Auto Update 2024/10/12 12:30:54

This commit is contained in:
motikan2010-bot 2024-10-12 21:30:54 +09:00
parent 5b4871bdad
commit e9d4d1d02a
42 changed files with 240 additions and 236 deletions

View file

@ -13,10 +13,10 @@
"description": "use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range",
"fork": false,
"created_at": "2013-09-09T21:50:30Z",
"updated_at": "2024-08-12T19:12:16Z",
"updated_at": "2024-10-12T08:13:44Z",
"pushed_at": "2015-01-12T19:56:04Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 2
}

View file

@ -1889,36 +1889,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 493163626,
"name": "pentesterlab",
"full_name": "ThaFWord\/pentesterlab",
"owner": {
"login": "ThaFWord",
"id": 77698145,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77698145?v=4",
"html_url": "https:\/\/github.com\/ThaFWord"
},
"html_url": "https:\/\/github.com\/ThaFWord\/pentesterlab",
"description": "CVE-2018-6574: go get RCE",
"fork": false,
"created_at": "2022-05-17T08:32:20Z",
"updated_at": "2022-05-19T10:07:49Z",
"pushed_at": "2022-05-17T08:47:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 497029793,
"name": "CVE-2018-6574",

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-10-09T21:15:37Z",
"updated_at": "2024-10-12T07:50:11Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4105,
"watchers_count": 4105,
"stargazers_count": 4106,
"watchers_count": 4106,
"has_discussions": false,
"forks_count": 1095,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1095,
"watchers": 4105,
"watchers": 4106,
"score": 0,
"subscribers_count": 148
},

View file

@ -43,10 +43,10 @@
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2024-10-11T12:57:04Z",
"updated_at": "2024-10-12T09:02:56Z",
"pushed_at": "2022-04-14T18:23:38Z",
"stargazers_count": 346,
"watchers_count": 346,
"stargazers_count": 345,
"watchers_count": 345,
"has_discussions": false,
"forks_count": 85,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 85,
"watchers": 346,
"watchers": 345,
"score": 0,
"subscribers_count": 13
},

View file

@ -1011,7 +1011,7 @@
"stargazers_count": 1297,
"watchers_count": 1297,
"has_discussions": false,
"forks_count": 344,
"forks_count": 343,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1023,7 +1023,7 @@
"smbghost"
],
"visibility": "public",
"forks": 344,
"forks": 343,
"watchers": 1297,
"score": 0,
"subscribers_count": 34

View file

@ -170,10 +170,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-10-09T14:18:57Z",
"updated_at": "2024-10-12T11:27:01Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 628,
"watchers_count": 628,
"stargazers_count": 629,
"watchers_count": 629,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
@ -182,7 +182,7 @@
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 628,
"watchers": 629,
"score": 0,
"subscribers_count": 12
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-10-09T21:15:37Z",
"updated_at": "2024-10-12T07:50:11Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4105,
"watchers_count": 4105,
"stargazers_count": 4106,
"watchers_count": 4106,
"has_discussions": false,
"forks_count": 1095,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1095,
"watchers": 4105,
"watchers": 4106,
"score": 0,
"subscribers_count": 148
},

View file

@ -48,8 +48,8 @@
"description": "CVE-2020-15368 updated",
"fork": false,
"created_at": "2024-08-10T23:51:38Z",
"updated_at": "2024-09-18T22:48:08Z",
"pushed_at": "2024-08-10T23:57:40Z",
"updated_at": "2024-10-12T08:25:16Z",
"pushed_at": "2024-10-12T08:25:12Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,

View file

@ -62,10 +62,10 @@
"description": "A network detection package for CVE-2020-16898 (Windows TCP\/IP Remote Code Execution Vulnerability)",
"fork": false,
"created_at": "2020-10-14T03:25:00Z",
"updated_at": "2024-09-03T18:23:15Z",
"updated_at": "2024-10-12T10:28:29Z",
"pushed_at": "2024-09-03T18:23:10Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -74,7 +74,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 9
},

View file

@ -957,8 +957,8 @@
"description": "cve-2020-1938 POC, updated version",
"fork": false,
"created_at": "2024-10-12T01:46:15Z",
"updated_at": "2024-10-12T01:53:59Z",
"pushed_at": "2024-10-12T01:51:05Z",
"updated_at": "2024-10-12T11:25:37Z",
"pushed_at": "2024-10-12T11:25:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
"fork": false,
"created_at": "2020-08-15T07:42:50Z",
"updated_at": "2024-09-28T12:21:17Z",
"updated_at": "2024-10-12T07:12:58Z",
"pushed_at": "2024-04-16T15:11:54Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 79,
"watchers": 80,
"score": 0,
"subscribers_count": 7
}

View file

@ -457,10 +457,10 @@
"description": null,
"fork": false,
"created_at": "2021-07-02T16:44:24Z",
"updated_at": "2024-09-03T18:23:12Z",
"updated_at": "2024-10-12T10:29:08Z",
"pushed_at": "2024-09-03T18:23:07Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -469,7 +469,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 6
},

View file

@ -299,36 +299,6 @@
"score": 0,
"subscribers_count": 5
},
{
"id": 444978473,
"name": "testanull-CVE-2021-22005.py",
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-22005.py",
"owner": {
"login": "timb-machine-mirrors",
"id": 49810875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
},
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-22005.py",
"description": "Clone from gist",
"fork": false,
"created_at": "2022-01-05T23:22:08Z",
"updated_at": "2023-04-08T20:15:10Z",
"pushed_at": "2022-01-05T23:22:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 505737586,
"name": "cve-2021-22005",

View file

@ -58,35 +58,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 444979391,
"name": "testanull-CVE-2021-28482.py",
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-28482.py",
"owner": {
"login": "timb-machine-mirrors",
"id": 49810875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
},
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-28482.py",
"description": "Clone from gist",
"fork": false,
"created_at": "2022-01-05T23:26:58Z",
"updated_at": "2023-04-08T20:15:02Z",
"pushed_at": "2022-01-05T23:27:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -133,10 +133,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2024-09-03T15:06:29Z",
"updated_at": "2024-10-12T08:14:07Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 137,
"watchers_count": 137,
"stargazers_count": 138,
"watchers_count": 138,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -148,7 +148,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 137,
"watchers": 138,
"score": 0,
"subscribers_count": 2
},

View file

@ -58,5 +58,65 @@
"watchers": 46,
"score": 0,
"subscribers_count": 6
},
{
"id": 871545050,
"name": "CVE-2021-40539",
"full_name": "lpyzds\/CVE-2021-40539",
"owner": {
"login": "lpyzds",
"id": 178446553,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178446553?v=4",
"html_url": "https:\/\/github.com\/lpyzds"
},
"html_url": "https:\/\/github.com\/lpyzds\/CVE-2021-40539",
"description": "CVE-2021-40539ADSelfService Plus RCE漏洞",
"fork": false,
"created_at": "2024-10-12T09:01:42Z",
"updated_at": "2024-10-12T09:06:21Z",
"pushed_at": "2024-10-12T09:06:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 871547174,
"name": "CVE-2021-40539",
"full_name": "lpyydxs\/CVE-2021-40539",
"owner": {
"login": "lpyydxs",
"id": 184594317,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184594317?v=4",
"html_url": "https:\/\/github.com\/lpyydxs"
},
"html_url": "https:\/\/github.com\/lpyydxs\/CVE-2021-40539",
"description": "CVE-2021-40539ADSelfService Plus RCE漏洞",
"fork": false,
"created_at": "2024-10-12T09:09:00Z",
"updated_at": "2024-10-12T09:15:57Z",
"pushed_at": "2024-10-12T09:15:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "Apache 2.4.50 Path traversal vulnerability",
"fork": false,
"created_at": "2021-10-08T05:44:54Z",
"updated_at": "2024-08-12T20:17:05Z",
"updated_at": "2024-10-12T09:02:56Z",
"pushed_at": "2022-08-30T11:59:18Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 18,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-10-11T18:33:35Z",
"updated_at": "2024-10-12T08:05:29Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1797,
"watchers_count": 1797,
"stargazers_count": 1798,
"watchers_count": 1798,
"has_discussions": false,
"forks_count": 525,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 525,
"watchers": 1797,
"watchers": 1798,
"score": 0,
"subscribers_count": 27
},
@ -1966,10 +1966,10 @@
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2024-09-27T19:44:04Z",
"updated_at": "2024-10-12T07:30:06Z",
"pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 634,
"watchers_count": 634,
"stargazers_count": 635,
"watchers_count": 635,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
@ -1990,7 +1990,7 @@
],
"visibility": "public",
"forks": 98,
"watchers": 634,
"watchers": 635,
"score": 0,
"subscribers_count": 28
},
@ -4721,10 +4721,10 @@
"description": "Log4j Exploit Detection Logic for Zeek",
"fork": false,
"created_at": "2021-12-13T17:25:52Z",
"updated_at": "2022-02-09T10:00:20Z",
"updated_at": "2024-10-12T10:55:49Z",
"pushed_at": "2024-05-04T18:38:58Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -4736,7 +4736,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 9
},

View file

@ -169,8 +169,8 @@
"description": null,
"fork": false,
"created_at": "2024-10-11T16:57:20Z",
"updated_at": "2024-10-11T17:13:10Z",
"pushed_at": "2024-10-11T17:13:06Z",
"updated_at": "2024-10-12T11:13:11Z",
"pushed_at": "2024-10-12T11:13:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-10T13:15:20Z",
"updated_at": "2024-08-12T20:24:01Z",
"updated_at": "2024-10-12T07:48:23Z",
"pushed_at": "2022-06-13T17:00:33Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
"updated_at": "2024-09-25T08:36:08Z",
"updated_at": "2024-10-12T08:35:14Z",
"pushed_at": "2023-04-12T17:28:49Z",
"stargazers_count": 274,
"watchers_count": 274,
"stargazers_count": 275,
"watchers_count": 275,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 274,
"watchers": 275,
"score": 0,
"subscribers_count": 9
}

View file

@ -13,10 +13,10 @@
"description": "cve-2022-21907",
"fork": false,
"created_at": "2022-01-11T05:00:55Z",
"updated_at": "2022-03-21T07:03:34Z",
"updated_at": "2024-10-12T10:25:17Z",
"pushed_at": "2024-10-11T14:52:28Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,12 +13,12 @@
"description": "Security issue in the hypervisor firmware of some older Qualcomm chipsets",
"fork": false,
"created_at": "2022-12-27T19:48:30Z",
"updated_at": "2024-10-02T14:50:40Z",
"updated_at": "2024-10-12T07:32:28Z",
"pushed_at": "2022-12-27T20:32:37Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": true,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,8 +33,8 @@
"security"
],
"visibility": "public",
"forks": 0,
"watchers": 20,
"forks": 1,
"watchers": 21,
"score": 0,
"subscribers_count": 1
}

View file

@ -105,10 +105,10 @@
"description": "Detects attempts and successful exploitation of CVE-2022-26809",
"fork": false,
"created_at": "2022-04-14T16:58:09Z",
"updated_at": "2024-09-16T15:44:38Z",
"updated_at": "2024-10-12T10:26:20Z",
"pushed_at": "2024-09-16T15:44:34Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -117,7 +117,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 10
},

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2022-12-23T12:33:21Z",
"updated_at": "2023-03-10T01:15:25Z",
"pushed_at": "2024-10-11T02:37:08Z",
"pushed_at": "2024-10-12T11:29:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-19T12:46:45Z",
"updated_at": "2024-10-08T11:35:22Z",
"updated_at": "2024-10-12T07:48:20Z",
"pushed_at": "2022-09-06T14:05:22Z",
"stargazers_count": 243,
"watchers_count": 243,
"stargazers_count": 244,
"watchers_count": 244,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 243,
"watchers": 244,
"score": 0,
"subscribers_count": 12
},

View file

@ -108,13 +108,13 @@
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 14,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 13,
"watchers": 48,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "MOC3ingbird Exploit for Live2D (CVE-2023-27566)",
"fork": false,
"created_at": "2023-03-03T01:57:28Z",
"updated_at": "2024-09-28T03:10:19Z",
"updated_at": "2024-10-12T07:47:08Z",
"pushed_at": "2023-09-19T01:12:41Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": true,
"forks_count": 6,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 77,
"watchers": 78,
"score": 0,
"subscribers_count": 2
}

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-3824 PoC",
"fork": false,
"created_at": "2024-10-11T10:53:04Z",
"updated_at": "2024-10-11T15:14:00Z",
"updated_at": "2024-10-12T12:12:20Z",
"pushed_at": "2024-10-11T10:59:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -95,7 +95,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -193,10 +193,10 @@
"description": "Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırılan bu güvenlik açığı, yerel NTLM bilgilerinin potansiyel sızıntısı ve uzaktan kod çalıştırma olasılığı dahil olmak üzere geniş kapsamlı etkilere sahiptir.",
"fork": false,
"created_at": "2024-02-23T12:13:11Z",
"updated_at": "2024-04-02T15:01:16Z",
"updated_at": "2024-10-12T07:56:40Z",
"pushed_at": "2024-02-24T15:36:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-09-23T03:28:47Z",
"updated_at": "2024-10-12T07:59:45Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 190,
"watchers_count": 190,
"stargazers_count": 191,
"watchers_count": 191,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 190,
"watchers": 191,
"score": 0,
"subscribers_count": 2
},

View file

@ -982,10 +982,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-10-11T08:19:38Z",
"updated_at": "2024-10-12T11:52:12Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3491,
"watchers_count": 3491,
"stargazers_count": 3492,
"watchers_count": 3492,
"has_discussions": false,
"forks_count": 239,
"allow_forking": true,
@ -994,7 +994,7 @@
"topics": [],
"visibility": "public",
"forks": 239,
"watchers": 3491,
"watchers": 3492,
"score": 0,
"subscribers_count": 38
},

32
2024/CVE-2024-3656.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 871549647,
"name": "CVE-2024-3656",
"full_name": "h4x0r-dz\/CVE-2024-3656",
"owner": {
"login": "h4x0r-dz",
"id": 26070859,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
"html_url": "https:\/\/github.com\/h4x0r-dz"
},
"html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-3656",
"description": "Keycloak admin API allows low privilege users to use administrative functions",
"fork": false,
"created_at": "2024-10-12T09:17:00Z",
"updated_at": "2024-10-12T12:04:30Z",
"pushed_at": "2024-10-12T09:48:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability ",
"fork": false,
"created_at": "2024-09-24T19:24:55Z",
"updated_at": "2024-10-10T14:59:31Z",
"updated_at": "2024-10-12T08:14:19Z",
"pushed_at": "2024-10-01T15:38:24Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 115,
"watchers": 116,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-38816 Proof of Concept",
"fork": false,
"created_at": "2024-09-28T23:16:23Z",
"updated_at": "2024-09-28T23:16:23Z",
"updated_at": "2024-10-12T08:27:06Z",
"pushed_at": "2024-09-26T09:46:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,12 +13,12 @@
"description": "Unauthenticated Remote Code Execution via Angular-Base64-Upload Library ",
"fork": false,
"created_at": "2024-10-09T14:35:06Z",
"updated_at": "2024-10-11T18:41:59Z",
"updated_at": "2024-10-12T10:22:25Z",
"pushed_at": "2024-10-11T16:31:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,8 +29,8 @@
"poc-exploit"
],
"visibility": "public",
"forks": 2,
"watchers": 2,
"forks": 3,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,19 +73,19 @@
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
"fork": false,
"created_at": "2024-10-05T00:15:18Z",
"updated_at": "2024-10-11T11:18:58Z",
"updated_at": "2024-10-12T09:23:17Z",
"pushed_at": "2024-10-05T00:18:49Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 88,
"forks": 16,
"watchers": 89,
"score": 0,
"subscribers_count": 3
}

View file

@ -82,10 +82,10 @@
"description": " A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-10-08T10:04:08Z",
"updated_at": "2024-10-11T16:47:25Z",
"updated_at": "2024-10-12T09:07:03Z",
"pushed_at": "2024-10-08T10:08:07Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -94,7 +94,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept for CVE-2024-8353",
"fork": false,
"created_at": "2024-09-30T17:33:59Z",
"updated_at": "2024-10-08T02:39:22Z",
"updated_at": "2024-10-12T07:06:23Z",
"pushed_at": "2024-10-01T00:04:52Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept Exploit for CVE-2024-9464",
"fork": false,
"created_at": "2024-10-09T16:36:25Z",
"updated_at": "2024-10-11T23:21:10Z",
"updated_at": "2024-10-12T09:36:31Z",
"pushed_at": "2024-10-09T16:41:41Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 22,
"watchers": 24,
"score": 0,
"subscribers_count": 4
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -774,6 +774,9 @@
- [alperenugurlu/CVE-2024-3596-Detector](https://github.com/alperenugurlu/CVE-2024-3596-Detector)
### CVE-2024-3656
- [h4x0r-dz/CVE-2024-3656](https://github.com/h4x0r-dz/CVE-2024-3656)
### CVE-2024-3806 (2024-05-09)
<code>The Porto theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.1.0 via the 'porto_ajax_posts' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.
@ -22092,7 +22095,6 @@
- [tiagob0b/CVE-2021-22005](https://github.com/tiagob0b/CVE-2021-22005)
- [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005)
- [shmilylty/cve-2021-22005-exp](https://github.com/shmilylty/cve-2021-22005-exp)
- [timb-machine-mirrors/testanull-CVE-2021-22005.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py)
- [InventorMAO/cve-2021-22005](https://github.com/InventorMAO/cve-2021-22005)
### CVE-2021-22006 (2021-09-23)
@ -23206,7 +23208,6 @@
- [Shadow0ps/CVE-2021-28482-Exchange-POC](https://github.com/Shadow0ps/CVE-2021-28482-Exchange-POC)
- [KevinWorst/CVE-2021-28482_Exploit](https://github.com/KevinWorst/CVE-2021-28482_Exploit)
- [timb-machine-mirrors/testanull-CVE-2021-28482.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-28482.py)
### CVE-2021-28663 (2021-05-10)
@ -24976,6 +24977,8 @@
- [DarkSprings/CVE-2021-40539](https://github.com/DarkSprings/CVE-2021-40539)
- [synacktiv/CVE-2021-40539](https://github.com/synacktiv/CVE-2021-40539)
- [lpyzds/CVE-2021-40539](https://github.com/lpyzds/CVE-2021-40539)
- [lpyydxs/CVE-2021-40539](https://github.com/lpyydxs/CVE-2021-40539)
### CVE-2021-40822 (2022-05-01)
@ -37377,7 +37380,6 @@
- [twseptian/cve-2018-6574](https://github.com/twseptian/cve-2018-6574)
- [the-valluvarsploit/CVE-2018-6574](https://github.com/the-valluvarsploit/CVE-2018-6574)
- [yavolo/CVE-2018-6574](https://github.com/yavolo/CVE-2018-6574)
- [ThaFWord/pentesterlab](https://github.com/ThaFWord/pentesterlab)
- [jftierno/CVE-2018-6574](https://github.com/jftierno/CVE-2018-6574)
- [Cypheer/exploit_CVE-2018-6574](https://github.com/Cypheer/exploit_CVE-2018-6574)
- [jftierno/CVE-2018-6574-2](https://github.com/jftierno/CVE-2018-6574-2)