mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/13 12:33:10
This commit is contained in:
parent
d7129173d8
commit
1dcb9d92a4
38 changed files with 249 additions and 113 deletions
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-17T04:39:32Z",
|
||||
"updated_at": "2024-10-07T18:03:33Z",
|
||||
"updated_at": "2024-12-13T10:41:40Z",
|
||||
"pushed_at": "2024-05-27T02:44:38Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -42,7 +42,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -314,5 +314,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 902838403,
|
||||
"name": "CVE-2017-12617",
|
||||
"full_name": "DevaDJ\/CVE-2017-12617",
|
||||
"owner": {
|
||||
"login": "DevaDJ",
|
||||
"id": 56772318,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56772318?v=4",
|
||||
"html_url": "https:\/\/github.com\/DevaDJ",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DevaDJ\/CVE-2017-12617",
|
||||
"description": "Improved version of PikaChu CVE",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T11:22:38Z",
|
||||
"updated_at": "2024-12-13T11:31:35Z",
|
||||
"pushed_at": "2024-12-13T11:31:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -324,8 +324,8 @@
|
|||
"description": "This repo contains both the exploit and the explaination of how this vulnerability is exploited",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-11T13:33:42Z",
|
||||
"updated_at": "2024-12-12T20:40:34Z",
|
||||
"pushed_at": "2024-12-12T20:40:30Z",
|
||||
"updated_at": "2024-12-13T08:29:49Z",
|
||||
"pushed_at": "2024-12-13T08:29:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2024-12-10T10:06:00Z",
|
||||
"updated_at": "2024-12-13T08:33:01Z",
|
||||
"pushed_at": "2022-01-05T04:09:42Z",
|
||||
"stargazers_count": 641,
|
||||
"watchers_count": 641,
|
||||
"stargazers_count": 642,
|
||||
"watchers_count": 642,
|
||||
"has_discussions": false,
|
||||
"forks_count": 163,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 163,
|
||||
"watchers": 641,
|
||||
"watchers": 642,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -169,10 +169,10 @@
|
|||
"description": "Read my blog for more info - ",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-25T12:55:15Z",
|
||||
"updated_at": "2024-08-21T03:39:34Z",
|
||||
"updated_at": "2024-12-13T08:08:44Z",
|
||||
"pushed_at": "2021-04-27T21:13:18Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -262,10 +262,10 @@
|
|||
"description": "VMware vCenter Server任意文件上传漏洞 \/ Code By:Jun_sheng",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-27T08:36:21Z",
|
||||
"updated_at": "2024-10-28T02:18:43Z",
|
||||
"updated_at": "2024-12-13T12:10:18Z",
|
||||
"pushed_at": "2022-07-08T09:17:14Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -274,7 +274,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -204,10 +204,10 @@
|
|||
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-18T05:42:13Z",
|
||||
"updated_at": "2024-12-08T07:44:09Z",
|
||||
"updated_at": "2024-12-13T08:25:21Z",
|
||||
"pushed_at": "2021-12-14T05:12:17Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -216,7 +216,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 148,
|
||||
"watchers": 149,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1265,10 +1265,10 @@
|
|||
"description": "CVE-2021-3156 - Sudo Baron Samedit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T06:29:26Z",
|
||||
"updated_at": "2024-12-05T20:01:29Z",
|
||||
"updated_at": "2024-12-13T08:10:23Z",
|
||||
"pushed_at": "2022-02-12T19:33:07Z",
|
||||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"stargazers_count": 222,
|
||||
"watchers_count": 222,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -1277,7 +1277,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 221,
|
||||
"watchers": 222,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -967,10 +967,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2024-12-09T15:53:46Z",
|
||||
"updated_at": "2024-12-13T11:37:03Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 1089,
|
||||
"watchers_count": 1089,
|
||||
"stargazers_count": 1090,
|
||||
"watchers_count": 1090,
|
||||
"has_discussions": false,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
|
@ -981,7 +981,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 190,
|
||||
"watchers": 1089,
|
||||
"watchers": 1090,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A download of code without integrity check vulnerability in the \"execute restore src-vis\" command of FortiOS before 7.0.3.",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-08T07:30:52Z",
|
||||
"updated_at": "2024-11-14T23:09:52Z",
|
||||
"updated_at": "2024-12-13T11:14:49Z",
|
||||
"pushed_at": "2023-10-18T17:15:55Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -7201,10 +7201,10 @@
|
|||
"description": "Small example repo for looking into log4j CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T19:59:38Z",
|
||||
"updated_at": "2024-09-24T16:59:09Z",
|
||||
"updated_at": "2024-12-13T08:10:30Z",
|
||||
"pushed_at": "2021-12-24T15:44:53Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -7213,7 +7213,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2024-12-12T17:05:24Z",
|
||||
"updated_at": "2024-12-13T06:37:28Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1172,
|
||||
"watchers_count": 1172,
|
||||
"stargazers_count": 1171,
|
||||
"watchers_count": 1171,
|
||||
"has_discussions": true,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 190,
|
||||
"watchers": 1172,
|
||||
"watchers": 1171,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Demonstrate some functionalities of Morion by generating an exploit for CVE-2022-27646 (stack buffer overflow on Netgear R6700v3 routers).",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-01T05:10:56Z",
|
||||
"updated_at": "2024-10-28T07:04:26Z",
|
||||
"pushed_at": "2024-10-28T07:04:22Z",
|
||||
"updated_at": "2024-12-13T08:49:45Z",
|
||||
"pushed_at": "2024-12-13T08:49:41Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -203,10 +203,10 @@
|
|||
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-05T18:42:27Z",
|
||||
"updated_at": "2024-12-08T11:46:06Z",
|
||||
"updated_at": "2024-12-13T12:14:00Z",
|
||||
"pushed_at": "2023-02-05T19:35:03Z",
|
||||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -215,7 +215,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 215,
|
||||
"watchers": 214,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-24T13:54:42Z",
|
||||
"updated_at": "2024-11-28T15:29:10Z",
|
||||
"updated_at": "2024-12-13T10:50:47Z",
|
||||
"pushed_at": "2023-02-24T13:29:38Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 108,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 108,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-16T20:15:36Z",
|
||||
"updated_at": "2024-12-04T10:43:06Z",
|
||||
"updated_at": "2024-12-13T06:37:07Z",
|
||||
"pushed_at": "2024-05-08T16:17:07Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 131,
|
||||
"watchers": 130,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -91,5 +91,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 902845679,
|
||||
"name": "CVE-2023-40028",
|
||||
"full_name": "sudlit\/CVE-2023-40028",
|
||||
"owner": {
|
||||
"login": "sudlit",
|
||||
"id": 18578688,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18578688?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudlit",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudlit\/CVE-2023-40028",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T11:42:51Z",
|
||||
"updated_at": "2024-12-13T11:55:14Z",
|
||||
"pushed_at": "2024-12-13T11:55:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-10124.json
Normal file
33
2024/CVE-2024-10124.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 902440180,
|
||||
"name": "CVE-2024-10124",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-10124",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10124",
|
||||
"description": "Vayu Blocks – Gutenberg Blocks for WordPress & WooCommerce <= 1.1.1 - Missing Authorization to Unauthenticated Arbitrary Plugin Installation\/Activation",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-12T15:13:30Z",
|
||||
"updated_at": "2024-12-13T10:33:26Z",
|
||||
"pushed_at": "2024-12-12T15:14:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -91,5 +91,36 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 902781667,
|
||||
"name": "CVE-2024-10220",
|
||||
"full_name": "filipzag\/CVE-2024-10220",
|
||||
"owner": {
|
||||
"login": "filipzag",
|
||||
"id": 35038922,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35038922?v=4",
|
||||
"html_url": "https:\/\/github.com\/filipzag",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/filipzag\/CVE-2024-10220",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T08:59:23Z",
|
||||
"updated_at": "2024-12-13T08:59:53Z",
|
||||
"pushed_at": "2024-12-13T08:59:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-29T06:13:36Z",
|
||||
"updated_at": "2024-12-13T04:19:43Z",
|
||||
"updated_at": "2024-12-13T08:07:54Z",
|
||||
"pushed_at": "2024-12-04T01:01:28Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1160,7 +1160,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-03T13:30:31Z",
|
||||
"updated_at": "2024-10-03T05:17:54Z",
|
||||
"updated_at": "2024-12-13T07:06:39Z",
|
||||
"pushed_at": "2024-07-27T12:46:44Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
|
|
|
@ -231,10 +231,10 @@
|
|||
"description": "CVE-2024-28955 Exploitation PoC ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T11:49:51Z",
|
||||
"updated_at": "2024-09-12T08:51:31Z",
|
||||
"updated_at": "2024-12-13T10:42:54Z",
|
||||
"pushed_at": "2024-07-01T12:53:21Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -252,7 +252,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -952,10 +952,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-12-11T16:22:09Z",
|
||||
"updated_at": "2024-12-13T12:09:59Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3500,
|
||||
"watchers_count": 3500,
|
||||
"stargazers_count": 3499,
|
||||
"watchers_count": 3499,
|
||||
"has_discussions": false,
|
||||
"forks_count": 240,
|
||||
"allow_forking": true,
|
||||
|
@ -964,7 +964,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 240,
|
||||
"watchers": 3500,
|
||||
"watchers": 3499,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Exploit PoC for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T19:33:08Z",
|
||||
"updated_at": "2024-12-12T16:39:07Z",
|
||||
"updated_at": "2024-12-13T10:10:23Z",
|
||||
"pushed_at": "2024-05-19T07:12:00Z",
|
||||
"stargazers_count": 517,
|
||||
"watchers_count": 517,
|
||||
"stargazers_count": 518,
|
||||
"watchers_count": 518,
|
||||
"has_discussions": false,
|
||||
"forks_count": 145,
|
||||
"allow_forking": true,
|
||||
|
@ -93,7 +93,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 145,
|
||||
"watchers": 517,
|
||||
"watchers": 518,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"forks": 21,
|
||||
"watchers": 113,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-40711-exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-16T05:02:27Z",
|
||||
"updated_at": "2024-12-13T02:57:02Z",
|
||||
"updated_at": "2024-12-13T08:34:45Z",
|
||||
"pushed_at": "2024-10-17T01:06:42Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "cve-2024-42327 ZBX-25623",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-01T00:15:27Z",
|
||||
"updated_at": "2024-12-10T22:15:23Z",
|
||||
"updated_at": "2024-12-13T06:43:33Z",
|
||||
"pushed_at": "2024-12-01T01:18:36Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 5,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-08T08:28:26Z",
|
||||
"updated_at": "2024-12-09T08:34:29Z",
|
||||
"updated_at": "2024-12-13T07:00:44Z",
|
||||
"pushed_at": "2024-08-08T09:32:00Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "This repository details a SQL Injection vulnerability in Inventio Lite v4's, including exploitation steps and a Python script to automate the attack. It provides information on the vulnerable code, recommended fixes, and how to extract and decrypt administrative credentials.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-07T08:45:43Z",
|
||||
"updated_at": "2024-09-12T06:46:16Z",
|
||||
"pushed_at": "2024-09-12T06:46:12Z",
|
||||
"updated_at": "2024-12-13T12:02:08Z",
|
||||
"pushed_at": "2024-12-13T12:02:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -60,13 +60,13 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation \/ Arbitrary Code Execution Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T08:51:08Z",
|
||||
"updated_at": "2024-12-11T14:35:20Z",
|
||||
"updated_at": "2024-12-13T09:37:44Z",
|
||||
"pushed_at": "2024-11-05T02:57:25Z",
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 178,
|
||||
"watchers": 179,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"forks": 17,
|
||||
"watchers": 90,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-11T14:19:55Z",
|
||||
"updated_at": "2024-12-13T04:51:20Z",
|
||||
"updated_at": "2024-12-13T08:33:10Z",
|
||||
"pushed_at": "2024-12-11T14:23:19Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "s2-067(CVE-2024-53677)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-12T08:30:14Z",
|
||||
"updated_at": "2024-12-13T04:39:09Z",
|
||||
"updated_at": "2024-12-13T09:18:45Z",
|
||||
"pushed_at": "2024-12-12T08:33:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T06:21:36Z",
|
||||
"updated_at": "2024-12-13T06:22:39Z",
|
||||
"pushed_at": "2024-12-13T06:22:08Z",
|
||||
"updated_at": "2024-12-13T07:28:37Z",
|
||||
"pushed_at": "2024-12-13T07:28:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection ",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-21T09:51:21Z",
|
||||
"updated_at": "2024-12-11T23:50:45Z",
|
||||
"pushed_at": "2024-08-22T15:20:46Z",
|
||||
"updated_at": "2024-12-13T10:58:23Z",
|
||||
"pushed_at": "2024-12-13T10:58:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
10
README.md
10
README.md
|
@ -1986,6 +1986,13 @@
|
|||
|
||||
- [windz3r0day/CVE-2024-10015](https://github.com/windz3r0day/CVE-2024-10015)
|
||||
|
||||
### CVE-2024-10124 (2024-12-12)
|
||||
|
||||
<code>The Vayu Blocks – Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation due to a missing capability check on the tp_install() function in all versions up to, and including, 1.1.1. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated. This vulnerability was partially patched in version 1.1.1.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-10124](https://github.com/RandomRobbieBF/CVE-2024-10124)
|
||||
|
||||
### CVE-2024-10140 (2024-10-19)
|
||||
|
||||
<code>Eine kritische Schwachstelle wurde in code-projects Pharmacy Management System 1.0 entdeckt. Betroffen davon ist ein unbekannter Prozess der Datei /manage_supplier.php. Durch Beeinflussen des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
|
||||
|
@ -2001,6 +2008,7 @@
|
|||
- [mochizuki875/CVE-2024-10220-githooks](https://github.com/mochizuki875/CVE-2024-10220-githooks)
|
||||
- [any2sec/cve-2024-10220](https://github.com/any2sec/cve-2024-10220)
|
||||
- [XiaomingX/cve-2024-10220-githooks](https://github.com/XiaomingX/cve-2024-10220-githooks)
|
||||
- [filipzag/CVE-2024-10220](https://github.com/filipzag/CVE-2024-10220)
|
||||
|
||||
### CVE-2024-10245 (2024-11-12)
|
||||
|
||||
|
@ -13263,6 +13271,7 @@
|
|||
- [0xyassine/CVE-2023-40028](https://github.com/0xyassine/CVE-2023-40028)
|
||||
- [BBSynapse/CVE-2023-40028](https://github.com/BBSynapse/CVE-2023-40028)
|
||||
- [0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028](https://github.com/0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028)
|
||||
- [sudlit/CVE-2023-40028](https://github.com/sudlit/CVE-2023-40028)
|
||||
|
||||
### CVE-2023-40031 (2023-08-25)
|
||||
|
||||
|
@ -43958,6 +43967,7 @@
|
|||
- [K3ysTr0K3R/CVE-2017-12617-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2017-12617-EXPLOIT)
|
||||
- [scirusvulgaris/CVE-2017-12617](https://github.com/scirusvulgaris/CVE-2017-12617)
|
||||
- [yZ1337/CVE-2017-12617](https://github.com/yZ1337/CVE-2017-12617)
|
||||
- [DevaDJ/CVE-2017-12617](https://github.com/DevaDJ/CVE-2017-12617)
|
||||
|
||||
### CVE-2017-12624 (2017-11-14)
|
||||
|
||||
|
|
Loading…
Reference in a new issue