mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 01:54:09 +01:00
Auto Update 2024/10/29 06:30:47
This commit is contained in:
parent
7578730fb1
commit
0b8e06a408
39 changed files with 166 additions and 126 deletions
|
@ -48,10 +48,10 @@
|
||||||
"description": "Exploiting CVE-2016-4657 to JailBreak the Nintendo Switch",
|
"description": "Exploiting CVE-2016-4657 to JailBreak the Nintendo Switch",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2017-06-02T10:54:27Z",
|
"created_at": "2017-06-02T10:54:27Z",
|
||||||
"updated_at": "2024-07-17T10:25:19Z",
|
"updated_at": "2024-10-29T04:41:43Z",
|
||||||
"pushed_at": "2018-02-03T14:49:44Z",
|
"pushed_at": "2018-02-03T14:49:44Z",
|
||||||
"stargazers_count": 53,
|
"stargazers_count": 54,
|
||||||
"watchers_count": 53,
|
"watchers_count": 54,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -60,7 +60,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 53,
|
"watchers": 54,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 7
|
"subscribers_count": 7
|
||||||
},
|
},
|
||||||
|
|
|
@ -1183,10 +1183,10 @@
|
||||||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-07T18:36:50Z",
|
"created_at": "2022-03-07T18:36:50Z",
|
||||||
"updated_at": "2024-10-17T02:54:10Z",
|
"updated_at": "2024-10-29T01:28:50Z",
|
||||||
"pushed_at": "2023-02-02T02:17:30Z",
|
"pushed_at": "2023-02-02T02:17:30Z",
|
||||||
"stargazers_count": 273,
|
"stargazers_count": 274,
|
||||||
"watchers_count": 273,
|
"watchers_count": 274,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 77,
|
"forks_count": 77,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -1195,7 +1195,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 77,
|
"forks": 77,
|
||||||
"watchers": 273,
|
"watchers": 274,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
},
|
},
|
||||||
|
|
|
@ -76,10 +76,10 @@
|
||||||
"description": "Unsigned driver loader using CVE-2018-19320",
|
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-11-12T05:48:13Z",
|
"created_at": "2022-11-12T05:48:13Z",
|
||||||
"updated_at": "2024-10-27T12:10:27Z",
|
"updated_at": "2024-10-29T03:31:49Z",
|
||||||
"pushed_at": "2023-04-09T13:50:29Z",
|
"pushed_at": "2023-04-09T13:50:29Z",
|
||||||
"stargazers_count": 196,
|
"stargazers_count": 197,
|
||||||
"watchers_count": 196,
|
"watchers_count": 197,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 50,
|
"forks_count": 50,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -88,7 +88,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 50,
|
"forks": 50,
|
||||||
"watchers": 196,
|
"watchers": 197,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 8
|
"subscribers_count": 8
|
||||||
}
|
}
|
||||||
|
|
|
@ -50,13 +50,13 @@
|
||||||
"stargazers_count": 4,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 4,
|
"watchers_count": 4,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 6,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 6,
|
||||||
"watchers": 4,
|
"watchers": 4,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
|
|
|
@ -262,10 +262,10 @@
|
||||||
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
|
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-06-10T05:12:44Z",
|
"created_at": "2019-06-10T05:12:44Z",
|
||||||
"updated_at": "2024-08-28T01:42:39Z",
|
"updated_at": "2024-10-29T01:02:33Z",
|
||||||
"pushed_at": "2019-06-21T03:33:05Z",
|
"pushed_at": "2019-06-21T03:33:05Z",
|
||||||
"stargazers_count": 188,
|
"stargazers_count": 189,
|
||||||
"watchers_count": 188,
|
"watchers_count": 189,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 68,
|
"forks_count": 68,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -274,7 +274,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 68,
|
"forks": 68,
|
||||||
"watchers": 188,
|
"watchers": 189,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 8
|
"subscribers_count": 8
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.",
|
"description": "TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-25T18:18:15Z",
|
"created_at": "2020-03-25T18:18:15Z",
|
||||||
"updated_at": "2024-10-01T08:41:10Z",
|
"updated_at": "2024-10-29T02:42:26Z",
|
||||||
"pushed_at": "2020-03-29T20:32:16Z",
|
"pushed_at": "2020-03-29T20:32:16Z",
|
||||||
"stargazers_count": 18,
|
"stargazers_count": 19,
|
||||||
"watchers_count": 18,
|
"watchers_count": 19,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 7,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -32,7 +32,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 7,
|
||||||
"watchers": 18,
|
"watchers": 19,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
}
|
}
|
||||||
|
|
|
@ -138,10 +138,10 @@
|
||||||
"description": "Exploit for CVE-2021-3129",
|
"description": "Exploit for CVE-2021-3129",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-01-27T10:16:35Z",
|
"created_at": "2021-01-27T10:16:35Z",
|
||||||
"updated_at": "2024-10-26T04:43:14Z",
|
"updated_at": "2024-10-29T05:00:59Z",
|
||||||
"pushed_at": "2021-03-07T04:39:58Z",
|
"pushed_at": "2021-03-07T04:39:58Z",
|
||||||
"stargazers_count": 64,
|
"stargazers_count": 65,
|
||||||
"watchers_count": 64,
|
"watchers_count": 65,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 26,
|
"forks_count": 26,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -154,7 +154,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 26,
|
"forks": 26,
|
||||||
"watchers": 64,
|
"watchers": 65,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
|
@ -76,10 +76,10 @@
|
||||||
"description": "Python script for exploiting command injection in Open PLC Webserver v3",
|
"description": "Python script for exploiting command injection in Open PLC Webserver v3",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-03-28T21:31:45Z",
|
"created_at": "2024-03-28T21:31:45Z",
|
||||||
"updated_at": "2024-10-23T15:23:50Z",
|
"updated_at": "2024-10-29T02:45:45Z",
|
||||||
"pushed_at": "2024-07-12T00:16:13Z",
|
"pushed_at": "2024-07-12T00:16:13Z",
|
||||||
"stargazers_count": 15,
|
"stargazers_count": 16,
|
||||||
"watchers_count": 15,
|
"watchers_count": 16,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 5,
|
"forks_count": 5,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -93,7 +93,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 5,
|
"forks": 5,
|
||||||
"watchers": 15,
|
"watchers": 16,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -82,10 +82,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-07-02T12:10:49Z",
|
"created_at": "2021-07-02T12:10:49Z",
|
||||||
"updated_at": "2024-10-28T20:47:31Z",
|
"updated_at": "2024-10-29T05:52:01Z",
|
||||||
"pushed_at": "2021-07-02T12:17:50Z",
|
"pushed_at": "2021-07-02T12:17:50Z",
|
||||||
"stargazers_count": 253,
|
"stargazers_count": 254,
|
||||||
"watchers_count": 253,
|
"watchers_count": 254,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 67,
|
"forks_count": 67,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -94,7 +94,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 67,
|
"forks": 67,
|
||||||
"watchers": 253,
|
"watchers": 254,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 10
|
"subscribers_count": 10
|
||||||
},
|
},
|
||||||
|
@ -113,10 +113,10 @@
|
||||||
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
|
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-07-03T15:15:12Z",
|
"created_at": "2021-07-03T15:15:12Z",
|
||||||
"updated_at": "2024-10-27T14:37:41Z",
|
"updated_at": "2024-10-29T01:18:02Z",
|
||||||
"pushed_at": "2021-09-13T12:12:17Z",
|
"pushed_at": "2021-09-13T12:12:17Z",
|
||||||
"stargazers_count": 119,
|
"stargazers_count": 120,
|
||||||
"watchers_count": 119,
|
"watchers_count": 120,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 39,
|
"forks_count": 39,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -132,7 +132,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 39,
|
"forks": 39,
|
||||||
"watchers": 119,
|
"watchers": 120,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 7
|
"subscribers_count": 7
|
||||||
},
|
},
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
|
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-10-27T15:51:12Z",
|
"created_at": "2021-10-27T15:51:12Z",
|
||||||
"updated_at": "2024-10-22T06:49:56Z",
|
"updated_at": "2024-10-29T01:49:16Z",
|
||||||
"pushed_at": "2021-10-28T06:37:37Z",
|
"pushed_at": "2021-10-28T06:37:37Z",
|
||||||
"stargazers_count": 250,
|
"stargazers_count": 251,
|
||||||
"watchers_count": 250,
|
"watchers_count": 251,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 76,
|
"forks_count": 76,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -57,7 +57,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 76,
|
"forks": 76,
|
||||||
"watchers": 250,
|
"watchers": 251,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 6
|
"subscribers_count": 6
|
||||||
},
|
},
|
||||||
|
|
|
@ -268,10 +268,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-10-05T23:53:48Z",
|
"created_at": "2021-10-05T23:53:48Z",
|
||||||
"updated_at": "2024-08-12T20:17:00Z",
|
"updated_at": "2024-10-29T01:57:23Z",
|
||||||
"pushed_at": "2021-10-06T15:37:23Z",
|
"pushed_at": "2021-10-06T15:37:23Z",
|
||||||
"stargazers_count": 36,
|
"stargazers_count": 37,
|
||||||
"watchers_count": 36,
|
"watchers_count": 37,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 22,
|
"forks_count": 22,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -280,7 +280,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 22,
|
"forks": 22,
|
||||||
"watchers": 36,
|
"watchers": 37,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -2027,10 +2027,10 @@
|
||||||
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
|
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-12T00:29:03Z",
|
"created_at": "2021-12-12T00:29:03Z",
|
||||||
"updated_at": "2024-10-28T12:44:02Z",
|
"updated_at": "2024-10-29T01:23:00Z",
|
||||||
"pushed_at": "2022-03-10T18:44:50Z",
|
"pushed_at": "2022-03-10T18:44:50Z",
|
||||||
"stargazers_count": 635,
|
"stargazers_count": 636,
|
||||||
"watchers_count": 635,
|
"watchers_count": 636,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 98,
|
"forks_count": 98,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -2051,7 +2051,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 98,
|
"forks": 98,
|
||||||
"watchers": 635,
|
"watchers": 636,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 28
|
"subscribers_count": 28
|
||||||
},
|
},
|
||||||
|
|
|
@ -76,10 +76,10 @@
|
||||||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-07T18:36:50Z",
|
"created_at": "2022-03-07T18:36:50Z",
|
||||||
"updated_at": "2024-10-17T02:54:10Z",
|
"updated_at": "2024-10-29T01:28:50Z",
|
||||||
"pushed_at": "2023-02-02T02:17:30Z",
|
"pushed_at": "2023-02-02T02:17:30Z",
|
||||||
"stargazers_count": 273,
|
"stargazers_count": 274,
|
||||||
"watchers_count": 273,
|
"watchers_count": 274,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 77,
|
"forks_count": 77,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -88,7 +88,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 77,
|
"forks": 77,
|
||||||
"watchers": 273,
|
"watchers": 274,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Let's control Secure Boot Chain ourselves.",
|
"description": "Let's control Secure Boot Chain ourselves.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-12-01T07:32:18Z",
|
"created_at": "2023-12-01T07:32:18Z",
|
||||||
"updated_at": "2024-10-25T11:39:34Z",
|
"updated_at": "2024-10-29T02:17:19Z",
|
||||||
"pushed_at": "2024-02-20T09:05:59Z",
|
"pushed_at": "2024-02-20T09:05:59Z",
|
||||||
"stargazers_count": 36,
|
"stargazers_count": 37,
|
||||||
"watchers_count": 36,
|
"watchers_count": 37,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -29,7 +29,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 8,
|
||||||
"watchers": 36,
|
"watchers": 37,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-06-10T08:31:26Z",
|
"created_at": "2023-06-10T08:31:26Z",
|
||||||
"updated_at": "2024-10-28T09:39:27Z",
|
"updated_at": "2024-10-29T02:17:36Z",
|
||||||
"pushed_at": "2024-08-01T15:09:15Z",
|
"pushed_at": "2024-08-01T15:09:15Z",
|
||||||
"stargazers_count": 281,
|
"stargazers_count": 282,
|
||||||
"watchers_count": 281,
|
"watchers_count": 282,
|
||||||
"has_discussions": true,
|
"has_discussions": true,
|
||||||
"forks_count": 40,
|
"forks_count": 40,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -29,7 +29,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 40,
|
"forks": 40,
|
||||||
"watchers": 281,
|
"watchers": 282,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 5
|
"subscribers_count": 5
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理",
|
"description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-08-04T08:22:41Z",
|
"created_at": "2022-08-04T08:22:41Z",
|
||||||
"updated_at": "2024-10-28T08:55:43Z",
|
"updated_at": "2024-10-29T03:11:00Z",
|
||||||
"pushed_at": "2022-08-19T09:04:09Z",
|
"pushed_at": "2022-08-19T09:04:09Z",
|
||||||
"stargazers_count": 298,
|
"stargazers_count": 299,
|
||||||
"watchers_count": 298,
|
"watchers_count": 299,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 39,
|
"forks_count": 39,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -34,7 +34,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 39,
|
"forks": 39,
|
||||||
"watchers": 298,
|
"watchers": 299,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 6
|
"subscribers_count": 6
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "CVE-2023-21554 Windows MessageQueuing PoC,分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
|
"description": "CVE-2023-21554 Windows MessageQueuing PoC,分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-05-18T10:30:49Z",
|
"created_at": "2023-05-18T10:30:49Z",
|
||||||
"updated_at": "2024-09-27T15:56:14Z",
|
"updated_at": "2024-10-29T04:37:17Z",
|
||||||
"pushed_at": "2023-05-18T10:38:57Z",
|
"pushed_at": "2023-05-18T10:38:57Z",
|
||||||
"stargazers_count": 54,
|
"stargazers_count": 53,
|
||||||
"watchers_count": 54,
|
"watchers_count": 53,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 15,
|
"forks_count": 15,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 15,
|
"forks": 15,
|
||||||
"watchers": 54,
|
"watchers": 53,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -19,13 +19,13 @@
|
||||||
"stargazers_count": 129,
|
"stargazers_count": 129,
|
||||||
"watchers_count": 129,
|
"watchers_count": 129,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 30,
|
"forks_count": 33,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 30,
|
"forks": 33,
|
||||||
"watchers": 129,
|
"watchers": 129,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
|
|
|
@ -59,6 +59,6 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 2,
|
"watchers": 2,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -14,7 +14,7 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-03-23T15:25:49Z",
|
"created_at": "2024-03-23T15:25:49Z",
|
||||||
"updated_at": "2024-03-23T15:34:32Z",
|
"updated_at": "2024-10-29T06:12:48Z",
|
||||||
"pushed_at": "2024-03-23T18:59:30Z",
|
"pushed_at": "2024-03-23T18:59:30Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-01-16T06:52:02Z",
|
"created_at": "2024-01-16T06:52:02Z",
|
||||||
"updated_at": "2024-10-28T14:59:57Z",
|
"updated_at": "2024-10-29T04:27:53Z",
|
||||||
"pushed_at": "2024-08-18T08:26:46Z",
|
"pushed_at": "2024-08-18T08:26:46Z",
|
||||||
"stargazers_count": 1239,
|
"stargazers_count": 1240,
|
||||||
"watchers_count": 1239,
|
"watchers_count": 1240,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 208,
|
"forks_count": 208,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 208,
|
"forks": 208,
|
||||||
"watchers": 1239,
|
"watchers": 1240,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 20
|
"subscribers_count": 20
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "ownCloud exploits for CVE-2023-49105",
|
"description": "ownCloud exploits for CVE-2023-49105",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-12-05T11:35:12Z",
|
"created_at": "2023-12-05T11:35:12Z",
|
||||||
"updated_at": "2024-09-23T20:16:00Z",
|
"updated_at": "2024-10-29T06:24:51Z",
|
||||||
"pushed_at": "2023-12-05T11:35:19Z",
|
"pushed_at": "2023-12-05T11:35:19Z",
|
||||||
"stargazers_count": 33,
|
"stargazers_count": 34,
|
||||||
"watchers_count": 33,
|
"watchers_count": 34,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 10,
|
"forks_count": 10,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 10,
|
"forks": 10,
|
||||||
"watchers": 33,
|
"watchers": 34,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -28,6 +28,6 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!",
|
"description": "ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-02-21T09:42:04Z",
|
"created_at": "2024-02-21T09:42:04Z",
|
||||||
"updated_at": "2024-10-16T08:05:48Z",
|
"updated_at": "2024-10-29T03:21:04Z",
|
||||||
"pushed_at": "2024-07-16T09:26:55Z",
|
"pushed_at": "2024-07-16T09:26:55Z",
|
||||||
"stargazers_count": 96,
|
"stargazers_count": 97,
|
||||||
"watchers_count": 96,
|
"watchers_count": 97,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 29,
|
"forks_count": 29,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -35,7 +35,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 29,
|
"forks": 29,
|
||||||
"watchers": 96,
|
"watchers": 97,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
},
|
},
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-02-16T15:17:59Z",
|
"created_at": "2024-02-16T15:17:59Z",
|
||||||
"updated_at": "2024-10-28T16:17:33Z",
|
"updated_at": "2024-10-29T03:16:26Z",
|
||||||
"pushed_at": "2024-02-19T20:00:35Z",
|
"pushed_at": "2024-02-19T20:00:35Z",
|
||||||
"stargazers_count": 683,
|
"stargazers_count": 684,
|
||||||
"watchers_count": 683,
|
"watchers_count": 684,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 151,
|
"forks_count": 151,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -57,7 +57,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 151,
|
"forks": 151,
|
||||||
"watchers": 683,
|
"watchers": 684,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 10
|
"subscribers_count": 10
|
||||||
},
|
},
|
||||||
|
@ -107,10 +107,10 @@
|
||||||
"description": "CVE-2024-21413 PoC for THM Lab",
|
"description": "CVE-2024-21413 PoC for THM Lab",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-02-17T14:52:52Z",
|
"created_at": "2024-02-17T14:52:52Z",
|
||||||
"updated_at": "2024-10-28T22:34:45Z",
|
"updated_at": "2024-10-29T03:16:03Z",
|
||||||
"pushed_at": "2024-03-13T02:44:28Z",
|
"pushed_at": "2024-03-13T02:44:28Z",
|
||||||
"stargazers_count": 35,
|
"stargazers_count": 37,
|
||||||
"watchers_count": 35,
|
"watchers_count": 37,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -119,7 +119,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 8,
|
||||||
"watchers": 35,
|
"watchers": 37,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -965,7 +965,7 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"id": 838662184,
|
"id": 838662184,
|
||||||
|
|
|
@ -1733,6 +1733,6 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -84,7 +84,7 @@
|
||||||
"stargazers_count": 144,
|
"stargazers_count": 144,
|
||||||
"watchers_count": 144,
|
"watchers_count": 144,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 34,
|
"forks_count": 35,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
|
@ -100,7 +100,7 @@
|
||||||
"teamcity"
|
"teamcity"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 34,
|
"forks": 35,
|
||||||
"watchers": 144,
|
"watchers": 144,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
|
|
33
2024/CVE-2024-27954.json
Normal file
33
2024/CVE-2024-27954.json
Normal file
|
@ -0,0 +1,33 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 880016834,
|
||||||
|
"name": "CVE-2024-27954",
|
||||||
|
"full_name": "fa-rrel\/CVE-2024-27954",
|
||||||
|
"owner": {
|
||||||
|
"login": "fa-rrel",
|
||||||
|
"id": 153366162,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-27954",
|
||||||
|
"description": "Automatic Plugin for WordPress < 3.92.1 Multiples Vulnerabilities",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-10-29T00:46:35Z",
|
||||||
|
"updated_at": "2024-10-29T03:20:20Z",
|
||||||
|
"pushed_at": "2024-10-29T02:47:13Z",
|
||||||
|
"stargazers_count": 1,
|
||||||
|
"watchers_count": 1,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 1,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -59,6 +59,6 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "CVE-2024-37085 VMware ESXi RCE Vulnerability",
|
"description": "CVE-2024-37085 VMware ESXi RCE Vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-06T18:23:43Z",
|
"created_at": "2024-08-06T18:23:43Z",
|
||||||
"updated_at": "2024-09-03T02:14:04Z",
|
"updated_at": "2024-10-29T01:26:47Z",
|
||||||
"pushed_at": "2024-08-06T18:25:19Z",
|
"pushed_at": "2024-08-06T18:25:19Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 7,
|
||||||
"watchers_count": 6,
|
"watchers_count": 7,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -57,7 +57,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 6,
|
"watchers": 7,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-02T19:57:52Z",
|
"created_at": "2024-08-02T19:57:52Z",
|
||||||
"updated_at": "2024-08-29T13:31:15Z",
|
"updated_at": "2024-10-29T00:41:05Z",
|
||||||
"pushed_at": "2024-08-02T20:01:15Z",
|
"pushed_at": "2024-08-02T20:01:15Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 2,
|
"watchers_count": 3,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 2,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "CVE-2024-40711-exp",
|
"description": "CVE-2024-40711-exp",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-16T05:02:27Z",
|
"created_at": "2024-10-16T05:02:27Z",
|
||||||
"updated_at": "2024-10-22T11:22:13Z",
|
"updated_at": "2024-10-29T06:23:21Z",
|
||||||
"pushed_at": "2024-10-17T01:06:42Z",
|
"pushed_at": "2024-10-17T01:06:42Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 7,
|
||||||
"watchers_count": 6,
|
"watchers_count": 7,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -57,7 +57,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 6,
|
"watchers": 7,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "PoC for the CVE-2024-41992 (RCE on devices running WiFi-TestSuite-DUT)",
|
"description": "PoC for the CVE-2024-41992 (RCE on devices running WiFi-TestSuite-DUT)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-23T23:48:01Z",
|
"created_at": "2024-08-23T23:48:01Z",
|
||||||
"updated_at": "2024-08-26T07:09:36Z",
|
"updated_at": "2024-10-29T05:53:49Z",
|
||||||
"pushed_at": "2024-08-26T07:09:33Z",
|
"pushed_at": "2024-08-26T07:09:33Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 0,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -1670,6 +1670,6 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -152,7 +152,7 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 5,
|
"watchers": 5,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"id": 879870262,
|
"id": 879870262,
|
||||||
|
@ -174,15 +174,15 @@
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 1,
|
||||||
"watchers": 1,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -28,6 +28,6 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -2718,10 +2718,10 @@
|
||||||
"description": "Proof of concept python script for regreSSHion exploit. ",
|
"description": "Proof of concept python script for regreSSHion exploit. ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-30T06:13:11Z",
|
"created_at": "2024-07-30T06:13:11Z",
|
||||||
"updated_at": "2024-10-22T03:06:40Z",
|
"updated_at": "2024-10-29T04:56:58Z",
|
||||||
"pushed_at": "2024-10-19T04:58:22Z",
|
"pushed_at": "2024-10-19T04:58:22Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 7,
|
||||||
"watchers_count": 6,
|
"watchers_count": 7,
|
||||||
"has_discussions": true,
|
"has_discussions": true,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -2730,7 +2730,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 6,
|
"watchers": 7,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -3335,6 +3335,13 @@
|
||||||
|
|
||||||
- [jprx/CVE-2024-27815](https://github.com/jprx/CVE-2024-27815)
|
- [jprx/CVE-2024-27815](https://github.com/jprx/CVE-2024-27815)
|
||||||
|
|
||||||
|
### CVE-2024-27954 (2024-05-17)
|
||||||
|
|
||||||
|
<code>Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP Automatic Automatic allows Path Traversal, Server Side Request Forgery.This issue affects Automatic: from n/a through 3.92.0.
|
||||||
|
</code>
|
||||||
|
|
||||||
|
- [fa-rrel/CVE-2024-27954](https://github.com/fa-rrel/CVE-2024-27954)
|
||||||
|
|
||||||
### CVE-2024-27956 (2024-03-21)
|
### CVE-2024-27956 (2024-03-21)
|
||||||
|
|
||||||
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.\n\n
|
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.\n\n
|
||||||
|
|
Loading…
Add table
Reference in a new issue