mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/03/07 00:26:41
This commit is contained in:
parent
78e10c838c
commit
028babf5a1
38 changed files with 222 additions and 191 deletions
|
@ -13,7 +13,7 @@
|
|||
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T09:51:12Z",
|
||||
"updated_at": "2024-02-29T22:37:08Z",
|
||||
"updated_at": "2024-03-06T23:37:43Z",
|
||||
"pushed_at": "2023-12-27T23:45:17Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
@ -208,5 +208,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 768304075,
|
||||
"name": "CVE-2014-6287",
|
||||
"full_name": "zhsh9\/CVE-2014-6287",
|
||||
"owner": {
|
||||
"login": "zhsh9",
|
||||
"id": 78374754,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78374754?v=4",
|
||||
"html_url": "https:\/\/github.com\/zhsh9"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zhsh9\/CVE-2014-6287",
|
||||
"description": "Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-06T20:55:08Z",
|
||||
"updated_at": "2024-03-06T20:57:14Z",
|
||||
"pushed_at": "2024-03-06T20:55:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 768258204,
|
||||
"name": "CVE-2017-16651-Exploit",
|
||||
"full_name": "sephiroth950911\/CVE-2017-16651-Exploit",
|
||||
"owner": {
|
||||
"login": "sephiroth950911",
|
||||
"id": 61886874,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61886874?v=4",
|
||||
"html_url": "https:\/\/github.com\/sephiroth950911"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sephiroth950911\/CVE-2017-16651-Exploit",
|
||||
"description": "CyberPunk Style CVE-2017-16651 Roundcube Webmail Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-06T18:53:06Z",
|
||||
"updated_at": "2024-03-06T18:53:58Z",
|
||||
"pushed_at": "2024-03-06T18:53:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -53,10 +53,10 @@
|
|||
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T23:51:12Z",
|
||||
"updated_at": "2024-03-03T02:25:11Z",
|
||||
"updated_at": "2024-03-06T20:05:17Z",
|
||||
"pushed_at": "2018-02-27T05:22:38Z",
|
||||
"stargazers_count": 543,
|
||||
"watchers_count": 543,
|
||||
"stargazers_count": 544,
|
||||
"watchers_count": 544,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -74,7 +74,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 543,
|
||||
"watchers": 544,
|
||||
"score": 0,
|
||||
"subscribers_count": 47
|
||||
},
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 47,
|
||||
"watchers": 186,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 345279364,
|
||||
|
|
|
@ -128,7 +128,7 @@
|
|||
"forks": 14,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 261161731,
|
||||
|
|
|
@ -454,7 +454,7 @@
|
|||
"forks": 27,
|
||||
"watchers": 100,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 295917575,
|
||||
|
@ -694,7 +694,7 @@
|
|||
"forks": 12,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
"subscribers_count": 8
|
||||
},
|
||||
{
|
||||
"id": 296468860,
|
||||
|
|
|
@ -47,7 +47,7 @@
|
|||
"forks": 1080,
|
||||
"watchers": 3997,
|
||||
"score": 0,
|
||||
"subscribers_count": 152
|
||||
"subscribers_count": 151
|
||||
},
|
||||
{
|
||||
"id": 307998445,
|
||||
|
@ -77,7 +77,7 @@
|
|||
"forks": 63,
|
||||
"watchers": 282,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
"subscribers_count": 7
|
||||
},
|
||||
{
|
||||
"id": 308145197,
|
||||
|
@ -377,7 +377,7 @@
|
|||
"forks": 11,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 310303375,
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 9,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 307620612,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 6,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
"subscribers_count": 9
|
||||
}
|
||||
]
|
|
@ -46,7 +46,7 @@
|
|||
"forks": 32,
|
||||
"watchers": 207,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
"subscribers_count": 18
|
||||
},
|
||||
{
|
||||
"id": 303891965,
|
||||
|
|
|
@ -122,7 +122,7 @@
|
|||
"forks": 65,
|
||||
"watchers": 533,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
"subscribers_count": 8
|
||||
},
|
||||
{
|
||||
"id": 304156994,
|
||||
|
|
|
@ -318,10 +318,10 @@
|
|||
"description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-28T05:00:37Z",
|
||||
"updated_at": "2024-02-21T17:01:43Z",
|
||||
"updated_at": "2024-03-06T21:27:27Z",
|
||||
"pushed_at": "2020-10-10T17:19:51Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -339,7 +339,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -850,7 +850,7 @@
|
|||
"forks": 8,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 278061523,
|
||||
|
@ -1220,7 +1220,7 @@
|
|||
"forks": 17,
|
||||
"watchers": 61,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 278872820,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 3,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 7,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -152,10 +152,10 @@
|
|||
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T16:31:34Z",
|
||||
"updated_at": "2024-01-04T16:55:05Z",
|
||||
"updated_at": "2024-03-06T21:28:01Z",
|
||||
"pushed_at": "2021-02-25T16:05:02Z",
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
"has_discussions": false,
|
||||
"forks_count": 86,
|
||||
"allow_forking": true,
|
||||
|
@ -164,7 +164,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 86,
|
||||
"watchers": 242,
|
||||
"watchers": 243,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -1527,7 +1527,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2023-05-28T11:06:10Z",
|
||||
"pushed_at": "2024-03-04T21:40:15Z",
|
||||
"pushed_at": "2024-03-06T21:44:41Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T20:37:14Z",
|
||||
"updated_at": "2024-02-22T19:00:17Z",
|
||||
"updated_at": "2024-03-06T22:50:10Z",
|
||||
"pushed_at": "2022-08-30T02:11:05Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -227,10 +227,10 @@
|
|||
"description": "PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-13T11:08:33Z",
|
||||
"updated_at": "2024-02-25T20:44:39Z",
|
||||
"updated_at": "2024-03-06T19:13:11Z",
|
||||
"pushed_at": "2022-06-18T13:53:53Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -239,7 +239,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-23T15:03:09Z",
|
||||
"updated_at": "2024-02-19T11:31:47Z",
|
||||
"updated_at": "2024-03-07T00:12:48Z",
|
||||
"pushed_at": "2022-03-26T05:52:15Z",
|
||||
"stargazers_count": 451,
|
||||
"watchers_count": 451,
|
||||
"stargazers_count": 452,
|
||||
"watchers_count": 452,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 451,
|
||||
"watchers": 452,
|
||||
"score": 0,
|
||||
"subscribers_count": 20
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-03-03T01:39:15Z",
|
||||
"updated_at": "2024-03-06T19:38:47Z",
|
||||
"pushed_at": "2024-02-23T14:48:26Z",
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"has_discussions": true,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 175,
|
||||
"watchers": 176,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-19T20:36:49Z",
|
||||
"updated_at": "2024-02-02T17:40:32Z",
|
||||
"updated_at": "2024-03-06T21:51:18Z",
|
||||
"pushed_at": "2023-01-20T17:58:39Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 61,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-17T16:45:24Z",
|
||||
"updated_at": "2024-03-06T11:18:55Z",
|
||||
"updated_at": "2024-03-07T00:12:55Z",
|
||||
"pushed_at": "2022-12-21T17:53:19Z",
|
||||
"stargazers_count": 378,
|
||||
"watchers_count": 378,
|
||||
"stargazers_count": 379,
|
||||
"watchers_count": 379,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 378,
|
||||
"watchers": 379,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
@ -103,10 +103,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2024-03-06T03:58:47Z",
|
||||
"updated_at": "2024-03-07T00:12:55Z",
|
||||
"pushed_at": "2023-08-02T09:35:14Z",
|
||||
"stargazers_count": 868,
|
||||
"watchers_count": 868,
|
||||
"stargazers_count": 869,
|
||||
"watchers_count": 869,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 868,
|
||||
"watchers": 869,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
@ -193,10 +193,10 @@
|
|||
"description": "CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T05:08:20Z",
|
||||
"updated_at": "2024-02-19T11:31:54Z",
|
||||
"updated_at": "2024-03-07T00:12:55Z",
|
||||
"pushed_at": "2023-01-19T08:12:40Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-14T20:45:31Z",
|
||||
"updated_at": "2024-02-19T11:32:01Z",
|
||||
"updated_at": "2024-03-07T00:13:03Z",
|
||||
"pushed_at": "2023-11-14T20:54:26Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "This script complements the results obtained through the keepass-password-dumper tool when exploiting the CVE-2023-32784 vulnerability affecting KeePass.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-20T14:37:00Z",
|
||||
"updated_at": "2023-11-02T23:39:29Z",
|
||||
"updated_at": "2024-03-06T19:36:39Z",
|
||||
"pushed_at": "2023-05-21T09:08:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -322,10 +322,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-10T18:22:57Z",
|
||||
"updated_at": "2024-02-29T12:41:50Z",
|
||||
"updated_at": "2024-03-06T20:54:06Z",
|
||||
"pushed_at": "2023-09-01T19:14:30Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -334,7 +334,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 67,
|
||||
"watchers": 66,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2024-03-05T14:54:34Z",
|
||||
"updated_at": "2024-03-07T00:13:01Z",
|
||||
"pushed_at": "2023-11-26T06:46:44Z",
|
||||
"stargazers_count": 753,
|
||||
"watchers_count": 753,
|
||||
"stargazers_count": 754,
|
||||
"watchers_count": 754,
|
||||
"has_discussions": false,
|
||||
"forks_count": 137,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 137,
|
||||
"watchers": 753,
|
||||
"watchers": 754,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-21T05:22:51Z",
|
||||
"updated_at": "2024-02-27T06:58:39Z",
|
||||
"updated_at": "2024-03-07T00:13:02Z",
|
||||
"pushed_at": "2023-12-18T04:25:00Z",
|
||||
"stargazers_count": 279,
|
||||
"watchers_count": 279,
|
||||
"stargazers_count": 280,
|
||||
"watchers_count": 280,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 279,
|
||||
"watchers": 280,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "OpenSSH ProxyCommand RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-25T12:51:05Z",
|
||||
"updated_at": "2024-01-21T05:43:03Z",
|
||||
"updated_at": "2024-03-07T00:13:03Z",
|
||||
"pushed_at": "2023-12-26T07:43:32Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -133,10 +133,10 @@
|
|||
"description": "一个验证对CVE-2023-51385",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-25T13:13:25Z",
|
||||
"updated_at": "2024-01-21T05:45:08Z",
|
||||
"updated_at": "2024-03-07T00:13:04Z",
|
||||
"pushed_at": "2023-12-25T15:46:42Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-03-02T15:45:52Z",
|
||||
"updated_at": "2024-03-06T17:10:15Z",
|
||||
"pushed_at": "2024-03-06T17:10:50Z",
|
||||
"pushed_at": "2024-03-06T20:12:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2024-1512 in MasterStudy LMS WordPress Plugin.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-01T11:08:37Z",
|
||||
"updated_at": "2024-03-01T11:17:08Z",
|
||||
"updated_at": "2024-03-06T23:34:24Z",
|
||||
"pushed_at": "2024-03-01T11:18:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -67,35 +67,5 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 766020621,
|
||||
"name": "POCv2.0-for-CVE-2024-1709",
|
||||
"full_name": "tr1pl3ight\/POCv2.0-for-CVE-2024-1709",
|
||||
"owner": {
|
||||
"login": "tr1pl3ight",
|
||||
"id": 161883835,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161883835?v=4",
|
||||
"html_url": "https:\/\/github.com\/tr1pl3ight"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tr1pl3ight\/POCv2.0-for-CVE-2024-1709",
|
||||
"description": "CVE-2024-1709 ConnectWise ScreenConnect auth bypass patch WORK 2.0 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-02T05:46:40Z",
|
||||
"updated_at": "2024-03-02T15:01:09Z",
|
||||
"pushed_at": "2024-03-03T17:42:59Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T15:17:59Z",
|
||||
"updated_at": "2024-03-06T05:58:17Z",
|
||||
"updated_at": "2024-03-06T21:55:32Z",
|
||||
"pushed_at": "2024-02-19T20:00:35Z",
|
||||
"stargazers_count": 514,
|
||||
"watchers_count": 514,
|
||||
"stargazers_count": 515,
|
||||
"watchers_count": 515,
|
||||
"has_discussions": false,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 514,
|
||||
"watchers": 515,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -133,10 +133,10 @@
|
|||
"description": "CVE-2024-21413 PoC for THM Lab",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-17T14:52:52Z",
|
||||
"updated_at": "2024-03-02T02:57:49Z",
|
||||
"updated_at": "2024-03-06T21:35:45Z",
|
||||
"pushed_at": "2024-02-26T13:37:33Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -29,36 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 764804141,
|
||||
"name": "CVE-2024-21762-POC",
|
||||
"full_name": "c0d3b3af\/CVE-2024-21762-POC",
|
||||
"owner": {
|
||||
"login": "c0d3b3af",
|
||||
"id": 161638405,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161638405?v=4",
|
||||
"html_url": "https:\/\/github.com\/c0d3b3af"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c0d3b3af\/CVE-2024-21762-POC",
|
||||
"description": "FortiOS 6.0 - 7.4.2 Out of bound exploit --> RCE!!!",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-28T18:35:52Z",
|
||||
"updated_at": "2024-03-03T19:21:51Z",
|
||||
"pushed_at": "2024-02-28T18:58:40Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 764866619,
|
||||
"name": "cve-2024-21762-check",
|
||||
|
@ -90,23 +60,23 @@
|
|||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 766583501,
|
||||
"id": 766394047,
|
||||
"name": "CVE-2024-21762-POC",
|
||||
"full_name": "tr1pl3ight\/CVE-2024-21762-POC",
|
||||
"full_name": "redCode001\/CVE-2024-21762-POC",
|
||||
"owner": {
|
||||
"login": "tr1pl3ight",
|
||||
"id": 161883835,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161883835?v=4",
|
||||
"html_url": "https:\/\/github.com\/tr1pl3ight"
|
||||
"login": "redCode001",
|
||||
"id": 129734113,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129734113?v=4",
|
||||
"html_url": "https:\/\/github.com\/redCode001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tr1pl3ight\/CVE-2024-21762-POC",
|
||||
"description": "CVE-2024-21762 POC Forti VPN SSL Out of Boundary RCE",
|
||||
"html_url": "https:\/\/github.com\/redCode001\/CVE-2024-21762-POC",
|
||||
"description": "FortiOS 6.0 - 7.4.2 Out of bound exploit --> RCE!!!",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-03T17:01:56Z",
|
||||
"updated_at": "2024-03-03T17:45:58Z",
|
||||
"pushed_at": "2024-03-03T17:50:30Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"created_at": "2024-03-03T06:12:13Z",
|
||||
"updated_at": "2024-03-03T06:12:13Z",
|
||||
"pushed_at": "2024-02-28T18:58:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -115,8 +85,38 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 768318279,
|
||||
"name": "CVE-2024-21762-Exploit",
|
||||
"full_name": "c0d3b3af\/CVE-2024-21762-Exploit",
|
||||
"owner": {
|
||||
"login": "c0d3b3af",
|
||||
"id": 161638405,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161638405?v=4",
|
||||
"html_url": "https:\/\/github.com\/c0d3b3af"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c0d3b3af\/CVE-2024-21762-Exploit",
|
||||
"description": "proof-of-concept out-of-bound write vuln in FortiOS ---> RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-06T21:39:22Z",
|
||||
"updated_at": "2024-03-06T21:39:23Z",
|
||||
"pushed_at": "2024-03-06T21:39:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -226,10 +226,10 @@
|
|||
"description": "on this git you can find all information on the CVE-2024-23897",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-27T13:27:57Z",
|
||||
"updated_at": "2024-03-01T12:46:05Z",
|
||||
"updated_at": "2024-03-06T22:14:44Z",
|
||||
"pushed_at": "2024-01-27T14:43:18Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -238,7 +238,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
"description": "Exploit for CVE-2024-27198 - TeamCity Server",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-05T05:43:06Z",
|
||||
"updated_at": "2024-03-06T17:50:30Z",
|
||||
"updated_at": "2024-03-06T20:22:31Z",
|
||||
"pushed_at": "2024-03-05T06:20:55Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-06T03:15:03Z",
|
||||
"updated_at": "2024-03-06T17:12:36Z",
|
||||
"updated_at": "2024-03-06T21:21:14Z",
|
||||
"pushed_at": "2024-03-06T05:08:41Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -121,7 +121,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -140,7 +140,6 @@
|
|||
|
||||
- [W01fh4cker/ScreenConnect-AuthBypass-RCE](https://github.com/W01fh4cker/ScreenConnect-AuthBypass-RCE)
|
||||
- [HussainFathy/CVE-2024-1709](https://github.com/HussainFathy/CVE-2024-1709)
|
||||
- [tr1pl3ight/POCv2.0-for-CVE-2024-1709](https://github.com/tr1pl3ight/POCv2.0-for-CVE-2024-1709)
|
||||
|
||||
### CVE-2024-2074 (-)
|
||||
|
||||
|
@ -259,9 +258,9 @@
|
|||
</code>
|
||||
|
||||
- [Gh71m/CVE-2024-21762-POC](https://github.com/Gh71m/CVE-2024-21762-POC)
|
||||
- [c0d3b3af/CVE-2024-21762-POC](https://github.com/c0d3b3af/CVE-2024-21762-POC)
|
||||
- [BishopFox/cve-2024-21762-check](https://github.com/BishopFox/cve-2024-21762-check)
|
||||
- [tr1pl3ight/CVE-2024-21762-POC](https://github.com/tr1pl3ight/CVE-2024-21762-POC)
|
||||
- [redCode001/CVE-2024-21762-POC](https://github.com/redCode001/CVE-2024-21762-POC)
|
||||
- [c0d3b3af/CVE-2024-21762-Exploit](https://github.com/c0d3b3af/CVE-2024-21762-Exploit)
|
||||
|
||||
### CVE-2024-21887 (2024-01-12)
|
||||
|
||||
|
@ -35570,6 +35569,7 @@
|
|||
</code>
|
||||
|
||||
- [ropbear/CVE-2017-16651](https://github.com/ropbear/CVE-2017-16651)
|
||||
- [sephiroth950911/CVE-2017-16651-Exploit](https://github.com/sephiroth950911/CVE-2017-16651-Exploit)
|
||||
|
||||
### CVE-2017-16720 (2018-01-05)
|
||||
|
||||
|
@ -38701,6 +38701,7 @@
|
|||
- [hadrian3689/rejetto_hfs_rce](https://github.com/hadrian3689/rejetto_hfs_rce)
|
||||
- [randallbanner/Rejetto-HTTP-File-Server-HFS-2.3.x---Remote-Command-Execution](https://github.com/randallbanner/Rejetto-HTTP-File-Server-HFS-2.3.x---Remote-Command-Execution)
|
||||
- [0xTabun/CVE-2014-6287](https://github.com/0xTabun/CVE-2014-6287)
|
||||
- [zhsh9/CVE-2014-6287](https://github.com/zhsh9/CVE-2014-6287)
|
||||
|
||||
### CVE-2014-6332 (2014-11-11)
|
||||
|
||||
|
|
Loading…
Reference in a new issue