mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-25 09:04:11 +01:00
Auto Update 2024/05/14 18:29:05
This commit is contained in:
parent
8cbd24f03f
commit
1cd66aa5b2
46 changed files with 369 additions and 244 deletions
2006
2017
2018
2019
2020
2021
2022
2023
CVE-2023-22527.jsonCVE-2023-25157.jsonCVE-2023-26360.jsonCVE-2023-27524.jsonCVE-2023-32315.jsonCVE-2023-33733.jsonCVE-2023-36424.jsonCVE-2023-45866.jsonCVE-2023-46012.jsonCVE-2023-46604.jsonCVE-2023-47246.jsonCVE-2023-4863.jsonCVE-2023-50164.jsonCVE-2023-6553.json
2024
CVE-2024-1086.jsonCVE-2024-20353.jsonCVE-2024-20359.jsonCVE-2024-21762.jsonCVE-2024-21887.jsonCVE-2024-27460.jsonCVE-2024-27804.jsonCVE-2024-27956.jsonCVE-2024-29059.jsonCVE-2024-29988.jsonCVE-2024-3094.jsonCVE-2024-4761.json
README.md
|
@ -57,7 +57,7 @@
|
|||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 424360665,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Proof of Concept exploit for CVE-2017-8570",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T19:09:33Z",
|
||||
"updated_at": "2024-05-04T07:46:15Z",
|
||||
"updated_at": "2024-05-14T13:20:31Z",
|
||||
"pushed_at": "2018-01-09T19:23:43Z",
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"has_discussions": false,
|
||||
"forks_count": 105,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"watchers": 185,
|
||||
"watchers": 186,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -46,10 +46,10 @@
|
|||
"html_url": "https:\/\/github.com\/octodi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/octodi\/CVE-2018-10583",
|
||||
"description": "Update python3 exploit for CVE-2018-10583 (LibreOffice\/Open Office - '.odt' Information Disclosure )",
|
||||
"description": "Updated python3 exploit for CVE-2018-10583 (LibreOffice\/Open Office - '.odt' Information Disclosure )",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-13T17:13:17Z",
|
||||
"updated_at": "2024-05-13T17:31:12Z",
|
||||
"updated_at": "2024-05-14T15:03:13Z",
|
||||
"pushed_at": "2024-05-13T17:31:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -63,6 +63,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Modified standalone exploit ported for Python 3",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-16T12:14:52Z",
|
||||
"updated_at": "2024-04-30T06:42:13Z",
|
||||
"updated_at": "2024-05-14T17:21:30Z",
|
||||
"pushed_at": "2019-09-16T14:04:00Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T14:25:39Z",
|
||||
"updated_at": "2024-02-14T17:25:57Z",
|
||||
"updated_at": "2024-05-14T18:00:21Z",
|
||||
"pushed_at": "2019-11-21T15:03:15Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2024-04-17T21:54:17Z",
|
||||
"updated_at": "2024-05-14T17:56:55Z",
|
||||
"pushed_at": "2022-04-14T18:23:38Z",
|
||||
"stargazers_count": 335,
|
||||
"watchers_count": 335,
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"has_discussions": false,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 335,
|
||||
"watchers": 336,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-24T15:44:29Z",
|
||||
"updated_at": "2024-04-11T10:19:13Z",
|
||||
"updated_at": "2024-05-14T17:25:36Z",
|
||||
"pushed_at": "2020-05-24T16:28:46Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -58,7 +58,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -265,10 +265,10 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2024-05-10T10:41:04Z",
|
||||
"updated_at": "2024-05-14T14:13:48Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
"has_discussions": false,
|
||||
"forks_count": 81,
|
||||
"allow_forking": true,
|
||||
|
@ -277,7 +277,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 81,
|
||||
"watchers": 346,
|
||||
"watchers": 348,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
@ -719,10 +719,10 @@
|
|||
"description": "GUI Exploit Tool for CVE-2020-0688(Microsoft Exchange default MachineKeySection deserialize vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-09T12:50:48Z",
|
||||
"updated_at": "2024-05-13T10:20:18Z",
|
||||
"updated_at": "2024-05-14T14:14:22Z",
|
||||
"pushed_at": "2024-05-09T13:51:27Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -738,7 +738,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -373,10 +373,10 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2024-05-14T07:14:49Z",
|
||||
"updated_at": "2024-05-14T12:57:15Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 343,
|
||||
"watchers_count": 343,
|
||||
"stargazers_count": 344,
|
||||
"watchers_count": 344,
|
||||
"has_discussions": false,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
|
@ -391,7 +391,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"watchers": 343,
|
||||
"watchers": 344,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -1,20 +1,20 @@
|
|||
[
|
||||
{
|
||||
"id": 799195135,
|
||||
"name": "CVE-2023-2752",
|
||||
"full_name": "Cappricio-Securities\/CVE-2023-2752",
|
||||
"id": 800580605,
|
||||
"name": "CVE-2020-27838",
|
||||
"full_name": "Cappricio-Securities\/CVE-2020-27838",
|
||||
"owner": {
|
||||
"login": "Cappricio-Securities",
|
||||
"id": 102907425,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
|
||||
"html_url": "https:\/\/github.com\/Cappricio-Securities"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2023-2752",
|
||||
"description": "Tool for finding CVE-2023-27524 (Apache Superset - Authentication Bypass)",
|
||||
"html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2020-27838",
|
||||
"description": "CVE-2020-27838 - KeyCloak - Information Exposure ",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-11T12:29:08Z",
|
||||
"updated_at": "2024-05-11T12:34:06Z",
|
||||
"pushed_at": "2024-05-11T12:29:46Z",
|
||||
"created_at": "2024-05-14T15:50:16Z",
|
||||
"updated_at": "2024-05-14T15:59:14Z",
|
||||
"pushed_at": "2024-05-14T15:59:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -22,15 +22,7 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"apache-superset",
|
||||
"apache-superset---authentication-bypass",
|
||||
"authentication-bypass",
|
||||
"bugbounty",
|
||||
"cve-2023-2752",
|
||||
"vapt",
|
||||
"wapt"
|
||||
],
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 12,
|
||||
"watchers": 67,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
|
|
|
@ -2143,5 +2143,43 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 800600797,
|
||||
"name": "CVE-2021-3156-checker",
|
||||
"full_name": "lypd0\/CVE-2021-3156-checker",
|
||||
"owner": {
|
||||
"login": "lypd0",
|
||||
"id": 146327014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146327014?v=4",
|
||||
"html_url": "https:\/\/github.com\/lypd0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lypd0\/CVE-2021-3156-checker",
|
||||
"description": "Checker for CVE-2021-3156 with static version check",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T16:35:09Z",
|
||||
"updated_at": "2024-05-14T17:04:55Z",
|
||||
"pushed_at": "2024-05-14T17:04:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"checker",
|
||||
"cve",
|
||||
"cve-2021-3156",
|
||||
"escalation",
|
||||
"privesc",
|
||||
"privilege",
|
||||
"python"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -169,10 +169,10 @@
|
|||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T00:56:36Z",
|
||||
"updated_at": "2024-05-14T07:19:06Z",
|
||||
"updated_at": "2024-05-14T12:34:43Z",
|
||||
"pushed_at": "2023-05-04T19:24:39Z",
|
||||
"stargazers_count": 1023,
|
||||
"watchers_count": 1023,
|
||||
"stargazers_count": 1022,
|
||||
"watchers_count": 1022,
|
||||
"has_discussions": false,
|
||||
"forks_count": 308,
|
||||
"allow_forking": true,
|
||||
|
@ -185,7 +185,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 308,
|
||||
"watchers": 1023,
|
||||
"watchers": 1022,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T10:25:59Z",
|
||||
"updated_at": "2024-05-13T20:52:04Z",
|
||||
"updated_at": "2024-05-14T13:41:18Z",
|
||||
"pushed_at": "2023-05-27T15:39:41Z",
|
||||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 215,
|
||||
"watchers": 216,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T20:37:14Z",
|
||||
"updated_at": "2024-03-06T22:50:10Z",
|
||||
"updated_at": "2024-05-14T17:56:49Z",
|
||||
"pushed_at": "2022-08-30T02:11:05Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 144,
|
||||
"watchers": 143,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -1561,10 +1561,10 @@
|
|||
"description": "Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-09T09:32:10Z",
|
||||
"updated_at": "2024-03-30T12:00:40Z",
|
||||
"updated_at": "2024-05-14T15:53:57Z",
|
||||
"pushed_at": "2022-06-16T07:28:13Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -1583,7 +1583,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is working POC of CVE-2022-36271 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-16T19:48:36Z",
|
||||
"updated_at": "2023-09-28T11:41:58Z",
|
||||
"updated_at": "2024-05-14T17:06:24Z",
|
||||
"pushed_at": "2022-09-01T16:43:49Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -280,10 +280,10 @@
|
|||
"description": "Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-19T11:49:08Z",
|
||||
"updated_at": "2024-04-21T17:20:37Z",
|
||||
"updated_at": "2024-05-14T14:34:50Z",
|
||||
"pushed_at": "2023-12-29T14:57:34Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -304,7 +304,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -586,10 +586,10 @@
|
|||
"description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-26T02:34:44Z",
|
||||
"updated_at": "2024-05-14T01:51:48Z",
|
||||
"updated_at": "2024-05-14T15:20:02Z",
|
||||
"pushed_at": "2024-04-24T02:34:16Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -598,7 +598,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-06T14:05:09Z",
|
||||
"updated_at": "2024-05-10T10:50:31Z",
|
||||
"updated_at": "2024-05-14T17:54:06Z",
|
||||
"pushed_at": "2023-07-14T10:40:17Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 148,
|
||||
"watchers": 149,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,8 +43,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T11:22:35Z",
|
||||
"updated_at": "2024-05-14T11:22:39Z",
|
||||
"pushed_at": "2024-05-14T11:22:36Z",
|
||||
"updated_at": "2024-05-14T13:37:04Z",
|
||||
"pushed_at": "2024-05-14T13:37:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -332,5 +332,43 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 799195135,
|
||||
"name": "CVE-2023-27524",
|
||||
"full_name": "Cappricio-Securities\/CVE-2023-27524",
|
||||
"owner": {
|
||||
"login": "Cappricio-Securities",
|
||||
"id": 102907425,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
|
||||
"html_url": "https:\/\/github.com\/Cappricio-Securities"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2023-27524",
|
||||
"description": "Tool for finding CVE-2023-27524 (Apache Superset - Authentication Bypass)",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-11T12:29:08Z",
|
||||
"updated_at": "2024-05-14T15:26:47Z",
|
||||
"pushed_at": "2024-05-14T15:26:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"apache-superset",
|
||||
"apache-superset---authentication-bypass",
|
||||
"authentication-bypass",
|
||||
"bugbounty",
|
||||
"cve-2023-2752",
|
||||
"vapt",
|
||||
"wapt"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-18T15:42:00Z",
|
||||
"updated_at": "2024-05-12T13:42:09Z",
|
||||
"updated_at": "2024-05-14T13:21:41Z",
|
||||
"pushed_at": "2024-03-07T07:23:41Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-33733 reportlab RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-30T22:22:50Z",
|
||||
"updated_at": "2024-05-13T18:13:45Z",
|
||||
"updated_at": "2024-05-14T17:49:07Z",
|
||||
"pushed_at": "2023-09-05T15:49:14Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 94,
|
||||
"watchers": 96,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-21T21:39:24Z",
|
||||
"updated_at": "2024-05-12T16:31:42Z",
|
||||
"updated_at": "2024-05-14T12:31:53Z",
|
||||
"pushed_at": "2024-03-22T06:45:43Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 102,
|
||||
"watchers": 103,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-05-14T12:14:52Z",
|
||||
"updated_at": "2024-05-14T18:12:14Z",
|
||||
"pushed_at": "2024-05-14T09:04:25Z",
|
||||
"stargazers_count": 593,
|
||||
"watchers_count": 593,
|
||||
"stargazers_count": 606,
|
||||
"watchers_count": 606,
|
||||
"has_discussions": false,
|
||||
"forks_count": 98,
|
||||
"forks_count": 103,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 98,
|
||||
"watchers": 593,
|
||||
"forks": 103,
|
||||
"watchers": 606,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-03T22:06:09Z",
|
||||
"updated_at": "2024-05-14T10:19:17Z",
|
||||
"updated_at": "2024-05-14T17:06:38Z",
|
||||
"pushed_at": "2024-01-20T16:59:23Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "exploit for cve-2023-47246 SysAid RCE (shell upload)",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-17T07:03:06Z",
|
||||
"updated_at": "2024-04-30T00:09:31Z",
|
||||
"updated_at": "2024-05-14T17:06:56Z",
|
||||
"pushed_at": "2023-12-07T02:55:01Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-21T05:22:51Z",
|
||||
"updated_at": "2024-05-14T10:37:08Z",
|
||||
"updated_at": "2024-05-14T17:19:11Z",
|
||||
"pushed_at": "2023-12-18T04:25:00Z",
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 293,
|
||||
"watchers": 294,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -103,19 +103,19 @@
|
|||
"description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-17T14:18:54Z",
|
||||
"updated_at": "2024-03-14T14:50:28Z",
|
||||
"updated_at": "2024-05-14T15:21:41Z",
|
||||
"pushed_at": "2023-12-18T02:46:21Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": true,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 55,
|
||||
"forks": 16,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-13T20:26:59Z",
|
||||
"updated_at": "2024-05-10T10:52:14Z",
|
||||
"updated_at": "2024-05-14T15:19:05Z",
|
||||
"pushed_at": "2024-02-06T23:22:31Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -38,8 +38,8 @@
|
|||
"wordpress"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 63,
|
||||
"forks": 21,
|
||||
"watchers": 64,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-05-14T12:14:53Z",
|
||||
"updated_at": "2024-05-14T16:45:49Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 1925,
|
||||
"watchers_count": 1925,
|
||||
"stargazers_count": 1926,
|
||||
"watchers_count": 1926,
|
||||
"has_discussions": false,
|
||||
"forks_count": 239,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 239,
|
||||
"watchers": 1925,
|
||||
"watchers": 1926,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 795510133,
|
||||
"name": "CVE-2024-20353-CiscoASAandFTD",
|
||||
"full_name": "Spl0stus\/CVE-2024-20353-CiscoASAandFTD",
|
||||
"owner": {
|
||||
"login": "Spl0stus",
|
||||
"id": 168833593,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168833593?v=4",
|
||||
"html_url": "https:\/\/github.com\/Spl0stus"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Spl0stus\/CVE-2024-20353-CiscoASAandFTD",
|
||||
"description": "Exploit for Cisco ASA and FTD (may 2024)",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-03T12:46:09Z",
|
||||
"updated_at": "2024-05-07T06:33:37Z",
|
||||
"pushed_at": "2024-05-03T12:52:18Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 795883499,
|
||||
"name": "CVE-2024-20359-CiscoASA-FTD-exploit",
|
||||
"full_name": "Garvard-Agency\/CVE-2024-20359-CiscoASA-FTD-exploit",
|
||||
"owner": {
|
||||
"login": "Garvard-Agency",
|
||||
"id": 168903663,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168903663?v=4",
|
||||
"html_url": "https:\/\/github.com\/Garvard-Agency"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Garvard-Agency\/CVE-2024-20359-CiscoASA-FTD-exploit",
|
||||
"description": "Exploit for Cisco ASA and FTD (may 2024)",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-04T10:40:22Z",
|
||||
"updated_at": "2024-05-09T12:13:02Z",
|
||||
"pushed_at": "2024-05-04T10:50:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-13T22:57:00Z",
|
||||
"updated_at": "2024-05-07T12:07:45Z",
|
||||
"updated_at": "2024-05-14T12:40:44Z",
|
||||
"pushed_at": "2024-03-24T22:01:21Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T20:59:38Z",
|
||||
"updated_at": "2024-04-26T05:00:24Z",
|
||||
"updated_at": "2024-05-14T16:25:10Z",
|
||||
"pushed_at": "2024-01-17T00:38:28Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "HP Plantronics Hub 3.2.1 Updater Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-13T11:15:14Z",
|
||||
"updated_at": "2024-05-14T06:00:17Z",
|
||||
"pushed_at": "2024-05-13T11:46:39Z",
|
||||
"updated_at": "2024-05-14T13:55:32Z",
|
||||
"pushed_at": "2024-05-14T13:55:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
32
2024/CVE-2024-27804.json
Normal file
32
2024/CVE-2024-27804.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 800535361,
|
||||
"name": "CVE-2024-27804",
|
||||
"full_name": "R00tkitSMM\/CVE-2024-27804",
|
||||
"owner": {
|
||||
"login": "R00tkitSMM",
|
||||
"id": 78787782,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78787782?v=4",
|
||||
"html_url": "https:\/\/github.com\/R00tkitSMM"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/R00tkitSMM\/CVE-2024-27804",
|
||||
"description": "POC for CVE-2024-27804",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T14:17:06Z",
|
||||
"updated_at": "2024-05-14T17:43:08Z",
|
||||
"pushed_at": "2024-05-14T14:55:23Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -183,5 +183,55 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 800537570,
|
||||
"name": "WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956",
|
||||
"full_name": "AiGptCode\/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956",
|
||||
"owner": {
|
||||
"login": "AiGptCode",
|
||||
"id": 146197697,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146197697?v=4",
|
||||
"html_url": "https:\/\/github.com\/AiGptCode"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AiGptCode\/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956",
|
||||
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T14:21:49Z",
|
||||
"updated_at": "2024-05-14T15:00:27Z",
|
||||
"pushed_at": "2024-05-14T15:00:23Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"android",
|
||||
"backdoor",
|
||||
"backdoors",
|
||||
"cve",
|
||||
"cve-2024-27956",
|
||||
"hack",
|
||||
"hacking",
|
||||
"html",
|
||||
"php",
|
||||
"ransomware",
|
||||
"rce",
|
||||
"reverse-shell",
|
||||
"shell",
|
||||
"web",
|
||||
"website",
|
||||
"windows",
|
||||
"wordpress",
|
||||
"wordpress-plugin",
|
||||
"wordpress-reversshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-11T10:14:39Z",
|
||||
"updated_at": "2024-05-02T20:58:32Z",
|
||||
"updated_at": "2024-05-14T13:43:50Z",
|
||||
"pushed_at": "2024-03-25T12:56:16Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Exploit for Microsoft SmartScreen malicious execution (april 2024)",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-03T12:17:25Z",
|
||||
"updated_at": "2024-05-06T13:06:49Z",
|
||||
"updated_at": "2024-05-14T15:58:14Z",
|
||||
"pushed_at": "2024-05-03T12:57:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -1012,10 +1012,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-05-14T08:47:24Z",
|
||||
"updated_at": "2024-05-14T13:20:47Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3459,
|
||||
"watchers_count": 3459,
|
||||
"stargazers_count": 3460,
|
||||
"watchers_count": 3460,
|
||||
"has_discussions": false,
|
||||
"forks_count": 233,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,7 +1024,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 233,
|
||||
"watchers": 3459,
|
||||
"watchers": 3460,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
32
2024/CVE-2024-4761.json
Normal file
32
2024/CVE-2024-4761.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 800632738,
|
||||
"name": "CVE-2024-4761",
|
||||
"full_name": "michredteam\/CVE-2024-4761",
|
||||
"owner": {
|
||||
"login": "michredteam",
|
||||
"id": 168865716,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168865716?v=4",
|
||||
"html_url": "https:\/\/github.com\/michredteam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/michredteam\/CVE-2024-4761",
|
||||
"description": "High CVE-2024-4761 Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T17:45:22Z",
|
||||
"updated_at": "2024-05-14T18:11:56Z",
|
||||
"pushed_at": "2024-05-14T18:21:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
51
README.md
51
README.md
|
@ -516,6 +516,13 @@
|
|||
|
||||
- [JoeBeeton/CVE-2024-4701-POC](https://github.com/JoeBeeton/CVE-2024-4701-POC)
|
||||
|
||||
### CVE-2024-4761 (2024-05-14)
|
||||
|
||||
<code>Out of bounds write in V8 in Google Chrome prior to 124.0.6367.207 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
|
||||
</code>
|
||||
|
||||
- [michredteam/CVE-2024-4761](https://github.com/michredteam/CVE-2024-4761)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
||||
|
@ -526,13 +533,6 @@
|
|||
|
||||
- [Instructor-Team8/CVE-2024-20291-POC](https://github.com/Instructor-Team8/CVE-2024-20291-POC)
|
||||
|
||||
### CVE-2024-20353 (2024-04-24)
|
||||
|
||||
<code>A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted web server on a device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads.
|
||||
</code>
|
||||
|
||||
- [Spl0stus/CVE-2024-20353-CiscoASAandFTD](https://github.com/Spl0stus/CVE-2024-20353-CiscoASAandFTD)
|
||||
|
||||
### CVE-2024-20356 (2024-04-24)
|
||||
|
||||
<code>A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root.
|
||||
|
@ -540,13 +540,6 @@
|
|||
|
||||
- [nettitude/CVE-2024-20356](https://github.com/nettitude/CVE-2024-20356)
|
||||
|
||||
### CVE-2024-20359 (2024-04-24)
|
||||
|
||||
<code>A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability.\r\n\r This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
|
||||
</code>
|
||||
|
||||
- [Garvard-Agency/CVE-2024-20359-CiscoASA-FTD-exploit](https://github.com/Garvard-Agency/CVE-2024-20359-CiscoASA-FTD-exploit)
|
||||
|
||||
### CVE-2024-20656 (2024-01-09)
|
||||
|
||||
<code>Visual Studio Elevation of Privilege Vulnerability
|
||||
|
@ -1546,6 +1539,13 @@
|
|||
### CVE-2024-27697
|
||||
- [SanjinDedic/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697](https://github.com/SanjinDedic/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697)
|
||||
|
||||
### CVE-2024-27804 (2024-05-13)
|
||||
|
||||
<code>The issue was addressed with improved memory handling. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges.
|
||||
</code>
|
||||
|
||||
- [R00tkitSMM/CVE-2024-27804](https://github.com/R00tkitSMM/CVE-2024-27804)
|
||||
|
||||
### CVE-2024-27956 (2024-03-21)
|
||||
|
||||
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.\n\n
|
||||
|
@ -1557,6 +1557,7 @@
|
|||
- [FoxyProxys/CVE-2024-27956](https://github.com/FoxyProxys/CVE-2024-27956)
|
||||
- [k3ppf0r/CVE-2024-27956](https://github.com/k3ppf0r/CVE-2024-27956)
|
||||
- [nancyariah4/CVE-2024-27956](https://github.com/nancyariah4/CVE-2024-27956)
|
||||
- [AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956](https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956)
|
||||
|
||||
### CVE-2024-27971
|
||||
- [truonghuuphuc/CVE-2024-27971-Note](https://github.com/truonghuuphuc/CVE-2024-27971-Note)
|
||||
|
@ -2485,13 +2486,6 @@
|
|||
|
||||
- [pashayogi/CVE-2023-2744](https://github.com/pashayogi/CVE-2023-2744)
|
||||
|
||||
### CVE-2023-2752 (2023-05-17)
|
||||
|
||||
<code>Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.
|
||||
</code>
|
||||
|
||||
- [Cappricio-Securities/CVE-2023-2752](https://github.com/Cappricio-Securities/CVE-2023-2752)
|
||||
|
||||
### CVE-2023-2822 (2023-05-20)
|
||||
|
||||
<code>Es wurde eine problematische Schwachstelle in Ellucian Ethos Identity bis 5.10.5 ausgemacht. Hiervon betroffen ist ein unbekannter Codeblock der Datei /cas/logout. Durch Manipulation des Arguments url mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 5.10.6 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.
|
||||
|
@ -4232,7 +4226,11 @@
|
|||
### CVE-2023-24100
|
||||
- [badboycxcc/CVE-2023-24100](https://github.com/badboycxcc/CVE-2023-24100)
|
||||
|
||||
### CVE-2023-24203
|
||||
### CVE-2023-24203 (-)
|
||||
|
||||
<code>Cross Site Scripting vulnerability in SourceCodester Simple Customer Relationship Management System v1.0 allows attacker to execute arbitary code via the company or query parameter(s).
|
||||
</code>
|
||||
|
||||
- [momo1239/CVE-2023-24203-and-CVE-2023-24204](https://github.com/momo1239/CVE-2023-24203-and-CVE-2023-24204)
|
||||
|
||||
### CVE-2023-24317 (2023-02-23)
|
||||
|
@ -4731,6 +4729,7 @@
|
|||
- [CN016/Apache-Superset-SECRET_KEY-CVE-2023-27524-](https://github.com/CN016/Apache-Superset-SECRET_KEY-CVE-2023-27524-)
|
||||
- [NguyenCongHaiNam/Research-CVE-2023-27524](https://github.com/NguyenCongHaiNam/Research-CVE-2023-27524)
|
||||
- [karthi-the-hacker/CVE-2023-27524](https://github.com/karthi-the-hacker/CVE-2023-27524)
|
||||
- [Cappricio-Securities/CVE-2023-27524](https://github.com/Cappricio-Securities/CVE-2023-27524)
|
||||
|
||||
### CVE-2023-27532 (2023-03-10)
|
||||
|
||||
|
@ -17062,6 +17061,7 @@
|
|||
- [DDayLuong/CVE-2021-3156](https://github.com/DDayLuong/CVE-2021-3156)
|
||||
- [wurwur/CVE-2021-3156](https://github.com/wurwur/CVE-2021-3156)
|
||||
- [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156)
|
||||
- [lypd0/CVE-2021-3156-checker](https://github.com/lypd0/CVE-2021-3156-checker)
|
||||
|
||||
### CVE-2021-3157
|
||||
- [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)
|
||||
|
@ -27578,6 +27578,13 @@
|
|||
|
||||
- [pazhanivel07/openjpeg-2.3.0_CVE-2020-27824](https://github.com/pazhanivel07/openjpeg-2.3.0_CVE-2020-27824)
|
||||
|
||||
### CVE-2020-27838 (2021-03-08)
|
||||
|
||||
<code>A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality.
|
||||
</code>
|
||||
|
||||
- [Cappricio-Securities/CVE-2020-27838](https://github.com/Cappricio-Securities/CVE-2020-27838)
|
||||
|
||||
### CVE-2020-27904 (2020-12-08)
|
||||
|
||||
<code>A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges.
|
||||
|
|
Loading…
Add table
Reference in a new issue