mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/12 18:33:03
This commit is contained in:
parent
eca778046c
commit
145ce69511
49 changed files with 190 additions and 154 deletions
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -59,7 +59,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 108
|
||||
"subscribers_count": 107
|
||||
},
|
||||
{
|
||||
"id": 7564614,
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 110
|
||||
"subscribers_count": 109
|
||||
}
|
||||
]
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 109
|
||||
"subscribers_count": 108
|
||||
}
|
||||
]
|
|
@ -417,10 +417,10 @@
|
|||
"description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2024-12-08T08:50:03Z",
|
||||
"updated_at": "2024-12-12T15:55:33Z",
|
||||
"pushed_at": "2024-11-13T03:12:58Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -437,7 +437,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -205,10 +205,10 @@
|
|||
"description": "iis6 exploit 2017 CVE-2017-7269",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-05T23:21:12Z",
|
||||
"updated_at": "2024-11-18T05:25:32Z",
|
||||
"updated_at": "2024-12-12T16:04:23Z",
|
||||
"pushed_at": "2023-02-04T09:09:35Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -217,7 +217,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -391,10 +391,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T04:11:45Z",
|
||||
"updated_at": "2024-08-12T19:38:07Z",
|
||||
"updated_at": "2024-12-12T16:02:23Z",
|
||||
"pushed_at": "2018-04-28T04:47:05Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -403,7 +403,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-12T05:48:13Z",
|
||||
"updated_at": "2024-12-07T06:34:43Z",
|
||||
"updated_at": "2024-12-12T12:16:18Z",
|
||||
"pushed_at": "2023-04-09T13:50:29Z",
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 212,
|
||||
"watchers": 211,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-16T14:45:44Z",
|
||||
"updated_at": "2024-08-12T19:44:55Z",
|
||||
"updated_at": "2024-12-12T12:22:56Z",
|
||||
"pushed_at": "2020-10-20T14:30:01Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 75,
|
||||
"watchers": 74,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
"subscribers_count": 6
|
||||
}
|
||||
]
|
|
@ -50,7 +50,7 @@
|
|||
"stargazers_count": 311,
|
||||
"watchers_count": 311,
|
||||
"has_discussions": false,
|
||||
"forks_count": 94,
|
||||
"forks_count": 88,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -67,7 +67,7 @@
|
|||
"security-1266"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 94,
|
||||
"forks": 88,
|
||||
"watchers": 311,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -180,13 +180,13 @@
|
|||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"forks": 22,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "USB device fuzzing on Android Phone",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-05T05:45:29Z",
|
||||
"updated_at": "2024-08-12T19:59:44Z",
|
||||
"updated_at": "2024-12-12T14:13:19Z",
|
||||
"pushed_at": "2021-10-16T15:23:41Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -324,8 +324,8 @@
|
|||
"description": "This repo contains both the exploit and the explaination of how this vulnerability is exploited",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-11T13:33:42Z",
|
||||
"updated_at": "2024-12-11T13:33:46Z",
|
||||
"pushed_at": "2024-12-11T13:33:42Z",
|
||||
"updated_at": "2024-12-12T16:25:42Z",
|
||||
"pushed_at": "2024-12-12T16:25:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -981,10 +981,10 @@
|
|||
"description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2024-12-08T08:50:03Z",
|
||||
"updated_at": "2024-12-12T15:55:33Z",
|
||||
"pushed_at": "2024-11-13T03:12:58Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -1001,7 +1001,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -49,7 +49,7 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2024-12-05T15:38:57Z",
|
||||
"updated_at": "2024-12-12T17:05:22Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1973,
|
||||
"watchers_count": 1973,
|
||||
|
|
|
@ -231,10 +231,10 @@
|
|||
"description": "CVE-2021-40438 Apache <= 2.4.48 SSRF exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-12T11:56:23Z",
|
||||
"updated_at": "2024-10-25T15:20:44Z",
|
||||
"updated_at": "2024-12-12T14:13:00Z",
|
||||
"pushed_at": "2023-12-12T12:29:24Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -251,7 +251,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 1346,
|
||||
"watchers_count": 1346,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"forks_count": 322,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"forks": 322,
|
||||
"watchers": 1346,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
|
|
|
@ -1307,7 +1307,7 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2024-12-11T08:54:15Z",
|
||||
"updated_at": "2024-12-12T17:05:21Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 802,
|
||||
"watchers_count": 802,
|
||||
|
|
|
@ -58,13 +58,13 @@
|
|||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -143,13 +143,13 @@
|
|||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"forks": 11,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2022-2586: Linux kernel nft_object UAF",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-03T19:04:31Z",
|
||||
"updated_at": "2024-12-11T15:49:41Z",
|
||||
"updated_at": "2024-12-12T15:10:18Z",
|
||||
"pushed_at": "2022-09-03T19:06:45Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2024-12-11T02:33:29Z",
|
||||
"updated_at": "2024-12-12T17:05:24Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1176,
|
||||
"watchers_count": 1176,
|
||||
"stargazers_count": 1172,
|
||||
"watchers_count": 1172,
|
||||
"has_discussions": true,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 190,
|
||||
"watchers": 1176,
|
||||
"watchers": 1172,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -852,7 +852,7 @@
|
|||
"description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-02T12:33:18Z",
|
||||
"updated_at": "2024-11-27T14:51:07Z",
|
||||
"updated_at": "2024-12-12T17:05:24Z",
|
||||
"pushed_at": "2023-04-13T16:46:26Z",
|
||||
"stargazers_count": 396,
|
||||
"watchers_count": 396,
|
||||
|
|
|
@ -391,10 +391,10 @@
|
|||
"description": "通过 jvm 启动参数 以及 jps pid进行拦截非法参数",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-20T13:05:24Z",
|
||||
"updated_at": "2024-01-12T15:42:59Z",
|
||||
"updated_at": "2024-12-12T14:31:34Z",
|
||||
"pushed_at": "2022-10-21T03:46:50Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -405,7 +405,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-11T15:04:51Z",
|
||||
"updated_at": "2024-12-12T02:23:56Z",
|
||||
"updated_at": "2024-12-12T17:05:08Z",
|
||||
"pushed_at": "2024-01-09T21:11:58Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -541,15 +541,15 @@
|
|||
{
|
||||
"id": 617968206,
|
||||
"name": "CVE-2023-23397",
|
||||
"full_name": "shaolinsec\/CVE-2023-23397",
|
||||
"full_name": "stevesec\/CVE-2023-23397",
|
||||
"owner": {
|
||||
"login": "shaolinsec",
|
||||
"login": "stevesec",
|
||||
"id": 80222096,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80222096?v=4",
|
||||
"html_url": "https:\/\/github.com\/shaolinsec",
|
||||
"html_url": "https:\/\/github.com\/stevesec",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shaolinsec\/CVE-2023-23397",
|
||||
"html_url": "https:\/\/github.com\/stevesec\/CVE-2023-23397",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T13:40:18Z",
|
||||
|
|
|
@ -663,10 +663,10 @@
|
|||
"description": "This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-03T21:14:05Z",
|
||||
"updated_at": "2024-12-12T07:41:54Z",
|
||||
"updated_at": "2024-12-12T17:05:26Z",
|
||||
"pushed_at": "2023-09-08T06:15:42Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -675,7 +675,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 1290,
|
||||
"watchers_count": 1290,
|
||||
"has_discussions": false,
|
||||
"forks_count": 219,
|
||||
"forks_count": 220,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 219,
|
||||
"forks": 220,
|
||||
"watchers": 1290,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2023-6241 for Pixel 8",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-02T02:17:31Z",
|
||||
"updated_at": "2024-11-19T16:35:45Z",
|
||||
"updated_at": "2024-12-12T16:41:59Z",
|
||||
"pushed_at": "2024-10-17T19:39:45Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -267,8 +267,8 @@
|
|||
"description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-11T18:13:32Z",
|
||||
"updated_at": "2024-12-11T19:30:50Z",
|
||||
"pushed_at": "2024-12-11T19:22:20Z",
|
||||
"updated_at": "2024-12-12T15:48:13Z",
|
||||
"pushed_at": "2024-12-12T15:48:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": " Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 – 9.1.1.1 – Authentication Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-14T16:59:52Z",
|
||||
"updated_at": "2024-11-21T00:35:21Z",
|
||||
"updated_at": "2024-12-12T13:40:41Z",
|
||||
"pushed_at": "2024-11-14T17:00:59Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-29T06:13:36Z",
|
||||
"updated_at": "2024-12-12T06:01:40Z",
|
||||
"updated_at": "2024-12-12T14:13:59Z",
|
||||
"pushed_at": "2024-12-04T01:01:28Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T18:42:43Z",
|
||||
"updated_at": "2024-12-11T23:45:35Z",
|
||||
"updated_at": "2024-12-12T16:35:40Z",
|
||||
"pushed_at": "2024-12-11T23:45:31Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-08T02:31:41Z",
|
||||
"updated_at": "2024-11-29T05:01:59Z",
|
||||
"updated_at": "2024-12-12T13:01:40Z",
|
||||
"pushed_at": "2024-03-12T13:33:58Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T15:17:59Z",
|
||||
"updated_at": "2024-12-12T07:41:57Z",
|
||||
"updated_at": "2024-12-12T17:05:29Z",
|
||||
"pushed_at": "2024-02-19T20:00:35Z",
|
||||
"stargazers_count": 707,
|
||||
"watchers_count": 707,
|
||||
"stargazers_count": 708,
|
||||
"watchers_count": 708,
|
||||
"has_discussions": false,
|
||||
"forks_count": 153,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 153,
|
||||
"watchers": 707,
|
||||
"watchers": 708,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Proof of concept of the CVE-2024-24549, Exploit in Python. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-09T04:59:07Z",
|
||||
"updated_at": "2024-12-12T06:53:35Z",
|
||||
"updated_at": "2024-12-12T13:53:58Z",
|
||||
"pushed_at": "2024-12-09T05:09:43Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Exploit PoC for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T19:33:08Z",
|
||||
"updated_at": "2024-12-12T07:38:14Z",
|
||||
"updated_at": "2024-12-12T16:39:07Z",
|
||||
"pushed_at": "2024-05-19T07:12:00Z",
|
||||
"stargazers_count": 516,
|
||||
"watchers_count": 516,
|
||||
"stargazers_count": 517,
|
||||
"watchers_count": 517,
|
||||
"has_discussions": false,
|
||||
"forks_count": 145,
|
||||
"allow_forking": true,
|
||||
|
@ -93,7 +93,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 145,
|
||||
"watchers": 516,
|
||||
"watchers": 517,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-32640 | Automated SQLi Exploitation PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-16T01:02:32Z",
|
||||
"updated_at": "2024-11-20T16:30:46Z",
|
||||
"updated_at": "2024-12-12T13:46:58Z",
|
||||
"pushed_at": "2024-05-16T21:07:32Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -38,7 +38,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-13T19:30:20Z",
|
||||
"updated_at": "2024-12-09T21:37:48Z",
|
||||
"updated_at": "2024-12-12T17:02:29Z",
|
||||
"pushed_at": "2024-11-29T16:56:23Z",
|
||||
"stargazers_count": 218,
|
||||
"watchers_count": 218,
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 218,
|
||||
"watchers": 219,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -123,6 +123,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 901596404,
|
||||
"name": "Zabbix---CVE-2024-42327",
|
||||
"full_name": "itform-fr\/Zabbix---CVE-2024-42327",
|
||||
"owner": {
|
||||
"login": "itform-fr",
|
||||
"id": 131718750,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131718750?v=4",
|
||||
"html_url": "https:\/\/github.com\/itform-fr",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/itform-fr\/Zabbix---CVE-2024-42327",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-11T00:39:26Z",
|
||||
"updated_at": "2024-12-12T16:27:33Z",
|
||||
"pushed_at": "2024-12-11T00:46:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 902138431,
|
||||
"name": "CVE-2024-42327",
|
||||
|
@ -138,18 +169,18 @@
|
|||
"description": "writeup cve-2024-42327",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-12T01:32:26Z",
|
||||
"updated_at": "2024-12-12T04:09:28Z",
|
||||
"pushed_at": "2024-12-12T04:09:24Z",
|
||||
"updated_at": "2024-12-12T18:15:09Z",
|
||||
"pushed_at": "2024-12-12T18:15:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-13T00:41:32Z",
|
||||
"updated_at": "2024-12-08T22:58:04Z",
|
||||
"updated_at": "2024-12-12T16:00:05Z",
|
||||
"pushed_at": "2024-10-01T00:57:03Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 53,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for CVE-2024-48990",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-20T18:41:25Z",
|
||||
"updated_at": "2024-12-12T04:14:49Z",
|
||||
"updated_at": "2024-12-12T13:17:01Z",
|
||||
"pushed_at": "2024-11-20T18:49:33Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 88,
|
||||
"watchers": 89,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -543,13 +543,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-11T14:19:55Z",
|
||||
"updated_at": "2024-12-12T09:59:03Z",
|
||||
"updated_at": "2024-12-12T15:14:47Z",
|
||||
"pushed_at": "2024-12-11T14:23:19Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-54679)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-06T06:02:34Z",
|
||||
"updated_at": "2024-12-08T09:23:19Z",
|
||||
"updated_at": "2024-12-12T13:07:15Z",
|
||||
"pushed_at": "2024-12-06T06:19:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-01T10:59:45Z",
|
||||
"updated_at": "2024-10-15T14:33:18Z",
|
||||
"updated_at": "2024-12-12T12:53:59Z",
|
||||
"pushed_at": "2024-09-01T11:07:15Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
11
README.md
11
README.md
|
@ -2408,7 +2408,7 @@
|
|||
|
||||
### CVE-2024-20767 (2024-03-18)
|
||||
|
||||
<code>ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could lead to arbitrary file system read. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access to sensitive files and perform arbitrary file system write. Exploitation of this issue does not require user interaction.
|
||||
<code>ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet.
|
||||
</code>
|
||||
|
||||
- [yoryio/CVE-2024-20767](https://github.com/yoryio/CVE-2024-20767)
|
||||
|
@ -6133,6 +6133,7 @@
|
|||
- [compr00t/CVE-2024-42327](https://github.com/compr00t/CVE-2024-42327)
|
||||
- [depers-rus/CVE-2024-42327](https://github.com/depers-rus/CVE-2024-42327)
|
||||
- [watchdog1337/CVE-2024-42327_Zabbix_SQLI](https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI)
|
||||
- [itform-fr/Zabbix---CVE-2024-42327](https://github.com/itform-fr/Zabbix---CVE-2024-42327)
|
||||
- [igorbf495/CVE-2024-42327](https://github.com/igorbf495/CVE-2024-42327)
|
||||
|
||||
### CVE-2024-42346 (2024-09-20)
|
||||
|
@ -7399,7 +7400,11 @@
|
|||
|
||||
- [hotplugin0x01/CVE-2024-54679](https://github.com/hotplugin0x01/CVE-2024-54679)
|
||||
|
||||
### CVE-2024-55099
|
||||
### CVE-2024-55099 (2024-12-12)
|
||||
|
||||
<code>A SQL Injection vulnerability was found in /admin/index.php in phpgurukul Online Nurse Hiring System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the username parameter.
|
||||
</code>
|
||||
|
||||
- [kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-](https://github.com/kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-)
|
||||
|
||||
### CVE-2024-55557
|
||||
|
@ -9789,7 +9794,7 @@
|
|||
- [SecCTechs/CVE-2023-23397](https://github.com/SecCTechs/CVE-2023-23397)
|
||||
- [tiepologian/CVE-2023-23397](https://github.com/tiepologian/CVE-2023-23397)
|
||||
- [BronzeBee/cve-2023-23397](https://github.com/BronzeBee/cve-2023-23397)
|
||||
- [shaolinsec/CVE-2023-23397](https://github.com/shaolinsec/CVE-2023-23397)
|
||||
- [stevesec/CVE-2023-23397](https://github.com/stevesec/CVE-2023-23397)
|
||||
- [Cyb3rMaddy/CVE-2023-23397-Report](https://github.com/Cyb3rMaddy/CVE-2023-23397-Report)
|
||||
- [Zeppperoni/CVE-2023-23397-Patch](https://github.com/Zeppperoni/CVE-2023-23397-Patch)
|
||||
- [jacquesquail/CVE-2023-23397](https://github.com/jacquesquail/CVE-2023-23397)
|
||||
|
|
Loading…
Reference in a new issue