Auto Update 2024/06/08 18:29:02

This commit is contained in:
motikan2010-bot 2024-06-09 03:29:02 +09:00
parent 9ec7b56823
commit f91d28657a
31 changed files with 174 additions and 136 deletions

View file

@ -13,10 +13,10 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2024-06-02T15:58:15Z",
"updated_at": "2024-06-08T14:14:11Z",
"pushed_at": "2023-01-22T09:39:45Z",
"stargazers_count": 385,
"watchers_count": 385,
"stargazers_count": 386,
"watchers_count": 386,
"has_discussions": false,
"forks_count": 114,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 114,
"watchers": 385,
"watchers": 386,
"score": 0,
"subscribers_count": 18
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2008-4250 Conficker",
"fork": false,
"created_at": "2024-04-11T15:27:50Z",
"updated_at": "2024-06-08T11:47:45Z",
"updated_at": "2024-06-08T15:34:01Z",
"pushed_at": "2024-06-05T02:26:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -36,6 +36,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.",
"fork": false,
"created_at": "2017-12-25T06:11:54Z",
"updated_at": "2023-09-28T10:46:55Z",
"updated_at": "2024-06-08T13:52:08Z",
"pushed_at": "2017-12-25T06:21:23Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 24,
"watchers": 23,
"score": 0,
"subscribers_count": 1
},

View file

@ -258,8 +258,8 @@
"description": "wp-includes\/rest-api\/endpoints\/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json\/wp\/v2\/users request.",
"fork": false,
"created_at": "2024-05-27T21:19:33Z",
"updated_at": "2024-05-28T16:37:48Z",
"pushed_at": "2024-05-28T16:37:45Z",
"updated_at": "2024-06-08T16:06:29Z",
"pushed_at": "2024-06-08T16:06:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

File diff suppressed because one or more lines are too long

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2020-09-08T06:06:36Z",
"updated_at": "2020-11-25T07:32:06Z",
"updated_at": "2024-06-08T16:40:10Z",
"pushed_at": "2020-09-08T06:09:54Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 4
}

View file

@ -1690,10 +1690,10 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2024-05-08T08:30:09Z",
"updated_at": "2024-06-08T18:17:00Z",
"pushed_at": "2022-03-30T14:02:04Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 247,
"watchers_count": 247,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -1702,7 +1702,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 248,
"watchers": 247,
"score": 0,
"subscribers_count": 7
},

View file

@ -415,13 +415,13 @@
"stargazers_count": 429,
"watchers_count": 429,
"has_discussions": false,
"forks_count": 112,
"forks_count": 111,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 112,
"forks": 111,
"watchers": 429,
"score": 0,
"subscribers_count": 8

View file

@ -133,10 +133,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2024-06-08T05:13:23Z",
"updated_at": "2024-06-08T12:44:06Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 127,
"watchers_count": 127,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -148,7 +148,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 126,
"watchers": 127,
"score": 0,
"subscribers_count": 2
},

View file

@ -369,10 +369,10 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2024-06-04T09:54:01Z",
"updated_at": "2024-06-08T17:30:18Z",
"pushed_at": "2024-04-26T03:16:26Z",
"stargazers_count": 1098,
"watchers_count": 1098,
"stargazers_count": 1097,
"watchers_count": 1097,
"has_discussions": false,
"forks_count": 528,
"allow_forking": true,
@ -383,7 +383,7 @@
],
"visibility": "public",
"forks": 528,
"watchers": 1098,
"watchers": 1097,
"score": 0,
"subscribers_count": 23
},
@ -1842,7 +1842,7 @@
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 7,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1857,7 +1857,7 @@
"security"
],
"visibility": "public",
"forks": 7,
"forks": 6,
"watchers": 35,
"score": 0,
"subscribers_count": 3

View file

@ -1314,10 +1314,10 @@
"description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行CVE-2022-22947 注入哥斯拉内存马",
"fork": false,
"created_at": "2022-05-16T15:27:41Z",
"updated_at": "2024-04-05T15:00:35Z",
"updated_at": "2024-06-08T13:34:17Z",
"pushed_at": "2022-05-16T15:33:37Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -1326,7 +1326,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 51,
"watchers": 50,
"score": 0,
"subscribers_count": 1
},

View file

@ -103,10 +103,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2024-06-05T04:48:04Z",
"updated_at": "2024-06-08T17:16:48Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 870,
"watchers_count": 870,
"stargazers_count": 871,
"watchers_count": 871,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 870,
"watchers": 871,
"score": 0,
"subscribers_count": 25
},

View file

@ -73,10 +73,10 @@
"description": "GameOver(lay) Ubuntu Privilege Escalation",
"fork": false,
"created_at": "2023-10-09T22:02:42Z",
"updated_at": "2024-05-31T16:07:12Z",
"updated_at": "2024-06-08T15:39:49Z",
"pushed_at": "2023-10-09T22:44:21Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 101,
"watchers": 102,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": "Chamilo CVE-2023-34960 Batch scan\/exploit ",
"fork": false,
"created_at": "2023-07-09T11:24:33Z",
"updated_at": "2024-04-12T05:37:26Z",
"updated_at": "2024-06-08T14:47:14Z",
"pushed_at": "2023-07-09T11:57:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-15T12:14:18Z",
"updated_at": "2024-06-02T16:14:45Z",
"updated_at": "2024-06-08T16:26:21Z",
"pushed_at": "2024-03-08T12:57:53Z",
"stargazers_count": 186,
"watchers_count": 186,
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 186,
"watchers": 187,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-06-08T02:49:35Z",
"updated_at": "2024-06-08T17:42:51Z",
"pushed_at": "2024-05-29T14:55:57Z",
"stargazers_count": 782,
"watchers_count": 782,
"stargazers_count": 783,
"watchers_count": 783,
"has_discussions": false,
"forks_count": 138,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 138,
"watchers": 782,
"watchers": 783,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,10 +13,10 @@
"description": "Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)",
"fork": false,
"created_at": "2024-06-02T14:15:27Z",
"updated_at": "2024-06-07T14:56:24Z",
"updated_at": "2024-06-08T15:29:46Z",
"pushed_at": "2024-06-03T05:03:46Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 2
}

View file

@ -18,7 +18,7 @@
"stargazers_count": 2086,
"watchers_count": 2086,
"has_discussions": false,
"forks_count": 266,
"forks_count": 267,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"poc"
],
"visibility": "public",
"forks": 266,
"forks": 267,
"watchers": 2086,
"score": 0,
"subscribers_count": 24

View file

@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-06-08T10:08:11Z",
"updated_at": "2024-06-08T14:49:37Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 627,
"watchers_count": 627,
"stargazers_count": 628,
"watchers_count": 628,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 140,
"watchers": 627,
"watchers": 628,
"score": 0,
"subscribers_count": 9
},

View file

@ -230,14 +230,14 @@
{
"id": 809314858,
"name": "0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
"full_name": "0bl1v10nf0rg0773n\/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
"full_name": "ivanbg2004\/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
"owner": {
"login": "0bl1v10nf0rg0773n",
"login": "ivanbg2004",
"id": 124943966,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124943966?v=4",
"html_url": "https:\/\/github.com\/0bl1v10nf0rg0773n"
"html_url": "https:\/\/github.com\/ivanbg2004"
},
"html_url": "https:\/\/github.com\/0bl1v10nf0rg0773n\/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
"html_url": "https:\/\/github.com\/ivanbg2004\/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
"description": "0BL1V10N's CVE-2024-25600 for Bricks Builder (TryHackMe) plugin for WordPress exploit",
"fork": false,
"created_at": "2024-06-02T10:49:03Z",

View file

@ -13,12 +13,12 @@
"description": "Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )",
"fork": false,
"created_at": "2024-05-31T20:11:37Z",
"updated_at": "2024-06-08T10:23:23Z",
"updated_at": "2024-06-08T16:28:02Z",
"pushed_at": "2024-06-08T09:12:43Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"vulnerability-scanners"
],
"visibility": "public",
"forks": 9,
"watchers": 46,
"forks": 10,
"watchers": 47,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "Telesquare TLR-2005KSH_RCE (CVE-2024-29269) Batch scan\/exploit",
"fork": false,
"created_at": "2024-04-12T07:36:08Z",
"updated_at": "2024-04-12T08:33:10Z",
"updated_at": "2024-06-08T14:54:09Z",
"pushed_at": "2024-04-12T07:58:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-06-08T04:39:38Z",
"updated_at": "2024-06-08T18:17:17Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3470,
"watchers_count": 3470,
"stargazers_count": 3469,
"watchers_count": 3469,
"has_discussions": false,
"forks_count": 232,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 232,
"watchers": 3470,
"watchers": 3469,
"score": 0,
"subscribers_count": 39
},

View file

@ -73,10 +73,10 @@
"description": "Exploit PoC for CVE-2024-32002",
"fork": false,
"created_at": "2024-05-17T19:33:08Z",
"updated_at": "2024-06-07T15:16:59Z",
"updated_at": "2024-06-08T14:13:12Z",
"pushed_at": "2024-05-19T07:12:00Z",
"stargazers_count": 436,
"watchers_count": 436,
"stargazers_count": 437,
"watchers_count": 437,
"has_discussions": false,
"forks_count": 119,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 119,
"watchers": 436,
"watchers": 437,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-32640 | Automated SQLi Exploitation PoC",
"fork": false,
"created_at": "2024-05-16T01:02:32Z",
"updated_at": "2024-06-06T00:12:38Z",
"updated_at": "2024-06-08T14:42:16Z",
"pushed_at": "2024-05-16T21:07:32Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 1
},

View file

@ -403,10 +403,10 @@
"description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect",
"fork": false,
"created_at": "2024-04-16T21:24:15Z",
"updated_at": "2024-05-08T09:15:12Z",
"updated_at": "2024-06-08T15:29:04Z",
"pushed_at": "2024-04-17T11:03:32Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -415,7 +415,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-06-07T03:28:03Z",
"updated_at": "2024-06-08T16:09:28Z",
"pushed_at": "2024-06-07T03:28:00Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 55,
"watchers": 56,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
"fork": false,
"created_at": "2024-06-07T05:50:23Z",
"updated_at": "2024-06-08T10:21:27Z",
"updated_at": "2024-06-08T18:03:03Z",
"pushed_at": "2024-06-07T11:49:08Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 49,
"watchers": 55,
"score": 0,
"subscribers_count": 4
},
@ -133,10 +133,10 @@
"description": "POC & $BASH script for CVE-2024-4577",
"fork": false,
"created_at": "2024-06-07T09:51:39Z",
"updated_at": "2024-06-08T12:07:00Z",
"updated_at": "2024-06-08T18:11:51Z",
"pushed_at": "2024-06-07T18:37:44Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 14,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},
@ -163,19 +163,19 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-06-08T12:17:43Z",
"updated_at": "2024-06-08T17:55:28Z",
"pushed_at": "2024-06-07T09:53:15Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 8,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 53,
"forks": 10,
"watchers": 60,
"score": 0,
"subscribers_count": 2
},
@ -223,10 +223,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-07T10:40:37Z",
"updated_at": "2024-06-07T20:43:49Z",
"updated_at": "2024-06-08T15:34:01Z",
"pushed_at": "2024-06-07T15:06:52Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
@ -481,20 +481,20 @@
},
{
"id": 812271703,
"name": "CVE-2024-4577-PoC",
"full_name": "ZephrFish\/CVE-2024-4577-PoC",
"name": "CVE-2024-4577-PHP-RCE",
"full_name": "ZephrFish\/CVE-2024-4577-PHP-RCE",
"owner": {
"login": "ZephrFish",
"id": 5783068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
"html_url": "https:\/\/github.com\/ZephrFish"
},
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2024-4577-PoC",
"description": "PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2024-4577-PHP-RCE",
"description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
"fork": false,
"created_at": "2024-06-08T12:23:35Z",
"updated_at": "2024-06-08T12:24:44Z",
"pushed_at": "2024-06-08T12:24:41Z",
"updated_at": "2024-06-08T15:59:30Z",
"pushed_at": "2024-06-08T15:59:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -502,10 +502,47 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-4577",
"pentest",
"php",
"poc",
"rce-exploit",
"redteam"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 812283983,
"name": "CVE-2024-4577-PHP-RCE",
"full_name": "xcanwin\/CVE-2024-4577-PHP-RCE",
"owner": {
"login": "xcanwin",
"id": 14187349,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14187349?v=4",
"html_url": "https:\/\/github.com\/xcanwin"
},
"html_url": "https:\/\/github.com\/xcanwin\/CVE-2024-4577-PHP-RCE",
"description": "全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP",
"fork": false,
"created_at": "2024-06-08T13:04:45Z",
"updated_at": "2024-06-08T18:14:25Z",
"pushed_at": "2024-06-08T14:04:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -337,8 +337,8 @@
"description": "CVE-2024-4956 Python exploitation utility",
"fork": false,
"created_at": "2024-06-05T15:37:39Z",
"updated_at": "2024-06-07T20:03:30Z",
"pushed_at": "2024-06-07T20:03:27Z",
"updated_at": "2024-06-08T16:13:06Z",
"pushed_at": "2024-06-08T16:13:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -637,7 +637,8 @@
- [0x20c/CVE-2024-4577-nuclei](https://github.com/0x20c/CVE-2024-4577-nuclei)
- [manuelinfosec/CVE-2024-4577](https://github.com/manuelinfosec/CVE-2024-4577)
- [zomasec/CVE-2024-4577](https://github.com/zomasec/CVE-2024-4577)
- [ZephrFish/CVE-2024-4577-PoC](https://github.com/ZephrFish/CVE-2024-4577-PoC)
- [ZephrFish/CVE-2024-4577-PHP-RCE](https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE)
- [xcanwin/CVE-2024-4577-PHP-RCE](https://github.com/xcanwin/CVE-2024-4577-PHP-RCE)
### CVE-2024-4701 (2024-05-10)
@ -1613,7 +1614,7 @@
- [K3ysTr0K3R/CVE-2024-25600-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT)
- [X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE](https://github.com/X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE)
- [RHYru9/CVE-2024-25600-mass](https://github.com/RHYru9/CVE-2024-25600-mass)
- [0bl1v10nf0rg0773n/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress](https://github.com/0bl1v10nf0rg0773n/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress)
- [ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress](https://github.com/ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress)
- [k3lpi3b4nsh33/CVE-2024-25600](https://github.com/k3lpi3b4nsh33/CVE-2024-25600)
- [WanLiChangChengWanLiChang/CVE-2024-25600](https://github.com/WanLiChangChengWanLiChang/CVE-2024-25600)