mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/02/07 18:26:20
This commit is contained in:
parent
f0c89bd5e1
commit
1bf9ccc515
46 changed files with 285 additions and 262 deletions
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 382165102,
|
||||
"name": "distccd_rce_CVE-2004-2687",
|
||||
"full_name": "n3ov4n1sh\/distccd_rce_CVE-2004-2687",
|
||||
"full_name": "c0d3cr4f73r\/distccd_rce_CVE-2004-2687",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/distccd_rce_CVE-2004-2687",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/distccd_rce_CVE-2004-2687",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T21:56:34Z",
|
||||
|
|
|
@ -692,14 +692,14 @@
|
|||
{
|
||||
"id": 557398595,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "n3ov4n1sh\/CVE-2007-2447",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2007-2447",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2007-2447",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-25T16:05:16Z",
|
||||
|
|
|
@ -32,14 +32,14 @@
|
|||
{
|
||||
"id": 386447803,
|
||||
"name": "CVE-2009-2265",
|
||||
"full_name": "n3ov4n1sh\/CVE-2009-2265",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2009-2265",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2009-2265",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2009-2265",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-15T23:14:11Z",
|
||||
|
|
|
@ -32,14 +32,14 @@
|
|||
{
|
||||
"id": 384774726,
|
||||
"name": "CVE-2011-1249",
|
||||
"full_name": "n3ov4n1sh\/CVE-2011-1249",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2011-1249",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2011-1249",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2011-1249",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-10T19:27:23Z",
|
||||
|
|
|
@ -1694,14 +1694,14 @@
|
|||
{
|
||||
"id": 485013657,
|
||||
"name": "CVE-2014-0160_Heartbleed",
|
||||
"full_name": "n3ov4n1sh\/CVE-2014-0160_Heartbleed",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2014-0160_Heartbleed",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2014-0160_Heartbleed",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2014-0160_Heartbleed",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-24T11:53:16Z",
|
||||
|
|
|
@ -244,14 +244,14 @@
|
|||
{
|
||||
"id": 385080605,
|
||||
"name": "CVE-2015-1635-POC",
|
||||
"full_name": "n3ov4n1sh\/CVE-2015-1635-POC",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2015-1635-POC",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2015-1635-POC",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2015-1635-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-12T00:23:30Z",
|
||||
|
@ -274,14 +274,14 @@
|
|||
{
|
||||
"id": 385082908,
|
||||
"name": "CVE-2015-1635",
|
||||
"full_name": "n3ov4n1sh\/CVE-2015-1635",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2015-1635",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2015-1635",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2015-1635",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-12T00:37:54Z",
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T14:19:51Z",
|
||||
"updated_at": "2024-02-07T09:59:42Z",
|
||||
"updated_at": "2024-02-07T13:33:54Z",
|
||||
"pushed_at": "2018-04-07T01:10:06Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -92,7 +92,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 123,
|
||||
"watchers": 122,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -32,14 +32,14 @@
|
|||
{
|
||||
"id": 386433999,
|
||||
"name": "CVE-2015-6668",
|
||||
"full_name": "n3ov4n1sh\/CVE-2015-6668",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2015-6668",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2015-6668",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2015-6668",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-15T21:58:15Z",
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 615366361,
|
||||
"name": "CVE-2016-1531",
|
||||
"full_name": "n3ov4n1sh\/CVE-2016-1531",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2016-1531",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2016-1531",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2016-1531",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-17T14:30:15Z",
|
||||
|
|
|
@ -62,14 +62,14 @@
|
|||
{
|
||||
"id": 384203070,
|
||||
"name": "MS17-010_CVE-2017-0143",
|
||||
"full_name": "n3ov4n1sh\/MS17-010_CVE-2017-0143",
|
||||
"full_name": "c0d3cr4f73r\/MS17-010_CVE-2017-0143",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/MS17-010_CVE-2017-0143",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/MS17-010_CVE-2017-0143",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-08T17:35:50Z",
|
||||
|
|
|
@ -113,10 +113,10 @@
|
|||
"description": "BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities. Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found. Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) can be found (for Amazon Echo, and Samsung Gear S3). Under 'l2cap_infra' a general testing framework to send and receive raw l2cap messages (using scapy) can be found. Under 'nRF24_BDADDR_Sniffer' a tool to capture bluetooth mac addresses (BDADDR) over the air, using a nRF24L01 chip For more details on BlueBorne, you may read the full technical white paper available here: https:\/\/www.armis.com\/blueborne\/ In addition a several detailed blog posts on the exploitation of these vulnerability can be found here: https:\/\/www.armis.com\/blog\/ =============== Dependencies:",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-12T07:21:08Z",
|
||||
"updated_at": "2023-11-03T07:17:12Z",
|
||||
"updated_at": "2024-02-07T15:04:40Z",
|
||||
"pushed_at": "2020-11-04T16:49:05Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -125,7 +125,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -427,14 +427,14 @@
|
|||
{
|
||||
"id": 386542444,
|
||||
"name": "CVE-2017-7269",
|
||||
"full_name": "n3ov4n1sh\/CVE-2017-7269",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2017-7269",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2017-7269",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2017-7269",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-16T07:02:27Z",
|
||||
|
|
|
@ -256,14 +256,14 @@
|
|||
{
|
||||
"id": 445751273,
|
||||
"name": "CVE-2018-16763",
|
||||
"full_name": "n3ov4n1sh\/CVE-2018-16763",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2018-16763",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2018-16763",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2018-16763",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-08T07:15:24Z",
|
||||
|
|
|
@ -641,14 +641,14 @@
|
|||
{
|
||||
"id": 377824354,
|
||||
"name": "CVE-2019-14287",
|
||||
"full_name": "n3ov4n1sh\/CVE-2019-14287",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2019-14287",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2019-14287",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2019-14287",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-17T12:33:08Z",
|
||||
|
|
|
@ -275,14 +275,14 @@
|
|||
{
|
||||
"id": 387298591,
|
||||
"name": "CVE-2019-16278",
|
||||
"full_name": "n3ov4n1sh\/CVE-2019-16278",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2019-16278",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2019-16278",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2019-16278",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-19T00:45:07Z",
|
||||
|
|
|
@ -667,14 +667,14 @@
|
|||
{
|
||||
"id": 384265226,
|
||||
"name": "CVE-2019-5736",
|
||||
"full_name": "n3ov4n1sh\/CVE-2019-5736",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2019-5736",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2019-5736",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2019-5736",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-08T22:46:30Z",
|
||||
|
|
|
@ -97,14 +97,14 @@
|
|||
{
|
||||
"id": 384531590,
|
||||
"name": "CVE-2019-6447",
|
||||
"full_name": "n3ov4n1sh\/CVE-2019-6447",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2019-6447",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2019-6447",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2019-6447",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-09T19:21:29Z",
|
||||
|
|
|
@ -32,14 +32,14 @@
|
|||
{
|
||||
"id": 387264720,
|
||||
"name": "CVE-2019-9053",
|
||||
"full_name": "n3ov4n1sh\/CVE-2019-9053",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2019-9053",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2019-9053",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2019-9053",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-18T20:37:30Z",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T11:53:57Z",
|
||||
"updated_at": "2023-12-11T06:17:34Z",
|
||||
"updated_at": "2024-02-07T16:22:46Z",
|
||||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -40,7 +40,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 164,
|
||||
"watchers": 165,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -1,38 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 499846982,
|
||||
"name": "Follina",
|
||||
"full_name": "AbdulRKB\/Follina",
|
||||
"owner": {
|
||||
"login": "AbdulRKB",
|
||||
"id": 82715493,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82715493?v=4",
|
||||
"html_url": "https:\/\/github.com\/AbdulRKB"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AbdulRKB\/Follina",
|
||||
"description": "Remote Access Shell for Windows (based on cve-2021-30190)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-04T14:18:38Z",
|
||||
"updated_at": "2024-02-02T11:56:50Z",
|
||||
"pushed_at": "2023-12-31T19:03:45Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2022-30190",
|
||||
"follina",
|
||||
"mstd",
|
||||
"reverse-shell",
|
||||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -79,10 +79,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2024-02-07T11:50:20Z",
|
||||
"updated_at": "2024-02-07T13:46:43Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1890,
|
||||
"watchers_count": 1890,
|
||||
"stargazers_count": 1889,
|
||||
"watchers_count": 1889,
|
||||
"has_discussions": false,
|
||||
"forks_count": 517,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 517,
|
||||
"watchers": 1890,
|
||||
"watchers": 1889,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
@ -897,14 +897,14 @@
|
|||
{
|
||||
"id": 452291757,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "n3ov4n1sh\/CVE-2021-4034",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2021-4034",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2021-4034",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T13:45:17Z",
|
||||
|
@ -938,10 +938,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2024-02-06T23:32:28Z",
|
||||
"updated_at": "2024-02-07T16:18:45Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 949,
|
||||
"watchers_count": 949,
|
||||
"stargazers_count": 950,
|
||||
"watchers_count": 950,
|
||||
"has_discussions": false,
|
||||
"forks_count": 181,
|
||||
"allow_forking": true,
|
||||
|
@ -952,7 +952,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 181,
|
||||
"watchers": 949,
|
||||
"watchers": 950,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
@ -4540,14 +4540,14 @@
|
|||
{
|
||||
"id": 604329826,
|
||||
"name": "CVE-2021-4034_Python3",
|
||||
"full_name": "n3ov4n1sh\/CVE-2021-4034_Python3",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2021-4034_Python3",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2021-4034_Python3",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2021-4034_Python3",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-20T20:39:32Z",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache Log4j 远程代码执行",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-09T15:27:38Z",
|
||||
"updated_at": "2024-01-31T19:25:18Z",
|
||||
"updated_at": "2024-02-07T13:52:40Z",
|
||||
"pushed_at": "2023-05-14T04:54:32Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -374,7 +374,7 @@
|
|||
"stargazers_count": 1081,
|
||||
"watchers_count": 1081,
|
||||
"has_discussions": false,
|
||||
"forks_count": 521,
|
||||
"forks_count": 522,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -382,7 +382,7 @@
|
|||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 521,
|
||||
"forks": 522,
|
||||
"watchers": 1081,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
|
@ -857,10 +857,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2024-02-03T19:20:32Z",
|
||||
"updated_at": "2024-02-07T16:22:45Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 915,
|
||||
"watchers_count": 915,
|
||||
"stargazers_count": 916,
|
||||
"watchers_count": 916,
|
||||
"has_discussions": false,
|
||||
"forks_count": 143,
|
||||
"allow_forking": true,
|
||||
|
@ -889,7 +889,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 143,
|
||||
"watchers": 915,
|
||||
"watchers": 916,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
},
|
||||
|
@ -3666,10 +3666,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2024-02-04T22:43:57Z",
|
||||
"updated_at": "2024-02-07T13:46:42Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3331,
|
||||
"watchers_count": 3331,
|
||||
"stargazers_count": 3330,
|
||||
"watchers_count": 3330,
|
||||
"has_discussions": true,
|
||||
"forks_count": 749,
|
||||
"allow_forking": true,
|
||||
|
@ -3678,7 +3678,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 749,
|
||||
"watchers": 3331,
|
||||
"watchers": 3330,
|
||||
"score": 0,
|
||||
"subscribers_count": 58
|
||||
},
|
||||
|
@ -9786,10 +9786,10 @@
|
|||
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-24T13:18:49Z",
|
||||
"updated_at": "2024-01-25T08:55:14Z",
|
||||
"updated_at": "2024-02-07T14:00:22Z",
|
||||
"pushed_at": "2024-01-04T17:12:05Z",
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -9798,7 +9798,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 132,
|
||||
"watchers": 133,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-19T08:10:46Z",
|
||||
"updated_at": "2024-01-26T12:07:52Z",
|
||||
"updated_at": "2024-02-07T16:22:44Z",
|
||||
"pushed_at": "2022-09-04T17:28:56Z",
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -41,7 +41,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 319,
|
||||
"watchers": 320,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -1409,10 +1409,10 @@
|
|||
"description": "Just simple PoC for the Atlassian Jira exploit. Provides code execution for unauthorised user on a server.",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-15T10:06:15Z",
|
||||
"updated_at": "2023-04-11T18:37:11Z",
|
||||
"updated_at": "2024-02-07T13:03:55Z",
|
||||
"pushed_at": "2022-07-21T14:24:29Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -1421,7 +1421,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -256,14 +256,14 @@
|
|||
{
|
||||
"id": 485156953,
|
||||
"name": "CVE-2022-29464",
|
||||
"full_name": "n3ov4n1sh\/CVE-2022-29464",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2022-29464",
|
||||
"owner": {
|
||||
"login": "n3ov4n1sh",
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh"
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n3ov4n1sh\/CVE-2022-29464",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2022-29464",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-24T22:40:38Z",
|
||||
|
|
|
@ -1224,6 +1224,42 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 499846982,
|
||||
"name": "Follina",
|
||||
"full_name": "AbdulRKB\/Follina",
|
||||
"owner": {
|
||||
"login": "AbdulRKB",
|
||||
"id": 82715493,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82715493?v=4",
|
||||
"html_url": "https:\/\/github.com\/AbdulRKB"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AbdulRKB\/Follina",
|
||||
"description": "Remote Access Shell for Windows (based on cve-2022-30190)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-04T14:18:38Z",
|
||||
"updated_at": "2024-02-07T17:00:53Z",
|
||||
"pushed_at": "2023-12-31T19:03:45Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2022-30190",
|
||||
"follina",
|
||||
"mstd",
|
||||
"reverse-shell",
|
||||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 499922590,
|
||||
"name": "CVE-2022-30190",
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"forks": 46,
|
||||
"watchers": 158,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
|
|
|
@ -1030,10 +1030,10 @@
|
|||
"description": "text4shell(CVE-2022-42889) BurpSuite Scanner",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-09T08:18:19Z",
|
||||
"updated_at": "2023-08-09T17:41:46Z",
|
||||
"updated_at": "2024-02-07T14:20:28Z",
|
||||
"pushed_at": "2022-12-09T09:08:13Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1045,7 +1045,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux Bluetooth - Run arbitrary management commands as an unprivileged user",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-16T10:05:13Z",
|
||||
"updated_at": "2023-12-13T03:14:42Z",
|
||||
"updated_at": "2024-02-07T15:04:54Z",
|
||||
"pushed_at": "2023-05-31T16:06:34Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -227,10 +227,10 @@
|
|||
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-06T15:09:33Z",
|
||||
"updated_at": "2024-02-07T10:56:31Z",
|
||||
"updated_at": "2024-02-07T14:33:23Z",
|
||||
"pushed_at": "2024-02-06T15:56:12Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -239,7 +239,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -471,13 +471,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -470,10 +470,10 @@
|
|||
"description": "Joomla! < 4.2.8 - Unauthenticated information disclosure",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-24T11:50:16Z",
|
||||
"updated_at": "2024-02-01T13:39:39Z",
|
||||
"updated_at": "2024-02-07T15:04:53Z",
|
||||
"pushed_at": "2023-12-27T11:30:46Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -489,7 +489,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-22T19:44:08Z",
|
||||
"updated_at": "2024-01-24T11:22:56Z",
|
||||
"updated_at": "2024-02-07T13:46:48Z",
|
||||
"pushed_at": "2023-03-07T10:43:36Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 106,
|
||||
"watchers": 105,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Unauthenticated RCE in ZoneMinder Snapshots - Poc Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-11T19:23:13Z",
|
||||
"updated_at": "2024-02-01T14:29:39Z",
|
||||
"updated_at": "2024-02-07T13:28:56Z",
|
||||
"pushed_at": "2023-12-11T20:27:56Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -736,10 +736,10 @@
|
|||
"description": "CVE-2023-38831 WinRaR Exploit Generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-12T14:07:00Z",
|
||||
"updated_at": "2023-12-12T17:45:00Z",
|
||||
"updated_at": "2024-02-07T15:04:56Z",
|
||||
"pushed_at": "2023-09-12T16:39:44Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -754,7 +754,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-06T02:29:06Z",
|
||||
"updated_at": "2024-02-07T12:23:57Z",
|
||||
"updated_at": "2024-02-07T13:28:52Z",
|
||||
"pushed_at": "2024-02-06T02:59:15Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"forks": 3,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -172,13 +172,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Postfix SMTP Smuggling - Expect Script POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-26T17:02:20Z",
|
||||
"updated_at": "2024-02-01T06:47:19Z",
|
||||
"updated_at": "2024-02-07T15:04:59Z",
|
||||
"pushed_at": "2023-12-26T20:16:45Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-6875 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-13T15:23:17Z",
|
||||
"updated_at": "2024-01-16T11:22:51Z",
|
||||
"updated_at": "2024-02-07T17:48:57Z",
|
||||
"pushed_at": "2024-01-15T10:58:20Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-06T15:09:33Z",
|
||||
"updated_at": "2024-02-07T10:56:31Z",
|
||||
"updated_at": "2024-02-07T14:33:23Z",
|
||||
"pushed_at": "2024-02-06T15:56:12Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -134,7 +134,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-02-07T12:23:05Z",
|
||||
"updated_at": "2024-02-07T12:23:06Z",
|
||||
"pushed_at": "2024-02-07T12:23:06Z",
|
||||
"pushed_at": "2024-02-07T13:42:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC and Detection for CVE-2024-21626",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-01T15:28:37Z",
|
||||
"updated_at": "2024-02-06T23:48:54Z",
|
||||
"updated_at": "2024-02-07T16:24:45Z",
|
||||
"pushed_at": "2024-02-06T16:09:05Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -108,13 +108,13 @@
|
|||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -168,13 +168,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-27T18:17:48Z",
|
||||
"updated_at": "2024-02-05T11:47:07Z",
|
||||
"updated_at": "2024-02-07T16:30:21Z",
|
||||
"pushed_at": "2024-01-30T14:31:14Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -500,10 +500,10 @@
|
|||
"description": "Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-04T20:56:42Z",
|
||||
"updated_at": "2024-02-07T11:31:12Z",
|
||||
"updated_at": "2024-02-07T15:14:37Z",
|
||||
"pushed_at": "2024-02-05T14:10:26Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": true,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -512,8 +512,38 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 754184572,
|
||||
"name": "CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability",
|
||||
"full_name": "Praison001\/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability",
|
||||
"owner": {
|
||||
"login": "Praison001",
|
||||
"id": 60835238,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
|
||||
"html_url": "https:\/\/github.com\/Praison001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Praison001\/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability",
|
||||
"description": "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-07T15:07:37Z",
|
||||
"updated_at": "2024-02-07T18:06:36Z",
|
||||
"pushed_at": "2024-02-07T15:19:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
49
README.md
49
README.md
|
@ -314,6 +314,7 @@
|
|||
- [brijne/CVE-2024-23897-RCE](https://github.com/brijne/CVE-2024-23897-RCE)
|
||||
- [WLXQqwer/Jenkins-CVE-2024-23897-](https://github.com/WLXQqwer/Jenkins-CVE-2024-23897-)
|
||||
- [kaanatmacaa/CVE-2024-23897](https://github.com/kaanatmacaa/CVE-2024-23897)
|
||||
- [Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability](https://github.com/Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability)
|
||||
|
||||
### CVE-2024-24034
|
||||
- [ELIZEUOPAIN/CVE-2024-24034](https://github.com/ELIZEUOPAIN/CVE-2024-24034)
|
||||
|
@ -10591,7 +10592,7 @@
|
|||
- [gpiechnik2/nmap-CVE-2022-29464](https://github.com/gpiechnik2/nmap-CVE-2022-29464)
|
||||
- [0xAgun/CVE-2022-29464](https://github.com/0xAgun/CVE-2022-29464)
|
||||
- [oppsec/WSOB](https://github.com/oppsec/WSOB)
|
||||
- [n3ov4n1sh/CVE-2022-29464](https://github.com/n3ov4n1sh/CVE-2022-29464)
|
||||
- [c0d3cr4f73r/CVE-2022-29464](https://github.com/c0d3cr4f73r/CVE-2022-29464)
|
||||
- [lowkey0808/cve-2022-29464](https://github.com/lowkey0808/cve-2022-29464)
|
||||
- [superzerosec/CVE-2022-29464](https://github.com/superzerosec/CVE-2022-29464)
|
||||
- [axin2019/CVE-2022-29464](https://github.com/axin2019/CVE-2022-29464)
|
||||
|
@ -10813,6 +10814,7 @@
|
|||
- [droidrzrlover/CVE-2022-30190](https://github.com/droidrzrlover/CVE-2022-30190)
|
||||
- [hilt86/cve-2022-30190-mitigate](https://github.com/hilt86/cve-2022-30190-mitigate)
|
||||
- [SrikeshMaharaj/CVE-2022-30190](https://github.com/SrikeshMaharaj/CVE-2022-30190)
|
||||
- [AbdulRKB/Follina](https://github.com/AbdulRKB/Follina)
|
||||
- [DerZiad/CVE-2022-30190](https://github.com/DerZiad/CVE-2022-30190)
|
||||
- [tej7gandhi/CVE-2022-30190-Zero-Click-Zero-Day-in-msdt](https://github.com/tej7gandhi/CVE-2022-30190-Zero-Click-Zero-Day-in-msdt)
|
||||
- [ItsNee/Follina-CVE-2022-30190-POC](https://github.com/ItsNee/Follina-CVE-2022-30190-POC)
|
||||
|
@ -14710,7 +14712,7 @@
|
|||
- [moldabekov/CVE-2021-4034](https://github.com/moldabekov/CVE-2021-4034)
|
||||
- [jostmart/-CVE-2021-4034](https://github.com/jostmart/-CVE-2021-4034)
|
||||
- [c3l3si4n/pwnkit](https://github.com/c3l3si4n/pwnkit)
|
||||
- [n3ov4n1sh/CVE-2021-4034](https://github.com/n3ov4n1sh/CVE-2021-4034)
|
||||
- [c0d3cr4f73r/CVE-2021-4034](https://github.com/c0d3cr4f73r/CVE-2021-4034)
|
||||
- [ly4k/PwnKit](https://github.com/ly4k/PwnKit)
|
||||
- [san3ncrypt3d/CVE-2021-4034-POC](https://github.com/san3ncrypt3d/CVE-2021-4034-POC)
|
||||
- [fdellwing/CVE-2021-4034](https://github.com/fdellwing/CVE-2021-4034)
|
||||
|
@ -14828,7 +14830,7 @@
|
|||
- [fei9747/CVE-2021-4034](https://github.com/fei9747/CVE-2021-4034)
|
||||
- [pyhrr0/pwnkit](https://github.com/pyhrr0/pwnkit)
|
||||
- [mutur4/CVE-2021-4034](https://github.com/mutur4/CVE-2021-4034)
|
||||
- [n3ov4n1sh/CVE-2021-4034_Python3](https://github.com/n3ov4n1sh/CVE-2021-4034_Python3)
|
||||
- [c0d3cr4f73r/CVE-2021-4034_Python3](https://github.com/c0d3cr4f73r/CVE-2021-4034_Python3)
|
||||
- [TheSermux/CVE-2021-4034](https://github.com/TheSermux/CVE-2021-4034)
|
||||
- [ps-interactive/lab_cve-2021-4034-polkit-emulation-and-detection](https://github.com/ps-interactive/lab_cve-2021-4034-polkit-emulation-and-detection)
|
||||
- [asepsaepdin/CVE-2021-4034](https://github.com/asepsaepdin/CVE-2021-4034)
|
||||
|
@ -16551,13 +16553,6 @@
|
|||
|
||||
- [Security-AVS/CVE-2021-30146](https://github.com/Security-AVS/CVE-2021-30146)
|
||||
|
||||
### CVE-2021-30190 (2021-05-25)
|
||||
|
||||
<code>CODESYS V2 Web-Server before 1.1.9.20 has Improper Access Control.
|
||||
</code>
|
||||
|
||||
- [AbdulRKB/Follina](https://github.com/AbdulRKB/Follina)
|
||||
|
||||
### CVE-2021-30357 (2021-06-08)
|
||||
|
||||
<code>SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access.
|
||||
|
@ -26284,7 +26279,7 @@
|
|||
- [Billith/CVE-2019-5736-PoC](https://github.com/Billith/CVE-2019-5736-PoC)
|
||||
- [BBRathnayaka/POC-CVE-2019-5736](https://github.com/BBRathnayaka/POC-CVE-2019-5736)
|
||||
- [shen54/IT19172088](https://github.com/shen54/IT19172088)
|
||||
- [n3ov4n1sh/CVE-2019-5736](https://github.com/n3ov4n1sh/CVE-2019-5736)
|
||||
- [c0d3cr4f73r/CVE-2019-5736](https://github.com/c0d3cr4f73r/CVE-2019-5736)
|
||||
- [fahmifj/Docker-breakout-runc](https://github.com/fahmifj/Docker-breakout-runc)
|
||||
- [Asbatel/CVE-2019-5736_POC](https://github.com/Asbatel/CVE-2019-5736_POC)
|
||||
- [takumak/cve-2019-5736-reproducer](https://github.com/takumak/cve-2019-5736-reproducer)
|
||||
|
@ -26436,7 +26431,7 @@
|
|||
- [fs0c131y/ESFileExplorerOpenPortVuln](https://github.com/fs0c131y/ESFileExplorerOpenPortVuln)
|
||||
- [SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447](https://github.com/SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447)
|
||||
- [Nehal-Zaman/CVE-2019-6447](https://github.com/Nehal-Zaman/CVE-2019-6447)
|
||||
- [n3ov4n1sh/CVE-2019-6447](https://github.com/n3ov4n1sh/CVE-2019-6447)
|
||||
- [c0d3cr4f73r/CVE-2019-6447](https://github.com/c0d3cr4f73r/CVE-2019-6447)
|
||||
- [julio-cfa/POC-ES-File-Explorer-CVE-2019-6447](https://github.com/julio-cfa/POC-ES-File-Explorer-CVE-2019-6447)
|
||||
- [febinrev/CVE-2019-6447-ESfile-explorer-exploit](https://github.com/febinrev/CVE-2019-6447-ESfile-explorer-exploit)
|
||||
- [Kayky-cmd/CVE-2019-6447--.](https://github.com/Kayky-cmd/CVE-2019-6447--.)
|
||||
|
@ -26820,7 +26815,7 @@
|
|||
</code>
|
||||
|
||||
- [SUNNYSAINI01001/46635.py_CVE-2019-9053](https://github.com/SUNNYSAINI01001/46635.py_CVE-2019-9053)
|
||||
- [n3ov4n1sh/CVE-2019-9053](https://github.com/n3ov4n1sh/CVE-2019-9053)
|
||||
- [c0d3cr4f73r/CVE-2019-9053](https://github.com/c0d3cr4f73r/CVE-2019-9053)
|
||||
- [maraspiras/46635.py](https://github.com/maraspiras/46635.py)
|
||||
- [e-renna/CVE-2019-9053](https://github.com/e-renna/CVE-2019-9053)
|
||||
- [zmiddle/Simple_CMS_SQLi](https://github.com/zmiddle/Simple_CMS_SQLi)
|
||||
|
@ -27972,7 +27967,7 @@
|
|||
- [M108Falcon/Sudo-CVE-2019-14287](https://github.com/M108Falcon/Sudo-CVE-2019-14287)
|
||||
- [edsonjt81/CVE-2019-14287-](https://github.com/edsonjt81/CVE-2019-14287-)
|
||||
- [DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights](https://github.com/DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights)
|
||||
- [n3ov4n1sh/CVE-2019-14287](https://github.com/n3ov4n1sh/CVE-2019-14287)
|
||||
- [c0d3cr4f73r/CVE-2019-14287](https://github.com/c0d3cr4f73r/CVE-2019-14287)
|
||||
- [Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287](https://github.com/Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287)
|
||||
- [5l1v3r1/cve-2019-14287sudoexp](https://github.com/5l1v3r1/cve-2019-14287sudoexp)
|
||||
- [MariliaMeira/CVE-2019-14287](https://github.com/MariliaMeira/CVE-2019-14287)
|
||||
|
@ -28332,7 +28327,7 @@
|
|||
- [Kr0ff/cve-2019-16278](https://github.com/Kr0ff/cve-2019-16278)
|
||||
- [NHPT/CVE-2019-16278](https://github.com/NHPT/CVE-2019-16278)
|
||||
- [keshiba/cve-2019-16278](https://github.com/keshiba/cve-2019-16278)
|
||||
- [n3ov4n1sh/CVE-2019-16278](https://github.com/n3ov4n1sh/CVE-2019-16278)
|
||||
- [c0d3cr4f73r/CVE-2019-16278](https://github.com/c0d3cr4f73r/CVE-2019-16278)
|
||||
- [alexander-fernandes/CVE-2019-16278](https://github.com/alexander-fernandes/CVE-2019-16278)
|
||||
- [FredBrave/CVE-2019-16278-Nostromo-1.9.6-RCE](https://github.com/FredBrave/CVE-2019-16278-Nostromo-1.9.6-RCE)
|
||||
- [0xTabun/CVE-2019-16278](https://github.com/0xTabun/CVE-2019-16278)
|
||||
|
@ -31856,7 +31851,7 @@
|
|||
- [kxisxr/Bash-Script-CVE-2018-16763](https://github.com/kxisxr/Bash-Script-CVE-2018-16763)
|
||||
- [padsalatushal/CVE-2018-16763](https://github.com/padsalatushal/CVE-2018-16763)
|
||||
- [wizardy0ga/THM-Vulnerability_Capstone-CVE-2018-16763](https://github.com/wizardy0ga/THM-Vulnerability_Capstone-CVE-2018-16763)
|
||||
- [n3ov4n1sh/CVE-2018-16763](https://github.com/n3ov4n1sh/CVE-2018-16763)
|
||||
- [c0d3cr4f73r/CVE-2018-16763](https://github.com/c0d3cr4f73r/CVE-2018-16763)
|
||||
- [BrunoPincho/cve-2018-16763-rust](https://github.com/BrunoPincho/cve-2018-16763-rust)
|
||||
- [NaturalT314/CVE-2018-16763](https://github.com/NaturalT314/CVE-2018-16763)
|
||||
- [p0dalirius/CVE-2018-16763-FuelCMS-1.4.1-RCE](https://github.com/p0dalirius/CVE-2018-16763-FuelCMS-1.4.1-RCE)
|
||||
|
@ -32619,7 +32614,7 @@
|
|||
|
||||
- [valarauco/wannafind](https://github.com/valarauco/wannafind)
|
||||
- [NatteeSetobol/Etern-blue-Windows-7-Checker](https://github.com/NatteeSetobol/Etern-blue-Windows-7-Checker)
|
||||
- [n3ov4n1sh/MS17-010_CVE-2017-0143](https://github.com/n3ov4n1sh/MS17-010_CVE-2017-0143)
|
||||
- [c0d3cr4f73r/MS17-010_CVE-2017-0143](https://github.com/c0d3cr4f73r/MS17-010_CVE-2017-0143)
|
||||
- [SampatDhakal/Metasploit-Attack-Report](https://github.com/SampatDhakal/Metasploit-Attack-Report)
|
||||
|
||||
### CVE-2017-0144 (2017-03-16)
|
||||
|
@ -33391,7 +33386,7 @@
|
|||
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
|
||||
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
|
||||
- [ThanHuuTuan/CVE-2017-7269](https://github.com/ThanHuuTuan/CVE-2017-7269)
|
||||
- [n3ov4n1sh/CVE-2017-7269](https://github.com/n3ov4n1sh/CVE-2017-7269)
|
||||
- [c0d3cr4f73r/CVE-2017-7269](https://github.com/c0d3cr4f73r/CVE-2017-7269)
|
||||
- [denchief1/CVE-2017-7269_Python3](https://github.com/denchief1/CVE-2017-7269_Python3)
|
||||
- [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269)
|
||||
|
||||
|
@ -35097,7 +35092,7 @@
|
|||
<code>Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
|
||||
</code>
|
||||
|
||||
- [n3ov4n1sh/CVE-2016-1531](https://github.com/n3ov4n1sh/CVE-2016-1531)
|
||||
- [c0d3cr4f73r/CVE-2016-1531](https://github.com/c0d3cr4f73r/CVE-2016-1531)
|
||||
|
||||
### CVE-2016-1542 (2016-06-13)
|
||||
|
||||
|
@ -36338,8 +36333,8 @@
|
|||
- [bongbongco/MS15-034](https://github.com/bongbongco/MS15-034)
|
||||
- [aedoo/CVE-2015-1635-POC](https://github.com/aedoo/CVE-2015-1635-POC)
|
||||
- [limkokholefork/CVE-2015-1635](https://github.com/limkokholefork/CVE-2015-1635)
|
||||
- [n3ov4n1sh/CVE-2015-1635-POC](https://github.com/n3ov4n1sh/CVE-2015-1635-POC)
|
||||
- [n3ov4n1sh/CVE-2015-1635](https://github.com/n3ov4n1sh/CVE-2015-1635)
|
||||
- [c0d3cr4f73r/CVE-2015-1635-POC](https://github.com/c0d3cr4f73r/CVE-2015-1635-POC)
|
||||
- [c0d3cr4f73r/CVE-2015-1635](https://github.com/c0d3cr4f73r/CVE-2015-1635)
|
||||
- [w01ke/CVE-2015-1635-POC](https://github.com/w01ke/CVE-2015-1635-POC)
|
||||
- [SkinAir/ms15-034-Scan](https://github.com/SkinAir/ms15-034-Scan)
|
||||
|
||||
|
@ -36829,7 +36824,7 @@
|
|||
</code>
|
||||
|
||||
- [G01d3nW01f/CVE-2015-6668](https://github.com/G01d3nW01f/CVE-2015-6668)
|
||||
- [n3ov4n1sh/CVE-2015-6668](https://github.com/n3ov4n1sh/CVE-2015-6668)
|
||||
- [c0d3cr4f73r/CVE-2015-6668](https://github.com/c0d3cr4f73r/CVE-2015-6668)
|
||||
|
||||
### CVE-2015-6835 (2016-05-16)
|
||||
|
||||
|
@ -37129,7 +37124,7 @@
|
|||
- [ingochris/heartpatch.us](https://github.com/ingochris/heartpatch.us)
|
||||
- [BelminD/heartbleed](https://github.com/BelminD/heartbleed)
|
||||
- [pierceoneill/bleeding-heart](https://github.com/pierceoneill/bleeding-heart)
|
||||
- [n3ov4n1sh/CVE-2014-0160_Heartbleed](https://github.com/n3ov4n1sh/CVE-2014-0160_Heartbleed)
|
||||
- [c0d3cr4f73r/CVE-2014-0160_Heartbleed](https://github.com/c0d3cr4f73r/CVE-2014-0160_Heartbleed)
|
||||
- [GardeniaWhite/fuzzing](https://github.com/GardeniaWhite/fuzzing)
|
||||
- [undacmic/heartbleed-proof-of-concept](https://github.com/undacmic/heartbleed-proof-of-concept)
|
||||
- [cbk914/heartbleed-checker](https://github.com/cbk914/heartbleed-checker)
|
||||
|
@ -38601,7 +38596,7 @@
|
|||
</code>
|
||||
|
||||
- [Madusanka99/OHTS](https://github.com/Madusanka99/OHTS)
|
||||
- [n3ov4n1sh/CVE-2011-1249](https://github.com/n3ov4n1sh/CVE-2011-1249)
|
||||
- [c0d3cr4f73r/CVE-2011-1249](https://github.com/c0d3cr4f73r/CVE-2011-1249)
|
||||
|
||||
### CVE-2011-1473 (2012-06-16)
|
||||
|
||||
|
@ -39025,7 +39020,7 @@
|
|||
</code>
|
||||
|
||||
- [zaphoxx/zaphoxx-coldfusion](https://github.com/zaphoxx/zaphoxx-coldfusion)
|
||||
- [n3ov4n1sh/CVE-2009-2265](https://github.com/n3ov4n1sh/CVE-2009-2265)
|
||||
- [c0d3cr4f73r/CVE-2009-2265](https://github.com/c0d3cr4f73r/CVE-2009-2265)
|
||||
- [p1ckzi/CVE-2009-2265](https://github.com/p1ckzi/CVE-2009-2265)
|
||||
- [0xConstant/CVE-2009-2265](https://github.com/0xConstant/CVE-2009-2265)
|
||||
|
||||
|
@ -39296,7 +39291,7 @@
|
|||
- [mr-l0n3lly/CVE-2007-2447](https://github.com/mr-l0n3lly/CVE-2007-2447)
|
||||
- [HerculesRD/PyUsernameMapScriptRCE](https://github.com/HerculesRD/PyUsernameMapScriptRCE)
|
||||
- [Aviksaikat/CVE-2007-2447](https://github.com/Aviksaikat/CVE-2007-2447)
|
||||
- [n3ov4n1sh/CVE-2007-2447](https://github.com/n3ov4n1sh/CVE-2007-2447)
|
||||
- [c0d3cr4f73r/CVE-2007-2447](https://github.com/c0d3cr4f73r/CVE-2007-2447)
|
||||
- [bdunlap9/CVE-2007-2447_python](https://github.com/bdunlap9/CVE-2007-2447_python)
|
||||
- [MikeRega7/CVE-2007-2447-RCE](https://github.com/MikeRega7/CVE-2007-2447-RCE)
|
||||
- [0xTabun/CVE-2007-2447](https://github.com/0xTabun/CVE-2007-2447)
|
||||
|
@ -39561,7 +39556,7 @@
|
|||
<code>distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks.
|
||||
</code>
|
||||
|
||||
- [n3ov4n1sh/distccd_rce_CVE-2004-2687](https://github.com/n3ov4n1sh/distccd_rce_CVE-2004-2687)
|
||||
- [c0d3cr4f73r/distccd_rce_CVE-2004-2687](https://github.com/c0d3cr4f73r/distccd_rce_CVE-2004-2687)
|
||||
- [k4miyo/CVE-2004-2687](https://github.com/k4miyo/CVE-2004-2687)
|
||||
- [ss0wl/CVE-2004-2687_distcc_v1](https://github.com/ss0wl/CVE-2004-2687_distcc_v1)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue