Auto Update 2025/01/22 00:32:37

This commit is contained in:
motikan2010-bot 2025-01-22 09:32:37 +09:00
parent d7c9c899f8
commit f5b8217d70
39 changed files with 194 additions and 142 deletions

View file

@ -78,10 +78,10 @@
"description": "Private keys vulnerable to Debian OpenSSL bug (CVE-2008-0166)",
"fork": false,
"created_at": "2022-05-15T10:28:03Z",
"updated_at": "2024-10-13T05:42:15Z",
"updated_at": "2025-01-21T21:45:18Z",
"pushed_at": "2024-05-18T14:17:24Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -90,7 +90,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},

View file

@ -48,7 +48,7 @@
"description": "My journey through WebKit CVE-2016-4622 Exploitation process",
"fork": false,
"created_at": "2020-04-07T00:46:19Z",
"updated_at": "2024-08-25T14:04:31Z",
"updated_at": "2025-01-21T22:11:02Z",
"pushed_at": "2020-04-12T19:46:40Z",
"stargazers_count": 21,
"watchers_count": 21,

View file

@ -14,10 +14,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2025-01-18T01:48:29Z",
"updated_at": "2025-01-21T23:37:51Z",
"pushed_at": "2022-12-11T10:44:39Z",
"stargazers_count": 527,
"watchers_count": 527,
"stargazers_count": 528,
"watchers_count": 528,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 52,
"watchers": 527,
"watchers": 528,
"score": 0,
"subscribers_count": 55
},

View file

@ -14,7 +14,7 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2025-01-17T06:23:10Z",
"updated_at": "2025-01-21T20:48:30Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1802,
"watchers_count": 1802,
@ -267,13 +267,13 @@
"stargazers_count": 144,
"watchers_count": 144,
"has_discussions": false,
"forks_count": 45,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 45,
"forks": 43,
"watchers": 144,
"score": 0,
"subscribers_count": 9

View file

@ -45,7 +45,7 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2024-12-22T14:00:19Z",
"updated_at": "2025-01-21T22:11:01Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 572,
"watchers_count": 572,
@ -177,10 +177,10 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false,
"created_at": "2020-01-11T09:49:17Z",
"updated_at": "2024-12-06T23:51:10Z",
"updated_at": "2025-01-21T22:11:01Z",
"pushed_at": "2021-01-24T20:18:04Z",
"stargazers_count": 156,
"watchers_count": 156,
"stargazers_count": 155,
"watchers_count": 155,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -189,7 +189,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 156,
"watchers": 155,
"score": 0,
"subscribers_count": 4
},

View file

@ -76,7 +76,7 @@
"description": "MacOS kernel memory leak (4 bytes)",
"fork": false,
"created_at": "2020-04-10T14:30:16Z",
"updated_at": "2024-08-15T03:57:59Z",
"updated_at": "2025-01-21T22:11:02Z",
"pushed_at": "2020-04-14T06:57:49Z",
"stargazers_count": 29,
"watchers_count": 29,

View file

@ -107,10 +107,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2025-01-16T03:08:57Z",
"updated_at": "2025-01-21T20:25:14Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1204,
"watchers_count": 1204,
"stargazers_count": 1205,
"watchers_count": 1205,
"has_discussions": false,
"forks_count": 283,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 283,
"watchers": 1204,
"watchers": 1205,
"score": 0,
"subscribers_count": 34
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
"fork": false,
"created_at": "2020-01-17T05:35:01Z",
"updated_at": "2024-12-03T10:19:36Z",
"updated_at": "2025-01-21T23:20:59Z",
"pushed_at": "2022-12-15T07:33:15Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 85,
"watchers": 86,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,7 +14,7 @@
"description": "Exploit for CVE-2021-30807",
"fork": false,
"created_at": "2021-10-09T20:11:42Z",
"updated_at": "2024-11-10T14:44:04Z",
"updated_at": "2025-01-21T22:11:09Z",
"pushed_at": "2021-11-29T13:50:42Z",
"stargazers_count": 130,
"watchers_count": 130,

View file

@ -45,7 +45,7 @@
"description": "Collection of materials relating to FORCEDENTRY",
"fork": false,
"created_at": "2021-12-25T03:00:01Z",
"updated_at": "2025-01-02T21:48:11Z",
"updated_at": "2025-01-21T22:11:11Z",
"pushed_at": "2024-03-30T22:17:05Z",
"stargazers_count": 95,
"watchers_count": 95,

View file

@ -107,7 +107,7 @@
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
"fork": false,
"created_at": "2022-03-01T12:41:03Z",
"updated_at": "2024-11-16T08:09:19Z",
"updated_at": "2025-01-21T22:11:13Z",
"pushed_at": "2022-03-01T16:11:31Z",
"stargazers_count": 253,
"watchers_count": 253,

View file

@ -486,7 +486,7 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2025-01-18T22:40:31Z",
"updated_at": "2025-01-21T22:11:06Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 963,
"watchers_count": 963,

View file

@ -1982,7 +1982,7 @@
"description": "Proof of concept for pwnkit vulnerability",
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
"updated_at": "2024-12-24T08:36:17Z",
"updated_at": "2025-01-21T20:48:36Z",
"pushed_at": "2023-01-12T19:23:29Z",
"stargazers_count": 338,
"watchers_count": 338,

View file

@ -308,8 +308,8 @@
"description": "Check Point Security Gateways RCE via CVE-2021-40438",
"fork": false,
"created_at": "2025-01-21T13:16:24Z",
"updated_at": "2025-01-21T16:47:39Z",
"pushed_at": "2025-01-21T16:03:56Z",
"updated_at": "2025-01-21T20:17:16Z",
"pushed_at": "2025-01-21T20:17:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -461,7 +461,7 @@
"description": "CVE-2021-41773 playground",
"fork": false,
"created_at": "2021-10-06T07:17:05Z",
"updated_at": "2024-11-22T13:23:13Z",
"updated_at": "2025-01-21T22:11:09Z",
"pushed_at": "2021-10-07T17:56:38Z",
"stargazers_count": 206,
"watchers_count": 206,

View file

@ -622,7 +622,7 @@
"description": "Hashes for vulnerable LOG4J versions",
"fork": false,
"created_at": "2021-12-10T18:06:06Z",
"updated_at": "2025-01-06T02:36:36Z",
"updated_at": "2025-01-21T20:35:54Z",
"pushed_at": "2021-12-17T17:02:24Z",
"stargazers_count": 153,
"watchers_count": 153,
@ -884,10 +884,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2025-01-14T03:16:00Z",
"updated_at": "2025-01-21T21:32:29Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 935,
"watchers_count": 935,
"stargazers_count": 934,
"watchers_count": 934,
"has_discussions": false,
"forks_count": 141,
"allow_forking": true,
@ -916,7 +916,7 @@
],
"visibility": "public",
"forks": 141,
"watchers": 935,
"watchers": 934,
"score": 0,
"subscribers_count": 25
},
@ -1467,7 +1467,7 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2025-01-19T07:23:11Z",
"updated_at": "2025-01-21T20:35:54Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 854,
"watchers_count": 854,
@ -2027,7 +2027,7 @@
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2025-01-19T18:55:44Z",
"updated_at": "2025-01-21T20:48:35Z",
"pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 637,
"watchers_count": 637,
@ -3749,10 +3749,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2025-01-15T07:32:58Z",
"updated_at": "2025-01-21T18:27:36Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3408,
"watchers_count": 3408,
"stargazers_count": 3407,
"watchers_count": 3407,
"has_discussions": true,
"forks_count": 740,
"allow_forking": true,
@ -3761,7 +3761,7 @@
"topics": [],
"visibility": "public",
"forks": 740,
"watchers": 3408,
"watchers": 3407,
"score": 0,
"subscribers_count": 55
},
@ -9580,7 +9580,7 @@
"description": "Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-21T22:14:24Z",
"updated_at": "2024-07-07T09:47:47Z",
"updated_at": "2025-01-21T20:35:55Z",
"pushed_at": "2022-01-10T19:13:04Z",
"stargazers_count": 57,
"watchers_count": 57,

View file

@ -141,7 +141,7 @@
"description": "Public testing data. Samples of log4j library versions to help log4j scanners \/ detectors improve their accuracy for detecting CVE-2021-45046 and CVE-2021-44228. TAG_TESTING, OWNER_KEN, DC_PUBLIC",
"fork": false,
"created_at": "2021-12-16T18:12:29Z",
"updated_at": "2023-09-11T19:22:43Z",
"updated_at": "2025-01-21T20:35:54Z",
"pushed_at": "2021-12-30T05:15:54Z",
"stargazers_count": 14,
"watchers_count": 14,

View file

@ -14,10 +14,10 @@
"description": "Android kernel exploitation for CVE-2022-20409",
"fork": false,
"created_at": "2022-11-21T22:42:50Z",
"updated_at": "2025-01-21T10:55:22Z",
"updated_at": "2025-01-21T23:07:38Z",
"pushed_at": "2024-10-17T16:26:39Z",
"stargazers_count": 169,
"watchers_count": 169,
"stargazers_count": 170,
"watchers_count": 170,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 169,
"watchers": 170,
"score": 0,
"subscribers_count": 5
}

View file

@ -14,7 +14,7 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
"updated_at": "2025-01-01T14:03:35Z",
"updated_at": "2025-01-21T20:48:38Z",
"pushed_at": "2023-05-27T15:39:41Z",
"stargazers_count": 237,
"watchers_count": 237,

View file

@ -14,10 +14,10 @@
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
"fork": false,
"created_at": "2022-02-07T15:53:21Z",
"updated_at": "2024-11-26T06:21:11Z",
"updated_at": "2025-01-21T20:48:36Z",
"pushed_at": "2022-02-07T15:55:03Z",
"stargazers_count": 239,
"watchers_count": 239,
"stargazers_count": 238,
"watchers_count": 238,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 239,
"watchers": 238,
"score": 0,
"subscribers_count": 12
},

View file

@ -96,7 +96,7 @@
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2024-11-02T16:24:21Z",
"updated_at": "2025-01-21T20:35:55Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 361,
"watchers_count": 361,

View file

@ -76,10 +76,10 @@
"description": "cve-2022-23131 zabbix-saml-bypass-exp",
"fork": false,
"created_at": "2022-02-18T11:51:47Z",
"updated_at": "2025-01-04T08:11:13Z",
"updated_at": "2025-01-21T23:15:09Z",
"pushed_at": "2024-08-11T18:14:56Z",
"stargazers_count": 150,
"watchers_count": 150,
"stargazers_count": 151,
"watchers_count": 151,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 150,
"watchers": 151,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,7 +14,7 @@
"description": null,
"fork": false,
"created_at": "2022-07-19T12:46:45Z",
"updated_at": "2025-01-16T01:30:59Z",
"updated_at": "2025-01-21T22:11:14Z",
"pushed_at": "2022-09-06T14:05:22Z",
"stargazers_count": 243,
"watchers_count": 243,

View file

@ -48,10 +48,10 @@
"description": "Bootloader unlock using CVE-2022-38694 for Anbernic Unisoc T820 devices",
"fork": false,
"created_at": "2024-06-27T14:28:13Z",
"updated_at": "2024-12-10T09:48:51Z",
"updated_at": "2025-01-22T00:15:23Z",
"pushed_at": "2024-10-15T10:16:57Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 3
}

View file

@ -743,10 +743,10 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-16T06:54:15Z",
"updated_at": "2025-01-21T14:12:13Z",
"updated_at": "2025-01-21T19:37:31Z",
"pushed_at": "2025-01-16T09:56:36Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -755,7 +755,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 59,
"watchers": 61,
"score": 0,
"subscribers_count": 7
},
@ -805,8 +805,8 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-18T15:32:21Z",
"updated_at": "2025-01-21T17:56:07Z",
"pushed_at": "2025-01-21T17:56:03Z",
"updated_at": "2025-01-22T00:11:35Z",
"pushed_at": "2025-01-22T00:11:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -76,7 +76,7 @@
"description": "CVE-2023-34362: MOVEit Transfer Unauthenticated RCE",
"fork": false,
"created_at": "2023-06-12T12:56:12Z",
"updated_at": "2024-09-27T17:00:38Z",
"updated_at": "2025-01-21T22:11:17Z",
"pushed_at": "2024-03-24T00:46:38Z",
"stargazers_count": 63,
"watchers_count": 63,

View file

@ -14,7 +14,7 @@
"description": "lazy way to create CVE-2023-38831 winrar file for testing",
"fork": false,
"created_at": "2023-08-24T16:03:07Z",
"updated_at": "2024-12-09T01:45:14Z",
"updated_at": "2025-01-21T20:35:59Z",
"pushed_at": "2023-08-24T16:13:02Z",
"stargazers_count": 92,
"watchers_count": 92,
@ -45,7 +45,7 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2025-01-18T22:50:54Z",
"updated_at": "2025-01-21T20:35:59Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 783,
"watchers_count": 783,

View file

@ -402,37 +402,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 725243332,
"name": "activemq-cve-2023-46604-duplicate",
"full_name": "tomasmussi-mulesoft\/activemq-cve-2023-46604-duplicate",
"owner": {
"login": "tomasmussi-mulesoft",
"id": 87021051,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87021051?v=4",
"html_url": "https:\/\/github.com\/tomasmussi-mulesoft",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tomasmussi-mulesoft\/activemq-cve-2023-46604-duplicate",
"description": "Repository to exploit CVE-2023-46604 reported for ActiveMQ",
"fork": false,
"created_at": "2023-11-29T18:30:02Z",
"updated_at": "2024-12-11T14:20:35Z",
"pushed_at": "2024-11-02T13:29:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 728564712,
"name": "CVE-Lab",
@ -557,6 +526,37 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 737375747,
"name": "activemq-cve-2023-46604",
"full_name": "tomasmussi\/activemq-cve-2023-46604",
"owner": {
"login": "tomasmussi",
"id": 12720693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12720693?v=4",
"html_url": "https:\/\/github.com\/tomasmussi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tomasmussi\/activemq-cve-2023-46604",
"description": "Repository to exploit CVE-2023-46604 reported for ActiveMQ",
"fork": false,
"created_at": "2023-12-30T20:02:19Z",
"updated_at": "2025-01-21T20:11:40Z",
"pushed_at": "2025-01-21T20:11:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 740774996,
"name": "cve-2023-46604",

View file

@ -297,19 +297,19 @@
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
"fork": false,
"created_at": "2024-09-27T09:02:08Z",
"updated_at": "2025-01-21T08:01:21Z",
"updated_at": "2025-01-21T22:38:43Z",
"pushed_at": "2024-09-30T12:48:08Z",
"stargazers_count": 134,
"watchers_count": 134,
"stargazers_count": 135,
"watchers_count": 135,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 134,
"forks": 18,
"watchers": 135,
"score": 0,
"subscribers_count": 3
},

View file

@ -438,5 +438,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 920321578,
"name": "Project-Exploiting-CVE-2024-27198-RCE-Vulnerability",
"full_name": "ArtemCyberLab\/Project-Exploiting-CVE-2024-27198-RCE-Vulnerability",
"owner": {
"login": "ArtemCyberLab",
"id": 193649833,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193649833?v=4",
"html_url": "https:\/\/github.com\/ArtemCyberLab",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ArtemCyberLab\/Project-Exploiting-CVE-2024-27198-RCE-Vulnerability",
"description": "In this project, I exploited the CVE-2024-27198-RCE vulnerability to perform a remote code execution (RCE) attack on a vulnerable TeamCity server.",
"fork": false,
"created_at": "2025-01-22T00:09:41Z",
"updated_at": "2025-01-22T00:16:40Z",
"pushed_at": "2025-01-22T00:16:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,7 +76,7 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2025-01-19T21:10:28Z",
"updated_at": "2025-01-21T22:11:19Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 428,
"watchers_count": 428,

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-26T12:39:44Z",
"updated_at": "2025-01-21T17:29:39Z",
"updated_at": "2025-01-21T23:57:55Z",
"pushed_at": "2025-01-16T09:48:07Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 53,
"watchers": 56,
"score": 0,
"subscribers_count": 0
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2

View file

@ -50,13 +50,13 @@
"stargazers_count": 83,
"watchers_count": 83,
"has_discussions": false,
"forks_count": 30,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"forks": 29,
"watchers": 83,
"score": 0,
"subscribers_count": 3

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-16T07:26:15Z",
"updated_at": "2025-01-21T17:35:07Z",
"updated_at": "2025-01-21T22:12:30Z",
"pushed_at": "2025-01-16T08:58:49Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 1
},
@ -45,8 +45,8 @@
"description": "Checks for authentication bypass vulnerability inFortinet's FortiOS, potentially exploited by remote attackers.",
"fork": false,
"created_at": "2025-01-18T15:17:07Z",
"updated_at": "2025-01-21T18:23:33Z",
"pushed_at": "2025-01-21T18:23:30Z",
"updated_at": "2025-01-22T00:29:48Z",
"pushed_at": "2025-01-22T00:29:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-17T16:10:38Z",
"updated_at": "2025-01-20T10:36:02Z",
"updated_at": "2025-01-21T23:20:25Z",
"pushed_at": "2024-10-17T16:28:17Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -138,10 +138,10 @@
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
"fork": false,
"created_at": "2025-01-16T14:45:53Z",
"updated_at": "2025-01-21T15:43:50Z",
"updated_at": "2025-01-21T23:59:22Z",
"pushed_at": "2025-01-16T20:09:52Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 0
},

View file

@ -15,7 +15,7 @@
"fork": false,
"created_at": "2025-01-19T05:31:13Z",
"updated_at": "2025-01-20T04:16:51Z",
"pushed_at": "2025-01-20T04:17:36Z",
"pushed_at": "2025-01-21T21:09:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -4321,6 +4321,7 @@
- [jrbH4CK/CVE-2024-27198](https://github.com/jrbH4CK/CVE-2024-27198)
- [geniuszly/CVE-2024-27198](https://github.com/geniuszly/CVE-2024-27198)
- [Cythonic1/CVE-2024-27198_POC](https://github.com/Cythonic1/CVE-2024-27198_POC)
- [ArtemCyberLab/Project-Exploiting-CVE-2024-27198-RCE-Vulnerability](https://github.com/ArtemCyberLab/Project-Exploiting-CVE-2024-27198-RCE-Vulnerability)
### CVE-2024-27292 (2024-02-29)
@ -7461,7 +7462,11 @@
- [OpenXP-Research/CVE-2024-48360](https://github.com/OpenXP-Research/CVE-2024-48360)
### CVE-2024-48392
### CVE-2024-48392 (2025-01-21)
<code>OrangeScrum v2.0.11 is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into user email due to lack of input validation, which could lead to account takeover.
</code>
- [Renzusclarke/CVE-2024-48392-PoC](https://github.com/Renzusclarke/CVE-2024-48392-PoC)
### CVE-2024-48415 (2024-10-22)
@ -8360,13 +8365,25 @@
- [nscan9/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection](https://github.com/nscan9/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection)
### CVE-2024-54792
### CVE-2024-54792 (2025-01-21)
<code>A Cross-Site Request Forgery (CSRF) vulnerability has been found in SpagoBI v3.5.1 in the user administration panel. An authenticated user can lead another user into executing unwanted actions inside the application they are logged in, like adding, editing or deleting users.
</code>
- [MarioTesoro/CVE-2024-54792](https://github.com/MarioTesoro/CVE-2024-54792)
### CVE-2024-54794
### CVE-2024-54794 (2025-01-21)
<code>The script input feature of SpagoBI 3.5.1 allows arbitrary code execution.
</code>
- [MarioTesoro/CVE-2024-54794](https://github.com/MarioTesoro/CVE-2024-54794)
### CVE-2024-54795
### CVE-2024-54795 (2025-01-21)
<code>SpagoBI v3.5.1 contains multiple Stored Cross-Site Scripting (XSS) vulnerabilities in the create/edit forms of the worksheet designer function.
</code>
- [MarioTesoro/CVE-2024-54795](https://github.com/MarioTesoro/CVE-2024-54795)
### CVE-2024-54819 (2025-01-07)
@ -8414,7 +8431,11 @@
- [SyFi/CVE-2024-55503](https://github.com/SyFi/CVE-2024-55503)
### CVE-2024-55504
### CVE-2024-55504 (2025-01-21)
<code>An issue in RAR Extractor - Unarchiver Free and Pro v.6.4.0 allows local attackers to inject arbitrary code potentially leading to remote control and unauthorized access to sensitive user data via the exploit_combined.dylib component on MacOS.
</code>
- [SyFi/CVE-2024-55504](https://github.com/SyFi/CVE-2024-55504)
### CVE-2024-55511 (2025-01-16)
@ -16029,11 +16050,11 @@
- [NKeshawarz/CVE-2023-46604-RCE](https://github.com/NKeshawarz/CVE-2023-46604-RCE)
- [minhangxiaohui/ActiveMQ_CVE-2023-46604](https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604)
- [nitzanoligo/CVE-2023-46604-demo](https://github.com/nitzanoligo/CVE-2023-46604-demo)
- [tomasmussi-mulesoft/activemq-cve-2023-46604-duplicate](https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604-duplicate)
- [dcm2406/CVE-Lab](https://github.com/dcm2406/CVE-Lab)
- [mrpentst/CVE-2023-46604](https://github.com/mrpentst/CVE-2023-46604)
- [dcm2406/CVE-2023-46604](https://github.com/dcm2406/CVE-2023-46604)
- [Mudoleto/Broker_ApacheMQ](https://github.com/Mudoleto/Broker_ApacheMQ)
- [tomasmussi/activemq-cve-2023-46604](https://github.com/tomasmussi/activemq-cve-2023-46604)
- [hh-hunter/cve-2023-46604](https://github.com/hh-hunter/cve-2023-46604)
- [stegano5/ExploitScript-CVE-2023-46604](https://github.com/stegano5/ExploitScript-CVE-2023-46604)
- [Arlenhiack/ActiveMQ-RCE-Exploit](https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit)