Auto Update 2024/12/31 12:31:57

This commit is contained in:
motikan2010-bot 2024-12-31 21:31:57 +09:00
parent 3f2f8becae
commit fddd3c5e9e
52 changed files with 285 additions and 209 deletions

View file

@ -603,15 +603,15 @@
{
"id": 868559608,
"name": "CVE-2017-7269",
"full_name": "geniuszlyy\/CVE-2017-7269",
"full_name": "geniuszly\/CVE-2017-7269",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2017-7269",
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2017-7269",
"description": "is a PoC tool demonstrating an exploit for a known vulnerability in the WebDAV component of IIS6",
"fork": false,
"created_at": "2024-10-06T17:33:11Z",

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-28T15:30:30Z",
"updated_at": "2024-12-31T06:31:41Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4148,
"watchers_count": 4148,
"stargazers_count": 4149,
"watchers_count": 4149,
"has_discussions": false,
"forks_count": 1099,
"allow_forking": true,
@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1099,
"watchers": 4148,
"watchers": 4149,
"score": 0,
"subscribers_count": 149
},

View file

@ -134,15 +134,15 @@
{
"id": 868553994,
"name": "CVE-2019-9193",
"full_name": "geniuszlyy\/CVE-2019-9193",
"full_name": "geniuszly\/CVE-2019-9193",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2019-9193",
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2019-9193",
"description": "is a PoC tool designed to exploit an authenticated Remote Code Execution (RCE) vulnerability in specific versions of PostgreSQL (9.3 - 11.7)",
"fork": false,
"created_at": "2024-10-06T17:16:44Z",

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2021-03-07T06:55:26Z",
"updated_at": "2023-02-02T06:25:02Z",
"updated_at": "2024-12-31T08:57:35Z",
"pushed_at": "2021-03-07T07:09:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 3
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 165,
"watchers_count": 165,
"has_discussions": false,
"forks_count": 38,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"forks": 39,
"watchers": 165,
"score": 0,
"subscribers_count": 3

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-28T15:30:30Z",
"updated_at": "2024-12-31T06:31:41Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4148,
"watchers_count": 4148,
"stargazers_count": 4149,
"watchers_count": 4149,
"has_discussions": false,
"forks_count": 1099,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1099,
"watchers": 4148,
"watchers": 4149,
"score": 0,
"subscribers_count": 149
},

View file

@ -2,15 +2,15 @@
{
"id": 872064512,
"name": "CVE-2020-15916",
"full_name": "geniuszlyy\/CVE-2020-15916",
"full_name": "geniuszly\/CVE-2020-15916",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2020-15916",
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2020-15916",
"description": "This project is a PoC for exploiting CVE-2020-15916, a vulnerability that allows unauthorized changes to the LAN configuration of a device",
"fork": false,
"created_at": "2024-10-13T17:30:19Z",

View file

@ -14,10 +14,10 @@
"description": "CVE-2020-17136 exploit",
"fork": false,
"created_at": "2021-03-18T11:16:36Z",
"updated_at": "2024-07-18T13:43:22Z",
"updated_at": "2024-12-31T08:57:18Z",
"pushed_at": "2021-03-31T14:42:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-28T01:54:56Z",
"updated_at": "2024-12-31T07:49:37Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1359,
"watchers_count": 1359,
"stargazers_count": 1360,
"watchers_count": 1360,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 1359,
"watchers": 1360,
"score": 0,
"subscribers_count": 15
}

View file

@ -359,10 +359,10 @@
"description": "Laravel RCE Exploit Script - CVE-2021-3129",
"fork": false,
"created_at": "2022-04-16T17:22:55Z",
"updated_at": "2024-12-17T05:59:50Z",
"updated_at": "2024-12-31T06:24:18Z",
"pushed_at": "2024-09-22T13:10:27Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -386,7 +386,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 95,
"watchers": 96,
"score": 0,
"subscribers_count": 1
},

View file

@ -395,10 +395,10 @@
"description": "CVE-2021-3560 analysis",
"fork": false,
"created_at": "2022-01-31T09:02:23Z",
"updated_at": "2024-11-27T19:11:24Z",
"updated_at": "2024-12-31T09:32:51Z",
"pushed_at": "2022-05-23T02:23:38Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -407,7 +407,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},

View file

@ -107,10 +107,10 @@
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
"updated_at": "2024-12-08T07:27:57Z",
"updated_at": "2024-12-31T10:04:30Z",
"pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 460,
"watchers_count": 460,
"stargazers_count": 461,
"watchers_count": 461,
"has_discussions": false,
"forks_count": 122,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 122,
"watchers": 460,
"watchers": 461,
"score": 0,
"subscribers_count": 8
},

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-28T01:54:56Z",
"updated_at": "2024-12-31T07:49:37Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1359,
"watchers_count": 1359,
"stargazers_count": 1360,
"watchers_count": 1360,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 1359,
"watchers": 1360,
"score": 0,
"subscribers_count": 15
}

View file

@ -95,15 +95,15 @@
{
"id": 869025784,
"name": "CVE-2022-2414",
"full_name": "geniuszlyy\/CVE-2022-2414",
"full_name": "geniuszly\/CVE-2022-2414",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-2414",
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-2414",
"description": "is a PoC script for demonstrating an XML External Entity (XXE) vulnerability exploitation",
"fork": false,
"created_at": "2024-10-07T15:36:39Z",

View file

@ -33,15 +33,15 @@
{
"id": 840469662,
"name": "CVE-2022-44149",
"full_name": "geniuszlyy\/CVE-2022-44149",
"full_name": "geniuszly\/CVE-2022-44149",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-44149",
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-44149",
"description": "it is script designed to interact with a router by sending a payload to its system tools. The script retrieves the router's configuration from environment variables to ensure security. It includes functions for generating an authorization header, sending a payload, and logging the process.",
"fork": false,
"created_at": "2024-08-09T19:27:22Z",

View file

@ -33,15 +33,15 @@
{
"id": 840470520,
"name": "CVE-2022-45701",
"full_name": "geniuszlyy\/CVE-2022-45701",
"full_name": "geniuszly\/CVE-2022-45701",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-45701",
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-45701",
"description": "it is script designed to exploit certain vulnerabilities in routers by sending payloads through SNMP (Simple Network Management Protocol). The script automates the process of authorization, payload generation, and execution, allowing for remote command execution on the target device.",
"fork": false,
"created_at": "2024-08-09T19:30:20Z",

View file

@ -33,15 +33,15 @@
{
"id": 840471119,
"name": "CVE-2022-46080",
"full_name": "geniuszlyy\/CVE-2022-46080",
"full_name": "geniuszly\/CVE-2022-46080",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-46080",
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-46080",
"description": "it is script that enables Telnet on routers by sending a specially crafted request. The script allows users to specify the router's URL, Telnet port, and password. It validates the inputs and logs the process, providing feedback on whether the exploit was successful.",
"fork": false,
"created_at": "2024-08-09T19:32:32Z",

View file

@ -107,10 +107,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2024-12-31T02:53:03Z",
"updated_at": "2024-12-31T11:17:24Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 884,
"watchers_count": 884,
"stargazers_count": 885,
"watchers_count": 885,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 884,
"watchers": 885,
"score": 0,
"subscribers_count": 26
},
@ -231,10 +231,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-05T21:50:25Z",
"updated_at": "2024-12-06T00:25:02Z",
"updated_at": "2024-12-31T11:17:24Z",
"pushed_at": "2023-06-13T08:55:50Z",
"stargazers_count": 145,
"watchers_count": 145,
"stargazers_count": 146,
"watchers_count": 146,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -245,7 +245,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 145,
"watchers": 146,
"score": 0,
"subscribers_count": 12
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-07-18T11:45:30Z",
"updated_at": "2024-12-30T08:58:33Z",
"updated_at": "2024-12-31T07:55:52Z",
"pushed_at": "2024-07-19T14:01:31Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 1
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-31T05:58:53Z",
"updated_at": "2024-12-31T12:24:50Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 54,
"watchers": 58,
"score": 0,
"subscribers_count": 1
}

View file

@ -2,15 +2,15 @@
{
"id": 865477756,
"name": "GenEtherExploit",
"full_name": "geniuszlyy\/GenEtherExploit",
"full_name": "geniuszly\/GenEtherExploit",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/GenEtherExploit",
"html_url": "https:\/\/github.com\/geniuszly\/GenEtherExploit",
"description": "is a PoC exploit for the macOS vulnerability CVE-2023-40404. This PoC leverages IOKit APIs to interact with the IOUserEthernetResource network service, manipulating the system's network interfaces",
"fork": false,
"created_at": "2024-09-30T15:41:14Z",

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-15T12:14:18Z",
"updated_at": "2024-12-21T00:56:57Z",
"updated_at": "2024-12-31T07:18:24Z",
"pushed_at": "2024-03-08T12:57:53Z",
"stargazers_count": 196,
"watchers_count": 196,
"stargazers_count": 197,
"watchers_count": 197,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 196,
"watchers": 197,
"score": 0,
"subscribers_count": 10
},

View file

@ -45,10 +45,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2024-12-09T07:21:54Z",
"updated_at": "2024-12-31T11:10:26Z",
"pushed_at": "2024-05-16T07:42:00Z",
"stargazers_count": 223,
"watchers_count": 223,
"stargazers_count": 224,
"watchers_count": 224,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 223,
"watchers": 224,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,7 +14,7 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-28T12:43:30Z",
"updated_at": "2024-12-31T08:20:51Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1313,
"watchers_count": 1313,

View file

@ -45,10 +45,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2024-12-28T10:59:12Z",
"updated_at": "2024-12-31T06:57:19Z",
"pushed_at": "2024-01-29T02:28:11Z",
"stargazers_count": 235,
"watchers_count": 235,
"stargazers_count": 236,
"watchers_count": 236,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 235,
"watchers": 236,
"score": 0,
"subscribers_count": 4
},

View file

@ -95,15 +95,15 @@
{
"id": 866966019,
"name": "CVE-2024-0582",
"full_name": "geniuszlyy\/CVE-2024-0582",
"full_name": "geniuszly\/CVE-2024-0582",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-0582",
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-0582",
"description": "is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)",
"fork": false,
"created_at": "2024-10-03T07:56:36Z",

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "Collapsing Categories <= 3.0.8 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2024-12-19T14:15:29Z",
"updated_at": "2024-12-19T15:53:19Z",
"updated_at": "2024-12-31T06:46:57Z",
"pushed_at": "2024-12-19T14:16:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": "PoC for CVE-2024-21182",
"fork": false,
"created_at": "2024-12-29T15:48:03Z",
"updated_at": "2024-12-31T05:15:18Z",
"updated_at": "2024-12-31T08:58:18Z",
"pushed_at": "2024-12-29T15:56:14Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 23,
"forks": 5,
"watchers": 24,
"score": 0,
"subscribers_count": 1
}

View file

@ -83,10 +83,10 @@
"description": "PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)",
"fork": false,
"created_at": "2024-07-15T07:26:59Z",
"updated_at": "2024-12-27T08:50:30Z",
"updated_at": "2024-12-31T07:44:51Z",
"pushed_at": "2024-07-16T23:22:14Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -106,7 +106,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 2
},

View file

@ -76,10 +76,10 @@
"description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1",
"fork": false,
"created_at": "2024-03-18T20:39:27Z",
"updated_at": "2024-12-30T04:28:59Z",
"updated_at": "2024-12-31T08:05:58Z",
"pushed_at": "2024-03-19T06:37:30Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},

View file

@ -1630,15 +1630,15 @@
{
"id": 864811586,
"name": "CVE-2024-24919",
"full_name": "geniuszlyy\/CVE-2024-24919",
"full_name": "geniuszly\/CVE-2024-24919",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-24919",
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-24919",
"description": "PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses",
"fork": false,
"created_at": "2024-09-29T08:20:56Z",

View file

@ -380,15 +380,15 @@
{
"id": 870123268,
"name": "CVE-2024-27198",
"full_name": "geniuszlyy\/CVE-2024-27198",
"full_name": "geniuszly\/CVE-2024-27198",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-27198",
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-27198",
"description": "is a PoC tool that targets a vulnerability in the TeamCity server (CVE-2024-27198)",
"fork": false,
"created_at": "2024-10-09T13:36:56Z",

View file

@ -74,15 +74,15 @@
{
"id": 868072354,
"name": "GenGravSSTIExploit",
"full_name": "geniuszlyy\/GenGravSSTIExploit",
"full_name": "geniuszly\/GenGravSSTIExploit",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/GenGravSSTIExploit",
"html_url": "https:\/\/github.com\/geniuszly\/GenGravSSTIExploit",
"description": "is a PoC Python script that exploits an authenticated Server-Side Template Injection (SSTI) vulnerability in Grav CMS versions <= 1.7.44 (CVE-2024-28116)",
"fork": false,
"created_at": "2024-10-05T12:05:06Z",

View file

@ -76,10 +76,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-12-30T11:26:49Z",
"updated_at": "2024-12-31T12:11:37Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 427,
"watchers_count": 427,
"stargazers_count": 426,
"watchers_count": 426,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 427,
"watchers": 426,
"score": 0,
"subscribers_count": 8
},

View file

@ -362,10 +362,10 @@
"description": "geoserver图形化漏洞利用工具",
"fork": false,
"created_at": "2024-10-05T10:08:55Z",
"updated_at": "2024-12-26T04:19:46Z",
"updated_at": "2024-12-31T08:29:17Z",
"pushed_at": "2024-10-08T03:16:26Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -374,7 +374,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-31T05:58:53Z",
"updated_at": "2024-12-31T12:24:50Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 54,
"watchers": 58,
"score": 0,
"subscribers_count": 1
}

View file

@ -455,15 +455,15 @@
{
"id": 865497094,
"name": "GenCrushSSTIExploit",
"full_name": "geniuszlyy\/GenCrushSSTIExploit",
"full_name": "geniuszly\/GenCrushSSTIExploit",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/GenCrushSSTIExploit",
"html_url": "https:\/\/github.com\/geniuszly\/GenCrushSSTIExploit",
"description": "is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP",
"fork": false,
"created_at": "2024-09-30T16:18:07Z",

View file

@ -14,7 +14,7 @@
"description": "InVesalius discovered CVE. CVE-2024-42845, CVE-2024-44825",
"fork": false,
"created_at": "2024-08-23T13:43:27Z",
"updated_at": "2024-12-30T23:20:09Z",
"updated_at": "2024-12-31T10:26:10Z",
"pushed_at": "2024-12-20T09:48:52Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -19,13 +19,13 @@
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 17,
"score": 0,
"subscribers_count": 0

View file

@ -95,15 +95,15 @@
{
"id": 870756822,
"name": "CVE-2024-44000",
"full_name": "geniuszlyy\/CVE-2024-44000",
"full_name": "geniuszly\/CVE-2024-44000",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-44000",
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-44000",
"description": "is a PoC tool designed to exploit insecurely exposed debug logs from WordPress sites and extract session cookies",
"fork": false,
"created_at": "2024-10-10T15:58:10Z",

33
2024/CVE-2024-46542.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 910002853,
"name": "CVE-2024-46542",
"full_name": "MarioTesoro\/CVE-2024-46542",
"owner": {
"login": "MarioTesoro",
"id": 62204045,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4",
"html_url": "https:\/\/github.com\/MarioTesoro",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-46542",
"description": null,
"fork": false,
"created_at": "2024-12-30T08:58:05Z",
"updated_at": "2024-12-31T12:17:30Z",
"pushed_at": "2024-12-31T12:17:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -169,10 +169,10 @@
"description": "RCE through a race condition in Apache Tomcat",
"fork": false,
"created_at": "2024-12-21T05:54:29Z",
"updated_at": "2024-12-30T15:45:48Z",
"updated_at": "2024-12-31T10:33:55Z",
"pushed_at": "2024-12-21T08:56:44Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 45,
"watchers": 47,
"score": 0,
"subscribers_count": 2
},
@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
"updated_at": "2024-12-30T18:18:04Z",
"updated_at": "2024-12-31T10:14:53Z",
"pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 3
},
@ -262,8 +262,8 @@
"description": "CVE-2024-50379-exp",
"fork": false,
"created_at": "2024-12-25T02:41:31Z",
"updated_at": "2024-12-31T06:26:31Z",
"pushed_at": "2024-12-31T06:26:28Z",
"updated_at": "2024-12-31T07:11:17Z",
"pushed_at": "2024-12-31T07:11:13Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,

View file

@ -66,5 +66,36 @@
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 910411215,
"name": "Cleo-CVE-2024-50623-PoC",
"full_name": "iSee857\/Cleo-CVE-2024-50623-PoC",
"owner": {
"login": "iSee857",
"id": 73977770,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4",
"html_url": "https:\/\/github.com\/iSee857",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/iSee857\/Cleo-CVE-2024-50623-PoC",
"description": "Cleo 远程代码执行漏洞批量检测脚本CVE-2024-50623",
"fork": false,
"created_at": "2024-12-31T07:43:48Z",
"updated_at": "2024-12-31T07:46:53Z",
"pushed_at": "2024-12-31T07:46:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-30T01:07:48Z",
"updated_at": "2024-12-31T03:48:11Z",
"updated_at": "2024-12-31T10:15:57Z",
"pushed_at": "2024-12-30T01:08:00Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -64,15 +64,15 @@
{
"id": 866079798,
"name": "CVE-2024-5522",
"full_name": "geniuszlyy\/CVE-2024-5522",
"full_name": "geniuszly\/CVE-2024-5522",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-5522",
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-5522",
"description": "A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites",
"fork": false,
"created_at": "2024-10-01T16:02:12Z",

View file

@ -45,10 +45,10 @@
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:16:21Z",
"updated_at": "2024-12-26T06:26:46Z",
"updated_at": "2024-12-31T12:16:09Z",
"pushed_at": "2024-07-01T12:25:01Z",
"stargazers_count": 380,
"watchers_count": 380,
"stargazers_count": 379,
"watchers_count": 379,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 90,
"watchers": 380,
"watchers": 379,
"score": 0,
"subscribers_count": 8
},
@ -2185,13 +2185,13 @@
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 24,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 24,
"forks": 25,
"watchers": 63,
"score": 0,
"subscribers_count": 3

View file

@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 0

View file

@ -73,15 +73,15 @@
{
"id": 869446465,
"name": "CVE-2024-7029",
"full_name": "geniuszlyy\/CVE-2024-7029",
"full_name": "geniuszly\/CVE-2024-7029",
"owner": {
"login": "geniuszlyy",
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszlyy",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-7029",
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-7029",
"description": " A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-10-08T10:04:08Z",

View file

@ -190,7 +190,7 @@
- [ysanatomic/io_uring_LPE-CVE-2024-0582](https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582)
- [Forsaken0129/CVE-2024-0582](https://github.com/Forsaken0129/CVE-2024-0582)
- [0ptyx/cve-2024-0582](https://github.com/0ptyx/cve-2024-0582)
- [geniuszlyy/CVE-2024-0582](https://github.com/geniuszlyy/CVE-2024-0582)
- [geniuszly/CVE-2024-0582](https://github.com/geniuszly/CVE-2024-0582)
- [101010zyl/CVE-2024-0582](https://github.com/101010zyl/CVE-2024-0582)
### CVE-2024-0588 (2024-04-09)
@ -880,7 +880,7 @@
- [olebris/CVE-2024-4040](https://github.com/olebris/CVE-2024-4040)
- [entroychang/CVE-2024-4040](https://github.com/entroychang/CVE-2024-4040)
- [safeer-accuknox/CrushFTP-cve-2024-4040-poc](https://github.com/safeer-accuknox/CrushFTP-cve-2024-4040-poc)
- [geniuszlyy/GenCrushSSTIExploit](https://github.com/geniuszlyy/GenCrushSSTIExploit)
- [geniuszly/GenCrushSSTIExploit](https://github.com/geniuszly/GenCrushSSTIExploit)
- [rahisec/CVE-2024-4040](https://github.com/rahisec/CVE-2024-4040)
### CVE-2024-4231 (2024-05-10)
@ -1220,7 +1220,7 @@
- [truonghuuphuc/CVE-2024-5522-Poc](https://github.com/truonghuuphuc/CVE-2024-5522-Poc)
- [kryptonproject/CVE-2024-5522-PoC](https://github.com/kryptonproject/CVE-2024-5522-PoC)
- [geniuszlyy/CVE-2024-5522](https://github.com/geniuszlyy/CVE-2024-5522)
- [geniuszly/CVE-2024-5522](https://github.com/geniuszly/CVE-2024-5522)
### CVE-2024-5633 (2024-07-09)
@ -1527,7 +1527,7 @@
- [bigherocenter/CVE-2024-7029-EXPLOIT](https://github.com/bigherocenter/CVE-2024-7029-EXPLOIT)
- [ebrasha/CVE-2024-7029](https://github.com/ebrasha/CVE-2024-7029)
- [geniuszlyy/CVE-2024-7029](https://github.com/geniuszlyy/CVE-2024-7029)
- [geniuszly/CVE-2024-7029](https://github.com/geniuszly/CVE-2024-7029)
### CVE-2024-7094 (2024-08-13)
@ -2374,7 +2374,11 @@
- [samogod/CVE-2024-11728](https://github.com/samogod/CVE-2024-11728)
### CVE-2024-11972
### CVE-2024-11972 (2024-12-31)
<code>The Hunk Companion WordPress plugin before 1.9.0 does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary Hunk Companion WordPress plugin before 1.9.0 from the WordPress.org repo, including vulnerable Hunk Companion WordPress plugin before 1.9.0 that have been closed.
</code>
- [JunTakemura/exploit-CVE-2024-11972](https://github.com/JunTakemura/exploit-CVE-2024-11972)
### CVE-2024-12025 (2024-12-18)
@ -3630,7 +3634,7 @@
- [Jutrm/cve-2024-24919](https://github.com/Jutrm/cve-2024-24919)
- [LuisMateo1/Arbitrary-File-Read-CVE-2024-24919](https://github.com/LuisMateo1/Arbitrary-File-Read-CVE-2024-24919)
- [AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-](https://github.com/AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-)
- [geniuszlyy/CVE-2024-24919](https://github.com/geniuszlyy/CVE-2024-24919)
- [geniuszly/CVE-2024-24919](https://github.com/geniuszly/CVE-2024-24919)
- [skyrowalker/CVE-2024-24919](https://github.com/skyrowalker/CVE-2024-24919)
- [sar-3mar/CVE-2024-24919_POC](https://github.com/sar-3mar/CVE-2024-24919_POC)
- [NingXin2002/Check-Point_poc](https://github.com/NingXin2002/Check-Point_poc)
@ -3995,7 +3999,7 @@
- [Stuub/RCity-CVE-2024-27198](https://github.com/Stuub/RCity-CVE-2024-27198)
- [HPT-Intern-Task-Submission/CVE-2024-27198](https://github.com/HPT-Intern-Task-Submission/CVE-2024-27198)
- [jrbH4CK/CVE-2024-27198](https://github.com/jrbH4CK/CVE-2024-27198)
- [geniuszlyy/CVE-2024-27198](https://github.com/geniuszlyy/CVE-2024-27198)
- [geniuszly/CVE-2024-27198](https://github.com/geniuszly/CVE-2024-27198)
- [Cythonic1/CVE-2024-27198_POC](https://github.com/Cythonic1/CVE-2024-27198_POC)
### CVE-2024-27292 (2024-02-29)
@ -4222,7 +4226,7 @@
- [akabe1/Graver](https://github.com/akabe1/Graver)
- [gunzf0x/Grav-CMS-RCE-Authenticated](https://github.com/gunzf0x/Grav-CMS-RCE-Authenticated)
- [geniuszlyy/GenGravSSTIExploit](https://github.com/geniuszlyy/GenGravSSTIExploit)
- [geniuszly/GenGravSSTIExploit](https://github.com/geniuszly/GenGravSSTIExploit)
### CVE-2024-28247 (2024-03-27)
@ -6510,7 +6514,7 @@
- [absholi7ly/CVE-2024-44000-LiteSpeed-Cache](https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache)
- [gbrsh/CVE-2024-44000](https://github.com/gbrsh/CVE-2024-44000)
- [ifqygazhar/CVE-2024-44000-LiteSpeed-Cache](https://github.com/ifqygazhar/CVE-2024-44000-LiteSpeed-Cache)
- [geniuszlyy/CVE-2024-44000](https://github.com/geniuszlyy/CVE-2024-44000)
- [geniuszly/CVE-2024-44000](https://github.com/geniuszly/CVE-2024-44000)
### CVE-2024-44083 (2024-08-19)
@ -6845,6 +6849,13 @@
- [EQSTLab/CVE-2024-46538](https://github.com/EQSTLab/CVE-2024-46538)
- [LauLeysen/CVE-2024-46538](https://github.com/LauLeysen/CVE-2024-46538)
### CVE-2024-46542 (2024-12-30)
<code>Veritas / Arctera Data Insight before 7.1.1 allows Application Administrators to conduct SQL injection attacks.
</code>
- [MarioTesoro/CVE-2024-46542](https://github.com/MarioTesoro/CVE-2024-46542)
### CVE-2024-46627 (2024-09-26)
<code>Incorrect access control in BECN DATAGERRY v2.2 allows attackers to execute arbitrary commands via crafted web requests.
@ -7315,6 +7326,7 @@
- [watchtowrlabs/CVE-2024-50623](https://github.com/watchtowrlabs/CVE-2024-50623)
- [verylazytech/CVE-2024-50623](https://github.com/verylazytech/CVE-2024-50623)
- [iSee857/Cleo-CVE-2024-50623-PoC](https://github.com/iSee857/Cleo-CVE-2024-50623-PoC)
### CVE-2024-50657 (2024-11-22)
@ -13811,7 +13823,7 @@
<code>A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sonoma 14.1. An app may be able to execute arbitrary code with kernel privileges.
</code>
- [geniuszlyy/GenEtherExploit](https://github.com/geniuszlyy/GenEtherExploit)
- [geniuszly/GenEtherExploit](https://github.com/geniuszly/GenEtherExploit)
### CVE-2023-40429 (2023-09-26)
@ -16992,7 +17004,7 @@
- [superhac/CVE-2022-2414-POC](https://github.com/superhac/CVE-2022-2414-POC)
- [amitlttwo/CVE-2022-2414-Proof-Of-Concept](https://github.com/amitlttwo/CVE-2022-2414-Proof-Of-Concept)
- [satyasai1460/CVE-2022-2414](https://github.com/satyasai1460/CVE-2022-2414)
- [geniuszlyy/CVE-2022-2414](https://github.com/geniuszlyy/CVE-2022-2414)
- [geniuszly/CVE-2022-2414](https://github.com/geniuszly/CVE-2022-2414)
### CVE-2022-2466 (2022-08-31)
@ -22322,7 +22334,7 @@
</code>
- [yerodin/CVE-2022-44149](https://github.com/yerodin/CVE-2022-44149)
- [geniuszlyy/CVE-2022-44149](https://github.com/geniuszlyy/CVE-2022-44149)
- [geniuszly/CVE-2022-44149](https://github.com/geniuszly/CVE-2022-44149)
### CVE-2022-44183 (2022-11-21)
@ -22598,7 +22610,7 @@
</code>
- [yerodin/CVE-2022-45701](https://github.com/yerodin/CVE-2022-45701)
- [geniuszlyy/CVE-2022-45701](https://github.com/geniuszlyy/CVE-2022-45701)
- [geniuszly/CVE-2022-45701](https://github.com/geniuszly/CVE-2022-45701)
### CVE-2022-45728 (2023-01-12)
@ -22658,7 +22670,7 @@
</code>
- [yerodin/CVE-2022-46080](https://github.com/yerodin/CVE-2022-46080)
- [geniuszlyy/CVE-2022-46080](https://github.com/geniuszlyy/CVE-2022-46080)
- [geniuszly/CVE-2022-46080](https://github.com/geniuszly/CVE-2022-46080)
### CVE-2022-46087 (2023-01-30)
@ -33486,7 +33498,7 @@
<code>goform/AdvSetLanip endpoint on Tenda AC15 AC1900 15.03.05.19 devices allows remote attackers to execute arbitrary system commands via shell metacharacters in the lanIp POST parameter.
</code>
- [geniuszlyy/CVE-2020-15916](https://github.com/geniuszlyy/CVE-2020-15916)
- [geniuszly/CVE-2020-15916](https://github.com/geniuszly/CVE-2020-15916)
### CVE-2020-15931 (2020-10-20)
@ -36729,7 +36741,7 @@
- [b4keSn4ke/CVE-2019-9193](https://github.com/b4keSn4ke/CVE-2019-9193)
- [chromanite/CVE-2019-9193-PostgreSQL-9.3-11.7](https://github.com/chromanite/CVE-2019-9193-PostgreSQL-9.3-11.7)
- [paulotrindadec/CVE-2019-9193](https://github.com/paulotrindadec/CVE-2019-9193)
- [geniuszlyy/CVE-2019-9193](https://github.com/geniuszlyy/CVE-2019-9193)
- [geniuszly/CVE-2019-9193](https://github.com/geniuszly/CVE-2019-9193)
- [AxthonyV/CVE-2019-9193](https://github.com/AxthonyV/CVE-2019-9193)
- [A0be/CVE-2019-9193](https://github.com/A0be/CVE-2019-9193)
@ -43527,7 +43539,7 @@
- [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269)
- [Cappricio-Securities/CVE-2017-7269](https://github.com/Cappricio-Securities/CVE-2017-7269)
- [VanishedPeople/CVE-2017-7269](https://github.com/VanishedPeople/CVE-2017-7269)
- [geniuszlyy/CVE-2017-7269](https://github.com/geniuszlyy/CVE-2017-7269)
- [geniuszly/CVE-2017-7269](https://github.com/geniuszly/CVE-2017-7269)
- [AxthonyV/CVE-2017-7269](https://github.com/AxthonyV/CVE-2017-7269)
### CVE-2017-7308 (2017-03-29)