mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2024/07/30 06:29:34
This commit is contained in:
parent
ca647f673c
commit
27e2043fe9
37 changed files with 200 additions and 99 deletions
|
@ -103,10 +103,10 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2024-07-29T15:24:25Z",
|
||||
"updated_at": "2024-07-30T04:47:16Z",
|
||||
"pushed_at": "2024-06-16T15:35:20Z",
|
||||
"stargazers_count": 939,
|
||||
"watchers_count": 939,
|
||||
"stargazers_count": 940,
|
||||
"watchers_count": 940,
|
||||
"has_discussions": false,
|
||||
"forks_count": 179,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 179,
|
||||
"watchers": 939,
|
||||
"watchers": 940,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -253,10 +253,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-02-21T09:56:19Z",
|
||||
"updated_at": "2024-03-13T14:58:31Z",
|
||||
"updated_at": "2024-07-30T04:05:35Z",
|
||||
"pushed_at": "2020-02-28T07:08:16Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -265,7 +265,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-29T07:11:06Z",
|
||||
"updated_at": "2024-07-29T07:24:58Z",
|
||||
"pushed_at": "2024-07-29T07:24:55Z",
|
||||
"updated_at": "2024-07-30T05:31:37Z",
|
||||
"pushed_at": "2024-07-30T05:31:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Spring Cloud Gateway < 3.0.7 & < 3.1.1 Code Injection (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-03T18:26:18Z",
|
||||
"updated_at": "2024-07-07T13:53:46Z",
|
||||
"updated_at": "2024-07-30T02:53:34Z",
|
||||
"pushed_at": "2022-03-04T21:10:45Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -36,7 +36,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"forks": 18,
|
||||
"watchers": 75,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -150,7 +150,7 @@
|
|||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -164,7 +164,7 @@
|
|||
"text4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"forks": 29,
|
||||
"watchers": 76,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-10T19:08:28Z",
|
||||
"updated_at": "2024-07-29T21:25:57Z",
|
||||
"updated_at": "2024-07-30T05:34:22Z",
|
||||
"pushed_at": "2023-03-10T20:16:53Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -93,7 +93,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 168,
|
||||
"watchers": 170,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-24T13:54:42Z",
|
||||
"updated_at": "2024-06-20T07:40:51Z",
|
||||
"updated_at": "2024-07-30T00:32:09Z",
|
||||
"pushed_at": "2023-02-24T13:29:38Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 108,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 108,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -227,10 +227,10 @@
|
|||
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-06T15:09:33Z",
|
||||
"updated_at": "2024-07-24T11:11:22Z",
|
||||
"updated_at": "2024-07-30T00:36:58Z",
|
||||
"pushed_at": "2024-02-06T15:56:12Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -239,7 +239,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 666237071,
|
||||
"name": "CVE-2023-33592",
|
||||
"full_name": "FuckingHack3r\/CVE-2023-33592",
|
||||
"full_name": "ChineseOldboy\/CVE-2023-33592",
|
||||
"owner": {
|
||||
"login": "FuckingHack3r",
|
||||
"login": "ChineseOldboy",
|
||||
"id": 102947998,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102947998?v=4",
|
||||
"html_url": "https:\/\/github.com\/FuckingHack3r"
|
||||
"html_url": "https:\/\/github.com\/ChineseOldboy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FuckingHack3r\/CVE-2023-33592",
|
||||
"html_url": "https:\/\/github.com\/ChineseOldboy\/CVE-2023-33592",
|
||||
"description": "CVE-2023-33592批量漏洞利用程序",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-14T03:15:13Z",
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-24T22:24:34Z",
|
||||
"updated_at": "2024-07-29T22:11:42Z",
|
||||
"updated_at": "2024-07-30T04:31:56Z",
|
||||
"pushed_at": "2023-08-25T00:30:01Z",
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 186,
|
||||
"watchers": 190,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
32
2023/CVE-2023-43040.json
Normal file
32
2023/CVE-2023-43040.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 835371220,
|
||||
"name": "CVE-2023-43040",
|
||||
"full_name": "riza\/CVE-2023-43040",
|
||||
"owner": {
|
||||
"login": "riza",
|
||||
"id": 2565849,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2565849?v=4",
|
||||
"html_url": "https:\/\/github.com\/riza"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/riza\/CVE-2023-43040",
|
||||
"description": "CVE-2023-43040 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-29T17:39:14Z",
|
||||
"updated_at": "2024-07-30T05:53:26Z",
|
||||
"pushed_at": "2024-07-29T17:53:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC for CVE-2023-4911",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-04T14:12:16Z",
|
||||
"updated_at": "2024-07-25T11:41:29Z",
|
||||
"updated_at": "2024-07-30T06:26:55Z",
|
||||
"pushed_at": "2023-10-04T14:16:36Z",
|
||||
"stargazers_count": 379,
|
||||
"watchers_count": 379,
|
||||
"stargazers_count": 378,
|
||||
"watchers_count": 378,
|
||||
"has_discussions": false,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 379,
|
||||
"watchers": 378,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T12:30:53Z",
|
||||
"updated_at": "2024-07-29T11:52:05Z",
|
||||
"updated_at": "2024-07-30T01:39:47Z",
|
||||
"pushed_at": "2024-07-25T18:12:57Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 164,
|
||||
"watchers": 165,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-06T15:09:33Z",
|
||||
"updated_at": "2024-07-24T11:11:22Z",
|
||||
"updated_at": "2024-07-30T00:36:58Z",
|
||||
"pushed_at": "2024-02-06T15:56:12Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -895,13 +895,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -600,10 +600,10 @@
|
|||
"description": "This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-31T18:14:19Z",
|
||||
"updated_at": "2024-06-09T05:24:59Z",
|
||||
"updated_at": "2024-07-30T02:29:31Z",
|
||||
"pushed_at": "2024-06-05T16:13:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -612,7 +612,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1813,10 +1813,10 @@
|
|||
"description": "GNU IFUNC is the real culprit behind CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T18:36:16Z",
|
||||
"updated_at": "2024-07-28T17:20:18Z",
|
||||
"updated_at": "2024-07-30T04:14:28Z",
|
||||
"pushed_at": "2024-07-25T19:17:59Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1840,7 +1840,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-07T23:03:55Z",
|
||||
"updated_at": "2024-05-15T07:27:30Z",
|
||||
"updated_at": "2024-07-30T05:59:57Z",
|
||||
"pushed_at": "2024-04-11T01:38:55Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1599,8 +1599,8 @@
|
|||
"description": "A Reverse shell generator for gitlab-shell vulnerability cve 2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-28T14:22:01Z",
|
||||
"updated_at": "2024-07-28T15:33:38Z",
|
||||
"pushed_at": "2024-07-28T15:33:35Z",
|
||||
"updated_at": "2024-07-30T04:17:31Z",
|
||||
"pushed_at": "2024-07-30T04:17:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -1643,7 +1643,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 835173287,
|
||||
|
@ -1680,6 +1680,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -523,5 +523,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 835555212,
|
||||
"name": "CVE-2024-34102-RCE",
|
||||
"full_name": "etx-Arn\/CVE-2024-34102-RCE",
|
||||
"owner": {
|
||||
"login": "etx-Arn",
|
||||
"id": 176983349,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176983349?v=4",
|
||||
"html_url": "https:\/\/github.com\/etx-Arn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/etx-Arn\/CVE-2024-34102-RCE",
|
||||
"description": "CVE-2024-34102 unauthenticated RCE PoC for Magento\/adobe commerce",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-30T04:42:45Z",
|
||||
"updated_at": "2024-07-30T04:45:20Z",
|
||||
"pushed_at": "2024-07-30T04:45:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -63,6 +63,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-09T19:44:40Z",
|
||||
"updated_at": "2024-07-19T09:09:54Z",
|
||||
"updated_at": "2024-07-30T02:28:42Z",
|
||||
"pushed_at": "2024-07-09T20:21:22Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-07-29T08:33:12Z",
|
||||
"updated_at": "2024-07-29T08:36:41Z",
|
||||
"pushed_at": "2024-07-29T09:13:08Z",
|
||||
"pushed_at": "2024-07-30T06:32:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -27,6 +27,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -57,6 +57,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-40348. Will attempt to read \/etc\/passwd from target",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-21T00:54:55Z",
|
||||
"updated_at": "2024-07-29T16:37:39Z",
|
||||
"updated_at": "2024-07-30T03:58:55Z",
|
||||
"pushed_at": "2024-07-21T09:54:02Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-19T03:51:54Z",
|
||||
"updated_at": "2024-07-28T15:35:25Z",
|
||||
"updated_at": "2024-07-30T03:01:22Z",
|
||||
"pushed_at": "2024-07-19T04:01:13Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "CVE-2024-4879 & CVE-2024-5217 ServiceNow RCE Scanning Using Nuclei & Shodan Dork to find it.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-28T06:51:33Z",
|
||||
"updated_at": "2024-07-29T19:25:31Z",
|
||||
"updated_at": "2024-07-30T03:22:43Z",
|
||||
"pushed_at": "2024-07-28T07:53:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -2698,5 +2698,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 835582804,
|
||||
"name": "CVE-2024-6387",
|
||||
"full_name": "l-urk\/CVE-2024-6387",
|
||||
"owner": {
|
||||
"login": "l-urk",
|
||||
"id": 112792604,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112792604?v=4",
|
||||
"html_url": "https:\/\/github.com\/l-urk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/l-urk\/CVE-2024-6387",
|
||||
"description": "proof of concept python script for regreSSHion exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-30T06:13:11Z",
|
||||
"updated_at": "2024-07-30T06:13:14Z",
|
||||
"pushed_at": "2024-07-30T06:13:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
11
README.md
11
README.md
|
@ -1058,6 +1058,7 @@
|
|||
- [ThatNotEasy/CVE-2024-6387](https://github.com/ThatNotEasy/CVE-2024-6387)
|
||||
- [W1hithat/CVE-2024-6387](https://github.com/W1hithat/CVE-2024-6387)
|
||||
- [prelearn-code/CVE-2024-6387](https://github.com/prelearn-code/CVE-2024-6387)
|
||||
- [l-urk/CVE-2024-6387](https://github.com/l-urk/CVE-2024-6387)
|
||||
|
||||
### CVE-2024-6666 (2024-07-11)
|
||||
|
||||
|
@ -3114,6 +3115,7 @@
|
|||
- [bughuntar/CVE-2024-34102](https://github.com/bughuntar/CVE-2024-34102)
|
||||
- [bughuntar/CVE-2024-34102-Python](https://github.com/bughuntar/CVE-2024-34102-Python)
|
||||
- [Phantom-IN/CVE-2024-34102](https://github.com/Phantom-IN/CVE-2024-34102)
|
||||
- [etx-Arn/CVE-2024-34102-RCE](https://github.com/etx-Arn/CVE-2024-34102-RCE)
|
||||
|
||||
### CVE-2024-34144 (2024-05-02)
|
||||
|
||||
|
@ -7875,7 +7877,7 @@
|
|||
<code>Lost and Found Information System v1.0 was discovered to contain a SQL injection vulnerability via the component /php-lfis/admin/?page=system_info/contact_information.
|
||||
</code>
|
||||
|
||||
- [FuckingHack3r/CVE-2023-33592](https://github.com/FuckingHack3r/CVE-2023-33592)
|
||||
- [ChineseOldboy/CVE-2023-33592](https://github.com/ChineseOldboy/CVE-2023-33592)
|
||||
|
||||
### CVE-2023-33617 (2023-05-23)
|
||||
|
||||
|
@ -9824,6 +9826,13 @@
|
|||
|
||||
- [d0rb/CVE-2023-42931](https://github.com/d0rb/CVE-2023-42931)
|
||||
|
||||
### CVE-2023-43040 (2024-05-13)
|
||||
|
||||
<code>IBM Spectrum Fusion HCI 2.5.2 through 2.7.2 could allow an attacker to perform unauthorized actions in RGW for Ceph due to improper bucket access. IBM X-Force ID: 266807.
|
||||
</code>
|
||||
|
||||
- [riza/CVE-2023-43040](https://github.com/riza/CVE-2023-43040)
|
||||
|
||||
### CVE-2023-43115 (2023-09-18)
|
||||
|
||||
<code>In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).
|
||||
|
|
Loading…
Add table
Reference in a new issue