fork": false,
"created_at": "2024-07-13T07:02:18Z",
"updated_at": "2024-07-13T07:06:56Z",
"pushed_at": "2024-07-13T07:06:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 828935876,
"name": "CVE-2024-4879",

View file

@ -1,21 +1,21 @@
[
{
"id": 879356925,
"name": "CVE-2024-23118",
"full_name": "zgimszhd61\/CVE-2024-23118",
"id": 884497011,
"name": "CVE-2024-50340",
"full_name": "Nyamort\/CVE-2024-50340",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"login": "Nyamort",
"id": 67233336,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67233336?v=4",
"html_url": "https:\/\/github.com\/Nyamort",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-23118",
"html_url": "https:\/\/github.com\/Nyamort\/CVE-2024-50340",
"description": null,
"fork": false,
"created_at": "2024-10-27T17:34:20Z",
"updated_at": "2024-10-27T17:34:24Z",
"pushed_at": "2024-10-27T17:34:21Z",
"created_at": "2024-11-06T21:24:43Z",
"updated_at": "2024-11-06T23:35:07Z",
"pushed_at": "2024-11-06T23:34:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

View file

@ -421,41 +421,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 822864634,
"name": "cve-2024-6387-poc",
"full_name": "zgimszhd61\/cve-2024-6387-poc",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/cve-2024-6387-poc",
"description": "Exploit for CVE-2024-6387 targeting a race condition in OpenSSH's signal handler on glibc-based Linux, enabling remote code execution and root access via unsafe async signal functions in SIGALRM handler.",
"fork": false,
"created_at": "2024-07-02T01:39:10Z",
"updated_at": "2024-10-26T13:31:10Z",
"pushed_at": "2024-07-02T01:54:25Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"poc",
"security"
],
"visibility": "public",
"forks": 4,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 822879505,
"name": "CVE-2024-6387fixshell",

View file

@ -14,10 +14,10 @@
"description": "VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)",
"fork": false,
"created_at": "2024-09-14T06:27:11Z",
"updated_at": "2024-10-28T19:36:08Z",
"updated_at": "2024-11-06T22:42:05Z",
"pushed_at": "2024-09-15T21:34:35Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 3
},

View file

@ -78,37 +78,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 875485476,
"name": "CVE-2024-9264",
"full_name": "zgimszhd61\/CVE-2024-9264",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-9264",
"description": "Exploit for Grafana arbitrary file-read (CVE-2024-9264)",
"fork": false,
"created_at": "2024-10-20T05:23:31Z",
"updated_at": "2024-10-21T09:37:02Z",
"pushed_at": "2024-10-20T05:34:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 875890256,
"name": "CVE-2024-9264-RCE-Exploit",
@ -177,36 +146,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 880862112,
"name": "CVE-2024-9264-RCE",
"full_name": "zgimszhd61\/CVE-2024-9264-RCE",
"owner": {
"login": "zgimszhd61",
"id": 114722053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114722053?v=4",
"html_url": "https:\/\/github.com\/zgimszhd61",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgimszhd61\/CVE-2024-9264-RCE",
"description": null,
"fork": false,
"created_at": "2024-10-30T13:54:34Z",
"updated_at": "2024-10-30T13:57:03Z",
"pushed_at": "2024-10-30T13:57:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -614,7 +614,6 @@
- [Mustafa1986/CVE-2024-3094](https://github.com/Mustafa1986/CVE-2024-3094)
- [MrBUGLF/XZ-Utils_CVE-2024-3094](https://github.com/MrBUGLF/XZ-Utils_CVE-2024-3094)
- [galacticquest/cve-2024-3094-detect](https://github.com/galacticquest/cve-2024-3094-detect)
- [zgimszhd61/cve-2024-3094-detect-tool](https://github.com/zgimszhd61/cve-2024-3094-detect-tool)
- [mightysai1997/CVE-2024-3094-info](https://github.com/mightysai1997/CVE-2024-3094-info)
- [mightysai1997/CVE-2024-3094](https://github.com/mightysai1997/CVE-2024-3094)
- [mesutgungor/xz-backdoor-vulnerability](https://github.com/mesutgungor/xz-backdoor-vulnerability)
@ -902,6 +901,7 @@
- [snyk-labs/pdfjs-vuln-demo](https://github.com/snyk-labs/pdfjs-vuln-demo)
- [UnHackerEnCapital/PDFernetRemotelo](https://github.com/UnHackerEnCapital/PDFernetRemotelo)
- [Masamuneee/CVE-2024-4367-Analysis](https://github.com/Masamuneee/CVE-2024-4367-Analysis)
- [pedrochalegre7/CVE-2024-4367-pdf-sample](https://github.com/pedrochalegre7/CVE-2024-4367-pdf-sample)
### CVE-2024-4406 (2024-05-02)
@ -1023,7 +1023,6 @@
- [Brut-Security/CVE-2024-4879](https://github.com/Brut-Security/CVE-2024-4879)
- [bigb0x/CVE-2024-4879](https://github.com/bigb0x/CVE-2024-4879)
- [Mr-r00t11/CVE-2024-4879](https://github.com/Mr-r00t11/CVE-2024-4879)
- [zgimszhd61/CVE-2024-4879](https://github.com/zgimszhd61/CVE-2024-4879)
- [ShadowByte1/CVE-2024-4879](https://github.com/ShadowByte1/CVE-2024-4879)
- [Praison001/CVE-2024-4879-ServiceNow](https://github.com/Praison001/CVE-2024-4879-ServiceNow)
- [NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning](https://github.com/NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning)
@ -1293,7 +1292,6 @@
- [wiggels/regresshion-check](https://github.com/wiggels/regresshion-check)
- [3yujw7njai/CVE-2024-6387](https://github.com/3yujw7njai/CVE-2024-6387)
- [betancour/OpenSSH-Vulnerability-test](https://github.com/betancour/OpenSSH-Vulnerability-test)
- [zgimszhd61/cve-2024-6387-poc](https://github.com/zgimszhd61/cve-2024-6387-poc)
- [muyuanlove/CVE-2024-6387fixshell](https://github.com/muyuanlove/CVE-2024-6387fixshell)
- [TAM-K592/CVE-2024-6387](https://github.com/TAM-K592/CVE-2024-6387)
- [teamos-hub/regreSSHion](https://github.com/teamos-hub/regreSSHion)
@ -1669,10 +1667,8 @@
### CVE-2024-9264
- [nollium/CVE-2024-9264](https://github.com/nollium/CVE-2024-9264)
- [z3k0sec/File-Read-CVE-2024-9264](https://github.com/z3k0sec/File-Read-CVE-2024-9264)
- [zgimszhd61/CVE-2024-9264](https://github.com/zgimszhd61/CVE-2024-9264)
- [z3k0sec/CVE-2024-9264-RCE-Exploit](https://github.com/z3k0sec/CVE-2024-9264-RCE-Exploit)
- [PunitTailor55/Grafana-CVE-2024-9264](https://github.com/PunitTailor55/Grafana-CVE-2024-9264)
- [zgimszhd61/CVE-2024-9264-RCE](https://github.com/zgimszhd61/CVE-2024-9264-RCE)
### CVE-2024-9441
- [adhikara13/CVE-2024-9441](https://github.com/adhikara13/CVE-2024-9441)
@ -2340,13 +2336,6 @@
- [horizon3ai/CVE-2024-23108](https://github.com/horizon3ai/CVE-2024-23108)
- [hitem/CVE-2024-23108](https://github.com/hitem/CVE-2024-23108)
### CVE-2024-23112 (2024-03-12)
<code>An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another users bookmark via URL manipulation.
</code>
- [zgimszhd61/CVE-2024-23112](https://github.com/zgimszhd61/CVE-2024-23112)
### CVE-2024-23113 (2024-02-15)
<code>A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.
@ -2358,30 +2347,8 @@
- [maybelookis/CVE-2024-23113](https://github.com/maybelookis/CVE-2024-23113)
- [p33d/CVE-2024-23113](https://github.com/p33d/CVE-2024-23113)
- [groshi/CVE-2024-23113-Private-POC](https://github.com/groshi/CVE-2024-23113-Private-POC)
- [zgimszhd61/CVE-2024-23113](https://github.com/zgimszhd61/CVE-2024-23113)
- [puckiestyle/CVE-2024-23113](https://github.com/puckiestyle/CVE-2024-23113)
### CVE-2024-23116 (2024-04-01)
<code>Centreon updateLCARelation SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the updateLCARelation function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-22296.
</code>
- [zgimszhd61/CVE-2024-23116](https://github.com/zgimszhd61/CVE-2024-23116)
### CVE-2024-23117 (2024-04-01)
<code>Centreon updateContactServiceCommands SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the updateContactServiceCommands function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-22297.
</code>
- [zgimszhd61/CVE-2024-23117](https://github.com/zgimszhd61/CVE-2024-23117)
### CVE-2024-23118 (2024-04-01)
<code>Centreon updateContactHostCommands SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the updateContactHostCommands function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-22298.
</code>
- [zgimszhd61/CVE-2024-23118](https://github.com/zgimszhd61/CVE-2024-23118)
### CVE-2024-23208 (2024-01-23)
<code>The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.3, watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3. An app may be able to execute arbitrary code with kernel privileges.
@ -2602,7 +2569,6 @@
- [BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety](https://github.com/BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety)
- [ShieldAuth-PHP/PBL05-CVE-Analsys](https://github.com/ShieldAuth-PHP/PBL05-CVE-Analsys)
- [verylazytech/CVE-2024-23897](https://github.com/verylazytech/CVE-2024-23897)
- [zgimszhd61/CVE-2024-23897-poc](https://github.com/zgimszhd61/CVE-2024-23897-poc)
### CVE-2024-23995 (2024-04-29)
@ -3775,13 +3741,6 @@
- [absholi7ly/Microsoft-Edge-Information-Disclosure](https://github.com/absholi7ly/Microsoft-Edge-Information-Disclosure)
### CVE-2024-30078 (2024-06-11)
<code>Windows Wi-Fi Driver Remote Code Execution Vulnerability
</code>
- [zgimszhd61/CVE-2024-30078-POC_WIFI](https://github.com/zgimszhd61/CVE-2024-30078-POC_WIFI)
### CVE-2024-30088 (2024-06-11)
<code>Windows Kernel Elevation of Privilege Vulnerability
@ -4600,7 +4559,6 @@
- [Niuwoo/CVE-2024-36401](https://github.com/Niuwoo/CVE-2024-36401)
- [RevoltSecurities/CVE-2024-36401](https://github.com/RevoltSecurities/CVE-2024-36401)
- [Mr-xn/CVE-2024-36401](https://github.com/Mr-xn/CVE-2024-36401)
- [zgimszhd61/CVE-2024-36401](https://github.com/zgimszhd61/CVE-2024-36401)
- [jakabakos/CVE-2024-36401-GeoServer-RCE](https://github.com/jakabakos/CVE-2024-36401-GeoServer-RCE)
- [ahisec/geoserver-](https://github.com/ahisec/geoserver-)
- [Chocapikk/CVE-2024-36401](https://github.com/Chocapikk/CVE-2024-36401)
@ -5510,7 +5468,6 @@
- [gbrsh/CVE-2024-44000](https://github.com/gbrsh/CVE-2024-44000)
- [ifqygazhar/CVE-2024-44000-LiteSpeed-Cache](https://github.com/ifqygazhar/CVE-2024-44000-LiteSpeed-Cache)
- [geniuszlyy/CVE-2024-44000](https://github.com/geniuszlyy/CVE-2024-44000)
- [zgimszhd61/CVE-2024-44000](https://github.com/zgimszhd61/CVE-2024-44000)
### CVE-2024-44083 (2024-08-19)
@ -5767,14 +5724,13 @@
- [HazeLook/CVE-2024-47575](https://github.com/HazeLook/CVE-2024-47575)
- [hazesecurity/CVE-2024-47575](https://github.com/hazesecurity/CVE-2024-47575)
- [groshi/CVE-2024-47575-POC](https://github.com/groshi/CVE-2024-47575-POC)
- [zgimszhd61/CVE-2024-47575-POC](https://github.com/zgimszhd61/CVE-2024-47575-POC)
- [krmxd/CVE-2024-47575](https://github.com/krmxd/CVE-2024-47575)
### CVE-2024-47854
- [MarioTesoro/CVE-2024-47854](https://github.com/MarioTesoro/CVE-2024-47854)
### CVE-2024-48063
- [zgimszhd61/CVE-2024-48063-poc](https://github.com/zgimszhd61/CVE-2024-48063-poc)
### CVE-2024-48208
- [rohilchaudhry/CVE-2024-48208](https://github.com/rohilchaudhry/CVE-2024-48208)
### CVE-2024-48217
- [ajrielrm/CVE-2024-48217](https://github.com/ajrielrm/CVE-2024-48217)
@ -5828,6 +5784,9 @@
### CVE-2024-49328
- [RandomRobbieBF/CVE-2024-49328](https://github.com/RandomRobbieBF/CVE-2024-49328)
### CVE-2024-50340
- [Nyamort/CVE-2024-50340](https://github.com/Nyamort/CVE-2024-50340)
### CVE-2024-50475
- [RandomRobbieBF/CVE-2024-50475](https://github.com/RandomRobbieBF/CVE-2024-50475)
@ -6342,6 +6301,7 @@
- [ysanatomic/io_uring_LPE-CVE-2023-2598](https://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598)
- [cainiao159357/CVE-2023-2598](https://github.com/cainiao159357/CVE-2023-2598)
- [LLfam/CVE-2023-2598](https://github.com/LLfam/CVE-2023-2598)
### CVE-2023-2636 (2023-07-17)
@ -8012,7 +7972,6 @@
- [C1ph3rX13/CVE-2023-22518](https://github.com/C1ph3rX13/CVE-2023-22518)
- [bibo318/CVE-2023-22518](https://github.com/bibo318/CVE-2023-22518)
- [Lilly-dox/Exploit-CVE-2023-22518](https://github.com/Lilly-dox/Exploit-CVE-2023-22518)
- [zgimszhd61/CVE-2023-22518](https://github.com/zgimszhd61/CVE-2023-22518)
### CVE-2023-22524 (2023-12-06)
@ -13125,7 +13084,6 @@
- [rainbowhatrkn/CVE-2023-46747-RCE](https://github.com/rainbowhatrkn/CVE-2023-46747-RCE)
- [AMELYA13/CVE-2023-46747-Mass-RCE](https://github.com/AMELYA13/CVE-2023-46747-Mass-RCE)
- [MacTavish2/CVE-2023-46747-Mass-RCE](https://github.com/MacTavish2/CVE-2023-46747-Mass-RCE)
- [zgimszhd61/CVE-2023-46747-RCE-poc](https://github.com/zgimszhd61/CVE-2023-46747-RCE-poc)
### CVE-2023-46805 (2024-01-12)
@ -39344,13 +39302,6 @@
- [payatu/CVE-2018-14442](https://github.com/payatu/CVE-2018-14442)
- [sharmasandeepkr/PS-2018-002---CVE-2018-14442](https://github.com/sharmasandeepkr/PS-2018-002---CVE-2018-14442)
### CVE-2018-14461 (2019-10-03)
<code>The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print().
</code>
- [uthrasri/CVE-2018-14461_tcpdump_AOSP10_R33](https://github.com/uthrasri/CVE-2018-14461_tcpdump_AOSP10_R33)
### CVE-2018-14463 (2019-10-03)
<code>The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167.