mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/11/18 00:30:50
This commit is contained in:
parent
dda0c2872a
commit
0a9e90580e
27 changed files with 265 additions and 149 deletions
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2014-10069",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-07T14:37:29Z",
|
||||
"updated_at": "2024-02-22T00:18:36Z",
|
||||
"updated_at": "2024-11-17T20:08:00Z",
|
||||
"pushed_at": "2018-01-07T16:36:31Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": true,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -89,7 +89,7 @@
|
|||
"description": "An exploit for CVE-2018-5955 GitStack 2.3.10 Unauthenticated RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-23T20:25:47Z",
|
||||
"updated_at": "2024-11-15T16:36:31Z",
|
||||
"updated_at": "2024-11-17T20:05:51Z",
|
||||
"pushed_at": "2024-11-15T16:36:27Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
|
|
|
@ -2667,37 +2667,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 852063962,
|
||||
"name": "cve-2018-6574",
|
||||
"full_name": "ttyA0\/cve-2018-6574",
|
||||
"owner": {
|
||||
"login": "ttyA0",
|
||||
"id": 96278236,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96278236?v=4",
|
||||
"html_url": "https:\/\/github.com\/ttyA0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ttyA0\/cve-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-04T06:55:16Z",
|
||||
"updated_at": "2024-09-04T06:57:31Z",
|
||||
"pushed_at": "2024-09-04T06:57:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 852845799,
|
||||
"name": "CVE-2018-6574",
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-05T16:55:40Z",
|
||||
"updated_at": "2024-11-15T20:45:36Z",
|
||||
"updated_at": "2024-11-17T19:29:01Z",
|
||||
"pushed_at": "2024-08-05T18:31:16Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -274,10 +274,10 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2024-10-25T12:58:36Z",
|
||||
"updated_at": "2024-11-17T19:28:30Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 351,
|
||||
"watchers_count": 351,
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"has_discussions": false,
|
||||
"forks_count": 79,
|
||||
"allow_forking": true,
|
||||
|
@ -286,7 +286,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 79,
|
||||
"watchers": 351,
|
||||
"watchers": 352,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2024-11-16T11:36:18Z",
|
||||
"updated_at": "2024-11-17T21:55:36Z",
|
||||
"pushed_at": "2023-07-20T10:51:42Z",
|
||||
"stargazers_count": 1730,
|
||||
"watchers_count": 1730,
|
||||
"stargazers_count": 1731,
|
||||
"watchers_count": 1731,
|
||||
"has_discussions": false,
|
||||
"forks_count": 359,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 359,
|
||||
"watchers": 1730,
|
||||
"watchers": 1731,
|
||||
"score": 0,
|
||||
"subscribers_count": 86
|
||||
},
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "CVE-2021-34081",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-17T18:17:01Z",
|
||||
"updated_at": "2024-11-17T18:18:11Z",
|
||||
"pushed_at": "2024-11-17T18:17:01Z",
|
||||
"updated_at": "2024-11-17T18:21:06Z",
|
||||
"pushed_at": "2024-11-17T18:21:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1603,37 +1603,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 452478414,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "ch4rum\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "ch4rum",
|
||||
"id": 98498025,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98498025?v=4",
|
||||
"html_url": "https:\/\/github.com\/ch4rum",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ch4rum\/CVE-2021-4034",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T23:46:28Z",
|
||||
"updated_at": "2022-01-27T05:23:59Z",
|
||||
"pushed_at": "2022-01-27T02:12:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 452496340,
|
||||
"name": "CVE-2021-4034",
|
||||
|
@ -2029,6 +1998,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
{
|
||||
"id": 452738641,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "NULL0B\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "NULL0B",
|
||||
"id": 26231330,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26231330?v=4",
|
||||
"html_url": "https:\/\/github.com\/NULL0B",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NULL0B\/CVE-2021-4034",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T15:33:17Z",
|
||||
"updated_at": "2022-01-27T05:23:59Z",
|
||||
"pushed_at": "2022-01-27T02:12:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 452753346,
|
||||
"name": "CVE-2021-4034",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "The FreeBSD ICMP buffer overflow, freebsd buffer overflow poc",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-02T20:18:54Z",
|
||||
"updated_at": "2024-06-21T06:03:43Z",
|
||||
"updated_at": "2024-11-17T22:17:14Z",
|
||||
"pushed_at": "2023-03-25T17:41:13Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -38,7 +38,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -143,11 +143,11 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jenderal92\/WP-CVE-2023-28121",
|
||||
"description": "Python 2.7",
|
||||
"description": "Wordpress CVE-2023-28121",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-03T01:19:09Z",
|
||||
"updated_at": "2024-11-08T23:09:36Z",
|
||||
"pushed_at": "2023-11-03T01:21:15Z",
|
||||
"updated_at": "2024-11-17T23:56:36Z",
|
||||
"pushed_at": "2024-11-17T23:45:17Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
@ -155,7 +155,15 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"bot-auto-scanner-vuln",
|
||||
"bot-auto-upload-shell",
|
||||
"cve-2023-28121",
|
||||
"cve-wordpress",
|
||||
"exploit",
|
||||
"vulnerability",
|
||||
"wordpress"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
|
|
|
@ -263,22 +263,28 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jenderal92\/WP-CVE-2023-32243",
|
||||
"description": "Python 2.7",
|
||||
"description": "Wordpress CVE-2023-32243",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-03T04:16:16Z",
|
||||
"updated_at": "2024-07-16T13:10:27Z",
|
||||
"pushed_at": "2023-07-03T04:17:45Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"updated_at": "2024-11-18T00:07:33Z",
|
||||
"pushed_at": "2024-11-17T23:46:50Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve-2023-32243",
|
||||
"exploit-wordpress",
|
||||
"wordpress",
|
||||
"wordpress-exploit",
|
||||
"wordpress-vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -42,22 +42,29 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jenderal92\/CHAMILO-CVE-2023-34960",
|
||||
"description": "Python 2.7",
|
||||
"description": "Wordpress CVE-2023-34960",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-03T11:17:42Z",
|
||||
"updated_at": "2024-02-05T17:52:47Z",
|
||||
"pushed_at": "2023-07-03T11:19:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2024-11-18T00:05:08Z",
|
||||
"pushed_at": "2024-11-17T23:46:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve-2023-34960",
|
||||
"exploit",
|
||||
"exploit-wordpress",
|
||||
"vulnerability",
|
||||
"wordpress",
|
||||
"wordpress-vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -179,11 +179,11 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jenderal92\/WP-CVE-2023-5360",
|
||||
"description": "Python 2.7",
|
||||
"description": "Wordpress CVE-2023-5360",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-03T00:58:36Z",
|
||||
"updated_at": "2024-07-20T17:41:02Z",
|
||||
"pushed_at": "2024-02-05T10:57:32Z",
|
||||
"updated_at": "2024-11-17T23:52:22Z",
|
||||
"pushed_at": "2024-11-17T23:43:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -191,7 +191,13 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"bot-auto-upload",
|
||||
"bot-scanner-python",
|
||||
"cve-2023-5360",
|
||||
"exploit",
|
||||
"exploit-2023"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
[
|
||||
{
|
||||
"id": 889986626,
|
||||
"id": 889993152,
|
||||
"name": "CVE-2024-10793",
|
||||
"full_name": "windz3r0day\/CVE-2024-10793",
|
||||
"owner": {
|
||||
|
@ -13,11 +13,11 @@
|
|||
"html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-10793",
|
||||
"description": "CVE-2024-10793 poc exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-17T18:25:35Z",
|
||||
"updated_at": "2024-11-17T18:29:25Z",
|
||||
"pushed_at": "2024-11-17T18:29:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"created_at": "2024-11-17T18:44:53Z",
|
||||
"updated_at": "2024-11-17T19:51:56Z",
|
||||
"pushed_at": "2024-11-17T19:51:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 890042652,
|
||||
"name": "CVE-2024-10924",
|
||||
"full_name": "FoKiiin\/CVE-2024-10924",
|
||||
"owner": {
|
||||
"login": "FoKiiin",
|
||||
"id": 186207976,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186207976?v=4",
|
||||
"html_url": "https:\/\/github.com\/FoKiiin",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FoKiiin\/CVE-2024-10924",
|
||||
"description": "CVE-2024-10924 Authentication Bypass Using an Alternate Path or Channel (CWE-288)",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-17T21:29:58Z",
|
||||
"updated_at": "2024-11-17T21:35:57Z",
|
||||
"pushed_at": "2024-11-17T21:35:29Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
33
2024/CVE-2024-27821.json
Normal file
33
2024/CVE-2024-27821.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 890033348,
|
||||
"name": "CVE-2024-27821",
|
||||
"full_name": "0xilis\/CVE-2024-27821",
|
||||
"owner": {
|
||||
"login": "0xilis",
|
||||
"id": 109871561,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109871561?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xilis",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xilis\/CVE-2024-27821",
|
||||
"description": "Writeup and PoC of CVE-2024-27821, for education purposes.",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-17T20:56:41Z",
|
||||
"updated_at": "2024-11-17T21:43:39Z",
|
||||
"pushed_at": "2024-11-17T21:43:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful for security assessments.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-03T14:40:08Z",
|
||||
"updated_at": "2024-11-13T20:48:08Z",
|
||||
"updated_at": "2024-11-17T22:49:17Z",
|
||||
"pushed_at": "2024-09-24T00:27:08Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-34102: Unauthenticated Magento XXE",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-27T18:10:13Z",
|
||||
"updated_at": "2024-08-20T21:27:09Z",
|
||||
"updated_at": "2024-11-17T22:47:14Z",
|
||||
"pushed_at": "2024-08-14T15:10:47Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -169,10 +169,10 @@
|
|||
"description": "CosmicSting (CVE-2024-34102)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-28T23:33:21Z",
|
||||
"updated_at": "2024-11-08T09:32:37Z",
|
||||
"updated_at": "2024-11-17T23:35:44Z",
|
||||
"pushed_at": "2024-09-05T18:38:46Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -265,10 +265,10 @@
|
|||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T18:25:46Z",
|
||||
"updated_at": "2024-11-17T12:18:49Z",
|
||||
"updated_at": "2024-11-17T20:38:53Z",
|
||||
"pushed_at": "2024-08-27T12:22:39Z",
|
||||
"stargazers_count": 620,
|
||||
"watchers_count": 620,
|
||||
"stargazers_count": 621,
|
||||
"watchers_count": 621,
|
||||
"has_discussions": false,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
|
@ -277,7 +277,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"watchers": 620,
|
||||
"watchers": 621,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -799,8 +799,8 @@
|
|||
"description": "PoC for Windows' IPv6 CVE-2024-38063",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-16T17:22:08Z",
|
||||
"updated_at": "2024-11-16T17:25:39Z",
|
||||
"pushed_at": "2024-11-16T17:25:07Z",
|
||||
"updated_at": "2024-11-17T22:36:00Z",
|
||||
"pushed_at": "2024-11-17T22:35:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -808,7 +808,16 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"bsod",
|
||||
"bsod-crashes",
|
||||
"cve",
|
||||
"cvepoc",
|
||||
"dos",
|
||||
"ipv6",
|
||||
"ipv6-network",
|
||||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
|
|
33
2024/CVE-2024-4351.json
Normal file
33
2024/CVE-2024-4351.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 890044743,
|
||||
"name": "CVE-2024-4351",
|
||||
"full_name": "ZSECURE\/CVE-2024-4351",
|
||||
"owner": {
|
||||
"login": "ZSECURE",
|
||||
"id": 46941177,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46941177?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZSECURE",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZSECURE\/CVE-2024-4351",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-17T21:37:55Z",
|
||||
"updated_at": "2024-11-17T21:39:06Z",
|
||||
"pushed_at": "2024-11-17T21:39:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-07T21:03:30Z",
|
||||
"updated_at": "2024-11-17T14:25:31Z",
|
||||
"updated_at": "2024-11-17T19:35:45Z",
|
||||
"pushed_at": "2024-11-14T16:25:52Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-13T16:09:14Z",
|
||||
"updated_at": "2024-11-13T20:11:58Z",
|
||||
"pushed_at": "2024-11-13T17:30:07Z",
|
||||
"updated_at": "2024-11-17T21:17:07Z",
|
||||
"pushed_at": "2024-11-17T21:17:03Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Exploit for Grafana arbitrary file-read (CVE-2024-9264)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-19T13:50:52Z",
|
||||
"updated_at": "2024-11-13T07:11:18Z",
|
||||
"pushed_at": "2024-10-19T16:01:12Z",
|
||||
"updated_at": "2024-11-17T19:40:22Z",
|
||||
"pushed_at": "2024-11-17T19:40:19Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"has_discussions": false,
|
||||
|
|
18
README.md
18
README.md
|
@ -888,6 +888,13 @@
|
|||
- [d0rb/CVE-2024-4323](https://github.com/d0rb/CVE-2024-4323)
|
||||
- [yuansec/CVE-2024-4323-dos_poc](https://github.com/yuansec/CVE-2024-4323-dos_poc)
|
||||
|
||||
### CVE-2024-4351 (2024-05-16)
|
||||
|
||||
<code>The Tutor LMS Pro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on the 'authenticate' function in all versions up to, and including, 2.7.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to gain control of an existing administrator account.
|
||||
</code>
|
||||
|
||||
- [ZSECURE/CVE-2024-4351](https://github.com/ZSECURE/CVE-2024-4351)
|
||||
|
||||
### CVE-2024-4352 (2024-05-16)
|
||||
|
||||
<code>The Tutor LMS Pro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on the 'get_calendar_materials' function. The plugin is also vulnerable to SQL Injection via the ‘year’ parameter of that function due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
||||
|
@ -2021,6 +2028,7 @@
|
|||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-10924](https://github.com/RandomRobbieBF/CVE-2024-10924)
|
||||
- [FoKiiin/CVE-2024-10924](https://github.com/FoKiiin/CVE-2024-10924)
|
||||
|
||||
### CVE-2024-10958 (2024-11-10)
|
||||
|
||||
|
@ -3675,6 +3683,13 @@
|
|||
|
||||
- [jprx/CVE-2024-27815](https://github.com/jprx/CVE-2024-27815)
|
||||
|
||||
### CVE-2024-27821 (2024-05-13)
|
||||
|
||||
<code>A path handling issue was addressed with improved validation. This issue is fixed in iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. A shortcut may output sensitive user data without consent.
|
||||
</code>
|
||||
|
||||
- [0xilis/CVE-2024-27821](https://github.com/0xilis/CVE-2024-27821)
|
||||
|
||||
### CVE-2024-27914 (2024-03-18)
|
||||
|
||||
<code>GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An unauthenticated user can provide a malicious link to a GLPI administrator in order to exploit a reflected XSS vulnerability. The XSS will only trigger if the administrator navigates through the debug bar. This issue has been patched in version 10.0.13.\n
|
||||
|
@ -23036,7 +23051,6 @@
|
|||
- [vilasboasph/CVE-2021-4034](https://github.com/vilasboasph/CVE-2021-4034)
|
||||
- [nobelh/CVE-2021-4034](https://github.com/nobelh/CVE-2021-4034)
|
||||
- [callrbx/pkexec-lpe-poc](https://github.com/callrbx/pkexec-lpe-poc)
|
||||
- [ch4rum/CVE-2021-4034](https://github.com/ch4rum/CVE-2021-4034)
|
||||
- [cd80-ctf/CVE-2021-4034](https://github.com/cd80-ctf/CVE-2021-4034)
|
||||
- [Al1ex/CVE-2021-4034](https://github.com/Al1ex/CVE-2021-4034)
|
||||
- [ashutoshrohilla/CVE-2021-4034](https://github.com/ashutoshrohilla/CVE-2021-4034)
|
||||
|
@ -23049,6 +23063,7 @@
|
|||
- [tahaafarooq/poppy](https://github.com/tahaafarooq/poppy)
|
||||
- [DosAmp/pkwned](https://github.com/DosAmp/pkwned)
|
||||
- [PwnFunction/CVE-2021-4034](https://github.com/PwnFunction/CVE-2021-4034)
|
||||
- [NULL0B/CVE-2021-4034](https://github.com/NULL0B/CVE-2021-4034)
|
||||
- [locksec/CVE-2021-4034](https://github.com/locksec/CVE-2021-4034)
|
||||
- [deoxykev/CVE-2021-4034-Rust](https://github.com/deoxykev/CVE-2021-4034-Rust)
|
||||
- [c3c/CVE-2021-4034](https://github.com/c3c/CVE-2021-4034)
|
||||
|
@ -39007,7 +39022,6 @@
|
|||
- [Dannners/CVE-2018-6574-go-get-RCE](https://github.com/Dannners/CVE-2018-6574-go-get-RCE)
|
||||
- [bme2003/CVE-2018-6574](https://github.com/bme2003/CVE-2018-6574)
|
||||
- [iNoSec2/cve-2018-6574](https://github.com/iNoSec2/cve-2018-6574)
|
||||
- [ttyA0/cve-2018-6574](https://github.com/ttyA0/cve-2018-6574)
|
||||
- [faqihudin13/CVE-2018-6574](https://github.com/faqihudin13/CVE-2018-6574)
|
||||
- [lisu60/cve-2018-6574](https://github.com/lisu60/cve-2018-6574)
|
||||
- [Saboor-Hakimi/CVE-2018-6574](https://github.com/Saboor-Hakimi/CVE-2018-6574)
|
||||
|
|
Loading…
Reference in a new issue