mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2026-05-14 18:57:08 +02:00
Auto Update 2026/05/06 06:53:55
This commit is contained in:
parent
cad6e44a21
commit
e99de194a0
118 changed files with 1050 additions and 1029 deletions
|
|
@ -14,12 +14,12 @@
|
|||
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T18:59:28Z",
|
||||
"updated_at": "2026-04-30T00:16:44Z",
|
||||
"updated_at": "2026-05-06T00:33:19Z",
|
||||
"pushed_at": "2021-06-06T09:41:51Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -27,8 +27,8 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 70,
|
||||
"forks": 6,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
|||
|
|
@ -113,10 +113,10 @@
|
|||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197,CVE-2026-40466)",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-20T02:38:50Z",
|
||||
"updated_at": "2026-05-05T08:27:46Z",
|
||||
"updated_at": "2026-05-06T02:08:22Z",
|
||||
"pushed_at": "2026-04-30T07:19:22Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
|
@ -127,7 +127,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠️ Validate and demonstrate CVE-2016-15042 with a Dockerized lab for unauthenticated file uploads in WordPress file managers.",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-23T05:54:10Z",
|
||||
"updated_at": "2026-05-05T21:54:32Z",
|
||||
"pushed_at": "2026-05-05T21:54:28Z",
|
||||
"updated_at": "2026-05-06T04:10:18Z",
|
||||
"pushed_at": "2026-05-06T04:10:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -249,10 +249,10 @@
|
|||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197,CVE-2026-40466)",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-20T02:38:50Z",
|
||||
"updated_at": "2026-05-05T08:27:46Z",
|
||||
"updated_at": "2026-05-06T02:08:22Z",
|
||||
"pushed_at": "2026-04-30T07:19:22Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
|
@ -263,7 +263,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
|||
|
|
@ -626,10 +626,10 @@
|
|||
"description": "CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-20T05:28:04Z",
|
||||
"updated_at": "2026-04-12T08:25:51Z",
|
||||
"updated_at": "2026-05-06T04:29:49Z",
|
||||
"pushed_at": "2017-01-27T10:04:07Z",
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"has_discussions": false,
|
||||
"forks_count": 102,
|
||||
"allow_forking": true,
|
||||
|
|
@ -640,7 +640,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 102,
|
||||
"watchers": 272,
|
||||
"watchers": 271,
|
||||
"score": 0,
|
||||
"subscribers_count": 20
|
||||
},
|
||||
|
|
|
|||
|
|
@ -179,8 +179,8 @@
|
|||
"description": "The Windows Print Spooler privilege escalation vulnerability (CVE-2019-1040\/CVE-2019-1019) has been implemented as a Reflective DLL for penetration testing.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-06T19:56:12Z",
|
||||
"updated_at": "2026-05-06T00:01:57Z",
|
||||
"pushed_at": "2026-05-06T00:01:53Z",
|
||||
"updated_at": "2026-05-06T03:58:48Z",
|
||||
"pushed_at": "2026-05-06T03:58:44Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -58,8 +58,8 @@
|
|||
"description": "🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.",
|
||||
"fork": false,
|
||||
"created_at": "2025-09-04T13:21:35Z",
|
||||
"updated_at": "2026-05-05T21:54:22Z",
|
||||
"pushed_at": "2026-05-05T21:54:18Z",
|
||||
"updated_at": "2026-05-06T04:10:17Z",
|
||||
"pushed_at": "2026-05-06T04:10:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -47,10 +47,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2026-05-05T04:33:22Z",
|
||||
"updated_at": "2026-05-06T01:04:01Z",
|
||||
"pushed_at": "2025-06-27T07:13:13Z",
|
||||
"stargazers_count": 1811,
|
||||
"watchers_count": 1811,
|
||||
"stargazers_count": 1812,
|
||||
"watchers_count": 1812,
|
||||
"has_discussions": false,
|
||||
"forks_count": 358,
|
||||
"allow_forking": true,
|
||||
|
|
@ -61,7 +61,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 358,
|
||||
"watchers": 1811,
|
||||
"watchers": 1812,
|
||||
"score": 0,
|
||||
"subscribers_count": 84
|
||||
},
|
||||
|
|
@ -2383,8 +2383,8 @@
|
|||
"description": "Zerologon (CVE-2020-1472) Proof-of-Concept application - Critical Active Directory vulnerability exploitation tool.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-06T10:17:38Z",
|
||||
"updated_at": "2026-05-05T23:59:14Z",
|
||||
"pushed_at": "2026-05-05T23:59:09Z",
|
||||
"updated_at": "2026-05-06T05:44:58Z",
|
||||
"pushed_at": "2026-05-06T05:44:54Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -212,8 +212,8 @@
|
|||
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-28T17:42:44Z",
|
||||
"updated_at": "2026-05-06T00:07:08Z",
|
||||
"pushed_at": "2026-05-06T00:07:05Z",
|
||||
"updated_at": "2026-05-06T04:03:12Z",
|
||||
"pushed_at": "2026-05-06T04:03:08Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -2050,8 +2050,8 @@
|
|||
"description": "🚀 Enhance your penetration testing with PwnKit Helper, a simple tool for exploiting the CVE-2021-4034 vulnerability in pkexec for local privilege escalation.",
|
||||
"fork": false,
|
||||
"created_at": "2025-10-01T09:53:03Z",
|
||||
"updated_at": "2026-05-05T22:01:24Z",
|
||||
"pushed_at": "2026-05-05T22:01:20Z",
|
||||
"updated_at": "2026-05-06T04:17:01Z",
|
||||
"pushed_at": "2026-05-06T04:16:56Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -245,10 +245,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2026-05-05T22:11:59Z",
|
||||
"updated_at": "2026-05-06T01:28:56Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1733,
|
||||
"watchers_count": 1733,
|
||||
"stargazers_count": 1734,
|
||||
"watchers_count": 1734,
|
||||
"has_discussions": false,
|
||||
"forks_count": 477,
|
||||
"allow_forking": true,
|
||||
|
|
@ -259,7 +259,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 477,
|
||||
"watchers": 1733,
|
||||
"watchers": 1734,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
@ -575,10 +575,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2026-04-07T07:50:25Z",
|
||||
"updated_at": "2026-05-06T01:28:54Z",
|
||||
"pushed_at": "2023-10-11T18:44:51Z",
|
||||
"stargazers_count": 824,
|
||||
"watchers_count": 824,
|
||||
"stargazers_count": 825,
|
||||
"watchers_count": 825,
|
||||
"has_discussions": false,
|
||||
"forks_count": 166,
|
||||
"allow_forking": true,
|
||||
|
|
@ -596,7 +596,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 166,
|
||||
"watchers": 824,
|
||||
"watchers": 825,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-16T16:02:47Z",
|
||||
"updated_at": "2024-01-22T19:06:04Z",
|
||||
"updated_at": "2026-05-06T02:21:13Z",
|
||||
"pushed_at": "2022-10-16T18:12:47Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
|||
|
|
@ -588,10 +588,10 @@
|
|||
"description": "vulnerability POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T17:13:18Z",
|
||||
"updated_at": "2023-08-15T12:50:54Z",
|
||||
"updated_at": "2026-05-06T01:28:39Z",
|
||||
"pushed_at": "2021-12-17T17:16:30Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
|
@ -606,7 +606,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -212,10 +212,10 @@
|
|||
"description": "Proof of concept of CVE-2022-24086",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-20T13:44:52Z",
|
||||
"updated_at": "2024-08-12T20:28:57Z",
|
||||
"updated_at": "2026-05-06T02:06:28Z",
|
||||
"pushed_at": "2022-12-20T15:10:18Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
|
@ -226,7 +226,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -2461,5 +2461,38 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1230429140,
|
||||
"name": "CVE-2022-26134-OGNL-Injection",
|
||||
"full_name": "roodhelios\/CVE-2022-26134-OGNL-Injection",
|
||||
"owner": {
|
||||
"login": "roodhelios",
|
||||
"id": 83717675,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83717675?v=4",
|
||||
"html_url": "https:\/\/github.com\/roodhelios",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/roodhelios\/CVE-2022-26134-OGNL-Injection",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-05-06T01:47:50Z",
|
||||
"updated_at": "2026-05-06T01:48:03Z",
|
||||
"pushed_at": "2026-05-06T01:48:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-23T15:03:09Z",
|
||||
"updated_at": "2026-02-20T06:34:31Z",
|
||||
"updated_at": "2026-05-06T01:28:31Z",
|
||||
"pushed_at": "2022-03-26T05:52:15Z",
|
||||
"stargazers_count": 467,
|
||||
"watchers_count": 467,
|
||||
"stargazers_count": 468,
|
||||
"watchers_count": 468,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 467,
|
||||
"watchers": 468,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
}
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Foxit PDF Reader Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-02T18:52:20Z",
|
||||
"updated_at": "2026-04-10T22:35:15Z",
|
||||
"updated_at": "2026-05-06T00:33:20Z",
|
||||
"pushed_at": "2023-12-05T12:22:45Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
|
@ -39,7 +39,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 120,
|
||||
"watchers": 121,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
|||
|
|
@ -819,15 +819,15 @@
|
|||
{
|
||||
"id": 632383541,
|
||||
"name": "CVE-2022-29464",
|
||||
"full_name": "ThatNotEasy\/CVE-2022-29464",
|
||||
"full_name": "Ap0dexMe0\/CVE-2022-29464",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2022-29464",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2022-29464",
|
||||
"description": "Perform With Mass Exploits In WSO Management.",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-25T09:45:18Z",
|
||||
|
|
|
|||
|
|
@ -88,10 +88,10 @@
|
|||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197,CVE-2026-40466)",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-20T02:38:50Z",
|
||||
"updated_at": "2026-05-05T08:27:46Z",
|
||||
"updated_at": "2026-05-06T02:08:22Z",
|
||||
"pushed_at": "2026-04-30T07:19:22Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
|
@ -102,7 +102,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
|||
|
|
@ -645,15 +645,15 @@
|
|||
{
|
||||
"id": 625551982,
|
||||
"name": "CVE-2023-23752",
|
||||
"full_name": "ThatNotEasy\/CVE-2023-23752",
|
||||
"full_name": "Ap0dexMe0\/CVE-2023-23752",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2023-23752",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2023-23752",
|
||||
"description": "Perform With Mass Exploiter In Joomla 4.2.8.",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-09T13:20:48Z",
|
||||
|
|
|
|||
|
|
@ -68,15 +68,15 @@
|
|||
{
|
||||
"id": 674914853,
|
||||
"name": "CVE-2023-2732",
|
||||
"full_name": "ThatNotEasy\/CVE-2023-2732",
|
||||
"full_name": "Ap0dexMe0\/CVE-2023-2732",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2023-2732",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2023-2732",
|
||||
"description": "Perform With Massive Authentication Bypass (Wordpress Mstore-API)",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-05T06:38:53Z",
|
||||
|
|
|
|||
|
|
@ -134,15 +134,15 @@
|
|||
{
|
||||
"id": 646129279,
|
||||
"name": "CVE-2023-27350",
|
||||
"full_name": "ThatNotEasy\/CVE-2023-27350",
|
||||
"full_name": "Ap0dexMe0\/CVE-2023-27350",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2023-27350",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2023-27350",
|
||||
"description": "Perfom With Massive Authentication Bypass In PaperCut MF\/NG",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-27T11:32:35Z",
|
||||
|
|
|
|||
|
|
@ -182,15 +182,15 @@
|
|||
{
|
||||
"id": 673080065,
|
||||
"name": "CVE-2023-27372",
|
||||
"full_name": "ThatNotEasy\/CVE-2023-27372",
|
||||
"full_name": "Ap0dexMe0\/CVE-2023-27372",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2023-27372",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2023-27372",
|
||||
"description": "Perform With Mass Remote Code Execution In SPIP Version (4.2.1)",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-31T20:32:36Z",
|
||||
|
|
|
|||
|
|
@ -134,15 +134,15 @@
|
|||
{
|
||||
"id": 636446962,
|
||||
"name": "CVE-2023-27524",
|
||||
"full_name": "ThatNotEasy\/CVE-2023-27524",
|
||||
"full_name": "Ap0dexMe0\/CVE-2023-27524",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2023-27524",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2023-27524",
|
||||
"description": "Perform With Apache-SuperSet Leaked Token [CSRF]",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-04T21:43:48Z",
|
||||
|
|
|
|||
|
|
@ -134,15 +134,15 @@
|
|||
{
|
||||
"id": 661434094,
|
||||
"name": "CVE-2023-32315",
|
||||
"full_name": "ThatNotEasy\/CVE-2023-32315",
|
||||
"full_name": "Ap0dexMe0\/CVE-2023-32315",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2023-32315",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2023-32315",
|
||||
"description": "Perform With Massive Openfire Unauthenticated Users",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-02T20:38:14Z",
|
||||
|
|
|
|||
|
|
@ -47,8 +47,8 @@
|
|||
"description": "oob_entry tfp0 kernel exploit for armv7 iOS (iOS 3.0–10.3.4), using CVE-2023-32434. We will publish a write-up detailing the methods in the coming weeks. 🐙",
|
||||
"fork": false,
|
||||
"created_at": "2025-08-13T09:19:29Z",
|
||||
"updated_at": "2026-05-06T00:33:03Z",
|
||||
"pushed_at": "2026-05-06T00:32:59Z",
|
||||
"updated_at": "2026-05-06T04:06:27Z",
|
||||
"pushed_at": "2026-05-06T04:06:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -108,15 +108,15 @@
|
|||
{
|
||||
"id": 669383465,
|
||||
"name": "CVE-2023-34960",
|
||||
"full_name": "ThatNotEasy\/CVE-2023-34960",
|
||||
"full_name": "Ap0dexMe0\/CVE-2023-34960",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2023-34960",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2023-34960",
|
||||
"description": "Perform with Massive Command Injection (Chamilo)",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-22T05:27:45Z",
|
||||
|
|
|
|||
|
|
@ -35,15 +35,15 @@
|
|||
{
|
||||
"id": 693937452,
|
||||
"name": "CVE-2023-36844",
|
||||
"full_name": "ThatNotEasy\/CVE-2023-36844",
|
||||
"full_name": "Ap0dexMe0\/CVE-2023-36844",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2023-36844",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2023-36844",
|
||||
"description": "Perform With Massive Juniper Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-20T02:32:56Z",
|
||||
|
|
|
|||
|
|
@ -66,8 +66,8 @@
|
|||
"description": "🔒 Analyze the CVE-2023-39910 vulnerability in Libbitcoin Explorer to understand its impact on Bitcoin wallet security and protect your assets.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-07T14:24:08Z",
|
||||
"updated_at": "2026-05-05T22:55:47Z",
|
||||
"pushed_at": "2026-05-05T22:55:43Z",
|
||||
"updated_at": "2026-05-06T05:10:28Z",
|
||||
"pushed_at": "2026-05-06T05:10:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 731273709,
|
||||
"name": "CVE-2023-4636",
|
||||
"full_name": "ThatNotEasy\/CVE-2023-4636",
|
||||
"full_name": "Ap0dexMe0\/CVE-2023-4636",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2023-4636",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2023-4636",
|
||||
"description": "Unauthenticated Remote Code Execution with default Imagick",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-13T17:59:02Z",
|
||||
|
|
|
|||
|
|
@ -1078,10 +1078,10 @@
|
|||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197,CVE-2026-40466)",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-20T02:38:50Z",
|
||||
"updated_at": "2026-05-05T08:27:46Z",
|
||||
"updated_at": "2026-05-06T02:08:22Z",
|
||||
"pushed_at": "2026-04-30T07:19:22Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
|
@ -1092,7 +1092,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -30,7 +30,7 @@
|
|||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 935598432,
|
||||
|
|
|
|||
|
|
@ -172,8 +172,8 @@
|
|||
"description": "🔍 Exploit CVE-2024-0670 in CheckMK agents for local privilege escalation using a robust C++ tool designed for security professionals.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-08T01:32:09Z",
|
||||
"updated_at": "2026-05-05T22:56:17Z",
|
||||
"pushed_at": "2026-05-05T22:56:12Z",
|
||||
"updated_at": "2026-05-06T05:10:53Z",
|
||||
"pushed_at": "2026-05-06T05:10:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -80,8 +80,8 @@
|
|||
"description": "Analyze and deobfuscate the Coruna Exploit Kit (CVE-2024-23222) to enhance understanding and detection of related threats.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-15T16:36:07Z",
|
||||
"updated_at": "2026-05-05T23:39:28Z",
|
||||
"pushed_at": "2026-05-05T23:39:24Z",
|
||||
"updated_at": "2026-05-06T05:56:20Z",
|
||||
"pushed_at": "2026-05-06T05:56:17Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -669,15 +669,15 @@
|
|||
{
|
||||
"id": 759622445,
|
||||
"name": "CVE-2024-23897",
|
||||
"full_name": "ThatNotEasy\/CVE-2024-23897",
|
||||
"full_name": "Ap0dexMe0\/CVE-2024-23897",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-23897",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2024-23897",
|
||||
"description": "Perform with massive Jenkins Reading-2-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-19T02:29:12Z",
|
||||
|
|
|
|||
|
|
@ -395,15 +395,15 @@
|
|||
{
|
||||
"id": 827369395,
|
||||
"name": "CVE-2024-27956",
|
||||
"full_name": "ThatNotEasy\/CVE-2024-27956",
|
||||
"full_name": "Ap0dexMe0\/CVE-2024-27956",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-27956",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2024-27956",
|
||||
"description": "Perform with massive Wordpress SQLI 2 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-11T14:17:23Z",
|
||||
|
|
|
|||
|
|
@ -245,8 +245,8 @@
|
|||
"description": "Go offensive-security research library — 15+ injection methods, AMSI\/ETW\/ntdll-unhook evasion, sleep mask (Ekko × XOR\/RC4\/AES), call-stack spoof, BYOVD (RTCore64) + kernel callback removal, LSASS dump + pure-Go MSV1_0 parser w\/ PPL bypass, recon (sandbox\/VM\/debugger\/dllhijack), PE ops (sRDI\/BOF\/CLR), Meterpreter C2, UAC bypass, CVE-2024-30088 LPE.",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-01T08:15:08Z",
|
||||
"updated_at": "2026-05-05T14:21:43Z",
|
||||
"pushed_at": "2026-05-05T14:19:36Z",
|
||||
"updated_at": "2026-05-06T06:34:41Z",
|
||||
"pushed_at": "2026-05-06T06:34:40Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": true,
|
||||
|
|
|
|||
|
|
@ -85,7 +85,7 @@
|
|||
"stargazers_count": 531,
|
||||
"watchers_count": 531,
|
||||
"has_discussions": false,
|
||||
"forks_count": 152,
|
||||
"forks_count": 151,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -98,7 +98,7 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 152,
|
||||
"forks": 151,
|
||||
"watchers": 531,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197,CVE-2026-40466)",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-20T02:38:50Z",
|
||||
"updated_at": "2026-05-05T08:27:46Z",
|
||||
"updated_at": "2026-05-06T02:08:22Z",
|
||||
"pushed_at": "2026-04-30T07:19:22Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
|||
|
|
@ -150,15 +150,15 @@
|
|||
{
|
||||
"id": 784490856,
|
||||
"name": "CVE-2024-3273",
|
||||
"full_name": "ThatNotEasy\/CVE-2024-3273",
|
||||
"full_name": "Ap0dexMe0\/CVE-2024-3273",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-3273",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2024-3273",
|
||||
"description": "D-Link NAS Command Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-10T00:27:02Z",
|
||||
|
|
|
|||
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -27,7 +27,7 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"forks": 18,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
|||
|
|
@ -43,15 +43,15 @@
|
|||
{
|
||||
"id": 840564456,
|
||||
"name": "CVE-2024-38856",
|
||||
"full_name": "ThatNotEasy\/CVE-2024-38856",
|
||||
"full_name": "Ap0dexMe0\/CVE-2024-38856",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-38856",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2024-38856",
|
||||
"description": "Perform With Massive Apache OFBiz Zero-Day Scanner & RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-10T03:05:34Z",
|
||||
|
|
|
|||
|
|
@ -2505,15 +2505,15 @@
|
|||
{
|
||||
"id": 829031934,
|
||||
"name": "CVE-2024-6387",
|
||||
"full_name": "ThatNotEasy\/CVE-2024-6387",
|
||||
"full_name": "Ap0dexMe0\/CVE-2024-6387",
|
||||
"owner": {
|
||||
"login": "ThatNotEasy",
|
||||
"login": "Ap0dexMe0",
|
||||
"id": 25004320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-6387",
|
||||
"html_url": "https:\/\/github.com\/Ap0dexMe0\/CVE-2024-6387",
|
||||
"description": "OpenSSH RCE Massive Vulnerable Scanner",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-15T16:04:57Z",
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠 Exploit the CVE-2025-14847 vulnerability in MongoDB to disclose sensitive heap memory using a Python script that analyzes responses for new leaked data.",
|
||||
"fork": false,
|
||||
"created_at": "2025-07-30T15:52:00Z",
|
||||
"updated_at": "2026-05-05T23:01:01Z",
|
||||
"pushed_at": "2026-05-05T23:00:57Z",
|
||||
"updated_at": "2026-05-06T05:15:56Z",
|
||||
"pushed_at": "2026-05-06T05:15:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -1129,8 +1129,8 @@
|
|||
"description": "🔍 Scan for MongoDB vulnerabilities with MongoBleed, a high-performance tool for detecting CVE-2025-14847 across large networks quickly and efficiently.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-14T06:05:44Z",
|
||||
"updated_at": "2026-05-05T23:00:06Z",
|
||||
"pushed_at": "2026-05-05T23:00:02Z",
|
||||
"updated_at": "2026-05-06T05:14:56Z",
|
||||
"pushed_at": "2026-05-06T05:14:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -80,12 +80,12 @@
|
|||
"description": "LPE due to integer truncation in vskrnlintvsp.sys",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T20:41:08Z",
|
||||
"updated_at": "2026-05-05T23:08:28Z",
|
||||
"updated_at": "2026-05-06T05:05:11Z",
|
||||
"pushed_at": "2026-05-05T21:00:17Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -93,8 +93,8 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
|||
|
|
@ -412,8 +412,8 @@
|
|||
"description": "🛠️ Exploit CVE-2025-2304 in Camaleon CMS easily with this Python script for privilege escalation, tested on version 2.9.0.",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-14T20:01:20Z",
|
||||
"updated_at": "2026-05-05T23:20:36Z",
|
||||
"pushed_at": "2026-05-05T23:20:33Z",
|
||||
"updated_at": "2026-05-06T05:36:46Z",
|
||||
"pushed_at": "2026-05-06T05:36:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Demonstrate CVE-2025-24257 with a public PoC for IOGPUFamily kernel heap OOB read\/write and panic analysis",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-04T03:42:55Z",
|
||||
"updated_at": "2026-05-05T23:50:26Z",
|
||||
"pushed_at": "2026-05-05T23:50:22Z",
|
||||
"updated_at": "2026-05-06T06:08:14Z",
|
||||
"pushed_at": "2026-05-06T06:08:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -1661,10 +1661,10 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EQSTLab\/CVE-2025-24813",
|
||||
"description": null,
|
||||
"description": "Apache Tomcat RCE",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-26T08:46:14Z",
|
||||
"updated_at": "2026-03-27T07:20:55Z",
|
||||
"updated_at": "2026-05-06T01:19:42Z",
|
||||
"pushed_at": "2026-03-27T07:20:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
|||
|
|
@ -11,10 +11,10 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EQSTLab\/CVE-2025-26788",
|
||||
"description": null,
|
||||
"description": "Strongkey FIDO Server Authorization Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2025-08-18T09:09:46Z",
|
||||
"updated_at": "2025-09-22T05:55:21Z",
|
||||
"updated_at": "2026-05-06T01:21:36Z",
|
||||
"pushed_at": "2025-09-22T05:55:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
|||
|
|
@ -775,8 +775,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-03-04T07:29:12Z",
|
||||
"updated_at": "2026-05-05T17:34:39Z",
|
||||
"pushed_at": "2026-05-05T17:57:14Z",
|
||||
"updated_at": "2026-05-06T05:24:17Z",
|
||||
"pushed_at": "2026-05-06T05:35:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-23T15:20:11Z",
|
||||
"updated_at": "2026-05-06T00:38:23Z",
|
||||
"pushed_at": "2026-05-06T00:38:18Z",
|
||||
"updated_at": "2026-05-06T04:12:00Z",
|
||||
"pushed_at": "2026-05-06T04:11:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -645,8 +645,8 @@
|
|||
"description": "Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒",
|
||||
"fork": false,
|
||||
"created_at": "2025-07-04T18:20:09Z",
|
||||
"updated_at": "2026-05-06T00:31:46Z",
|
||||
"pushed_at": "2026-05-06T00:31:42Z",
|
||||
"updated_at": "2026-05-06T04:05:00Z",
|
||||
"pushed_at": "2026-05-06T04:04:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -1628,8 +1628,8 @@
|
|||
"description": "🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment.",
|
||||
"fork": false,
|
||||
"created_at": "2025-09-20T00:42:07Z",
|
||||
"updated_at": "2026-05-06T00:39:32Z",
|
||||
"pushed_at": "2026-05-06T00:39:29Z",
|
||||
"updated_at": "2026-05-06T04:13:13Z",
|
||||
"pushed_at": "2026-05-06T04:13:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -1680,8 +1680,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-09-20T02:01:08Z",
|
||||
"updated_at": "2026-05-06T00:39:34Z",
|
||||
"pushed_at": "2026-05-06T00:39:30Z",
|
||||
"updated_at": "2026-05-06T04:13:16Z",
|
||||
"pushed_at": "2026-05-06T04:13:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -294,8 +294,8 @@
|
|||
"description": "🔍 Scan and research CVE-2025-36911 vulnerabilities with WPair, a specialized tool for Android built in Kotlin, ensuring your applications remain secure.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-29T01:59:47Z",
|
||||
"updated_at": "2026-05-05T23:11:13Z",
|
||||
"pushed_at": "2026-05-05T23:11:09Z",
|
||||
"updated_at": "2026-05-06T05:26:55Z",
|
||||
"pushed_at": "2026-05-06T05:26:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -251,8 +251,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-09-19T17:17:19Z",
|
||||
"updated_at": "2026-05-06T00:39:30Z",
|
||||
"pushed_at": "2026-05-06T00:39:26Z",
|
||||
"updated_at": "2026-05-06T04:13:03Z",
|
||||
"pushed_at": "2026-05-06T04:12:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research.",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-13T07:51:09Z",
|
||||
"updated_at": "2026-05-05T22:16:14Z",
|
||||
"pushed_at": "2026-05-05T22:16:10Z",
|
||||
"updated_at": "2026-05-06T04:31:30Z",
|
||||
"pushed_at": "2026-05-06T04:31:27Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -66,8 +66,8 @@
|
|||
"description": "🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-06T09:27:39Z",
|
||||
"updated_at": "2026-05-05T22:17:02Z",
|
||||
"pushed_at": "2026-05-05T22:16:59Z",
|
||||
"updated_at": "2026-05-06T04:32:22Z",
|
||||
"pushed_at": "2026-05-06T04:32:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-05T14:52:11Z",
|
||||
"updated_at": "2026-05-05T15:52:07Z",
|
||||
"updated_at": "2026-05-06T02:22:40Z",
|
||||
"pushed_at": "2026-05-05T15:33:57Z",
|
||||
"stargazers_count": 718,
|
||||
"watchers_count": 718,
|
||||
"stargazers_count": 719,
|
||||
"watchers_count": 719,
|
||||
"has_discussions": false,
|
||||
"forks_count": 108,
|
||||
"allow_forking": true,
|
||||
|
|
@ -37,7 +37,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 108,
|
||||
"watchers": 718,
|
||||
"watchers": 719,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
}
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛡️ Analyze CVE-2025-5419 to exploit an uninitialized read vulnerability in V8 for arbitrary read\/write access within the sandbox environment.",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-25T04:41:49Z",
|
||||
"updated_at": "2026-05-05T23:19:02Z",
|
||||
"pushed_at": "2026-05-05T23:18:58Z",
|
||||
"updated_at": "2026-05-06T05:34:56Z",
|
||||
"pushed_at": "2026-05-06T05:34:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -67,8 +67,8 @@
|
|||
"description": "🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.",
|
||||
"fork": false,
|
||||
"created_at": "2025-08-17T22:04:33Z",
|
||||
"updated_at": "2026-05-06T00:34:14Z",
|
||||
"pushed_at": "2026-05-06T00:34:10Z",
|
||||
"updated_at": "2026-05-06T04:07:43Z",
|
||||
"pushed_at": "2026-05-06T04:07:39Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -53,8 +53,8 @@
|
|||
"description": "CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐",
|
||||
"fork": false,
|
||||
"created_at": "2025-08-14T05:16:16Z",
|
||||
"updated_at": "2026-05-06T00:33:53Z",
|
||||
"pushed_at": "2026-05-06T00:33:49Z",
|
||||
"updated_at": "2026-05-06T04:07:17Z",
|
||||
"pushed_at": "2026-05-06T04:07:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated arbitrary code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-18T02:04:33Z",
|
||||
"updated_at": "2026-05-05T22:46:41Z",
|
||||
"pushed_at": "2026-05-05T22:46:37Z",
|
||||
"updated_at": "2026-05-06T05:00:58Z",
|
||||
"pushed_at": "2026-05-06T05:00:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -66,8 +66,8 @@
|
|||
"description": "🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool that helps detect critical vulnerabilities in your applications.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-17T10:19:10Z",
|
||||
"updated_at": "2026-05-05T22:46:15Z",
|
||||
"pushed_at": "2026-05-05T22:46:11Z",
|
||||
"updated_at": "2026-05-06T05:00:33Z",
|
||||
"pushed_at": "2026-05-06T05:00:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -151,8 +151,8 @@
|
|||
"description": "🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-27T18:17:43Z",
|
||||
"updated_at": "2026-05-05T22:46:22Z",
|
||||
"pushed_at": "2026-05-05T22:46:19Z",
|
||||
"updated_at": "2026-05-06T05:00:38Z",
|
||||
"pushed_at": "2026-05-06T05:00:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -203,8 +203,8 @@
|
|||
"description": "🚨 Exploit CVE-2025-55182, a critical RCE vulnerability in React Server Components for Next.js apps; enables testing for prototype pollution risks.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-24T02:36:56Z",
|
||||
"updated_at": "2026-05-05T22:47:30Z",
|
||||
"pushed_at": "2026-05-05T22:47:25Z",
|
||||
"updated_at": "2026-05-06T05:01:39Z",
|
||||
"pushed_at": "2026-05-06T05:01:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -251,8 +251,8 @@
|
|||
"description": "🚨 Exploit and scan for CVE-2025-55182, a critical React\/Next.js vulnerability enabling remote code execution through prototype pollution techniques.",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-28T16:48:51Z",
|
||||
"updated_at": "2026-05-05T22:46:03Z",
|
||||
"pushed_at": "2026-05-05T22:45:59Z",
|
||||
"updated_at": "2026-05-06T05:00:15Z",
|
||||
"pushed_at": "2026-05-06T05:00:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -303,8 +303,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-29T12:32:19Z",
|
||||
"updated_at": "2026-05-05T22:47:00Z",
|
||||
"pushed_at": "2026-05-05T22:46:57Z",
|
||||
"updated_at": "2026-05-06T05:01:18Z",
|
||||
"pushed_at": "2026-05-06T05:01:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -352,8 +352,8 @@
|
|||
"description": "🛠️ Exploit CVE-2025-55182 effortlessly with this GUI tool for vulnerability detection, command execution, and Shell reverse connections.",
|
||||
"fork": false,
|
||||
"created_at": "2025-04-21T22:04:31Z",
|
||||
"updated_at": "2026-05-05T22:50:00Z",
|
||||
"pushed_at": "2026-05-05T22:49:56Z",
|
||||
"updated_at": "2026-05-06T05:04:06Z",
|
||||
"pushed_at": "2026-05-06T05:04:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -406,8 +406,8 @@
|
|||
"description": "🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from insecure prototype references in Next.js applications.",
|
||||
"fork": false,
|
||||
"created_at": "2025-06-06T16:34:46Z",
|
||||
"updated_at": "2026-05-05T22:46:35Z",
|
||||
"pushed_at": "2026-05-05T22:46:31Z",
|
||||
"updated_at": "2026-05-06T05:00:52Z",
|
||||
"pushed_at": "2026-05-06T05:00:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -458,8 +458,8 @@
|
|||
"description": "⚠️ Explore a vulnerable environment to test security scanners against the CVE-2025-55182 RCE flaw in React Server Components and Next.js applications.",
|
||||
"fork": false,
|
||||
"created_at": "2025-07-15T18:33:34Z",
|
||||
"updated_at": "2026-05-05T22:47:25Z",
|
||||
"pushed_at": "2026-05-05T22:47:22Z",
|
||||
"updated_at": "2026-05-06T05:01:41Z",
|
||||
"pushed_at": "2026-05-06T05:01:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -576,12 +576,12 @@
|
|||
"description": "CVE-2025-55182 POC",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-03T21:16:22Z",
|
||||
"updated_at": "2026-04-29T01:15:34Z",
|
||||
"updated_at": "2026-05-06T05:10:33Z",
|
||||
"pushed_at": "2025-12-08T21:21:26Z",
|
||||
"stargazers_count": 796,
|
||||
"watchers_count": 796,
|
||||
"stargazers_count": 797,
|
||||
"watchers_count": 797,
|
||||
"has_discussions": false,
|
||||
"forks_count": 204,
|
||||
"forks_count": 203,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -589,8 +589,8 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 204,
|
||||
"watchers": 796,
|
||||
"forks": 203,
|
||||
"watchers": 797,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
@ -1445,10 +1445,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-12-04T11:04:37Z",
|
||||
"updated_at": "2025-12-05T23:38:42Z",
|
||||
"updated_at": "2026-05-06T05:11:31Z",
|
||||
"pushed_at": "2025-12-04T11:38:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -1459,7 +1459,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -12317,8 +12317,8 @@
|
|||
"description": "🛡️ Explore CVE-2025-55182, a critical RCE vulnerability in React's Flight Protocol, demonstrating exploitation techniques and mitigation strategies.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-24T14:48:19Z",
|
||||
"updated_at": "2026-05-05T22:46:09Z",
|
||||
"pushed_at": "2026-05-05T22:46:06Z",
|
||||
"updated_at": "2026-05-06T05:00:30Z",
|
||||
"pushed_at": "2026-05-06T05:00:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -12402,8 +12402,8 @@
|
|||
"description": "🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing remote code execution without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-24T18:44:51Z",
|
||||
"updated_at": "2026-05-05T22:45:43Z",
|
||||
"pushed_at": "2026-05-05T22:45:39Z",
|
||||
"updated_at": "2026-05-06T04:59:49Z",
|
||||
"pushed_at": "2026-05-06T04:59:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -12451,8 +12451,8 @@
|
|||
"description": "🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution via prototype chain pollution in `react-server-dom-webpack@19.0.0`.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-24T18:48:07Z",
|
||||
"updated_at": "2026-05-05T22:45:34Z",
|
||||
"pushed_at": "2026-05-05T22:45:31Z",
|
||||
"updated_at": "2026-05-06T05:00:01Z",
|
||||
"pushed_at": "2026-05-06T04:59:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -12536,8 +12536,8 @@
|
|||
"description": "🔍 Exploit CVE-2025-55182 in Next.js with this versatile tool for security research, featuring advanced payloads and WAF bypass techniques.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-25T19:28:28Z",
|
||||
"updated_at": "2026-05-05T22:47:02Z",
|
||||
"pushed_at": "2026-05-05T22:46:58Z",
|
||||
"updated_at": "2026-05-06T05:01:31Z",
|
||||
"pushed_at": "2026-05-06T05:01:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -12738,8 +12738,8 @@
|
|||
"description": "⚡ Discover and exploit CVE-2025-55182 with this PoC, offering reliable remote code execution tests for React Server Components in Next.js.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-26T22:26:55Z",
|
||||
"updated_at": "2026-05-05T22:47:01Z",
|
||||
"pushed_at": "2026-05-05T22:46:58Z",
|
||||
"updated_at": "2026-05-06T05:01:17Z",
|
||||
"pushed_at": "2026-05-06T05:01:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -13008,8 +13008,8 @@
|
|||
"description": "🛡️ Scan and assess vulnerabilities in Next.js\/Waku with the CVE-2025-55182-Scanner, combining static and dynamic analysis for robust security.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-02T01:28:57Z",
|
||||
"updated_at": "2026-05-05T22:51:47Z",
|
||||
"pushed_at": "2026-05-05T22:51:43Z",
|
||||
"updated_at": "2026-05-06T05:06:11Z",
|
||||
"pushed_at": "2026-05-06T05:06:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -13529,8 +13529,8 @@
|
|||
"description": "🔍 Exploit CVE-2025-55182 vulnerabilities in Next.js and React with this efficient framework for rapid testing and assessment.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-08T16:28:04Z",
|
||||
"updated_at": "2026-05-05T22:56:52Z",
|
||||
"pushed_at": "2026-05-05T22:56:48Z",
|
||||
"updated_at": "2026-05-06T05:12:22Z",
|
||||
"pushed_at": "2026-05-06T05:12:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -289,8 +289,8 @@
|
|||
"description": "🛠️ Test and validate the CVE-2025-55184 vulnerability in React Server Components to enhance your application's security against denial-of-service attacks.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-02T05:04:03Z",
|
||||
"updated_at": "2026-05-05T22:52:17Z",
|
||||
"pushed_at": "2026-05-05T22:52:12Z",
|
||||
"updated_at": "2026-05-06T05:06:35Z",
|
||||
"pushed_at": "2026-05-06T05:06:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -200,8 +200,8 @@
|
|||
"description": "🔍 Analyze WSUS deserialization behavior to enhance security, generate reports, and identify configuration weaknesses in your infrastructure.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-29T02:16:04Z",
|
||||
"updated_at": "2026-05-05T23:11:12Z",
|
||||
"pushed_at": "2026-05-05T23:11:09Z",
|
||||
"updated_at": "2026-05-06T05:26:46Z",
|
||||
"pushed_at": "2026-05-06T05:26:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔍 Detect vulnerabilities CVE-2025-61882 and CVE-2025-61884 in Oracle E-Business Suite to help secure your systems from potential remote code execution threats.",
|
||||
"fork": false,
|
||||
"created_at": "2025-03-04T15:38:32Z",
|
||||
"updated_at": "2026-05-05T22:14:36Z",
|
||||
"pushed_at": "2026-05-05T22:14:32Z",
|
||||
"updated_at": "2026-05-06T04:30:05Z",
|
||||
"pushed_at": "2026-05-06T04:30:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -179,10 +179,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-03-02T10:34:07Z",
|
||||
"updated_at": "2026-05-05T23:30:38Z",
|
||||
"updated_at": "2026-05-06T06:26:43Z",
|
||||
"pushed_at": "2026-05-05T04:45:36Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
|
@ -193,7 +193,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
|||
|
|
@ -179,8 +179,8 @@
|
|||
"description": "🔍 Demonstrate and validate the `addressof` and `fakeobj` primitives in the V8 sandbox for advanced security research on CVE-2025-6554.",
|
||||
"fork": false,
|
||||
"created_at": "2025-08-10T21:07:43Z",
|
||||
"updated_at": "2026-05-05T22:41:25Z",
|
||||
"pushed_at": "2026-05-05T22:41:21Z",
|
||||
"updated_at": "2026-05-06T04:55:54Z",
|
||||
"pushed_at": "2026-05-06T04:55:50Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -64,8 +64,8 @@
|
|||
"description": "Demonstrate exploitation of Signal K Server CVE-2025-66398 allowing unauthenticated attackers to inject backdoor and enable remote code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-23T09:09:21Z",
|
||||
"updated_at": "2026-05-05T23:44:25Z",
|
||||
"pushed_at": "2026-05-05T23:44:22Z",
|
||||
"updated_at": "2026-05-06T06:01:36Z",
|
||||
"pushed_at": "2026-05-06T06:01:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔧 Fix vulnerable versions in Next.js and React RSC apps with one command to secure against CVE-2025-66478. Improve your app's safety effortlessly.",
|
||||
"fork": false,
|
||||
"created_at": "2025-10-01T07:40:09Z",
|
||||
"updated_at": "2026-05-05T22:47:45Z",
|
||||
"pushed_at": "2026-05-05T22:47:42Z",
|
||||
"updated_at": "2026-05-06T05:01:59Z",
|
||||
"pushed_at": "2026-05-06T05:01:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -47,8 +47,8 @@
|
|||
"description": "🔍 Identify and understand the local privilege escalation vulnerability (CVE-2025-68921) in Nahimic audio software, impacting many gaming laptops.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-24T21:00:41Z",
|
||||
"updated_at": "2026-05-05T23:08:17Z",
|
||||
"pushed_at": "2026-05-05T23:08:13Z",
|
||||
"updated_at": "2026-05-06T05:23:40Z",
|
||||
"pushed_at": "2026-05-06T05:23:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Exploit CVE-2025-69985 to bypass authentication and execute remote commands on FUXA versions ≤ 1.2.8 via the \/api\/runscript endpoint.",
|
||||
"fork": false,
|
||||
"created_at": "2025-04-10T09:18:30Z",
|
||||
"updated_at": "2026-05-05T23:32:12Z",
|
||||
"pushed_at": "2026-05-05T23:32:08Z",
|
||||
"updated_at": "2026-05-06T05:48:46Z",
|
||||
"pushed_at": "2026-05-06T05:48:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠 Exploit and control Windows processes using CVE-2025-70795 and CVE-2026-0828 with driver-based termination tools.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-20T04:18:24Z",
|
||||
"updated_at": "2026-05-05T23:28:05Z",
|
||||
"pushed_at": "2026-05-05T23:28:02Z",
|
||||
"updated_at": "2026-05-06T05:44:24Z",
|
||||
"pushed_at": "2026-05-06T05:44:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -838,8 +838,8 @@
|
|||
"description": "🛠 Exploit CVE-2025-8088 with this Python tool to generate malicious WinRAR archives that ensure payload persistence in Windows startup folders.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-20T13:52:21Z",
|
||||
"updated_at": "2026-05-05T22:42:37Z",
|
||||
"pushed_at": "2026-05-05T22:42:33Z",
|
||||
"updated_at": "2026-05-06T04:56:56Z",
|
||||
"pushed_at": "2026-05-06T04:56:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -146,8 +146,8 @@
|
|||
"description": "🔍 Detect improper symbolic link handling in Gogs' PutContents API, exposing local code execution risks for versions 0.13.3 and earlier.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-31T13:25:07Z",
|
||||
"updated_at": "2026-05-05T22:51:19Z",
|
||||
"pushed_at": "2026-05-05T22:51:15Z",
|
||||
"updated_at": "2026-05-06T05:05:41Z",
|
||||
"pushed_at": "2026-05-06T05:05:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🚀 Exploit CVE-2025-9074 with this Docker escape framework, simplifying API vulnerabilities and enhancing security testing for developers and researchers.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-19T23:21:41Z",
|
||||
"updated_at": "2026-05-05T22:52:45Z",
|
||||
"pushed_at": "2026-05-05T22:52:41Z",
|
||||
"updated_at": "2026-05-06T05:07:13Z",
|
||||
"pushed_at": "2026-05-06T05:07:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,12 +14,12 @@
|
|||
"description": "CVE-2026-0073 is an RCE with a CVSS severity score of 8.3, and here we will explain how it works.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T21:22:41Z",
|
||||
"updated_at": "2026-05-05T23:13:36Z",
|
||||
"updated_at": "2026-05-06T04:23:12Z",
|
||||
"pushed_at": "2026-05-05T23:13:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -27,8 +27,8 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -47,12 +47,12 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T21:53:08Z",
|
||||
"updated_at": "2026-05-06T00:43:03Z",
|
||||
"updated_at": "2026-05-06T05:51:21Z",
|
||||
"pushed_at": "2026-05-05T22:11:24Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -60,8 +60,41 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"forks": 8,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1230505151,
|
||||
"name": "CVE-2026-0073",
|
||||
"full_name": "ByteWraith1\/CVE-2026-0073",
|
||||
"owner": {
|
||||
"login": "ByteWraith1",
|
||||
"id": 282127101,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/282127101?v=4",
|
||||
"html_url": "https:\/\/github.com\/ByteWraith1",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ByteWraith1\/CVE-2026-0073",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-05-06T04:05:29Z",
|
||||
"updated_at": "2026-05-06T04:25:01Z",
|
||||
"pushed_at": "2026-05-06T04:24:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
|||
68
2026/CVE-2026-0300.json
Normal file
68
2026/CVE-2026-0300.json
Normal file
|
|
@ -0,0 +1,68 @@
|
|||
[
|
||||
{
|
||||
"id": 1230520148,
|
||||
"name": "PAN-OS-User-ID-Buffer-Overflow-PoC",
|
||||
"full_name": "qassam-315\/PAN-OS-User-ID-Buffer-Overflow-PoC",
|
||||
"owner": {
|
||||
"login": "qassam-315",
|
||||
"id": 281894515,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/281894515?v=4",
|
||||
"html_url": "https:\/\/github.com\/qassam-315",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/qassam-315\/PAN-OS-User-ID-Buffer-Overflow-PoC",
|
||||
"description": "A research-grade Proof-of-Concept (PoC) for CVE-2026-0300, targeting the Buffer Overflow vulnerability in Palo Alto Networks PAN-OS User-ID™ Authentication Portal (CWE-787).",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-06T04:33:09Z",
|
||||
"updated_at": "2026-05-06T05:35:42Z",
|
||||
"pushed_at": "2026-05-06T05:37:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1230562730,
|
||||
"name": "CVE-2026-0300",
|
||||
"full_name": "mr-r3b00t\/CVE-2026-0300",
|
||||
"owner": {
|
||||
"login": "mr-r3b00t",
|
||||
"id": 14963690,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
|
||||
"html_url": "https:\/\/github.com\/mr-r3b00t",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2026-0300",
|
||||
"description": "a honeypot for CVE-2026-0300",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-06T05:45:17Z",
|
||||
"updated_at": "2026-05-06T05:53:27Z",
|
||||
"pushed_at": "2026-05-06T05:53:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -11,11 +11,11 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EQSTLab\/CVE-2026-0603",
|
||||
"description": null,
|
||||
"description": "Hibernate ORM Second-Order SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-23T05:01:19Z",
|
||||
"updated_at": "2026-04-27T01:50:56Z",
|
||||
"pushed_at": "2026-04-27T01:50:52Z",
|
||||
"updated_at": "2026-05-06T01:16:09Z",
|
||||
"pushed_at": "2026-05-06T01:16:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -1,35 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1174605544,
|
||||
"name": "tapo-c260-rce",
|
||||
"full_name": "l0lsec\/tapo-c260-rce",
|
||||
"owner": {
|
||||
"login": "l0lsec",
|
||||
"id": 51931886,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51931886?v=4",
|
||||
"html_url": "https:\/\/github.com\/l0lsec",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/l0lsec\/tapo-c260-rce",
|
||||
"description": "PoC exploit chain for TP-Link Tapo C260 camera — CVE-2026-0651\/0652\/0653. Research by @spaceraccoon.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-06T16:26:00Z",
|
||||
"updated_at": "2026-03-06T16:26:07Z",
|
||||
"pushed_at": "2026-03-06T16:26:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠 Exploit and control Windows processes using CVE-2025-70795 and CVE-2026-0828 with driver-based termination tools.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-20T04:18:24Z",
|
||||
"updated_at": "2026-05-05T23:28:05Z",
|
||||
"pushed_at": "2026-05-05T23:28:02Z",
|
||||
"updated_at": "2026-05-06T05:44:24Z",
|
||||
"pushed_at": "2026-05-06T05:44:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -1,37 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 1175219479,
|
||||
"name": "CVE-2026-1492-POC",
|
||||
"full_name": "imad-z1\/CVE-2026-1492-POC",
|
||||
"owner": {
|
||||
"login": "imad-z1",
|
||||
"id": 252134352,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/252134352?v=4",
|
||||
"html_url": "https:\/\/github.com\/imad-z1",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/imad-z1\/CVE-2026-1492-POC",
|
||||
"description": "User Registration & Membership <= 5.1.2 - Unauthenticated Privilege Escalation via Membership Registration",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-07T12:01:53Z",
|
||||
"updated_at": "2026-03-07T12:03:41Z",
|
||||
"pushed_at": "2026-03-07T12:03:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1187520015,
|
||||
"name": "CVE-2026-1492",
|
||||
|
|
|
|||
|
|
@ -1,70 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 1175143169,
|
||||
"name": "CVE-2026-20127-Cisco-SD-WAN-Preauth-RCE",
|
||||
"full_name": "yonathanpy\/CVE-2026-20127-Cisco-SD-WAN-Preauth-RCE",
|
||||
"owner": {
|
||||
"login": "yonathanpy",
|
||||
"id": 109464957,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109464957?v=4",
|
||||
"html_url": "https:\/\/github.com\/yonathanpy",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yonathanpy\/CVE-2026-20127-Cisco-SD-WAN-Preauth-RCE",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-03-07T09:39:29Z",
|
||||
"updated_at": "2026-03-19T16:14:54Z",
|
||||
"pushed_at": "2026-03-07T09:49:31Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1175850534,
|
||||
"name": "sdwan-scanner-CVE-2026-20127",
|
||||
"full_name": "abrahamsurf\/sdwan-scanner-CVE-2026-20127",
|
||||
"owner": {
|
||||
"login": "abrahamsurf",
|
||||
"id": 74070243,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74070243?v=4",
|
||||
"html_url": "https:\/\/github.com\/abrahamsurf",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/abrahamsurf\/sdwan-scanner-CVE-2026-20127",
|
||||
"description": "Cisco SD-WAN Exposure & Potential Vulnerability Scanner (Passive Fingerprinting) 2026",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-08T09:04:34Z",
|
||||
"updated_at": "2026-03-08T09:24:09Z",
|
||||
"pushed_at": "2026-03-08T09:21:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1176945391,
|
||||
"name": "CVE-2026-20127",
|
||||
|
|
|
|||
|
|
@ -1,21 +1,21 @@
|
|||
[
|
||||
{
|
||||
"id": 1172054067,
|
||||
"name": "CVE-2026-26418",
|
||||
"full_name": "aksalsalimi\/CVE-2026-26418",
|
||||
"id": 1230574523,
|
||||
"name": "CVE-2026-20817",
|
||||
"full_name": "ThanhCT-CyX\/CVE-2026-20817",
|
||||
"owner": {
|
||||
"login": "aksalsalimi",
|
||||
"id": 89083035,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89083035?v=4",
|
||||
"html_url": "https:\/\/github.com\/aksalsalimi",
|
||||
"login": "ThanhCT-CyX",
|
||||
"id": 226433522,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/226433522?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThanhCT-CyX",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aksalsalimi\/CVE-2026-26418",
|
||||
"html_url": "https:\/\/github.com\/ThanhCT-CyX\/CVE-2026-20817",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-03-03T22:34:17Z",
|
||||
"updated_at": "2026-03-05T18:14:53Z",
|
||||
"pushed_at": "2026-03-05T18:14:32Z",
|
||||
"created_at": "2026-05-06T06:02:38Z",
|
||||
"updated_at": "2026-05-06T06:52:35Z",
|
||||
"pushed_at": "2026-05-06T06:03:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠 Demonstrate remote code execution in Windows Notepad via markdown links exploiting unsecured URL protocols.",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-22T12:19:06Z",
|
||||
"updated_at": "2026-05-05T23:27:24Z",
|
||||
"pushed_at": "2026-05-05T23:27:21Z",
|
||||
"updated_at": "2026-05-06T05:43:40Z",
|
||||
"pushed_at": "2026-05-06T05:43:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -66,8 +66,8 @@
|
|||
"description": "🛠 Demonstrate remote code execution in Windows Notepad versions below 11.2510 using the CVE-2026-20841 proof of concept.",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-26T05:21:28Z",
|
||||
"updated_at": "2026-05-05T23:26:24Z",
|
||||
"pushed_at": "2026-05-05T23:26:21Z",
|
||||
"updated_at": "2026-05-06T05:42:48Z",
|
||||
"pushed_at": "2026-05-06T05:42:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -53,10 +53,10 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EQSTLab\/CVE-2026-21858",
|
||||
"description": null,
|
||||
"description": "n8n RCE",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-11T01:01:03Z",
|
||||
"updated_at": "2026-04-16T12:39:44Z",
|
||||
"updated_at": "2026-05-06T01:18:06Z",
|
||||
"pushed_at": "2026-04-16T12:39:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
@ -74,39 +74,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1164971168,
|
||||
"name": "CVE-2026-21858",
|
||||
"full_name": "0xBlackash\/CVE-2026-21858",
|
||||
"owner": {
|
||||
"login": "0xBlackash",
|
||||
"id": 259905299,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/259905299?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xBlackash",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xBlackash\/CVE-2026-21858",
|
||||
"description": "CVE-2026-21858",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-23T17:27:12Z",
|
||||
"updated_at": "2026-03-31T07:46:40Z",
|
||||
"pushed_at": "2026-03-05T21:21:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1180571766,
|
||||
"name": "Ni8mare-CVE-2026-21858",
|
||||
|
|
|
|||
|
|
@ -1,35 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1174511512,
|
||||
"name": "CVE-2026-22722",
|
||||
"full_name": "D7EAD\/CVE-2026-22722",
|
||||
"owner": {
|
||||
"login": "D7EAD",
|
||||
"id": 42398281,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42398281?v=4",
|
||||
"html_url": "https:\/\/github.com\/D7EAD",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/D7EAD\/CVE-2026-22722",
|
||||
"description": "A State-based logic vulnerability in VMWare Workstation Pro's Kernel NUIF",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-06T14:26:52Z",
|
||||
"updated_at": "2026-03-06T17:58:41Z",
|
||||
"pushed_at": "2026-03-06T14:27:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -130,5 +130,46 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1230494851,
|
||||
"name": "CVE-2026-23918",
|
||||
"full_name": "rhasan-com\/CVE-2026-23918",
|
||||
"owner": {
|
||||
"login": "rhasan-com",
|
||||
"id": 282123255,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/282123255?v=4",
|
||||
"html_url": "https:\/\/github.com\/rhasan-com",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rhasan-com\/CVE-2026-23918",
|
||||
"description": "Apache HTTP\/2 double-free vulnerability PoC (CVE-2026-23918)",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-06T03:45:57Z",
|
||||
"updated_at": "2026-05-06T06:16:06Z",
|
||||
"pushed_at": "2026-05-06T06:16:03Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [
|
||||
"apache-httpd",
|
||||
"cve",
|
||||
"cve-2026-23918",
|
||||
"cwe-415",
|
||||
"dos",
|
||||
"poc",
|
||||
"vulnerability-research"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔍 Analyze and detect CVE-2026-2406 vulnerabilities in Telnet to enhance security and prevent unauthorized access with this professional research engine.",
|
||||
"fork": false,
|
||||
"created_at": "2025-04-16T07:20:12Z",
|
||||
"updated_at": "2026-05-05T23:18:38Z",
|
||||
"pushed_at": "2026-05-05T23:18:35Z",
|
||||
"updated_at": "2026-05-06T05:34:31Z",
|
||||
"pushed_at": "2026-05-06T05:34:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -47,8 +47,8 @@
|
|||
"description": "🚨 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd, for instant root shell access without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-03T19:46:10Z",
|
||||
"updated_at": "2026-05-05T23:15:23Z",
|
||||
"pushed_at": "2026-05-05T23:15:20Z",
|
||||
"updated_at": "2026-05-06T05:31:11Z",
|
||||
"pushed_at": "2026-05-06T05:31:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -80,8 +80,8 @@
|
|||
"description": "Exploit Windows local privilege escalation on clients and servers using tested code for CVE-2026-24291 across multiple Windows versions",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-26T04:38:27Z",
|
||||
"updated_at": "2026-05-05T23:46:20Z",
|
||||
"pushed_at": "2026-05-05T23:46:16Z",
|
||||
"updated_at": "2026-05-06T06:03:42Z",
|
||||
"pushed_at": "2026-05-06T06:03:39Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Demonstrate a proof-of-concept exploit for CVE-2026-2441, a high-risk Chrome use-after-free vulnerability in the Blink CSS engine.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-03T14:19:18Z",
|
||||
"updated_at": "2026-05-05T23:29:39Z",
|
||||
"pushed_at": "2026-05-05T23:29:35Z",
|
||||
"updated_at": "2026-05-06T05:46:03Z",
|
||||
"pushed_at": "2026-05-06T05:46:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Expose and detail an unauthenticated stored XSS vulnerability in the Google Cloud Vertex AI Python SDK affecting versions 1.98.0 to 1.130.9.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-10T14:40:04Z",
|
||||
"updated_at": "2026-05-05T23:34:49Z",
|
||||
"pushed_at": "2026-05-05T23:34:46Z",
|
||||
"updated_at": "2026-05-06T05:51:22Z",
|
||||
"pushed_at": "2026-05-06T05:51:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -130,10 +130,10 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EQSTLab\/CVE-2026-25253",
|
||||
"description": null,
|
||||
"description": "OpenClaw Authentication Token Exfiltration",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-09T08:43:53Z",
|
||||
"updated_at": "2026-04-16T12:41:56Z",
|
||||
"updated_at": "2026-05-06T01:17:13Z",
|
||||
"pushed_at": "2026-04-16T12:41:52Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Exploit Frigate NVR ≤0.16.3 to execute commands remotely by abusing a configuration flaw without needing shell access or output capture.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-07T20:23:08Z",
|
||||
"updated_at": "2026-05-05T23:33:35Z",
|
||||
"pushed_at": "2026-05-05T23:33:31Z",
|
||||
"updated_at": "2026-05-06T05:50:08Z",
|
||||
"pushed_at": "2026-05-06T05:50:05Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for exploiting CVE-2026-26128.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T20:27:35Z",
|
||||
"updated_at": "2026-05-05T20:34:27Z",
|
||||
"pushed_at": "2026-05-05T20:34:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2026-05-06T06:49:30Z",
|
||||
"pushed_at": "2026-05-06T06:49:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,35 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1174228220,
|
||||
"name": "cve-2026-27483",
|
||||
"full_name": "thewhiteh4t\/cve-2026-27483",
|
||||
"owner": {
|
||||
"login": "thewhiteh4t",
|
||||
"id": 36354846,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36354846?v=4",
|
||||
"html_url": "https:\/\/github.com\/thewhiteh4t",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thewhiteh4t\/cve-2026-27483",
|
||||
"description": "MindsDB Path Traversal to RCE PoC",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-06T07:52:36Z",
|
||||
"updated_at": "2026-04-04T16:47:16Z",
|
||||
"pushed_at": "2026-03-07T05:04:01Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -1,21 +1,21 @@
|
|||
[
|
||||
{
|
||||
"id": 1175872718,
|
||||
"name": "CVE-2026-30863-Exploit",
|
||||
"full_name": "Worthes\/CVE-2026-30863-Exploit",
|
||||
"id": 1230512984,
|
||||
"name": "CVE-2026-27960",
|
||||
"full_name": "ByteWraith1\/CVE-2026-27960",
|
||||
"owner": {
|
||||
"login": "Worthes",
|
||||
"id": 260481209,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/260481209?v=4",
|
||||
"html_url": "https:\/\/github.com\/Worthes",
|
||||
"login": "ByteWraith1",
|
||||
"id": 282127101,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/282127101?v=4",
|
||||
"html_url": "https:\/\/github.com\/ByteWraith1",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Worthes\/CVE-2026-30863-Exploit",
|
||||
"description": "CWE-287: Improper Authentication in parse-community parse-server",
|
||||
"html_url": "https:\/\/github.com\/ByteWraith1\/CVE-2026-27960",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-03-08T09:47:38Z",
|
||||
"updated_at": "2026-03-08T10:08:27Z",
|
||||
"pushed_at": "2026-03-08T10:08:24Z",
|
||||
"created_at": "2026-05-06T04:20:26Z",
|
||||
"updated_at": "2026-05-06T04:24:29Z",
|
||||
"pushed_at": "2026-05-06T04:24:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -1,35 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1171750433,
|
||||
"name": "CVE-2026-27966--RCE-in-Langflow",
|
||||
"full_name": "Anon-Cyber-Team\/CVE-2026-27966--RCE-in-Langflow",
|
||||
"owner": {
|
||||
"login": "Anon-Cyber-Team",
|
||||
"id": 261612662,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/261612662?v=4",
|
||||
"html_url": "https:\/\/github.com\/Anon-Cyber-Team",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Anon-Cyber-Team\/CVE-2026-27966--RCE-in-Langflow",
|
||||
"description": "Exploit Tools For new CVE",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-03T15:12:34Z",
|
||||
"updated_at": "2026-03-12T09:45:10Z",
|
||||
"pushed_at": "2026-03-06T12:57:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -1,35 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1173744396,
|
||||
"name": "CVE-2026-28289",
|
||||
"full_name": "0xBlackash\/CVE-2026-28289",
|
||||
"owner": {
|
||||
"login": "0xBlackash",
|
||||
"id": 259905299,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/259905299?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xBlackash",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xBlackash\/CVE-2026-28289",
|
||||
"description": "CVE-2026-28289",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-05T17:48:00Z",
|
||||
"updated_at": "2026-03-12T09:41:24Z",
|
||||
"pushed_at": "2026-03-05T19:22:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -31,38 +31,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1175014507,
|
||||
"name": "CVE-2026-28372-telnetd-Privilege-Escalation",
|
||||
"full_name": "Rohitberiwala\/CVE-2026-28372-telnetd-Privilege-Escalation",
|
||||
"owner": {
|
||||
"login": "Rohitberiwala",
|
||||
"id": 171419227,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171419227?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rohitberiwala",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rohitberiwala\/CVE-2026-28372-telnetd-Privilege-Escalation",
|
||||
"description": "This Proof‑of‑Concept demonstrates a **Local Privilege Escalation** vulnerability in GNU inetutils `telnetd`. `telnetd` improperly passes client‑controlled environment variables to `login(1)`. By setting:",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-07T05:31:00Z",
|
||||
"updated_at": "2026-03-12T05:50:19Z",
|
||||
"pushed_at": "2026-03-07T08:35:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -1,37 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 1173849939,
|
||||
"name": "CVE-2026-29000",
|
||||
"full_name": "kernelzeroday\/CVE-2026-29000",
|
||||
"owner": {
|
||||
"login": "kernelzeroday",
|
||||
"id": 11334159,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11334159?v=4",
|
||||
"html_url": "https:\/\/github.com\/kernelzeroday",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kernelzeroday\/CVE-2026-29000",
|
||||
"description": "pac4j-jwt JwtAuthenticator auth bypass (CVE-2026-29000) writeup and PoCs",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-05T20:19:58Z",
|
||||
"updated_at": "2026-04-22T03:56:21Z",
|
||||
"pushed_at": "2026-03-06T02:08:21Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1178685428,
|
||||
"name": "CVE-2026-29000-Lab",
|
||||
|
|
|
|||
|
|
@ -1,35 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1174315237,
|
||||
"name": "CVE-2026-29041",
|
||||
"full_name": "kx00007\/CVE-2026-29041",
|
||||
"owner": {
|
||||
"login": "kx00007",
|
||||
"id": 248387558,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/248387558?v=4",
|
||||
"html_url": "https:\/\/github.com\/kx00007",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kx00007\/CVE-2026-29041",
|
||||
"description": "Hi, I’m K, This is my first CVE, which is a Remote Code Execution (RCE) vulnerability. It is the beginning of my journey as a security researcher.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-06T09:54:58Z",
|
||||
"updated_at": "2026-03-24T08:00:07Z",
|
||||
"pushed_at": "2026-03-06T10:26:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue