mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/08/18 18:29:10
This commit is contained in:
parent
f5aed05dba
commit
06e3aa51bf
28 changed files with 214 additions and 117 deletions
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Local privilege escalation PoC exploit for CVE-2019-16098",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-10T15:57:36Z",
|
||||
"updated_at": "2024-08-16T13:41:36Z",
|
||||
"updated_at": "2024-08-18T16:51:18Z",
|
||||
"pushed_at": "2019-09-13T20:05:43Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"has_discussions": false,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 190,
|
||||
"watchers": 191,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -3636,10 +3636,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2024-08-16T09:59:13Z",
|
||||
"updated_at": "2024-08-18T13:45:10Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3393,
|
||||
"watchers_count": 3393,
|
||||
"stargazers_count": 3394,
|
||||
"watchers_count": 3394,
|
||||
"has_discussions": true,
|
||||
"forks_count": 740,
|
||||
"allow_forking": true,
|
||||
|
@ -3648,7 +3648,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 740,
|
||||
"watchers": 3393,
|
||||
"watchers": 3394,
|
||||
"score": 0,
|
||||
"subscribers_count": 57
|
||||
},
|
||||
|
@ -6030,10 +6030,10 @@
|
|||
"description": "Tools for remediating the recent log4j2 RCE vulnerability (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T21:47:04Z",
|
||||
"updated_at": "2024-04-16T04:41:12Z",
|
||||
"updated_at": "2024-08-18T16:13:22Z",
|
||||
"pushed_at": "2023-03-21T09:51:33Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -6046,7 +6046,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 42,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2024-08-12T20:58:55Z",
|
||||
"updated_at": "2024-08-18T14:34:56Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 1081,
|
||||
"watchers_count": 1081,
|
||||
"stargazers_count": 1082,
|
||||
"watchers_count": 1082,
|
||||
"has_discussions": false,
|
||||
"forks_count": 220,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 220,
|
||||
"watchers": 1081,
|
||||
"watchers": 1082,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 844114285,
|
||||
"name": "CVE-2022-24834-",
|
||||
"full_name": "DukeSec97\/CVE-2022-24834-",
|
||||
"owner": {
|
||||
"login": "DukeSec97",
|
||||
"id": 59002589,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59002589?v=4",
|
||||
"html_url": "https:\/\/github.com\/DukeSec97"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DukeSec97\/CVE-2022-24834-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-08-18T12:33:36Z",
|
||||
"updated_at": "2024-08-18T12:39:19Z",
|
||||
"pushed_at": "2024-08-18T12:39:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -88,35 +88,5 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 818735736,
|
||||
"name": "SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-",
|
||||
"full_name": "binaryusergearone\/SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-",
|
||||
"owner": {
|
||||
"login": "binaryusergearone",
|
||||
"id": 125667320,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125667320?v=4",
|
||||
"html_url": "https:\/\/github.com\/binaryusergearone"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/binaryusergearone\/SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-22T17:54:50Z",
|
||||
"updated_at": "2024-06-22T18:05:03Z",
|
||||
"pushed_at": "2024-06-22T18:04:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WonderCMS Authenticated RCE - CVE-2023-41425",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-05T15:06:43Z",
|
||||
"updated_at": "2024-08-15T12:57:35Z",
|
||||
"updated_at": "2024-08-18T18:29:48Z",
|
||||
"pushed_at": "2023-11-06T18:56:53Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T20:59:38Z",
|
||||
"updated_at": "2024-08-12T10:38:27Z",
|
||||
"updated_at": "2024-08-18T17:06:49Z",
|
||||
"pushed_at": "2024-01-17T00:38:28Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 50,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -80,12 +80,12 @@
|
|||
"description": "PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-15T07:26:59Z",
|
||||
"updated_at": "2024-08-18T09:25:54Z",
|
||||
"updated_at": "2024-08-18T13:17:38Z",
|
||||
"pushed_at": "2024-07-16T23:22:14Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -102,8 +102,8 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 37,
|
||||
"forks": 7,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T14:34:09Z",
|
||||
"updated_at": "2024-07-29T03:21:00Z",
|
||||
"updated_at": "2024-08-18T15:55:57Z",
|
||||
"pushed_at": "2024-05-21T11:56:19Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -595,13 +595,13 @@
|
|||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-06T03:15:03Z",
|
||||
"updated_at": "2024-08-13T02:04:20Z",
|
||||
"updated_at": "2024-08-18T17:32:09Z",
|
||||
"pushed_at": "2024-03-11T07:57:40Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -98,7 +98,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 130,
|
||||
"watchers": 131,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2024-08-09T11:34:12Z",
|
||||
"updated_at": "2024-08-18T16:15:58Z",
|
||||
"pushed_at": "2024-07-29T12:20:50Z",
|
||||
"stargazers_count": 349,
|
||||
"watchers_count": 349,
|
||||
"stargazers_count": 350,
|
||||
"watchers_count": 350,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 349,
|
||||
"watchers": 350,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -982,10 +982,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-08-16T07:57:19Z",
|
||||
"updated_at": "2024-08-18T15:56:03Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3483,
|
||||
"watchers_count": 3483,
|
||||
"stargazers_count": 3484,
|
||||
"watchers_count": 3484,
|
||||
"has_discussions": false,
|
||||
"forks_count": 233,
|
||||
"allow_forking": true,
|
||||
|
@ -994,7 +994,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 233,
|
||||
"watchers": 3483,
|
||||
"watchers": 3484,
|
||||
"score": 0,
|
||||
"subscribers_count": 39
|
||||
},
|
||||
|
|
|
@ -240,7 +240,7 @@
|
|||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -250,7 +250,7 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"forks": 21,
|
||||
"watchers": 97,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-32640 | Automated SQLi Exploitation PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-16T01:02:32Z",
|
||||
"updated_at": "2024-08-16T08:36:14Z",
|
||||
"updated_at": "2024-08-18T17:23:33Z",
|
||||
"pushed_at": "2024-05-16T21:07:32Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -37,7 +37,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
32
2024/CVE-2024-35538.json
Normal file
32
2024/CVE-2024-35538.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 844197058,
|
||||
"name": "Typecho-Multiple-Vulnerabilities",
|
||||
"full_name": "cyberaz0r\/Typecho-Multiple-Vulnerabilities",
|
||||
"owner": {
|
||||
"login": "cyberaz0r",
|
||||
"id": 35109470,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35109470?v=4",
|
||||
"html_url": "https:\/\/github.com\/cyberaz0r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cyberaz0r\/Typecho-Multiple-Vulnerabilities",
|
||||
"description": "Exploits for Typecho CVE-2024-35538, CVE-2024-35539 and CVE-2024-35540",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-18T17:09:05Z",
|
||||
"updated_at": "2024-08-18T17:10:37Z",
|
||||
"pushed_at": "2024-08-18T17:10:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-09T19:44:40Z",
|
||||
"updated_at": "2024-07-30T02:28:42Z",
|
||||
"updated_at": "2024-08-18T15:32:52Z",
|
||||
"pushed_at": "2024-07-09T20:21:22Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -88,5 +88,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 844208301,
|
||||
"name": "CVE-2024-37085",
|
||||
"full_name": "WTN-arny\/CVE-2024-37085",
|
||||
"owner": {
|
||||
"login": "WTN-arny",
|
||||
"id": 178199794,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178199794?v=4",
|
||||
"html_url": "https:\/\/github.com\/WTN-arny"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/WTN-arny\/CVE-2024-37085",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-08-18T17:48:34Z",
|
||||
"updated_at": "2024-08-18T17:49:21Z",
|
||||
"pushed_at": "2024-08-18T17:49:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -73,7 +73,7 @@
|
|||
"description": "CVE-2024-38063 PoC. CVE-2024-38063 Demo",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-17T06:35:10Z",
|
||||
"updated_at": "2024-08-18T07:10:52Z",
|
||||
"updated_at": "2024-08-18T16:56:39Z",
|
||||
"pushed_at": "2024-08-18T07:10:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -103,19 +103,19 @@
|
|||
"description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-17T14:58:36Z",
|
||||
"updated_at": "2024-08-18T12:04:25Z",
|
||||
"updated_at": "2024-08-18T16:54:40Z",
|
||||
"pushed_at": "2024-08-17T15:12:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "CVE-2024-38077,本仓库仅用作备份,",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-09T07:46:09Z",
|
||||
"updated_at": "2024-08-15T07:40:05Z",
|
||||
"updated_at": "2024-08-18T17:48:39Z",
|
||||
"pushed_at": "2024-08-09T07:45:58Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of Concept code for exploitation of CVE-2024-38793 (Best Restaurant Menu by PriceListo <= 1.4.1 - Authenticated (Contributor+) SQL Injection)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-18T10:26:23Z",
|
||||
"updated_at": "2024-08-18T10:38:51Z",
|
||||
"updated_at": "2024-08-18T18:09:55Z",
|
||||
"pushed_at": "2024-08-18T10:38:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -66,5 +66,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 844163753,
|
||||
"name": "CVE-2024-38856-ApacheOfBiz",
|
||||
"full_name": "Praison001\/CVE-2024-38856-ApacheOfBiz",
|
||||
"owner": {
|
||||
"login": "Praison001",
|
||||
"id": 60835238,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
|
||||
"html_url": "https:\/\/github.com\/Praison001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Praison001\/CVE-2024-38856-ApacheOfBiz",
|
||||
"description": "Exploit for CVE-2024-38856 affecting Apache OFBiz versions before 18.12.15",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-18T15:19:58Z",
|
||||
"updated_at": "2024-08-18T15:27:43Z",
|
||||
"pushed_at": "2024-08-18T15:27:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -228,13 +228,13 @@
|
|||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 2,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "This is a python written PoC of a recent vulnerability in a wordpress plugin. More information on that here",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-21T04:59:31Z",
|
||||
"updated_at": "2024-08-06T23:54:03Z",
|
||||
"pushed_at": "2024-08-06T23:54:00Z",
|
||||
"updated_at": "2024-08-18T18:15:10Z",
|
||||
"pushed_at": "2024-08-18T18:15:08Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -2233,19 +2233,19 @@
|
|||
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T11:27:49Z",
|
||||
"updated_at": "2024-08-17T23:30:09Z",
|
||||
"updated_at": "2024-08-18T18:23:13Z",
|
||||
"pushed_at": "2024-08-14T07:15:57Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"forks": 8,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -3609,6 +3609,9 @@
|
|||
|
||||
- [efekaanakkar/CVE-2024-35511](https://github.com/efekaanakkar/CVE-2024-35511)
|
||||
|
||||
### CVE-2024-35538
|
||||
- [cyberaz0r/Typecho-Multiple-Vulnerabilities](https://github.com/cyberaz0r/Typecho-Multiple-Vulnerabilities)
|
||||
|
||||
### CVE-2024-36079 (-)
|
||||
|
||||
<code>An issue was discovered in Vaultize 21.07.27. When uploading files, there is no check that the filename parameter is correct. As a result, a temporary file will be created outside the specified directory when the file is downloaded. To exploit this, an authenticated user would upload a file with an incorrect file name, and then download it.
|
||||
|
@ -3736,6 +3739,7 @@
|
|||
- [mahmutaymahmutay/CVE-2024-37085](https://github.com/mahmutaymahmutay/CVE-2024-37085)
|
||||
- [Florian-Hoth/CVE-2024-37085-RCE-POC](https://github.com/Florian-Hoth/CVE-2024-37085-RCE-POC)
|
||||
- [WTN-arny/Vmware-ESXI](https://github.com/WTN-arny/Vmware-ESXI)
|
||||
- [WTN-arny/CVE-2024-37085](https://github.com/WTN-arny/CVE-2024-37085)
|
||||
|
||||
### CVE-2024-37147 (2024-07-10)
|
||||
|
||||
|
@ -3931,6 +3935,7 @@
|
|||
|
||||
- [securelayer7/CVE-2024-38856_Scanner](https://github.com/securelayer7/CVE-2024-38856_Scanner)
|
||||
- [ThatNotEasy/CVE-2024-38856](https://github.com/ThatNotEasy/CVE-2024-38856)
|
||||
- [Praison001/CVE-2024-38856-ApacheOfBiz](https://github.com/Praison001/CVE-2024-38856-ApacheOfBiz)
|
||||
|
||||
### CVE-2024-39031 (2024-07-09)
|
||||
|
||||
|
@ -6449,7 +6454,6 @@
|
|||
- [Timorlover/CVE-2023-23333](https://github.com/Timorlover/CVE-2023-23333)
|
||||
- [Mr-xn/CVE-2023-23333](https://github.com/Mr-xn/CVE-2023-23333)
|
||||
- [emanueldosreis/nmap-CVE-2023-23333-exploit](https://github.com/emanueldosreis/nmap-CVE-2023-23333-exploit)
|
||||
- [binaryusergearone/SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-](https://github.com/binaryusergearone/SolarView-Compact-6.00-Command-Injection-Exploit-CVE-2023-23333-)
|
||||
|
||||
### CVE-2023-23388 (2023-03-14)
|
||||
|
||||
|
@ -14820,6 +14824,7 @@
|
|||
</code>
|
||||
|
||||
- [convisolabs/CVE-2022-24834](https://github.com/convisolabs/CVE-2022-24834)
|
||||
- [DukeSec97/CVE-2022-24834-](https://github.com/DukeSec97/CVE-2022-24834-)
|
||||
|
||||
### CVE-2022-24853 (2022-04-14)
|
||||
|
||||
|
|
Loading…
Reference in a new issue