mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/16 12:33:27
This commit is contained in:
parent
ddd38f50fb
commit
faa4a96fec
53 changed files with 301 additions and 229 deletions
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 598440551,
|
||||
"name": "CVE-2006-20001",
|
||||
"full_name": "Saksham2002\/CVE-2006-20001",
|
||||
"full_name": "r1az4r\/CVE-2006-20001",
|
||||
"owner": {
|
||||
"login": "Saksham2002",
|
||||
"login": "r1az4r",
|
||||
"id": 31695520,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31695520?v=4",
|
||||
"html_url": "https:\/\/github.com\/Saksham2002",
|
||||
"html_url": "https:\/\/github.com\/r1az4r",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Saksham2002\/CVE-2006-20001",
|
||||
"html_url": "https:\/\/github.com\/r1az4r\/CVE-2006-20001",
|
||||
"description": "A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-07T05:30:52Z",
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "PoC para CVE-2015-9251 jQuery menor a 3.0.0.",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-01T16:02:04Z",
|
||||
"updated_at": "2024-11-01T16:04:08Z",
|
||||
"updated_at": "2024-12-16T06:35:07Z",
|
||||
"pushed_at": "2024-11-01T16:04:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -417,10 +417,10 @@
|
|||
"description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2024-12-12T15:55:33Z",
|
||||
"updated_at": "2024-12-16T09:11:32Z",
|
||||
"pushed_at": "2024-11-13T03:12:58Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -437,7 +437,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 158,
|
||||
"watchers": 159,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -330,8 +330,8 @@
|
|||
"description": "Improved version of PikaChu CVE",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T11:22:38Z",
|
||||
"updated_at": "2024-12-13T11:31:35Z",
|
||||
"pushed_at": "2024-12-13T11:31:31Z",
|
||||
"updated_at": "2024-12-16T10:14:43Z",
|
||||
"pushed_at": "2024-12-16T10:14:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-12T05:48:13Z",
|
||||
"updated_at": "2024-12-12T20:58:15Z",
|
||||
"updated_at": "2024-12-16T08:40:23Z",
|
||||
"pushed_at": "2023-04-09T13:50:29Z",
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 212,
|
||||
"watchers": 213,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -1907,13 +1907,13 @@
|
|||
"stargazers_count": 1175,
|
||||
"watchers_count": 1175,
|
||||
"has_discussions": false,
|
||||
"forks_count": 346,
|
||||
"forks_count": 345,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 346,
|
||||
"forks": 345,
|
||||
"watchers": 1175,
|
||||
"score": 0,
|
||||
"subscribers_count": 68
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "php-fpm+Nginx RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-23T23:26:57Z",
|
||||
"updated_at": "2024-10-30T08:09:01Z",
|
||||
"updated_at": "2024-12-16T11:23:42Z",
|
||||
"pushed_at": "2020-08-20T04:43:25Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 101,
|
||||
"watchers": 102,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -112,13 +112,13 @@
|
|||
"stargazers_count": 952,
|
||||
"watchers_count": 952,
|
||||
"has_discussions": false,
|
||||
"forks_count": 178,
|
||||
"forks_count": 176,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 178,
|
||||
"forks": 176,
|
||||
"watchers": 952,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2024-12-15T21:43:47Z",
|
||||
"updated_at": "2024-12-16T11:17:13Z",
|
||||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 223,
|
||||
"watchers": 224,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -179,7 +179,7 @@
|
|||
"stargazers_count": 886,
|
||||
"watchers_count": 886,
|
||||
"has_discussions": false,
|
||||
"forks_count": 268,
|
||||
"forks_count": 265,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -187,7 +187,7 @@
|
|||
"cve-2020-0601"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 268,
|
||||
"forks": 265,
|
||||
"watchers": 886,
|
||||
"score": 0,
|
||||
"subscribers_count": 33
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T17:14:27Z",
|
||||
"updated_at": "2024-12-04T08:36:15Z",
|
||||
"updated_at": "2024-12-16T08:35:04Z",
|
||||
"pushed_at": "2022-05-03T10:40:14Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -981,10 +981,10 @@
|
|||
"description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2024-12-12T15:55:33Z",
|
||||
"updated_at": "2024-12-16T09:11:32Z",
|
||||
"pushed_at": "2024-11-13T03:12:58Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -1001,7 +1001,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 158,
|
||||
"watchers": 159,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"forks": 20,
|
||||
"watchers": 104,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2024-12-15T10:53:45Z",
|
||||
"updated_at": "2024-12-16T08:15:29Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"has_discussions": false,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 265,
|
||||
"watchers": 266,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2021-3560 Local PrivEsc Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-11T14:28:43Z",
|
||||
"updated_at": "2024-11-13T06:49:51Z",
|
||||
"updated_at": "2024-12-16T06:53:41Z",
|
||||
"pushed_at": "2021-06-12T17:48:38Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -63,7 +63,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -147,10 +147,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-14T20:08:20Z",
|
||||
"updated_at": "2024-12-14T16:07:48Z",
|
||||
"updated_at": "2024-12-16T08:03:45Z",
|
||||
"pushed_at": "2022-11-16T13:14:56Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -159,7 +159,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 113,
|
||||
"watchers": 114,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -209,10 +209,10 @@
|
|||
"description": "Privilege escalation with polkit - CVE-2021-3560",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T08:15:17Z",
|
||||
"updated_at": "2024-11-26T22:44:38Z",
|
||||
"updated_at": "2024-12-16T06:53:21Z",
|
||||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -221,7 +221,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 116,
|
||||
"watchers": 117,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -91,36 +91,5 @@
|
|||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 904036351,
|
||||
"name": "exchange_tools",
|
||||
"full_name": "gmeier909\/exchange_tools",
|
||||
"owner": {
|
||||
"login": "gmeier909",
|
||||
"id": 38092939,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38092939?v=4",
|
||||
"html_url": "https:\/\/github.com\/gmeier909",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gmeier909\/exchange_tools",
|
||||
"description": "将常用的cve工具做个备份(CVE-2021-42321,CVE-2022-23277,CVE-2022-41082,Exchange_GetVersion_MatchVul)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-16T06:08:45Z",
|
||||
"updated_at": "2024-12-16T06:15:27Z",
|
||||
"pushed_at": "2024-12-16T06:08:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -10710,6 +10710,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 447404470,
|
||||
"name": "log4shell",
|
||||
"full_name": "jxerome\/log4shell",
|
||||
"owner": {
|
||||
"login": "jxerome",
|
||||
"id": 1355634,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1355634?v=4",
|
||||
"html_url": "https:\/\/github.com\/jxerome",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jxerome\/log4shell",
|
||||
"description": "Démo du fonctionnement de log4shell (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-12T23:44:20Z",
|
||||
"updated_at": "2022-01-12T23:59:13Z",
|
||||
"pushed_at": "2022-01-14T14:03:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 447754863,
|
||||
"name": "log4j_github_repository",
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-12T04:47:02Z",
|
||||
"updated_at": "2024-10-30T07:27:51Z",
|
||||
"updated_at": "2024-12-16T06:53:25Z",
|
||||
"pushed_at": "2024-03-18T07:32:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -29,36 +29,5 @@
|
|||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 904036351,
|
||||
"name": "exchange_tools",
|
||||
"full_name": "gmeier909\/exchange_tools",
|
||||
"owner": {
|
||||
"login": "gmeier909",
|
||||
"id": 38092939,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38092939?v=4",
|
||||
"html_url": "https:\/\/github.com\/gmeier909",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gmeier909\/exchange_tools",
|
||||
"description": "将常用的cve工具做个备份(CVE-2021-42321,CVE-2022-23277,CVE-2022-41082,Exchange_GetVersion_MatchVul)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-16T06:08:45Z",
|
||||
"updated_at": "2024-12-16T06:20:04Z",
|
||||
"pushed_at": "2024-12-16T06:19:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -786,8 +786,8 @@
|
|||
},
|
||||
{
|
||||
"id": 831810309,
|
||||
"name": "CVE-2023-22515",
|
||||
"full_name": "Onedy1703\/CVE-2023-22515",
|
||||
"name": "CVE-2023-22515-Confluence",
|
||||
"full_name": "Onedy1703\/CVE-2023-22515-Confluence",
|
||||
"owner": {
|
||||
"login": "Onedy1703",
|
||||
"id": 74649794,
|
||||
|
@ -795,12 +795,12 @@
|
|||
"html_url": "https:\/\/github.com\/Onedy1703",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Onedy1703\/CVE-2023-22515",
|
||||
"html_url": "https:\/\/github.com\/Onedy1703\/CVE-2023-22515-Confluence",
|
||||
"description": "CVE 2023-22515",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-21T17:19:36Z",
|
||||
"updated_at": "2024-12-14T09:44:02Z",
|
||||
"pushed_at": "2024-12-14T09:43:59Z",
|
||||
"updated_at": "2024-12-16T10:14:30Z",
|
||||
"pushed_at": "2024-12-16T10:13:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -421,10 +421,10 @@
|
|||
"description": "Joomla! < 4.2.8 - Unauthenticated information disclosure",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-24T11:50:16Z",
|
||||
"updated_at": "2024-12-09T18:18:44Z",
|
||||
"updated_at": "2024-12-16T11:33:42Z",
|
||||
"pushed_at": "2023-12-27T11:30:46Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -440,7 +440,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"forks": 35,
|
||||
"watchers": 166,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T20:32:45Z",
|
||||
"updated_at": "2024-12-16T06:15:44Z",
|
||||
"updated_at": "2024-12-16T09:57:04Z",
|
||||
"pushed_at": "2024-10-05T20:37:02Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -37,7 +37,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 27,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-12T18:50:58Z",
|
||||
"updated_at": "2024-12-12T19:30:34Z",
|
||||
"updated_at": "2024-12-16T12:14:04Z",
|
||||
"pushed_at": "2024-12-12T19:30:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"forks": 20,
|
||||
"watchers": 89,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-12-15T18:10:45Z",
|
||||
"updated_at": "2024-12-16T12:18:00Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1293,
|
||||
"watchers_count": 1293,
|
||||
"stargazers_count": 1295,
|
||||
"watchers_count": 1295,
|
||||
"has_discussions": false,
|
||||
"forks_count": 221,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 221,
|
||||
"watchers": 1293,
|
||||
"watchers": 1295,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -262,10 +262,10 @@
|
|||
"description": "CVE-2024-0044",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-19T02:51:14Z",
|
||||
"updated_at": "2024-11-12T16:04:10Z",
|
||||
"updated_at": "2024-12-16T07:45:51Z",
|
||||
"pushed_at": "2024-08-24T06:32:58Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -278,7 +278,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -166,6 +166,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -121,6 +121,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -146,8 +146,8 @@
|
|||
"description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-16T16:32:05Z",
|
||||
"updated_at": "2024-12-15T15:57:26Z",
|
||||
"pushed_at": "2024-12-15T15:57:22Z",
|
||||
"updated_at": "2024-12-16T11:58:05Z",
|
||||
"pushed_at": "2024-12-16T11:58:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-29T06:13:36Z",
|
||||
"updated_at": "2024-12-13T16:00:43Z",
|
||||
"updated_at": "2024-12-16T11:32:15Z",
|
||||
"pushed_at": "2024-12-04T01:01:28Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T18:42:43Z",
|
||||
"updated_at": "2024-12-15T23:55:02Z",
|
||||
"updated_at": "2024-12-16T10:01:06Z",
|
||||
"pushed_at": "2024-12-11T23:45:31Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -11,11 +11,11 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JunTakemura\/exploit-CVE-2024-11972",
|
||||
"description": "Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthorized Plugin Installation",
|
||||
"description": "Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthenticated Plugin Installation",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-15T23:54:15Z",
|
||||
"updated_at": "2024-12-16T02:13:42Z",
|
||||
"pushed_at": "2024-12-16T02:13:39Z",
|
||||
"updated_at": "2024-12-16T11:22:09Z",
|
||||
"pushed_at": "2024-12-16T10:06:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -90,6 +90,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Windows LPE",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-11T08:03:29Z",
|
||||
"updated_at": "2024-12-12T23:45:20Z",
|
||||
"updated_at": "2024-12-16T10:12:29Z",
|
||||
"pushed_at": "2024-06-11T20:41:59Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 109,
|
||||
"watchers": 110,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2024-12-06T09:50:30Z",
|
||||
"updated_at": "2024-12-16T10:41:35Z",
|
||||
"pushed_at": "2024-09-30T08:45:56Z",
|
||||
"stargazers_count": 423,
|
||||
"watchers_count": 423,
|
||||
"stargazers_count": 424,
|
||||
"watchers_count": 424,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 423,
|
||||
"watchers": 424,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-03T08:56:59Z",
|
||||
"updated_at": "2024-12-16T05:49:36Z",
|
||||
"updated_at": "2024-12-16T08:25:05Z",
|
||||
"pushed_at": "2024-11-18T23:48:31Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T20:32:45Z",
|
||||
"updated_at": "2024-12-16T06:15:44Z",
|
||||
"updated_at": "2024-12-16T09:57:04Z",
|
||||
"pushed_at": "2024-10-05T20:37:02Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -68,7 +68,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 27,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,20 +14,51 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-14T09:22:33Z",
|
||||
"updated_at": "2024-12-16T06:27:58Z",
|
||||
"updated_at": "2024-12-16T11:37:07Z",
|
||||
"pushed_at": "2024-12-14T10:13:45Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"forks": 5,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 904096436,
|
||||
"name": "CVE-2024-38819",
|
||||
"full_name": "GhostS3c\/CVE-2024-38819",
|
||||
"owner": {
|
||||
"login": "GhostS3c",
|
||||
"id": 190174780,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/190174780?v=4",
|
||||
"html_url": "https:\/\/github.com\/GhostS3c",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GhostS3c\/CVE-2024-38819",
|
||||
"description": "CVE-2024-38819 nuclei template",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-16T08:48:12Z",
|
||||
"updated_at": "2024-12-16T10:35:29Z",
|
||||
"pushed_at": "2024-12-16T08:49:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"forks": 13,
|
||||
"watchers": 94,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -548,10 +548,10 @@
|
|||
"description": "[漏洞复现] 全球首款利用PHP默认环境(XAMPP)的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-08T13:04:45Z",
|
||||
"updated_at": "2024-12-15T01:59:47Z",
|
||||
"updated_at": "2024-12-16T09:28:01Z",
|
||||
"pushed_at": "2024-07-21T20:27:03Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -560,7 +560,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 126,
|
||||
"watchers": 127,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -415,7 +415,7 @@
|
|||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -425,7 +425,7 @@
|
|||
"unauthenticated-path-traversal"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,7 +28,7 @@
|
|||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 902994077,
|
||||
|
@ -45,19 +45,19 @@
|
|||
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T17:42:55Z",
|
||||
"updated_at": "2024-12-16T06:17:00Z",
|
||||
"pushed_at": "2024-12-16T06:16:56Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"updated_at": "2024-12-16T12:06:11Z",
|
||||
"pushed_at": "2024-12-16T09:23:33Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
33
2024/CVE-2024-56115.json
Normal file
33
2024/CVE-2024-56115.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 904071998,
|
||||
"name": "CVE-2024-56115",
|
||||
"full_name": "ComplianceControl\/CVE-2024-56115",
|
||||
"owner": {
|
||||
"login": "ComplianceControl",
|
||||
"id": 188841575,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188841575?v=4",
|
||||
"html_url": "https:\/\/github.com\/ComplianceControl",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ComplianceControl\/CVE-2024-56115",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-16T07:46:41Z",
|
||||
"updated_at": "2024-12-16T07:47:09Z",
|
||||
"pushed_at": "2024-12-16T07:47:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-56116.json
Normal file
33
2024/CVE-2024-56116.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 904070943,
|
||||
"name": "CVE-2024-56116",
|
||||
"full_name": "ComplianceControl\/CVE-2024-56116",
|
||||
"owner": {
|
||||
"login": "ComplianceControl",
|
||||
"id": 188841575,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188841575?v=4",
|
||||
"html_url": "https:\/\/github.com\/ComplianceControl",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ComplianceControl\/CVE-2024-56116",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-16T07:44:07Z",
|
||||
"updated_at": "2024-12-16T07:46:19Z",
|
||||
"pushed_at": "2024-12-16T07:46:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1378,7 +1378,7 @@
|
|||
"forks": 27,
|
||||
"watchers": 65,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 823291064,
|
||||
|
@ -2180,10 +2180,10 @@
|
|||
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T11:27:49Z",
|
||||
"updated_at": "2024-12-15T09:26:49Z",
|
||||
"updated_at": "2024-12-16T11:10:04Z",
|
||||
"pushed_at": "2024-08-22T08:50:25Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -2192,9 +2192,9 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 825734560,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-10T06:27:59Z",
|
||||
"updated_at": "2024-11-23T06:49:24Z",
|
||||
"updated_at": "2024-12-16T08:03:54Z",
|
||||
"pushed_at": "2024-10-17T05:12:29Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -121,6 +121,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
16
README.md
16
README.md
|
@ -5727,6 +5727,7 @@
|
|||
|
||||
### CVE-2024-38819
|
||||
- [masa42/CVE-2024-38819-POC](https://github.com/masa42/CVE-2024-38819-POC)
|
||||
- [GhostS3c/CVE-2024-38819](https://github.com/GhostS3c/CVE-2024-38819)
|
||||
|
||||
### CVE-2024-38821 (2024-10-28)
|
||||
|
||||
|
@ -7442,7 +7443,7 @@
|
|||
|
||||
### CVE-2024-53677 (2024-12-11)
|
||||
|
||||
<code>File upload logic is flawed vulnerability in Apache Struts.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0, which fixes the issue.\n\nYou can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067
|
||||
<code>File upload logic is flawed vulnerability in Apache Struts.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload .\n\nYou can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067
|
||||
</code>
|
||||
|
||||
- [cloudwafs/s2-067-CVE-2024-53677](https://github.com/cloudwafs/s2-067-CVE-2024-53677)
|
||||
|
@ -7479,6 +7480,12 @@
|
|||
|
||||
- [JAckLosingHeart/CVE-2024-55875](https://github.com/JAckLosingHeart/CVE-2024-55875)
|
||||
|
||||
### CVE-2024-56115
|
||||
- [ComplianceControl/CVE-2024-56115](https://github.com/ComplianceControl/CVE-2024-56115)
|
||||
|
||||
### CVE-2024-56116
|
||||
- [ComplianceControl/CVE-2024-56116](https://github.com/ComplianceControl/CVE-2024-56116)
|
||||
|
||||
### CVE-2024-1642470
|
||||
- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)
|
||||
|
||||
|
@ -9640,7 +9647,7 @@
|
|||
- [s1d6point7bugcrowd/CVE-2023-22515-check](https://github.com/s1d6point7bugcrowd/CVE-2023-22515-check)
|
||||
- [xorbbo/cve-2023-22515](https://github.com/xorbbo/cve-2023-22515)
|
||||
- [spareack/CVE-2023-22515-NSE](https://github.com/spareack/CVE-2023-22515-NSE)
|
||||
- [Onedy1703/CVE-2023-22515](https://github.com/Onedy1703/CVE-2023-22515)
|
||||
- [Onedy1703/CVE-2023-22515-Confluence](https://github.com/Onedy1703/CVE-2023-22515-Confluence)
|
||||
|
||||
### CVE-2023-22518 (2023-10-31)
|
||||
|
||||
|
@ -18061,7 +18068,6 @@
|
|||
</code>
|
||||
|
||||
- [7BitsTeam/CVE-2022-23277](https://github.com/7BitsTeam/CVE-2022-23277)
|
||||
- [gmeier909/exchange_tools](https://github.com/gmeier909/exchange_tools)
|
||||
|
||||
### CVE-2022-23303 (2022-01-17)
|
||||
|
||||
|
@ -27925,7 +27931,6 @@
|
|||
- [DarkSprings/CVE-2021-42321](https://github.com/DarkSprings/CVE-2021-42321)
|
||||
- [xnyuq/cve-2021-42321](https://github.com/xnyuq/cve-2021-42321)
|
||||
- [7BitsTeam/exch_CVE-2021-42321](https://github.com/7BitsTeam/exch_CVE-2021-42321)
|
||||
- [gmeier909/exchange_tools](https://github.com/gmeier909/exchange_tools)
|
||||
|
||||
### CVE-2021-42325 (2021-10-12)
|
||||
|
||||
|
@ -28838,6 +28843,7 @@
|
|||
- [Vulnmachines/log4jshell_CVE-2021-44228](https://github.com/Vulnmachines/log4jshell_CVE-2021-44228)
|
||||
- [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer)
|
||||
- [mebibite/log4jhound](https://github.com/mebibite/log4jhound)
|
||||
- [jxerome/log4shell](https://github.com/jxerome/log4shell)
|
||||
- [sdogancesur/log4j_github_repository](https://github.com/sdogancesur/log4j_github_repository)
|
||||
- [jrocia/Search-log4Jvuln-AppScanSTD](https://github.com/jrocia/Search-log4Jvuln-AppScanSTD)
|
||||
- [aajuvonen/log4stdin](https://github.com/aajuvonen/log4stdin)
|
||||
|
@ -49454,7 +49460,7 @@
|
|||
<code>A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.\n\nThis issue affects Apache HTTP Server 2.4.54 and earlier.\n
|
||||
</code>
|
||||
|
||||
- [Saksham2002/CVE-2006-20001](https://github.com/Saksham2002/CVE-2006-20001)
|
||||
- [r1az4r/CVE-2006-20001](https://github.com/r1az4r/CVE-2006-20001)
|
||||
|
||||
|
||||
## 2005
|
||||
|
|
Loading…
Reference in a new issue