mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/21 06:31:48
This commit is contained in:
parent
55cdbd4753
commit
2304645eb8
26 changed files with 211 additions and 74 deletions
|
@ -14,10 +14,10 @@
|
|||
"description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-18T04:24:43Z",
|
||||
"updated_at": "2024-12-08T13:18:23Z",
|
||||
"updated_at": "2024-12-21T04:54:44Z",
|
||||
"pushed_at": "2019-09-30T23:38:11Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -1652,10 +1652,10 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2024-12-07T16:57:52Z",
|
||||
"updated_at": "2024-12-21T05:10:57Z",
|
||||
"pushed_at": "2022-03-30T14:02:04Z",
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
|
@ -1664,7 +1664,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 271,
|
||||
"watchers": 272,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -2182,7 +2182,7 @@
|
|||
"forks": 20,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 452924557,
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"windows-boot"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"forks": 61,
|
||||
"watchers": 317,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
|
|
|
@ -441,10 +441,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-05T20:35:38Z",
|
||||
"updated_at": "2024-12-15T22:44:39Z",
|
||||
"updated_at": "2024-12-21T04:26:27Z",
|
||||
"pushed_at": "2022-06-08T15:35:44Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -453,7 +453,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-28T09:51:41Z",
|
||||
"updated_at": "2024-11-13T18:00:42Z",
|
||||
"updated_at": "2024-12-21T03:51:05Z",
|
||||
"pushed_at": "2022-11-18T15:47:17Z",
|
||||
"stargazers_count": 529,
|
||||
"watchers_count": 529,
|
||||
"stargazers_count": 530,
|
||||
"watchers_count": 530,
|
||||
"has_discussions": false,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 110,
|
||||
"watchers": 529,
|
||||
"watchers": 530,
|
||||
"score": 0,
|
||||
"subscribers_count": 46
|
||||
},
|
||||
|
@ -180,10 +180,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-11-02T17:33:26Z",
|
||||
"updated_at": "2023-04-07T08:25:52Z",
|
||||
"updated_at": "2024-12-21T03:53:31Z",
|
||||
"pushed_at": "2022-11-02T17:33:46Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -192,7 +192,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -45,19 +45,19 @@
|
|||
"description": "harbor unauthorized detection",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-21T10:40:19Z",
|
||||
"updated_at": "2024-12-20T12:32:30Z",
|
||||
"updated_at": "2024-12-21T04:46:10Z",
|
||||
"pushed_at": "2024-12-12T07:37:01Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 27,
|
||||
"forks": 6,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "pocs & exploit for CVE-2023-24871 (rce + lpe)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-21T15:01:15Z",
|
||||
"updated_at": "2024-08-28T15:24:50Z",
|
||||
"updated_at": "2024-12-21T05:46:27Z",
|
||||
"pushed_at": "2024-07-17T12:34:16Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -49,10 +49,10 @@
|
|||
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-22T03:06:31Z",
|
||||
"updated_at": "2024-12-14T21:15:43Z",
|
||||
"updated_at": "2024-12-21T04:57:34Z",
|
||||
"pushed_at": "2024-08-24T13:38:50Z",
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -69,7 +69,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 273,
|
||||
"watchers": 274,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -211,10 +211,10 @@
|
|||
"description": "Automatic vuln scanner and exploiter for l7 ddos attacks using Chamilio CVE-2023-34960",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-13T08:30:18Z",
|
||||
"updated_at": "2024-11-06T23:17:03Z",
|
||||
"updated_at": "2024-12-21T02:53:55Z",
|
||||
"pushed_at": "2024-10-21T18:24:28Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -239,7 +239,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -122,5 +122,45 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 906469704,
|
||||
"name": "CVE-2023-40028-Ghost-Arbitrary-File-Read",
|
||||
"full_name": "monke443\/CVE-2023-40028-Ghost-Arbitrary-File-Read",
|
||||
"owner": {
|
||||
"login": "monke443",
|
||||
"id": 131496421,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131496421?v=4",
|
||||
"html_url": "https:\/\/github.com\/monke443",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/monke443\/CVE-2023-40028-Ghost-Arbitrary-File-Read",
|
||||
"description": "Arbitrary file read in Ghost-CMS allows an attacker to upload a malicious ZIP file with a symlink.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-21T01:53:47Z",
|
||||
"updated_at": "2024-12-21T02:51:46Z",
|
||||
"pushed_at": "2024-12-21T02:51:43Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2023-40028",
|
||||
"exploit",
|
||||
"ghost-cms",
|
||||
"github",
|
||||
"pentesting",
|
||||
"security",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-15T12:14:18Z",
|
||||
"updated_at": "2024-12-07T10:15:42Z",
|
||||
"updated_at": "2024-12-21T00:56:57Z",
|
||||
"pushed_at": "2024-03-08T12:57:53Z",
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
|
|
|
@ -245,6 +245,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -231,10 +231,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-12-18T23:12:25Z",
|
||||
"updated_at": "2024-11-07T20:36:14Z",
|
||||
"updated_at": "2024-12-21T01:54:59Z",
|
||||
"pushed_at": "2024-05-13T17:40:58Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-12-20T11:54:25Z",
|
||||
"updated_at": "2024-12-21T00:36:25Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2306,
|
||||
"watchers_count": 2306,
|
||||
"stargazers_count": 2307,
|
||||
"watchers_count": 2307,
|
||||
"has_discussions": false,
|
||||
"forks_count": 299,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 299,
|
||||
"watchers": 2306,
|
||||
"watchers": 2307,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -1734,5 +1734,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 906477862,
|
||||
"name": "Check-Point_poc",
|
||||
"full_name": "NingXin2002\/Check-Point_poc",
|
||||
"owner": {
|
||||
"login": "NingXin2002",
|
||||
"id": 138864342,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4",
|
||||
"html_url": "https:\/\/github.com\/NingXin2002",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NingXin2002\/Check-Point_poc",
|
||||
"description": "Check-Point安全网关任意文件读取漏洞(CVE-2024-24919)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-21T02:42:10Z",
|
||||
"updated_at": "2024-12-21T02:43:44Z",
|
||||
"pushed_at": "2024-12-21T02:43:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 906487773,
|
||||
"name": "Docassemble_poc",
|
||||
"full_name": "NingXin2002\/Docassemble_poc",
|
||||
"owner": {
|
||||
"login": "NingXin2002",
|
||||
"id": 138864342,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4",
|
||||
"html_url": "https:\/\/github.com\/NingXin2002",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NingXin2002\/Docassemble_poc",
|
||||
"description": "Docassemble任意文件读取漏洞(CVE-2024-27292)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-21T03:35:19Z",
|
||||
"updated_at": "2024-12-21T03:37:01Z",
|
||||
"pushed_at": "2024-12-21T03:36:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Materials for CVE-2024-30052.",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-04T19:09:45Z",
|
||||
"updated_at": "2024-10-28T19:44:45Z",
|
||||
"updated_at": "2024-12-21T05:56:21Z",
|
||||
"pushed_at": "2024-10-04T20:28:39Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -239,13 +239,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 906475087,
|
||||
"name": "CVE-2024-41713POC",
|
||||
"full_name": "zxj-hub\/CVE-2024-41713POC",
|
||||
"owner": {
|
||||
"login": "zxj-hub",
|
||||
"id": 192207002,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192207002?v=4",
|
||||
"html_url": "https:\/\/github.com\/zxj-hub",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zxj-hub\/CVE-2024-41713POC",
|
||||
"description": "Mitel MiCollab 企业协作平台 任意文件读取漏洞(CVE-2024-41713)由于Mitel MiCollab软件的 NuPoint 统一消息 (NPM) 组件中存在身份验证绕过漏洞,并且输入验证不足,未经身份验证的远程攻击者可利用该漏洞执行路径遍历攻击,成功利用可能导致未授权访问、破坏或删除用户的数据和系统配置。影响范围:version < MiCollab 9.8 SP2 (9.8.2.12)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-21T02:26:26Z",
|
||||
"updated_at": "2024-12-21T02:28:26Z",
|
||||
"pushed_at": "2024-12-21T02:28:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-20T05:24:10Z",
|
||||
"updated_at": "2024-12-20T16:26:15Z",
|
||||
"updated_at": "2024-12-21T02:16:44Z",
|
||||
"pushed_at": "2024-12-20T05:41:23Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -11,10 +11,10 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AbdullahAlmutawa\/CVE-2024-50945",
|
||||
"description": "SimplCommerce is affected by a broken access control vulnerability in the review system, allowing unauthorized users to post reviews for products they have not purchased.",
|
||||
"description": "SimplCommerce is affected by a Broken Access Control vulnerability in the review system, allowing unauthorized users to post reviews for products they have not purchased.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-20T00:43:18Z",
|
||||
"updated_at": "2024-12-20T21:18:15Z",
|
||||
"updated_at": "2024-12-21T01:25:07Z",
|
||||
"pushed_at": "2024-12-20T21:18:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T17:42:55Z",
|
||||
"updated_at": "2024-12-21T00:26:13Z",
|
||||
"updated_at": "2024-12-21T01:51:32Z",
|
||||
"pushed_at": "2024-12-20T10:05:15Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-20T03:34:01Z",
|
||||
"updated_at": "2024-12-20T21:18:42Z",
|
||||
"updated_at": "2024-12-21T05:14:20Z",
|
||||
"pushed_at": "2024-12-20T04:26:44Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -3560,6 +3560,7 @@
|
|||
- [geniuszlyy/CVE-2024-24919](https://github.com/geniuszlyy/CVE-2024-24919)
|
||||
- [skyrowalker/CVE-2024-24919](https://github.com/skyrowalker/CVE-2024-24919)
|
||||
- [sar-3mar/CVE-2024-24919_POC](https://github.com/sar-3mar/CVE-2024-24919_POC)
|
||||
- [NingXin2002/Check-Point_poc](https://github.com/NingXin2002/Check-Point_poc)
|
||||
|
||||
### CVE-2024-24926 (2024-02-12)
|
||||
|
||||
|
@ -3930,6 +3931,7 @@
|
|||
</code>
|
||||
|
||||
- [th3gokul/CVE-2024-27292](https://github.com/th3gokul/CVE-2024-27292)
|
||||
- [NingXin2002/Docassemble_poc](https://github.com/NingXin2002/Docassemble_poc)
|
||||
|
||||
### CVE-2024-27316 (2024-04-04)
|
||||
|
||||
|
@ -6210,6 +6212,7 @@
|
|||
</code>
|
||||
|
||||
- [watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713](https://github.com/watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713)
|
||||
- [zxj-hub/CVE-2024-41713POC](https://github.com/zxj-hub/CVE-2024-41713POC)
|
||||
|
||||
### CVE-2024-41958 (2024-08-05)
|
||||
|
||||
|
@ -13487,6 +13490,7 @@
|
|||
- [BBSynapse/CVE-2023-40028](https://github.com/BBSynapse/CVE-2023-40028)
|
||||
- [0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028](https://github.com/0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028)
|
||||
- [sudlit/CVE-2023-40028](https://github.com/sudlit/CVE-2023-40028)
|
||||
- [monke443/CVE-2023-40028-Ghost-Arbitrary-File-Read](https://github.com/monke443/CVE-2023-40028-Ghost-Arbitrary-File-Read)
|
||||
|
||||
### CVE-2023-40031 (2023-08-25)
|
||||
|
||||
|
|
Loading…
Reference in a new issue