mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/08/17 06:29:17
This commit is contained in:
parent
6851dc0e87
commit
1e2fb9d57f
41 changed files with 259 additions and 189 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2024-08-12T19:13:37Z",
|
||||
"updated_at": "2024-08-17T02:51:40Z",
|
||||
"pushed_at": "2021-02-24T09:17:24Z",
|
||||
"stargazers_count": 2305,
|
||||
"watchers_count": 2305,
|
||||
"stargazers_count": 2306,
|
||||
"watchers_count": 2306,
|
||||
"has_discussions": false,
|
||||
"forks_count": 465,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 465,
|
||||
"watchers": 2305,
|
||||
"watchers": 2306,
|
||||
"score": 0,
|
||||
"subscribers_count": 117
|
||||
},
|
||||
|
|
|
@ -414,10 +414,10 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2024-08-16T17:52:19Z",
|
||||
"updated_at": "2024-08-17T04:59:03Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"has_discussions": false,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
|
@ -426,7 +426,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 443,
|
||||
"watchers": 444,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T05:55:53Z",
|
||||
"updated_at": "2024-08-12T19:34:13Z",
|
||||
"updated_at": "2024-08-17T01:40:23Z",
|
||||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 536,
|
||||
"watchers_count": 536,
|
||||
"stargazers_count": 537,
|
||||
"watchers_count": 537,
|
||||
"has_discussions": false,
|
||||
"forks_count": 253,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 253,
|
||||
"watchers": 536,
|
||||
"watchers": 537,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
File diff suppressed because one or more lines are too long
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-08-15T20:54:57Z",
|
||||
"updated_at": "2024-08-17T01:18:01Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4085,
|
||||
"watchers_count": 4085,
|
||||
"stargazers_count": 4086,
|
||||
"watchers_count": 4086,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1087,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1087,
|
||||
"watchers": 4085,
|
||||
"watchers": 4086,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2024-08-16T17:52:19Z",
|
||||
"updated_at": "2024-08-17T04:59:03Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"has_discussions": false,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 443,
|
||||
"watchers": 444,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Double-Free BUG in WhatsApp exploit poc.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-10T15:25:59Z",
|
||||
"updated_at": "2024-08-13T11:22:56Z",
|
||||
"updated_at": "2024-08-17T05:00:38Z",
|
||||
"pushed_at": "2020-05-10T15:32:54Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-08-15T20:54:57Z",
|
||||
"updated_at": "2024-08-17T01:18:01Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4085,
|
||||
"watchers_count": 4085,
|
||||
"stargazers_count": 4086,
|
||||
"watchers_count": 4086,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1087,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1087,
|
||||
"watchers": 4085,
|
||||
"watchers": 4086,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A simple POC that demonstrates A vulnerability found in IObitUnlocker 1.1.2 that leverages IOCTL codes found it its vulnerable driver (IObitUnlocker.sys), providing ability to unlock, delete, rename, copy, and move running files and a low privileged user.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-14T19:53:03Z",
|
||||
"updated_at": "2024-08-16T10:51:26Z",
|
||||
"updated_at": "2024-08-17T01:50:45Z",
|
||||
"pushed_at": "2024-04-14T20:07:14Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -90,10 +90,10 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2024-08-12T20:10:39Z",
|
||||
"updated_at": "2024-08-17T01:41:14Z",
|
||||
"pushed_at": "2023-06-08T04:01:33Z",
|
||||
"stargazers_count": 477,
|
||||
"watchers_count": 477,
|
||||
"stargazers_count": 478,
|
||||
"watchers_count": 478,
|
||||
"has_discussions": false,
|
||||
"forks_count": 147,
|
||||
"allow_forking": true,
|
||||
|
@ -104,7 +104,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 147,
|
||||
"watchers": 477,
|
||||
"watchers": 478,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-08-13T02:40:51Z",
|
||||
"updated_at": "2024-08-17T01:41:22Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1292,
|
||||
"watchers_count": 1292,
|
||||
"stargazers_count": 1293,
|
||||
"watchers_count": 1293,
|
||||
"has_discussions": false,
|
||||
"forks_count": 165,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 165,
|
||||
"watchers": 1292,
|
||||
"watchers": 1293,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-29T13:07:14Z",
|
||||
"updated_at": "2024-08-12T20:13:26Z",
|
||||
"updated_at": "2024-08-17T01:41:28Z",
|
||||
"pushed_at": "2023-01-19T16:24:33Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 213,
|
||||
"watchers": 214,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -944,7 +944,7 @@
|
|||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -961,7 +961,7 @@
|
|||
"zeroday"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"forks": 33,
|
||||
"watchers": 120,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -1224,10 +1224,10 @@
|
|||
"description": "CVE-2021-3156 - Sudo Baron Samedit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T06:29:26Z",
|
||||
"updated_at": "2024-08-12T20:12:34Z",
|
||||
"updated_at": "2024-08-17T00:48:44Z",
|
||||
"pushed_at": "2022-02-12T19:33:07Z",
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -1236,7 +1236,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 216,
|
||||
"watchers": 217,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "This is a exploit of CVE-2021-32305 a web vulnerability to command injection on search.php path, this exploit allows execute commands.",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-26T20:20:00Z",
|
||||
"updated_at": "2023-12-26T20:29:35Z",
|
||||
"updated_at": "2024-08-17T02:08:19Z",
|
||||
"pushed_at": "2023-12-26T20:29:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -471,36 +471,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 479265759,
|
||||
"name": "CVE-2021-42013",
|
||||
"full_name": "Adashz\/CVE-2021-42013",
|
||||
"owner": {
|
||||
"login": "Adashz",
|
||||
"id": 70690472,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70690472?v=4",
|
||||
"html_url": "https:\/\/github.com\/Adashz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Adashz\/CVE-2021-42013",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-08T06:07:37Z",
|
||||
"updated_at": "2022-04-08T06:08:55Z",
|
||||
"pushed_at": "2022-04-08T07:07:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 482976975,
|
||||
"name": "apache_2.4.50",
|
||||
|
|
|
@ -1186,10 +1186,10 @@
|
|||
"description": "F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-12T16:54:52Z",
|
||||
"updated_at": "2024-08-12T20:23:13Z",
|
||||
"updated_at": "2024-08-17T03:10:10Z",
|
||||
"pushed_at": "2023-05-11T02:55:01Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -1206,7 +1206,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -766,10 +766,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-08-13T02:40:51Z",
|
||||
"updated_at": "2024-08-17T01:41:22Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1292,
|
||||
"watchers_count": 1292,
|
||||
"stargazers_count": 1293,
|
||||
"watchers_count": 1293,
|
||||
"has_discussions": false,
|
||||
"forks_count": 165,
|
||||
"allow_forking": true,
|
||||
|
@ -785,7 +785,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 165,
|
||||
"watchers": 1292,
|
||||
"watchers": 1293,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-13T14:24:12Z",
|
||||
"updated_at": "2024-08-14T03:11:31Z",
|
||||
"updated_at": "2024-08-17T01:41:09Z",
|
||||
"pushed_at": "2022-10-13T15:25:00Z",
|
||||
"stargazers_count": 335,
|
||||
"watchers_count": 335,
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"has_discussions": false,
|
||||
"forks_count": 91,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 91,
|
||||
"watchers": 335,
|
||||
"watchers": 336,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering them ineffective, working for both x32 and x64(CVE-2023-44976).",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-01T18:24:38Z",
|
||||
"updated_at": "2024-08-16T22:07:08Z",
|
||||
"updated_at": "2024-08-17T06:03:37Z",
|
||||
"pushed_at": "2024-07-06T23:35:51Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-08-15T14:09:09Z",
|
||||
"updated_at": "2024-08-17T03:30:33Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2210,
|
||||
"watchers_count": 2210,
|
||||
"stargazers_count": 2211,
|
||||
"watchers_count": 2211,
|
||||
"has_discussions": false,
|
||||
"forks_count": 288,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 288,
|
||||
"watchers": 2210,
|
||||
"watchers": 2211,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T05:53:02Z",
|
||||
"updated_at": "2024-08-13T15:15:27Z",
|
||||
"updated_at": "2024-08-17T06:18:13Z",
|
||||
"pushed_at": "2024-04-16T21:00:14Z",
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 258,
|
||||
"watchers": 259,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "一个验证对CVE-2024-21733",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-15T09:47:32Z",
|
||||
"updated_at": "2024-08-16T18:26:02Z",
|
||||
"updated_at": "2024-08-17T06:20:11Z",
|
||||
"pushed_at": "2024-08-16T05:52:08Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -80,10 +80,10 @@
|
|||
"description": "PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-15T07:26:59Z",
|
||||
"updated_at": "2024-08-07T01:49:55Z",
|
||||
"updated_at": "2024-08-17T06:32:03Z",
|
||||
"pushed_at": "2024-07-16T23:22:14Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -103,7 +103,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2024-23897",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-26T09:44:32Z",
|
||||
"updated_at": "2024-08-15T05:09:08Z",
|
||||
"updated_at": "2024-08-17T01:44:38Z",
|
||||
"pushed_at": "2024-01-28T06:47:28Z",
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 185,
|
||||
"watchers": 186,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -364,6 +364,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-06T00:49:40Z",
|
||||
"updated_at": "2024-08-05T13:44:14Z",
|
||||
"updated_at": "2024-08-17T05:33:53Z",
|
||||
"pushed_at": "2024-07-12T00:41:36Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 101,
|
||||
"watchers": 102,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "mitigation script by disabling ipv6 of all interfaces",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-15T12:41:01Z",
|
||||
"updated_at": "2024-08-16T14:51:44Z",
|
||||
"updated_at": "2024-08-17T02:41:54Z",
|
||||
"pushed_at": "2024-08-15T13:53:45Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-38063 exploits for sale. CVE-2024-38063 PoC. CVE-2024-38063 Demo",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-16T03:33:47Z",
|
||||
"updated_at": "2024-08-16T15:37:17Z",
|
||||
"updated_at": "2024-08-17T02:01:12Z",
|
||||
"pushed_at": "2024-08-16T15:37:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -64,6 +64,36 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 843636100,
|
||||
"name": "CVE-2024-38063-VB",
|
||||
"full_name": "noradlb1\/CVE-2024-38063-VB",
|
||||
"owner": {
|
||||
"login": "noradlb1",
|
||||
"id": 74623428,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74623428?v=4",
|
||||
"html_url": "https:\/\/github.com\/noradlb1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/noradlb1\/CVE-2024-38063-VB",
|
||||
"description": "CVE-2024-38063 VB",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-17T01:11:12Z",
|
||||
"updated_at": "2024-08-17T01:20:05Z",
|
||||
"pushed_at": "2024-08-17T01:20:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "检测RDL服务是否运行,快速排查受影响资产",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-10T01:10:06Z",
|
||||
"updated_at": "2024-08-13T07:38:52Z",
|
||||
"updated_at": "2024-08-17T04:04:07Z",
|
||||
"pushed_at": "2024-08-10T02:19:43Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2024/CVE-2024-42657.json
Normal file
32
2024/CVE-2024-42657.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 843654614,
|
||||
"name": "CVE-2024-42657",
|
||||
"full_name": "sudo-subho\/CVE-2024-42657",
|
||||
"owner": {
|
||||
"login": "sudo-subho",
|
||||
"id": 77957540,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77957540?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudo-subho"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudo-subho\/CVE-2024-42657",
|
||||
"description": "CVE-2024-42657 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the lack of encryption during login process.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-17T02:55:14Z",
|
||||
"updated_at": "2024-08-17T02:59:43Z",
|
||||
"pushed_at": "2024-08-17T02:59:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-42658.json
Normal file
32
2024/CVE-2024-42658.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 843655957,
|
||||
"name": "CVE-2024-42658",
|
||||
"full_name": "sudo-subho\/CVE-2024-42658",
|
||||
"owner": {
|
||||
"login": "sudo-subho",
|
||||
"id": 77957540,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77957540?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudo-subho"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudo-subho\/CVE-2024-42658",
|
||||
"description": " CVE-2024-42658 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the cookies parameter",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-17T03:02:20Z",
|
||||
"updated_at": "2024-08-17T03:03:41Z",
|
||||
"pushed_at": "2024-08-17T03:03:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-08T08:28:26Z",
|
||||
"updated_at": "2024-08-15T01:17:05Z",
|
||||
"updated_at": "2024-08-17T04:03:30Z",
|
||||
"pushed_at": "2024-08-08T09:32:00Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -620,10 +620,10 @@
|
|||
"description": "A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T23:32:11Z",
|
||||
"updated_at": "2024-08-16T12:50:54Z",
|
||||
"updated_at": "2024-08-17T03:15:40Z",
|
||||
"pushed_at": "2024-07-12T02:56:25Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -646,7 +646,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1190,36 +1190,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 824582405,
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "cybersagor\/CVE-2024-4577",
|
||||
"owner": {
|
||||
"login": "cybersagor",
|
||||
"id": 132956845,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132956845?v=4",
|
||||
"html_url": "https:\/\/github.com\/cybersagor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cybersagor\/CVE-2024-4577",
|
||||
"description": "CVE-2024-4577 Exploits",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T12:47:44Z",
|
||||
"updated_at": "2024-07-05T16:43:53Z",
|
||||
"pushed_at": "2024-07-05T16:43:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 825104886,
|
||||
"name": "CVE-2024-4577-RCE",
|
||||
|
@ -1466,5 +1436,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 843644753,
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "bughuntar\/CVE-2024-4577",
|
||||
"owner": {
|
||||
"login": "bughuntar",
|
||||
"id": 99727538,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99727538?v=4",
|
||||
"html_url": "https:\/\/github.com\/bughuntar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bughuntar\/CVE-2024-4577",
|
||||
"description": "CVE-2024-4577 Exploits",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-17T02:01:57Z",
|
||||
"updated_at": "2024-08-17T02:02:29Z",
|
||||
"pushed_at": "2024-08-17T02:02:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 449,
|
||||
"watchers_count": 449,
|
||||
"has_discussions": false,
|
||||
"forks_count": 181,
|
||||
"forks_count": 179,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 181,
|
||||
"forks": 179,
|
||||
"watchers": 449,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
10
README.md
10
README.md
|
@ -822,7 +822,6 @@
|
|||
- [olebris/CVE-2024-4577](https://github.com/olebris/CVE-2024-4577)
|
||||
- [AlperenY-cs/CVE-2024-4577](https://github.com/AlperenY-cs/CVE-2024-4577)
|
||||
- [charis3306/CVE-2024-4577](https://github.com/charis3306/CVE-2024-4577)
|
||||
- [cybersagor/CVE-2024-4577](https://github.com/cybersagor/CVE-2024-4577)
|
||||
- [l0n3m4n/CVE-2024-4577-RCE](https://github.com/l0n3m4n/CVE-2024-4577-RCE)
|
||||
- [bibo318/CVE-2024-4577-RCE-ATTACK](https://github.com/bibo318/CVE-2024-4577-RCE-ATTACK)
|
||||
- [waived/CVE-2024-4577-PHP-RCE](https://github.com/waived/CVE-2024-4577-PHP-RCE)
|
||||
|
@ -831,6 +830,7 @@
|
|||
- [a-roshbaik/CVE-2024-4577-PHP-RCE](https://github.com/a-roshbaik/CVE-2024-4577-PHP-RCE)
|
||||
- [Jcccccx/CVE-2024-4577](https://github.com/Jcccccx/CVE-2024-4577)
|
||||
- [ManuelKy08/CVE-2024-4577---RR](https://github.com/ManuelKy08/CVE-2024-4577---RR)
|
||||
- [bughuntar/CVE-2024-4577](https://github.com/bughuntar/CVE-2024-4577)
|
||||
|
||||
### CVE-2024-4701 (2024-05-10)
|
||||
|
||||
|
@ -3824,6 +3824,7 @@
|
|||
|
||||
- [diegoalbuquerque/CVE-2024-38063](https://github.com/diegoalbuquerque/CVE-2024-38063)
|
||||
- [proxykingdev/CVE-2024-38063](https://github.com/proxykingdev/CVE-2024-38063)
|
||||
- [noradlb1/CVE-2024-38063-VB](https://github.com/noradlb1/CVE-2024-38063-VB)
|
||||
|
||||
### CVE-2024-38077 (2024-07-09)
|
||||
|
||||
|
@ -4176,6 +4177,12 @@
|
|||
|
||||
- [fevar54/CVE-2024-42461](https://github.com/fevar54/CVE-2024-42461)
|
||||
|
||||
### CVE-2024-42657
|
||||
- [sudo-subho/CVE-2024-42657](https://github.com/sudo-subho/CVE-2024-42657)
|
||||
|
||||
### CVE-2024-42658
|
||||
- [sudo-subho/CVE-2024-42658](https://github.com/sudo-subho/CVE-2024-42658)
|
||||
|
||||
### CVE-2024-42758 (2024-08-16)
|
||||
|
||||
<code>A Cross-site Scripting (XSS) vulnerability exists in version v2024-01-05 of the indexmenu plugin when is used and enabled in Dokuwiki (Open Source Wiki Engine). A malicious attacker can input XSS payloads for example when creating or editing existing page, to trigger the XSS on Dokuwiki, which is then stored in .txt file (due to nature of how Dokuwiki is designed), which presents stored XSS.
|
||||
|
@ -23970,7 +23977,6 @@
|
|||
- [tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway](https://github.com/tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway)
|
||||
- [mauricelambert/CVE-2021-42013](https://github.com/mauricelambert/CVE-2021-42013)
|
||||
- [honypot/CVE-2021-42013](https://github.com/honypot/CVE-2021-42013)
|
||||
- [Adashz/CVE-2021-42013](https://github.com/Adashz/CVE-2021-42013)
|
||||
- [hadrian3689/apache_2.4.50](https://github.com/hadrian3689/apache_2.4.50)
|
||||
- [viliuspovilaika/cve-2021-42013](https://github.com/viliuspovilaika/cve-2021-42013)
|
||||
- [mightysai1997/cve-2021-42013](https://github.com/mightysai1997/cve-2021-42013)
|
||||
|
|
Loading…
Reference in a new issue