Auto Update 2024/12/16 12:33:27

This commit is contained in:
motikan2010-bot 2024-12-16 21:33:27 +09:00
parent ddd38f50fb
commit faa4a96fec
53 changed files with 301 additions and 229 deletions

View file

@ -2,15 +2,15 @@
{ {
"id": 598440551, "id": 598440551,
"name": "CVE-2006-20001", "name": "CVE-2006-20001",
"full_name": "Saksham2002\/CVE-2006-20001", "full_name": "r1az4r\/CVE-2006-20001",
"owner": { "owner": {
"login": "Saksham2002", "login": "r1az4r",
"id": 31695520, "id": 31695520,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31695520?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31695520?v=4",
"html_url": "https:\/\/github.com\/Saksham2002", "html_url": "https:\/\/github.com\/r1az4r",
"user_view_type": "public" "user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Saksham2002\/CVE-2006-20001", "html_url": "https:\/\/github.com\/r1az4r\/CVE-2006-20001",
"description": "A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. CVE project by @Sn0wAlice", "description": "A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. CVE project by @Sn0wAlice",
"fork": false, "fork": false,
"created_at": "2023-02-07T05:30:52Z", "created_at": "2023-02-07T05:30:52Z",

View file

@ -45,10 +45,10 @@
"description": "PoC para CVE-2015-9251 jQuery menor a 3.0.0.", "description": "PoC para CVE-2015-9251 jQuery menor a 3.0.0.",
"fork": false, "fork": false,
"created_at": "2024-11-01T16:02:04Z", "created_at": "2024-11-01T16:02:04Z",
"updated_at": "2024-11-01T16:04:08Z", "updated_at": "2024-12-16T06:35:07Z",
"pushed_at": "2024-11-01T16:04:04Z", "pushed_at": "2024-11-01T16:04:04Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -417,10 +417,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false, "fork": false,
"created_at": "2024-08-29T06:38:16Z", "created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-12T15:55:33Z", "updated_at": "2024-12-16T09:11:32Z",
"pushed_at": "2024-11-13T03:12:58Z", "pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 158, "stargazers_count": 159,
"watchers_count": 158, "watchers_count": 159,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
@ -437,7 +437,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 14,
"watchers": 158, "watchers": 159,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -330,8 +330,8 @@
"description": "Improved version of PikaChu CVE", "description": "Improved version of PikaChu CVE",
"fork": false, "fork": false,
"created_at": "2024-12-13T11:22:38Z", "created_at": "2024-12-13T11:22:38Z",
"updated_at": "2024-12-13T11:31:35Z", "updated_at": "2024-12-16T10:14:43Z",
"pushed_at": "2024-12-13T11:31:31Z", "pushed_at": "2024-12-16T10:14:39Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -76,10 +76,10 @@
"description": "Unsigned driver loader using CVE-2018-19320", "description": "Unsigned driver loader using CVE-2018-19320",
"fork": false, "fork": false,
"created_at": "2022-11-12T05:48:13Z", "created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-12-12T20:58:15Z", "updated_at": "2024-12-16T08:40:23Z",
"pushed_at": "2023-04-09T13:50:29Z", "pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 212, "stargazers_count": 213,
"watchers_count": 212, "watchers_count": 213,
"has_discussions": false, "has_discussions": false,
"forks_count": 57, "forks_count": 57,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 57, "forks": 57,
"watchers": 212, "watchers": 213,
"score": 0, "score": 0,
"subscribers_count": 9 "subscribers_count": 9
} }

View file

@ -19,13 +19,13 @@
"stargazers_count": 7, "stargazers_count": 7,
"watchers_count": 7, "watchers_count": 7,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 4,
"watchers": 7, "watchers": 7,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -1907,13 +1907,13 @@
"stargazers_count": 1175, "stargazers_count": 1175,
"watchers_count": 1175, "watchers_count": 1175,
"has_discussions": false, "has_discussions": false,
"forks_count": 346, "forks_count": 345,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 346, "forks": 345,
"watchers": 1175, "watchers": 1175,
"score": 0, "score": 0,
"subscribers_count": 68 "subscribers_count": 68

View file

@ -107,10 +107,10 @@
"description": "php-fpm+Nginx RCE", "description": "php-fpm+Nginx RCE",
"fork": false, "fork": false,
"created_at": "2019-10-23T23:26:57Z", "created_at": "2019-10-23T23:26:57Z",
"updated_at": "2024-10-30T08:09:01Z", "updated_at": "2024-12-16T11:23:42Z",
"pushed_at": "2020-08-20T04:43:25Z", "pushed_at": "2020-08-20T04:43:25Z",
"stargazers_count": 101, "stargazers_count": 102,
"watchers_count": 101, "watchers_count": 102,
"has_discussions": false, "has_discussions": false,
"forks_count": 37, "forks_count": 37,
"allow_forking": true, "allow_forking": true,
@ -119,7 +119,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 37, "forks": 37,
"watchers": 101, "watchers": 102,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -112,13 +112,13 @@
"stargazers_count": 952, "stargazers_count": 952,
"watchers_count": 952, "watchers_count": 952,
"has_discussions": false, "has_discussions": false,
"forks_count": 178, "forks_count": 176,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 178, "forks": 176,
"watchers": 952, "watchers": 952,
"score": 0, "score": 0,
"subscribers_count": 18 "subscribers_count": 18

View file

@ -14,10 +14,10 @@
"description": "Exploits for Android Binder bug CVE-2020-0041", "description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false, "fork": false,
"created_at": "2020-03-31T17:53:57Z", "created_at": "2020-03-31T17:53:57Z",
"updated_at": "2024-12-15T21:43:47Z", "updated_at": "2024-12-16T11:17:13Z",
"pushed_at": "2020-04-08T08:55:30Z", "pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 223, "stargazers_count": 224,
"watchers_count": 223, "watchers_count": 224,
"has_discussions": false, "has_discussions": false,
"forks_count": 68, "forks_count": 68,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 68, "forks": 68,
"watchers": 223, "watchers": 224,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },

View file

@ -179,7 +179,7 @@
"stargazers_count": 886, "stargazers_count": 886,
"watchers_count": 886, "watchers_count": 886,
"has_discussions": false, "has_discussions": false,
"forks_count": 268, "forks_count": 265,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -187,7 +187,7 @@
"cve-2020-0601" "cve-2020-0601"
], ],
"visibility": "public", "visibility": "public",
"forks": 268, "forks": 265,
"watchers": 886, "watchers": 886,
"score": 0, "score": 0,
"subscribers_count": 33 "subscribers_count": 33

View file

@ -14,10 +14,10 @@
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks", "description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
"fork": false, "fork": false,
"created_at": "2022-03-08T17:14:27Z", "created_at": "2022-03-08T17:14:27Z",
"updated_at": "2024-12-04T08:36:15Z", "updated_at": "2024-12-16T08:35:04Z",
"pushed_at": "2022-05-03T10:40:14Z", "pushed_at": "2022-05-03T10:40:14Z",
"stargazers_count": 21, "stargazers_count": 22,
"watchers_count": 21, "watchers_count": 22,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 21, "watchers": 22,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -981,10 +981,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false, "fork": false,
"created_at": "2024-08-29T06:38:16Z", "created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-12-12T15:55:33Z", "updated_at": "2024-12-16T09:11:32Z",
"pushed_at": "2024-11-13T03:12:58Z", "pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 158, "stargazers_count": 159,
"watchers_count": 158, "watchers_count": 159,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
@ -1001,7 +1001,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 14,
"watchers": 158, "watchers": 159,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -19,13 +19,13 @@
"stargazers_count": 104, "stargazers_count": 104,
"watchers_count": 104, "watchers_count": 104,
"has_discussions": false, "has_discussions": false,
"forks_count": 22, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 22, "forks": 20,
"watchers": 104, "watchers": 104,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2021-3129", "description": "Exploit for CVE-2021-3129",
"fork": false, "fork": false,
"created_at": "2021-01-13T12:52:20Z", "created_at": "2021-01-13T12:52:20Z",
"updated_at": "2024-12-15T10:53:45Z", "updated_at": "2024-12-16T08:15:29Z",
"pushed_at": "2021-01-29T13:59:07Z", "pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 265, "stargazers_count": 266,
"watchers_count": 265, "watchers_count": 266,
"has_discussions": false, "has_discussions": false,
"forks_count": 62, "forks_count": 62,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 62, "forks": 62,
"watchers": 265, "watchers": 266,
"score": 0, "score": 0,
"subscribers_count": 14 "subscribers_count": 14
}, },

View file

@ -45,10 +45,10 @@
"description": "CVE-2021-3560 Local PrivEsc Exploit", "description": "CVE-2021-3560 Local PrivEsc Exploit",
"fork": false, "fork": false,
"created_at": "2021-06-11T14:28:43Z", "created_at": "2021-06-11T14:28:43Z",
"updated_at": "2024-11-13T06:49:51Z", "updated_at": "2024-12-16T06:53:41Z",
"pushed_at": "2021-06-12T17:48:38Z", "pushed_at": "2021-06-12T17:48:38Z",
"stargazers_count": 76, "stargazers_count": 77,
"watchers_count": 76, "watchers_count": 77,
"has_discussions": false, "has_discussions": false,
"forks_count": 12, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
@ -63,7 +63,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 12,
"watchers": 76, "watchers": 77,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },
@ -147,10 +147,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-06-14T20:08:20Z", "created_at": "2021-06-14T20:08:20Z",
"updated_at": "2024-12-14T16:07:48Z", "updated_at": "2024-12-16T08:03:45Z",
"pushed_at": "2022-11-16T13:14:56Z", "pushed_at": "2022-11-16T13:14:56Z",
"stargazers_count": 113, "stargazers_count": 114,
"watchers_count": 113, "watchers_count": 114,
"has_discussions": false, "has_discussions": false,
"forks_count": 50, "forks_count": 50,
"allow_forking": true, "allow_forking": true,
@ -159,7 +159,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 50, "forks": 50,
"watchers": 113, "watchers": 114,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -209,10 +209,10 @@
"description": "Privilege escalation with polkit - CVE-2021-3560", "description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false, "fork": false,
"created_at": "2021-06-19T08:15:17Z", "created_at": "2021-06-19T08:15:17Z",
"updated_at": "2024-11-26T22:44:38Z", "updated_at": "2024-12-16T06:53:21Z",
"pushed_at": "2021-06-20T07:38:13Z", "pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 116, "stargazers_count": 117,
"watchers_count": 116, "watchers_count": 117,
"has_discussions": false, "has_discussions": false,
"forks_count": 50, "forks_count": 50,
"allow_forking": true, "allow_forking": true,
@ -221,7 +221,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 50, "forks": 50,
"watchers": 116, "watchers": 117,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -91,36 +91,5 @@
"watchers": 9, "watchers": 9,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 904036351,
"name": "exchange_tools",
"full_name": "gmeier909\/exchange_tools",
"owner": {
"login": "gmeier909",
"id": 38092939,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38092939?v=4",
"html_url": "https:\/\/github.com\/gmeier909",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gmeier909\/exchange_tools",
"description": "将常用的cve工具做个备份(CVE-2021-42321,CVE-2022-23277,CVE-2022-41082,Exchange_GetVersion_MatchVul)",
"fork": false,
"created_at": "2024-12-16T06:08:45Z",
"updated_at": "2024-12-16T06:15:27Z",
"pushed_at": "2024-12-16T06:08:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -10710,6 +10710,37 @@
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
{
"id": 447404470,
"name": "log4shell",
"full_name": "jxerome\/log4shell",
"owner": {
"login": "jxerome",
"id": 1355634,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1355634?v=4",
"html_url": "https:\/\/github.com\/jxerome",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jxerome\/log4shell",
"description": "Démo du fonctionnement de log4shell (CVE-2021-44228)",
"fork": false,
"created_at": "2022-01-12T23:44:20Z",
"updated_at": "2022-01-12T23:59:13Z",
"pushed_at": "2022-01-14T14:03:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{ {
"id": 447754863, "id": 447754863,
"name": "log4j_github_repository", "name": "log4j_github_repository",

View file

@ -45,10 +45,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-03-12T04:47:02Z", "created_at": "2024-03-12T04:47:02Z",
"updated_at": "2024-10-30T07:27:51Z", "updated_at": "2024-12-16T06:53:25Z",
"pushed_at": "2024-03-18T07:32:24Z", "pushed_at": "2024-03-18T07:32:24Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -29,36 +29,5 @@
"watchers": 9, "watchers": 9,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 904036351,
"name": "exchange_tools",
"full_name": "gmeier909\/exchange_tools",
"owner": {
"login": "gmeier909",
"id": 38092939,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38092939?v=4",
"html_url": "https:\/\/github.com\/gmeier909",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gmeier909\/exchange_tools",
"description": "将常用的cve工具做个备份(CVE-2021-42321,CVE-2022-23277,CVE-2022-41082,Exchange_GetVersion_MatchVul)",
"fork": false,
"created_at": "2024-12-16T06:08:45Z",
"updated_at": "2024-12-16T06:20:04Z",
"pushed_at": "2024-12-16T06:19:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -786,8 +786,8 @@
}, },
{ {
"id": 831810309, "id": 831810309,
"name": "CVE-2023-22515", "name": "CVE-2023-22515-Confluence",
"full_name": "Onedy1703\/CVE-2023-22515", "full_name": "Onedy1703\/CVE-2023-22515-Confluence",
"owner": { "owner": {
"login": "Onedy1703", "login": "Onedy1703",
"id": 74649794, "id": 74649794,
@ -795,12 +795,12 @@
"html_url": "https:\/\/github.com\/Onedy1703", "html_url": "https:\/\/github.com\/Onedy1703",
"user_view_type": "public" "user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/Onedy1703\/CVE-2023-22515", "html_url": "https:\/\/github.com\/Onedy1703\/CVE-2023-22515-Confluence",
"description": "CVE 2023-22515", "description": "CVE 2023-22515",
"fork": false, "fork": false,
"created_at": "2024-07-21T17:19:36Z", "created_at": "2024-07-21T17:19:36Z",
"updated_at": "2024-12-14T09:44:02Z", "updated_at": "2024-12-16T10:14:30Z",
"pushed_at": "2024-12-14T09:43:59Z", "pushed_at": "2024-12-16T10:13:52Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -421,10 +421,10 @@
"description": "Joomla! < 4.2.8 - Unauthenticated information disclosure", "description": "Joomla! < 4.2.8 - Unauthenticated information disclosure",
"fork": false, "fork": false,
"created_at": "2023-03-24T11:50:16Z", "created_at": "2023-03-24T11:50:16Z",
"updated_at": "2024-12-09T18:18:44Z", "updated_at": "2024-12-16T11:33:42Z",
"pushed_at": "2023-12-27T11:30:46Z", "pushed_at": "2023-12-27T11:30:46Z",
"stargazers_count": 79, "stargazers_count": 80,
"watchers_count": 79, "watchers_count": 80,
"has_discussions": false, "has_discussions": false,
"forks_count": 17, "forks_count": 17,
"allow_forking": true, "allow_forking": true,
@ -440,7 +440,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 17, "forks": 17,
"watchers": 79, "watchers": 80,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -19,13 +19,13 @@
"stargazers_count": 166, "stargazers_count": 166,
"watchers_count": 166, "watchers_count": 166,
"has_discussions": false, "has_discussions": false,
"forks_count": 33, "forks_count": 35,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 33, "forks": 35,
"watchers": 166, "watchers": 166,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false, "fork": false,
"created_at": "2024-10-05T20:32:45Z", "created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-16T06:15:44Z", "updated_at": "2024-12-16T09:57:04Z",
"pushed_at": "2024-10-05T20:37:02Z", "pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 27, "stargazers_count": 31,
"watchers_count": 27, "watchers_count": 31,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -37,7 +37,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 27, "watchers": 31,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -76,10 +76,10 @@
"description": "CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system.", "description": "CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system.",
"fork": false, "fork": false,
"created_at": "2024-12-12T18:50:58Z", "created_at": "2024-12-12T18:50:58Z",
"updated_at": "2024-12-12T19:30:34Z", "updated_at": "2024-12-16T12:14:04Z",
"pushed_at": "2024-12-12T19:30:30Z", "pushed_at": "2024-12-12T19:30:30Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -19,13 +19,13 @@
"stargazers_count": 89, "stargazers_count": 89,
"watchers_count": 89, "watchers_count": 89,
"has_discussions": false, "has_discussions": false,
"forks_count": 19, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 19, "forks": 20,
"watchers": 89, "watchers": 89,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-15T18:10:45Z", "updated_at": "2024-12-16T12:18:00Z",
"pushed_at": "2024-08-18T08:26:46Z", "pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1293, "stargazers_count": 1295,
"watchers_count": 1293, "watchers_count": 1295,
"has_discussions": false, "has_discussions": false,
"forks_count": 221, "forks_count": 221,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 221, "forks": 221,
"watchers": 1293, "watchers": 1295,
"score": 0, "score": 0,
"subscribers_count": 21 "subscribers_count": 21
}, },

View file

@ -262,10 +262,10 @@
"description": "CVE-2024-0044", "description": "CVE-2024-0044",
"fork": false, "fork": false,
"created_at": "2024-08-19T02:51:14Z", "created_at": "2024-08-19T02:51:14Z",
"updated_at": "2024-11-12T16:04:10Z", "updated_at": "2024-12-16T07:45:51Z",
"pushed_at": "2024-08-24T06:32:58Z", "pushed_at": "2024-08-24T06:32:58Z",
"stargazers_count": 4, "stargazers_count": 5,
"watchers_count": 4, "watchers_count": 5,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -278,7 +278,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 4, "watchers": 5,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -166,6 +166,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -121,6 +121,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -146,8 +146,8 @@
"description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.", "description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.",
"fork": false, "fork": false,
"created_at": "2024-11-16T16:32:05Z", "created_at": "2024-11-16T16:32:05Z",
"updated_at": "2024-12-15T15:57:26Z", "updated_at": "2024-12-16T11:58:05Z",
"pushed_at": "2024-12-15T15:57:22Z", "pushed_at": "2024-12-16T11:58:00Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis", "description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
"fork": false, "fork": false,
"created_at": "2024-11-29T06:13:36Z", "created_at": "2024-11-29T06:13:36Z",
"updated_at": "2024-12-13T16:00:43Z", "updated_at": "2024-12-16T11:32:15Z",
"pushed_at": "2024-12-04T01:01:28Z", "pushed_at": "2024-12-04T01:01:28Z",
"stargazers_count": 44, "stargazers_count": 45,
"watchers_count": 44, "watchers_count": 45,
"has_discussions": false, "has_discussions": false,
"forks_count": 10, "forks_count": 10,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 10,
"watchers": 44, "watchers": 45,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,10 +14,10 @@
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.", "description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.",
"fork": false, "fork": false,
"created_at": "2024-12-04T18:42:43Z", "created_at": "2024-12-04T18:42:43Z",
"updated_at": "2024-12-15T23:55:02Z", "updated_at": "2024-12-16T10:01:06Z",
"pushed_at": "2024-12-11T23:45:31Z", "pushed_at": "2024-12-11T23:45:31Z",
"stargazers_count": 10, "stargazers_count": 12,
"watchers_count": 10, "watchers_count": 12,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 10, "watchers": 12,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -11,11 +11,11 @@
"user_view_type": "public" "user_view_type": "public"
}, },
"html_url": "https:\/\/github.com\/JunTakemura\/exploit-CVE-2024-11972", "html_url": "https:\/\/github.com\/JunTakemura\/exploit-CVE-2024-11972",
"description": "Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthorized Plugin Installation", "description": "Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthenticated Plugin Installation",
"fork": false, "fork": false,
"created_at": "2024-12-15T23:54:15Z", "created_at": "2024-12-15T23:54:15Z",
"updated_at": "2024-12-16T02:13:42Z", "updated_at": "2024-12-16T11:22:09Z",
"pushed_at": "2024-12-16T02:13:39Z", "pushed_at": "2024-12-16T10:06:26Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -90,6 +90,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -45,10 +45,10 @@
"description": "Windows LPE", "description": "Windows LPE",
"fork": false, "fork": false,
"created_at": "2024-06-11T08:03:29Z", "created_at": "2024-06-11T08:03:29Z",
"updated_at": "2024-12-12T23:45:20Z", "updated_at": "2024-12-16T10:12:29Z",
"pushed_at": "2024-06-11T20:41:59Z", "pushed_at": "2024-06-11T20:41:59Z",
"stargazers_count": 109, "stargazers_count": 110,
"watchers_count": 109, "watchers_count": 110,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
@ -57,7 +57,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 109, "watchers": 110,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -76,10 +76,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()", "description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false, "fork": false,
"created_at": "2024-05-27T08:30:06Z", "created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-12-06T09:50:30Z", "updated_at": "2024-12-16T10:41:35Z",
"pushed_at": "2024-09-30T08:45:56Z", "pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 423, "stargazers_count": 424,
"watchers_count": 423, "watchers_count": 424,
"has_discussions": false, "has_discussions": false,
"forks_count": 52, "forks_count": 52,
"allow_forking": true, "allow_forking": true,
@ -88,7 +88,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 52, "forks": 52,
"watchers": 423, "watchers": 424,
"score": 0, "score": 0,
"subscribers_count": 8 "subscribers_count": 8
}, },

View file

@ -14,10 +14,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-03T08:56:59Z", "created_at": "2024-12-03T08:56:59Z",
"updated_at": "2024-12-16T05:49:36Z", "updated_at": "2024-12-16T08:25:05Z",
"pushed_at": "2024-11-18T23:48:31Z", "pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 40, "stargazers_count": 41,
"watchers_count": 40, "watchers_count": 41,
"has_discussions": false, "has_discussions": false,
"forks_count": 24, "forks_count": 24,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 24, "forks": 24,
"watchers": 40, "watchers": 41,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false, "fork": false,
"created_at": "2024-10-05T20:32:45Z", "created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-16T06:15:44Z", "updated_at": "2024-12-16T09:57:04Z",
"pushed_at": "2024-10-05T20:37:02Z", "pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 27, "stargazers_count": 31,
"watchers_count": 27, "watchers_count": 31,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -68,7 +68,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 27, "watchers": 31,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,20 +14,51 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-12-14T09:22:33Z", "created_at": "2024-12-14T09:22:33Z",
"updated_at": "2024-12-16T06:27:58Z", "updated_at": "2024-12-16T11:37:07Z",
"pushed_at": "2024-12-14T10:13:45Z", "pushed_at": "2024-12-14T10:13:45Z",
"stargazers_count": 13, "stargazers_count": 16,
"watchers_count": 13, "watchers_count": 16,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 5,
"watchers": 13, "watchers": 16,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
},
{
"id": 904096436,
"name": "CVE-2024-38819",
"full_name": "GhostS3c\/CVE-2024-38819",
"owner": {
"login": "GhostS3c",
"id": 190174780,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/190174780?v=4",
"html_url": "https:\/\/github.com\/GhostS3c",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/GhostS3c\/CVE-2024-38819",
"description": "CVE-2024-38819 nuclei template",
"fork": false,
"created_at": "2024-12-16T08:48:12Z",
"updated_at": "2024-12-16T10:35:29Z",
"pushed_at": "2024-12-16T08:49:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -19,13 +19,13 @@
"stargazers_count": 94, "stargazers_count": 94,
"watchers_count": 94, "watchers_count": 94,
"has_discussions": false, "has_discussions": false,
"forks_count": 12, "forks_count": 13,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 13,
"watchers": 94, "watchers": 94,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -548,10 +548,10 @@
"description": "[漏洞复现] 全球首款利用PHP默认环境XAMPP的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。", "description": "[漏洞复现] 全球首款利用PHP默认环境XAMPP的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。",
"fork": false, "fork": false,
"created_at": "2024-06-08T13:04:45Z", "created_at": "2024-06-08T13:04:45Z",
"updated_at": "2024-12-15T01:59:47Z", "updated_at": "2024-12-16T09:28:01Z",
"pushed_at": "2024-07-21T20:27:03Z", "pushed_at": "2024-07-21T20:27:03Z",
"stargazers_count": 126, "stargazers_count": 127,
"watchers_count": 126, "watchers_count": 127,
"has_discussions": false, "has_discussions": false,
"forks_count": 31, "forks_count": 31,
"allow_forking": true, "allow_forking": true,
@ -560,7 +560,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 31, "forks": 31,
"watchers": 126, "watchers": 127,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -415,7 +415,7 @@
"stargazers_count": 13, "stargazers_count": 13,
"watchers_count": 13, "watchers_count": 13,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -425,7 +425,7 @@
"unauthenticated-path-traversal" "unauthenticated-path-traversal"
], ],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 6,
"watchers": 13, "watchers": 13,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -28,6 +28,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -28,7 +28,7 @@
"forks": 2, "forks": 2,
"watchers": 3, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 3
}, },
{ {
"id": 902994077, "id": 902994077,
@ -45,19 +45,19 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false, "fork": false,
"created_at": "2024-12-13T17:42:55Z", "created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-16T06:17:00Z", "updated_at": "2024-12-16T12:06:11Z",
"pushed_at": "2024-12-16T06:16:56Z", "pushed_at": "2024-12-16T09:23:33Z",
"stargazers_count": 6, "stargazers_count": 8,
"watchers_count": 6, "watchers_count": 8,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 4,
"watchers": 6, "watchers": 8,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -28,6 +28,6 @@
"forks": 1, "forks": 1,
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 2
} }
] ]

33
2024/CVE-2024-56115.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 904071998,
"name": "CVE-2024-56115",
"full_name": "ComplianceControl\/CVE-2024-56115",
"owner": {
"login": "ComplianceControl",
"id": 188841575,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188841575?v=4",
"html_url": "https:\/\/github.com\/ComplianceControl",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ComplianceControl\/CVE-2024-56115",
"description": null,
"fork": false,
"created_at": "2024-12-16T07:46:41Z",
"updated_at": "2024-12-16T07:47:09Z",
"pushed_at": "2024-12-16T07:47:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-56116.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 904070943,
"name": "CVE-2024-56116",
"full_name": "ComplianceControl\/CVE-2024-56116",
"owner": {
"login": "ComplianceControl",
"id": 188841575,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188841575?v=4",
"html_url": "https:\/\/github.com\/ComplianceControl",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ComplianceControl\/CVE-2024-56116",
"description": null,
"fork": false,
"created_at": "2024-12-16T07:44:07Z",
"updated_at": "2024-12-16T07:46:19Z",
"pushed_at": "2024-12-16T07:46:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1378,7 +1378,7 @@
"forks": 27, "forks": 27,
"watchers": 65, "watchers": 65,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 2
}, },
{ {
"id": 823291064, "id": 823291064,
@ -2180,10 +2180,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false, "fork": false,
"created_at": "2024-07-08T11:27:49Z", "created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-12-15T09:26:49Z", "updated_at": "2024-12-16T11:10:04Z",
"pushed_at": "2024-08-22T08:50:25Z", "pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 59, "stargazers_count": 60,
"watchers_count": 59, "watchers_count": 60,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
@ -2192,9 +2192,9 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 59, "watchers": 60,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 3
}, },
{ {
"id": 825734560, "id": 825734560,

View file

@ -14,10 +14,10 @@
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ", "description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
"fork": false, "fork": false,
"created_at": "2024-09-10T06:27:59Z", "created_at": "2024-09-10T06:27:59Z",
"updated_at": "2024-11-23T06:49:24Z", "updated_at": "2024-12-16T08:03:54Z",
"pushed_at": "2024-10-17T05:12:29Z", "pushed_at": "2024-10-17T05:12:29Z",
"stargazers_count": 82, "stargazers_count": 83,
"watchers_count": 82, "watchers_count": 83,
"has_discussions": false, "has_discussions": false,
"forks_count": 12, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
@ -26,7 +26,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 12,
"watchers": 82, "watchers": 83,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -121,6 +121,6 @@
"forks": 1, "forks": 1,
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 2
} }
] ]

View file

@ -5727,6 +5727,7 @@
### CVE-2024-38819 ### CVE-2024-38819
- [masa42/CVE-2024-38819-POC](https://github.com/masa42/CVE-2024-38819-POC) - [masa42/CVE-2024-38819-POC](https://github.com/masa42/CVE-2024-38819-POC)
- [GhostS3c/CVE-2024-38819](https://github.com/GhostS3c/CVE-2024-38819)
### CVE-2024-38821 (2024-10-28) ### CVE-2024-38821 (2024-10-28)
@ -7442,7 +7443,7 @@
### CVE-2024-53677 (2024-12-11) ### CVE-2024-53677 (2024-12-11)
<code>File upload logic is flawed vulnerability in Apache Struts.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0, which fixes the issue.\n\nYou can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067 <code>File upload logic is flawed vulnerability in Apache Struts.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload .\n\nYou can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067
</code> </code>
- [cloudwafs/s2-067-CVE-2024-53677](https://github.com/cloudwafs/s2-067-CVE-2024-53677) - [cloudwafs/s2-067-CVE-2024-53677](https://github.com/cloudwafs/s2-067-CVE-2024-53677)
@ -7479,6 +7480,12 @@
- [JAckLosingHeart/CVE-2024-55875](https://github.com/JAckLosingHeart/CVE-2024-55875) - [JAckLosingHeart/CVE-2024-55875](https://github.com/JAckLosingHeart/CVE-2024-55875)
### CVE-2024-56115
- [ComplianceControl/CVE-2024-56115](https://github.com/ComplianceControl/CVE-2024-56115)
### CVE-2024-56116
- [ComplianceControl/CVE-2024-56116](https://github.com/ComplianceControl/CVE-2024-56116)
### CVE-2024-1642470 ### CVE-2024-1642470
- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470) - [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)
@ -9640,7 +9647,7 @@
- [s1d6point7bugcrowd/CVE-2023-22515-check](https://github.com/s1d6point7bugcrowd/CVE-2023-22515-check) - [s1d6point7bugcrowd/CVE-2023-22515-check](https://github.com/s1d6point7bugcrowd/CVE-2023-22515-check)
- [xorbbo/cve-2023-22515](https://github.com/xorbbo/cve-2023-22515) - [xorbbo/cve-2023-22515](https://github.com/xorbbo/cve-2023-22515)
- [spareack/CVE-2023-22515-NSE](https://github.com/spareack/CVE-2023-22515-NSE) - [spareack/CVE-2023-22515-NSE](https://github.com/spareack/CVE-2023-22515-NSE)
- [Onedy1703/CVE-2023-22515](https://github.com/Onedy1703/CVE-2023-22515) - [Onedy1703/CVE-2023-22515-Confluence](https://github.com/Onedy1703/CVE-2023-22515-Confluence)
### CVE-2023-22518 (2023-10-31) ### CVE-2023-22518 (2023-10-31)
@ -18061,7 +18068,6 @@
</code> </code>
- [7BitsTeam/CVE-2022-23277](https://github.com/7BitsTeam/CVE-2022-23277) - [7BitsTeam/CVE-2022-23277](https://github.com/7BitsTeam/CVE-2022-23277)
- [gmeier909/exchange_tools](https://github.com/gmeier909/exchange_tools)
### CVE-2022-23303 (2022-01-17) ### CVE-2022-23303 (2022-01-17)
@ -27925,7 +27931,6 @@
- [DarkSprings/CVE-2021-42321](https://github.com/DarkSprings/CVE-2021-42321) - [DarkSprings/CVE-2021-42321](https://github.com/DarkSprings/CVE-2021-42321)
- [xnyuq/cve-2021-42321](https://github.com/xnyuq/cve-2021-42321) - [xnyuq/cve-2021-42321](https://github.com/xnyuq/cve-2021-42321)
- [7BitsTeam/exch_CVE-2021-42321](https://github.com/7BitsTeam/exch_CVE-2021-42321) - [7BitsTeam/exch_CVE-2021-42321](https://github.com/7BitsTeam/exch_CVE-2021-42321)
- [gmeier909/exchange_tools](https://github.com/gmeier909/exchange_tools)
### CVE-2021-42325 (2021-10-12) ### CVE-2021-42325 (2021-10-12)
@ -28838,6 +28843,7 @@
- [Vulnmachines/log4jshell_CVE-2021-44228](https://github.com/Vulnmachines/log4jshell_CVE-2021-44228) - [Vulnmachines/log4jshell_CVE-2021-44228](https://github.com/Vulnmachines/log4jshell_CVE-2021-44228)
- [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer) - [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer)
- [mebibite/log4jhound](https://github.com/mebibite/log4jhound) - [mebibite/log4jhound](https://github.com/mebibite/log4jhound)
- [jxerome/log4shell](https://github.com/jxerome/log4shell)
- [sdogancesur/log4j_github_repository](https://github.com/sdogancesur/log4j_github_repository) - [sdogancesur/log4j_github_repository](https://github.com/sdogancesur/log4j_github_repository)
- [jrocia/Search-log4Jvuln-AppScanSTD](https://github.com/jrocia/Search-log4Jvuln-AppScanSTD) - [jrocia/Search-log4Jvuln-AppScanSTD](https://github.com/jrocia/Search-log4Jvuln-AppScanSTD)
- [aajuvonen/log4stdin](https://github.com/aajuvonen/log4stdin) - [aajuvonen/log4stdin](https://github.com/aajuvonen/log4stdin)
@ -49454,7 +49460,7 @@
<code>A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.\n\nThis issue affects Apache HTTP Server 2.4.54 and earlier.\n <code>A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.\n\nThis issue affects Apache HTTP Server 2.4.54 and earlier.\n
</code> </code>
- [Saksham2002/CVE-2006-20001](https://github.com/Saksham2002/CVE-2006-20001) - [r1az4r/CVE-2006-20001](https://github.com/r1az4r/CVE-2006-20001)
## 2005 ## 2005