mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/11/03 12:30:55
This commit is contained in:
parent
1054a10b49
commit
09cef87527
37 changed files with 152 additions and 216 deletions
|
@ -14,10 +14,10 @@
|
|||
"description": "A CVE-2012-2688 shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-06T16:12:39Z",
|
||||
"updated_at": "2024-06-04T01:51:24Z",
|
||||
"updated_at": "2024-11-03T11:26:43Z",
|
||||
"pushed_at": "2020-03-18T16:06:39Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -417,10 +417,10 @@
|
|||
"description": "最新tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2024-11-03T02:32:26Z",
|
||||
"updated_at": "2024-11-03T11:14:26Z",
|
||||
"pushed_at": "2024-09-09T07:42:24Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -437,7 +437,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 89,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -15,7 +15,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-01-11T10:20:27Z",
|
||||
"updated_at": "2024-11-01T10:39:34Z",
|
||||
"pushed_at": "2024-11-01T10:39:30Z",
|
||||
"pushed_at": "2024-11-03T10:58:20Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -267,19 +267,19 @@
|
|||
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T16:42:31Z",
|
||||
"updated_at": "2024-09-22T07:22:23Z",
|
||||
"updated_at": "2024-11-03T09:22:28Z",
|
||||
"pushed_at": "2021-04-21T16:46:37Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 45,
|
||||
"forks": 21,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "exp of CVE-2018-15982",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-10T04:53:31Z",
|
||||
"updated_at": "2024-08-12T19:43:55Z",
|
||||
"updated_at": "2024-11-03T09:27:33Z",
|
||||
"pushed_at": "2019-01-04T09:29:01Z",
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"has_discussions": false,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 180,
|
||||
"watchers": 181,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -81,13 +81,13 @@
|
|||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"forks": 51,
|
||||
"watchers": 198,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T16:03:16Z",
|
||||
"updated_at": "2024-11-03T03:22:23Z",
|
||||
"updated_at": "2024-11-03T06:54:00Z",
|
||||
"pushed_at": "2022-09-01T06:33:36Z",
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 177,
|
||||
"watchers": 178,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -950,10 +950,10 @@
|
|||
"description": "最新tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2024-11-03T02:32:26Z",
|
||||
"updated_at": "2024-11-03T11:14:26Z",
|
||||
"pushed_at": "2024-09-09T07:42:24Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -970,7 +970,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 89,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -50,10 +50,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2024-11-01T15:04:16Z",
|
||||
"updated_at": "2024-11-03T07:21:18Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 796,
|
||||
"watchers_count": 796,
|
||||
"stargazers_count": 797,
|
||||
"watchers_count": 797,
|
||||
"has_discussions": false,
|
||||
"forks_count": 122,
|
||||
"allow_forking": true,
|
||||
|
@ -62,7 +62,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 122,
|
||||
"watchers": 796,
|
||||
"watchers": 797,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -1194,10 +1194,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2024-11-02T06:53:10Z",
|
||||
"updated_at": "2024-11-03T06:49:43Z",
|
||||
"pushed_at": "2023-05-20T05:55:45Z",
|
||||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"stargazers_count": 547,
|
||||
"watchers_count": 547,
|
||||
"has_discussions": false,
|
||||
"forks_count": 141,
|
||||
"allow_forking": true,
|
||||
|
@ -1206,7 +1206,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 141,
|
||||
"watchers": 546,
|
||||
"watchers": 547,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
"unisoc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 37,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-24T13:54:42Z",
|
||||
"updated_at": "2024-11-01T00:26:08Z",
|
||||
"updated_at": "2024-11-03T09:13:49Z",
|
||||
"pushed_at": "2023-02-24T13:29:38Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 108,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 108,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-27T08:53:04Z",
|
||||
"updated_at": "2024-10-02T09:35:45Z",
|
||||
"updated_at": "2024-11-03T11:51:04Z",
|
||||
"pushed_at": "2023-04-04T05:26:59Z",
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 302,
|
||||
"watchers": 303,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -419,8 +419,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-20T11:57:24Z",
|
||||
"updated_at": "2024-10-09T11:24:26Z",
|
||||
"pushed_at": "2024-10-09T11:24:23Z",
|
||||
"updated_at": "2024-11-03T11:40:26Z",
|
||||
"pushed_at": "2024-11-03T11:40:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -200,8 +200,8 @@
|
|||
"description": "CVE-2024-23113-Private-POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T14:31:05Z",
|
||||
"updated_at": "2024-11-03T00:41:15Z",
|
||||
"pushed_at": "2024-10-31T17:52:19Z",
|
||||
"updated_at": "2024-11-03T12:29:02Z",
|
||||
"pushed_at": "2024-11-03T12:28:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -162,15 +162,15 @@
|
|||
{
|
||||
"id": 786291689,
|
||||
"name": "CVE-2024-24576-PoC-Python",
|
||||
"full_name": "mishalhossin\/CVE-2024-24576-PoC-Python",
|
||||
"full_name": "mishl-dev\/CVE-2024-24576-PoC-Python",
|
||||
"owner": {
|
||||
"login": "mishalhossin",
|
||||
"login": "mishl-dev",
|
||||
"id": 91066601,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91066601?v=4",
|
||||
"html_url": "https:\/\/github.com\/mishalhossin",
|
||||
"html_url": "https:\/\/github.com\/mishl-dev",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mishalhossin\/CVE-2024-24576-PoC-Python",
|
||||
"html_url": "https:\/\/github.com\/mishl-dev\/CVE-2024-24576-PoC-Python",
|
||||
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-24576",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-14T02:10:55Z",
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Windows LPE",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-11T08:03:29Z",
|
||||
"updated_at": "2024-10-22T14:29:11Z",
|
||||
"updated_at": "2024-11-03T09:01:33Z",
|
||||
"pushed_at": "2024-06-11T20:41:59Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 94,
|
||||
"watchers": 95,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -122,36 +122,5 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 879294178,
|
||||
"name": "CVE-2024-28987",
|
||||
"full_name": "hatvix1\/CVE-2024-28987",
|
||||
"owner": {
|
||||
"login": "hatvix1",
|
||||
"id": 186392026,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186392026?v=4",
|
||||
"html_url": "https:\/\/github.com\/hatvix1",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hatvix1\/CVE-2024-28987",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T14:31:40Z",
|
||||
"updated_at": "2024-11-03T00:41:14Z",
|
||||
"pushed_at": "2024-11-01T12:59:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -983,10 +983,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-11-02T08:44:49Z",
|
||||
"updated_at": "2024-11-03T09:28:40Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3491,
|
||||
"watchers_count": 3491,
|
||||
"stargazers_count": 3492,
|
||||
"watchers_count": 3492,
|
||||
"has_discussions": false,
|
||||
"forks_count": 238,
|
||||
"allow_forking": true,
|
||||
|
@ -995,7 +995,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 238,
|
||||
"watchers": 3491,
|
||||
"watchers": 3492,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 882582274,
|
||||
"name": "CVE-2024-37383-exploit",
|
||||
"full_name": "amirzargham\/CVE-2024-37383-exploit",
|
||||
"owner": {
|
||||
"login": "amirzargham",
|
||||
"id": 133110721,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133110721?v=4",
|
||||
"html_url": "https:\/\/github.com\/amirzargham",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amirzargham\/CVE-2024-37383-exploit",
|
||||
"description": "Roundcube mail server exploit for CVE-2024-37383 (Stored XSS)",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-03T07:16:46Z",
|
||||
"updated_at": "2024-11-03T07:24:35Z",
|
||||
"pushed_at": "2024-11-03T07:24:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -358,19 +358,19 @@
|
|||
"description": "potential memory corruption vulnerabilities in IPv6 networks.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-28T08:57:23Z",
|
||||
"updated_at": "2024-09-24T10:44:23Z",
|
||||
"updated_at": "2024-11-03T11:48:44Z",
|
||||
"pushed_at": "2024-08-28T09:02:59Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 5,
|
||||
"forks": 6,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -451,19 +451,19 @@
|
|||
"description": "This is a C language program designed to test the Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-01T09:20:02Z",
|
||||
"updated_at": "2024-10-21T08:10:12Z",
|
||||
"updated_at": "2024-11-03T11:52:16Z",
|
||||
"pushed_at": "2024-09-08T07:12:26Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,20 +14,20 @@
|
|||
"description": "CVE-2024-44258",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-29T09:45:03Z",
|
||||
"updated_at": "2024-11-03T05:05:20Z",
|
||||
"updated_at": "2024-11-03T11:04:21Z",
|
||||
"pushed_at": "2024-11-02T19:20:44Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 9,
|
||||
"forks": 1,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC honeypot for detecting exploit attempts against CVE-2024-47177",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-27T05:18:23Z",
|
||||
"updated_at": "2024-10-17T15:31:58Z",
|
||||
"updated_at": "2024-11-03T07:09:28Z",
|
||||
"pushed_at": "2024-09-30T04:36:30Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -61,37 +61,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 879294291,
|
||||
"name": "CVE-2024-47575",
|
||||
"full_name": "hatvix1\/CVE-2024-47575",
|
||||
"owner": {
|
||||
"login": "hatvix1",
|
||||
"id": 186392026,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186392026?v=4",
|
||||
"html_url": "https:\/\/github.com\/hatvix1",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hatvix1\/CVE-2024-47575",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T14:31:58Z",
|
||||
"updated_at": "2024-11-03T00:41:14Z",
|
||||
"pushed_at": "2024-10-31T18:01:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 879709998,
|
||||
"name": "CVE-2024-47575",
|
||||
|
@ -185,37 +154,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 881894297,
|
||||
"name": "CVE-2024-47575",
|
||||
"full_name": "Fruktolzzz\/CVE-2024-47575",
|
||||
"owner": {
|
||||
"login": "Fruktolzzz",
|
||||
"id": 95181057,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95181057?v=4",
|
||||
"html_url": "https:\/\/github.com\/Fruktolzzz",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Fruktolzzz\/CVE-2024-47575",
|
||||
"description": "CVE-2024-47575: FortiManager Missing Authentication",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-01T13:04:35Z",
|
||||
"updated_at": "2024-11-01T13:10:11Z",
|
||||
"pushed_at": "2024-11-01T13:10:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 881918245,
|
||||
"name": "CVE-2024-47575",
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Proof of concept of multiple Stored Cross-Site Scripting (XSS) vulnerabilities discovered in ACI Worldwide Proactive Risk Manager v 9.1.1.0",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T08:29:59Z",
|
||||
"updated_at": "2024-10-27T09:03:10Z",
|
||||
"pushed_at": "2024-10-27T09:00:14Z",
|
||||
"updated_at": "2024-11-03T09:33:37Z",
|
||||
"pushed_at": "2024-11-03T09:33:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,8 +14,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-30T09:53:42Z",
|
||||
"updated_at": "2024-10-30T09:55:14Z",
|
||||
"pushed_at": "2024-10-30T09:55:09Z",
|
||||
"updated_at": "2024-11-03T11:49:39Z",
|
||||
"pushed_at": "2024-11-03T11:49:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Research and PoC for CVE-2024-6386",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-05T14:44:36Z",
|
||||
"updated_at": "2024-09-16T09:45:12Z",
|
||||
"updated_at": "2024-11-03T07:36:10Z",
|
||||
"pushed_at": "2024-09-08T19:09:36Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -502,10 +502,10 @@
|
|||
"description": "Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote code execution (RCE) with root privileges. This vulnerability, identified as CVE-2024-6387, resides in the OpenSSH server component (sshd), which is designed to listen for connections from client applications.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T02:51:37Z",
|
||||
"updated_at": "2024-09-03T00:09:52Z",
|
||||
"updated_at": "2024-11-03T07:18:48Z",
|
||||
"pushed_at": "2024-07-02T03:23:00Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -514,7 +514,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -1421,10 +1421,10 @@
|
|||
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T18:32:46Z",
|
||||
"updated_at": "2024-10-24T15:36:51Z",
|
||||
"updated_at": "2024-11-03T06:33:12Z",
|
||||
"pushed_at": "2024-07-05T15:19:28Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -1442,7 +1442,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -2277,10 +2277,10 @@
|
|||
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T11:27:49Z",
|
||||
"updated_at": "2024-10-31T15:25:58Z",
|
||||
"updated_at": "2024-11-03T07:26:15Z",
|
||||
"pushed_at": "2024-08-22T08:50:25Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -2289,7 +2289,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -2687,10 +2687,10 @@
|
|||
"description": "Proof of concept python script for regreSSHion exploit. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-30T06:13:11Z",
|
||||
"updated_at": "2024-10-29T04:56:58Z",
|
||||
"updated_at": "2024-11-03T07:43:31Z",
|
||||
"pushed_at": "2024-10-19T04:58:22Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": true,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -2699,7 +2699,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -35,6 +35,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -2754,7 +2754,7 @@
|
|||
- [aydinnyunus/CVE-2024-24576-Exploit](https://github.com/aydinnyunus/CVE-2024-24576-Exploit)
|
||||
- [foxoman/CVE-2024-24576-PoC---Nim](https://github.com/foxoman/CVE-2024-24576-PoC---Nim)
|
||||
- [corysabol/batbadbut-demo](https://github.com/corysabol/batbadbut-demo)
|
||||
- [mishalhossin/CVE-2024-24576-PoC-Python](https://github.com/mishalhossin/CVE-2024-24576-PoC-Python)
|
||||
- [mishl-dev/CVE-2024-24576-PoC-Python](https://github.com/mishl-dev/CVE-2024-24576-PoC-Python)
|
||||
- [lpn/CVE-2024-24576.jl](https://github.com/lpn/CVE-2024-24576.jl)
|
||||
- [Gaurav1020/CVE-2024-24576-PoC-Rust](https://github.com/Gaurav1020/CVE-2024-24576-PoC-Rust)
|
||||
- [SheL3G/CVE-2024-24576-PoC-BatBadBut](https://github.com/SheL3G/CVE-2024-24576-PoC-BatBadBut)
|
||||
|
@ -3523,7 +3523,6 @@
|
|||
- [horizon3ai/CVE-2024-28987](https://github.com/horizon3ai/CVE-2024-28987)
|
||||
- [PlayerFridei/CVE-2024-28987](https://github.com/PlayerFridei/CVE-2024-28987)
|
||||
- [HazeLook/CVE-2024-28987](https://github.com/HazeLook/CVE-2024-28987)
|
||||
- [hatvix1/CVE-2024-28987](https://github.com/hatvix1/CVE-2024-28987)
|
||||
|
||||
### CVE-2024-28995 (2024-06-06)
|
||||
|
||||
|
@ -4706,6 +4705,7 @@
|
|||
</code>
|
||||
|
||||
- [bartfroklage/CVE-2024-37383-POC](https://github.com/bartfroklage/CVE-2024-37383-POC)
|
||||
- [amirzargham/CVE-2024-37383-exploit](https://github.com/amirzargham/CVE-2024-37383-exploit)
|
||||
|
||||
### CVE-2024-37393 (2024-06-10)
|
||||
|
||||
|
@ -5726,11 +5726,9 @@
|
|||
### CVE-2024-47575
|
||||
- [maybelookis/CVE-2024-47575](https://github.com/maybelookis/CVE-2024-47575)
|
||||
- [HazeLook/CVE-2024-47575](https://github.com/HazeLook/CVE-2024-47575)
|
||||
- [hatvix1/CVE-2024-47575](https://github.com/hatvix1/CVE-2024-47575)
|
||||
- [hazesecurity/CVE-2024-47575](https://github.com/hazesecurity/CVE-2024-47575)
|
||||
- [groshi/CVE-2024-47575-POC](https://github.com/groshi/CVE-2024-47575-POC)
|
||||
- [zgimszhd61/CVE-2024-47575-POC](https://github.com/zgimszhd61/CVE-2024-47575-POC)
|
||||
- [Fruktolzzz/CVE-2024-47575](https://github.com/Fruktolzzz/CVE-2024-47575)
|
||||
- [krmxd/CVE-2024-47575](https://github.com/krmxd/CVE-2024-47575)
|
||||
|
||||
### CVE-2024-47854
|
||||
|
|
Loading…
Add table
Reference in a new issue