Auto Update 2024/12/20 18:31:43

This commit is contained in:
motikan2010-bot 2024-12-21 03:31:43 +09:00
parent 75c22ac747
commit e21dc5c7a1
31 changed files with 183 additions and 119 deletions

View file

@ -14,10 +14,10 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2024-12-17T06:35:39Z",
"updated_at": "2024-12-20T15:53:58Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2306,
"watchers_count": 2306,
"stargazers_count": 2307,
"watchers_count": 2307,
"has_discussions": false,
"forks_count": 461,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 461,
"watchers": 2306,
"watchers": 2307,
"score": 0,
"subscribers_count": 117
},
@ -45,10 +45,10 @@
"description": "OpenSSL CVE-2014-0160 Heartbleed vulnerability test",
"fork": false,
"created_at": "2014-04-08T04:25:23Z",
"updated_at": "2024-08-30T12:43:24Z",
"updated_at": "2024-12-20T15:54:03Z",
"pushed_at": "2014-05-27T22:32:26Z",
"stargazers_count": 449,
"watchers_count": 449,
"stargazers_count": 450,
"watchers_count": 450,
"has_discussions": false,
"forks_count": 86,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 86,
"watchers": 449,
"watchers": 450,
"score": 0,
"subscribers_count": 30
},

View file

@ -144,10 +144,10 @@
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution for Python3",
"fork": false,
"created_at": "2021-02-04T04:28:21Z",
"updated_at": "2021-07-03T19:27:11Z",
"updated_at": "2024-12-20T16:08:18Z",
"pushed_at": "2021-07-03T19:27:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -156,7 +156,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -1618,10 +1618,10 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2024-12-18T21:54:31Z",
"updated_at": "2024-12-20T15:34:21Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 897,
"watchers_count": 897,
"stargazers_count": 898,
"watchers_count": 898,
"has_discussions": false,
"forks_count": 242,
"allow_forking": true,
@ -1630,7 +1630,7 @@
"topics": [],
"visibility": "public",
"forks": 242,
"watchers": 897,
"watchers": 898,
"score": 0,
"subscribers_count": 55
},
@ -3179,10 +3179,10 @@
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
"fork": false,
"created_at": "2020-03-15T19:33:53Z",
"updated_at": "2024-11-27T01:50:25Z",
"updated_at": "2024-12-20T16:56:29Z",
"pushed_at": "2022-03-28T04:10:20Z",
"stargazers_count": 132,
"watchers_count": 132,
"stargazers_count": 131,
"watchers_count": 131,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -3191,7 +3191,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 132,
"watchers": 131,
"score": 0,
"subscribers_count": 4
},

View file

@ -238,10 +238,10 @@
"description": "😂An awesome curated list of repos for CVE-2020-0601.",
"fork": false,
"created_at": "2020-01-16T02:46:21Z",
"updated_at": "2024-08-12T19:56:41Z",
"updated_at": "2024-12-20T15:50:46Z",
"pushed_at": "2020-02-02T02:29:23Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -255,7 +255,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},

View file

@ -14,19 +14,19 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2024-12-10T05:19:06Z",
"updated_at": "2024-12-20T14:54:42Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 713,
"watchers_count": 713,
"stargazers_count": 714,
"watchers_count": 714,
"has_discussions": false,
"forks_count": 173,
"forks_count": 174,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 173,
"watchers": 713,
"forks": 174,
"watchers": 714,
"score": 0,
"subscribers_count": 19
},

View file

@ -138,10 +138,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-12-16T13:58:02Z",
"updated_at": "2024-12-20T15:10:07Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1080,
"watchers_count": 1080,
"stargazers_count": 1081,
"watchers_count": 1081,
"has_discussions": false,
"forks_count": 318,
"allow_forking": true,
@ -154,7 +154,7 @@
],
"visibility": "public",
"forks": 318,
"watchers": 1080,
"watchers": 1081,
"score": 0,
"subscribers_count": 36
},

View file

@ -76,7 +76,7 @@
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
"fork": false,
"created_at": "2021-07-02T16:03:16Z",
"updated_at": "2024-12-08T21:33:48Z",
"updated_at": "2024-12-20T13:18:34Z",
"pushed_at": "2022-09-01T06:33:36Z",
"stargazers_count": 184,
"watchers_count": 184,

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-20T11:55:13Z",
"updated_at": "2024-12-20T16:42:37Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1345,
"watchers_count": 1345,
"stargazers_count": 1346,
"watchers_count": 1346,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1345,
"watchers": 1346,
"score": 0,
"subscribers_count": 15
}

View file

@ -138,10 +138,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-12-16T13:58:02Z",
"updated_at": "2024-12-20T15:10:07Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1080,
"watchers_count": 1080,
"stargazers_count": 1081,
"watchers_count": 1081,
"has_discussions": false,
"forks_count": 318,
"allow_forking": true,
@ -154,7 +154,7 @@
],
"visibility": "public",
"forks": 318,
"watchers": 1080,
"watchers": 1081,
"score": 0,
"subscribers_count": 36
},

View file

@ -45,8 +45,8 @@
"description": "Results of my research I have done on CVE-2021-30481 and on wallhacks in the videogame Counter-Strike 2",
"fork": false,
"created_at": "2024-05-31T09:43:39Z",
"updated_at": "2024-12-19T16:14:05Z",
"pushed_at": "2024-12-19T16:14:01Z",
"updated_at": "2024-12-20T14:47:16Z",
"pushed_at": "2024-12-20T14:47:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -967,10 +967,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-12-20T11:33:35Z",
"updated_at": "2024-12-20T18:15:39Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 1093,
"watchers_count": 1093,
"stargazers_count": 1092,
"watchers_count": 1092,
"has_discussions": false,
"forks_count": 190,
"allow_forking": true,
@ -981,7 +981,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 1093,
"watchers": 1092,
"score": 0,
"subscribers_count": 13
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2024-12-20T11:55:12Z",
"updated_at": "2024-12-20T13:18:25Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1346,
"watchers_count": 1346,
"stargazers_count": 1347,
"watchers_count": 1347,
"has_discussions": false,
"forks_count": 322,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 322,
"watchers": 1346,
"watchers": 1347,
"score": 0,
"subscribers_count": 27
},

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-20T11:55:13Z",
"updated_at": "2024-12-20T16:42:37Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1345,
"watchers_count": 1345,
"stargazers_count": 1346,
"watchers_count": 1346,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1345,
"watchers": 1346,
"score": 0,
"subscribers_count": 15
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 22,
"score": 0,
"subscribers_count": 3

View file

@ -45,10 +45,10 @@
"description": "harbor unauthorized detection",
"fork": false,
"created_at": "2023-03-21T10:40:19Z",
"updated_at": "2024-12-12T07:37:05Z",
"updated_at": "2024-12-20T12:32:30Z",
"pushed_at": "2024-12-12T07:37:01Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2024-12-11T09:20:43Z",
"updated_at": "2024-12-20T16:45:50Z",
"pushed_at": "2023-07-10T16:35:49Z",
"stargazers_count": 485,
"watchers_count": 485,
"stargazers_count": 486,
"watchers_count": 486,
"has_discussions": false,
"forks_count": 163,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 163,
"watchers": 485,
"watchers": 486,
"score": 0,
"subscribers_count": 10
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-26269: Misconfigured JMX in Apache James",
"fork": false,
"created_at": "2023-11-23T21:55:30Z",
"updated_at": "2023-11-26T12:24:28Z",
"updated_at": "2024-12-20T14:21:01Z",
"pushed_at": "2023-11-23T22:10:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-19T19:33:11Z",
"updated_at": "2024-12-20T13:21:17Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1304,
"watchers_count": 1304,
"stargazers_count": 1305,
"watchers_count": 1305,
"has_discussions": false,
"forks_count": 221,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 221,
"watchers": 1304,
"watchers": 1305,
"score": 0,
"subscribers_count": 21
},
@ -215,5 +215,36 @@
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 906344035,
"name": "RustyInjector",
"full_name": "xG3nesis\/RustyInjector",
"owner": {
"login": "xG3nesis",
"id": 83365854,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83365854?v=4",
"html_url": "https:\/\/github.com\/xG3nesis",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xG3nesis\/RustyInjector",
"description": "Rust implementation of Marc Newlin's keystroke injection proof of concept (CVE-2023-45866).",
"fork": false,
"created_at": "2024-12-20T17:28:48Z",
"updated_at": "2024-12-20T18:17:10Z",
"pushed_at": "2024-12-20T18:14:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -211,13 +211,13 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
"fork": false,
"created_at": "2024-04-22T07:05:04Z",
"updated_at": "2024-11-21T05:24:13Z",
"updated_at": "2024-12-20T15:01:42Z",
"pushed_at": "2024-05-09T16:39:55Z",
"stargazers_count": 216,
"watchers_count": 216,
"stargazers_count": 217,
"watchers_count": 217,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 216,
"watchers": 217,
"score": 0,
"subscribers_count": 5
},

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit",
"fork": false,
"created_at": "2024-02-03T11:33:40Z",
"updated_at": "2024-09-27T09:59:10Z",
"updated_at": "2024-12-20T14:07:58Z",
"pushed_at": "2024-02-03T11:48:37Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-24T13:43:36Z",
"updated_at": "2024-11-27T12:03:02Z",
"updated_at": "2024-12-20T15:01:41Z",
"pushed_at": "2024-11-27T12:02:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -1856,10 +1856,10 @@
"description": "CVE-2024-3094 (XZ Backdoor) Tools",
"fork": false,
"created_at": "2024-12-01T05:22:08Z",
"updated_at": "2024-12-08T18:31:57Z",
"updated_at": "2024-12-20T17:22:03Z",
"pushed_at": "2024-12-01T05:30:15Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1868,7 +1868,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-35176 poc full",
"fork": false,
"created_at": "2024-12-19T19:01:53Z",
"updated_at": "2024-12-20T04:36:02Z",
"updated_at": "2024-12-20T18:19:26Z",
"pushed_at": "2024-12-19T22:16:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-12-20T11:19:12Z",
"updated_at": "2024-12-20T14:02:51Z",
"pushed_at": "2024-11-29T16:56:23Z",
"stargazers_count": 244,
"watchers_count": 244,
"stargazers_count": 245,
"watchers_count": 245,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 244,
"watchers": 245,
"score": 0,
"subscribers_count": 6
},

View file

@ -510,10 +510,10 @@
"description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
"fork": false,
"created_at": "2024-06-08T12:23:35Z",
"updated_at": "2024-12-15T22:43:59Z",
"updated_at": "2024-12-20T16:00:38Z",
"pushed_at": "2024-06-19T16:19:57Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -529,7 +529,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 1
},

View file

@ -76,10 +76,10 @@
"description": "Apache TomcatCVE-2024-50379条件竞争致远程代码执行漏洞批量检测脚本",
"fork": false,
"created_at": "2024-12-20T05:24:10Z",
"updated_at": "2024-12-20T07:49:45Z",
"updated_at": "2024-12-20T16:26:15Z",
"pushed_at": "2024-12-20T05:41:23Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}

View file

@ -50,13 +50,13 @@
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 63,
"score": 0,
"subscribers_count": 3
@ -107,7 +107,7 @@
"description": "A Docker-based environment to reproduce the CVE-2024-53677 vulnerability in Apache Struts 2. ",
"fork": false,
"created_at": "2024-12-17T06:42:16Z",
"updated_at": "2024-12-19T05:46:48Z",
"updated_at": "2024-12-20T15:57:49Z",
"pushed_at": "2024-12-17T07:01:11Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -14,19 +14,19 @@
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
"fork": false,
"created_at": "2024-12-20T03:34:01Z",
"updated_at": "2024-12-20T10:53:27Z",
"updated_at": "2024-12-20T16:05:03Z",
"pushed_at": "2024-12-20T04:26:44Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"forks": 3,
"watchers": 10,
"score": 0,
"subscribers_count": 0
}

View file

@ -184,5 +184,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 906301837,
"name": "CVE-2024-7954POC",
"full_name": "zxj-hub\/CVE-2024-7954POC",
"owner": {
"login": "zxj-hub",
"id": 192207002,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192207002?v=4",
"html_url": "https:\/\/github.com\/zxj-hub",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zxj-hub\/CVE-2024-7954POC",
"description": "SPIP 4.30-alpha2、4.2.13、4.1.16之前的版本使用的porte_plume插件存在任意代码执行漏洞远程未经身份验证的攻击者可以通过发送精心设计的HTTP 请求以SPIP用户身份执行任意PHP代码。",
"fork": false,
"created_at": "2024-12-20T15:40:35Z",
"updated_at": "2024-12-20T15:40:39Z",
"pushed_at": "2024-12-20T15:40:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1647,6 +1647,7 @@
- [TheCyberguy-17/RCE_CVE-2024-7954](https://github.com/TheCyberguy-17/RCE_CVE-2024-7954)
- [MuhammadWaseem29/RCE-CVE-2024-7954](https://github.com/MuhammadWaseem29/RCE-CVE-2024-7954)
- [issamjr/CVE-2024-7954](https://github.com/issamjr/CVE-2024-7954)
- [zxj-hub/CVE-2024-7954POC](https://github.com/zxj-hub/CVE-2024-7954POC)
### CVE-2024-7965 (2024-08-21)
@ -7561,7 +7562,7 @@
### CVE-2024-53677 (2024-12-11)
<code>File upload logic is flawed vulnerability in Apache Struts.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload .\n\nYou can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067
<code>File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.\n\nYou can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067
</code>
- [cloudwafs/s2-067-CVE-2024-53677](https://github.com/cloudwafs/s2-067-CVE-2024-53677)
@ -14753,6 +14754,7 @@
- [AvishekDhakal/CVE-2023-45866_EXPLOITS](https://github.com/AvishekDhakal/CVE-2023-45866_EXPLOITS)
- [Chedrian07/CVE-2023-45866-POC](https://github.com/Chedrian07/CVE-2023-45866-POC)
- [Danyw24/blueXploit](https://github.com/Danyw24/blueXploit)
- [xG3nesis/RustyInjector](https://github.com/xG3nesis/RustyInjector)
### CVE-2023-45966 (2023-10-23)