mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/11/24 01:01:46
This commit is contained in:
parent
69230bc5d9
commit
29507a66a4
43 changed files with 622 additions and 1754 deletions
|
@ -14,10 +14,10 @@
|
|||
"description": "cups-root-file-read.sh | CVE-2012-5519",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-07T15:39:47Z",
|
||||
"updated_at": "2024-06-16T09:44:49Z",
|
||||
"updated_at": "2024-11-23T23:21:41Z",
|
||||
"pushed_at": "2022-06-30T10:54:51Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": true,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -188,5 +188,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 754620368,
|
||||
"name": "CVE-2017-11176",
|
||||
"full_name": "Yanoro\/CVE-2017-11176",
|
||||
"owner": {
|
||||
"login": "Yanoro",
|
||||
"id": 50038395,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50038395?v=4",
|
||||
"html_url": "https:\/\/github.com\/Yanoro",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Yanoro\/CVE-2017-11176",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-08T12:49:53Z",
|
||||
"updated_at": "2024-11-23T22:58:33Z",
|
||||
"pushed_at": "2024-02-17T12:00:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "POC for CVE-2020-13151",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-01T14:29:59Z",
|
||||
"updated_at": "2024-10-23T18:55:55Z",
|
||||
"updated_at": "2024-11-23T20:27:06Z",
|
||||
"pushed_at": "2020-08-03T18:55:37Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -1034,6 +1034,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -169,6 +169,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1130,7 +1130,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 278562778,
|
||||
|
@ -1192,7 +1192,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 278670349,
|
||||
|
|
|
@ -492,10 +492,10 @@
|
|||
"description": "Remake of CVE-2020-9484 by Pentestical",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-16T18:17:52Z",
|
||||
"updated_at": "2024-11-11T16:10:34Z",
|
||||
"updated_at": "2024-11-23T23:35:14Z",
|
||||
"pushed_at": "2024-09-16T18:22:36Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -504,7 +504,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1,39 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 446650428,
|
||||
"name": "badblood",
|
||||
"full_name": "jbaines-r7\/badblood",
|
||||
"owner": {
|
||||
"login": "jbaines-r7",
|
||||
"id": 91965877,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91965877?v=4",
|
||||
"html_url": "https:\/\/github.com\/jbaines-r7",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jbaines-r7\/badblood",
|
||||
"description": "SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-11T02:25:25Z",
|
||||
"updated_at": "2024-11-12T12:44:27Z",
|
||||
"pushed_at": "2022-01-11T11:22:06Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2021-20038",
|
||||
"exploit",
|
||||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 92,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 522394217,
|
||||
"name": "CVE-2021-20038-SonicWall-RCE",
|
||||
|
|
|
@ -147,10 +147,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-14T20:08:20Z",
|
||||
"updated_at": "2024-11-16T19:05:00Z",
|
||||
"updated_at": "2024-11-23T22:06:46Z",
|
||||
"pushed_at": "2022-11-16T13:14:56Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
|
@ -159,7 +159,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
33
2021/CVE-2021-41703.json
Normal file
33
2021/CVE-2021-41703.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 743697916,
|
||||
"name": "CVE-2021-41703",
|
||||
"full_name": "Yanoro\/CVE-2021-41703",
|
||||
"owner": {
|
||||
"login": "Yanoro",
|
||||
"id": 50038395,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50038395?v=4",
|
||||
"html_url": "https:\/\/github.com\/Yanoro",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Yanoro\/CVE-2021-41703",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-15T19:43:48Z",
|
||||
"updated_at": "2024-11-23T22:59:43Z",
|
||||
"pushed_at": "2024-01-24T18:18:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2024-11-21T05:14:16Z",
|
||||
"updated_at": "2024-11-23T23:28:42Z",
|
||||
"pushed_at": "2022-07-10T22:23:13Z",
|
||||
"stargazers_count": 985,
|
||||
"watchers_count": 985,
|
||||
"stargazers_count": 986,
|
||||
"watchers_count": 986,
|
||||
"has_discussions": false,
|
||||
"forks_count": 189,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 189,
|
||||
"watchers": 985,
|
||||
"watchers": 986,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
},
|
||||
|
|
|
@ -6188,10 +6188,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T21:32:42Z",
|
||||
"updated_at": "2024-09-06T23:07:26Z",
|
||||
"updated_at": "2024-11-23T23:28:52Z",
|
||||
"pushed_at": "2021-12-15T11:23:38Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -6200,7 +6200,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Local privilege escalation PoC for Linux kernel CVE-2022-1015",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T03:27:11Z",
|
||||
"updated_at": "2024-11-11T16:30:48Z",
|
||||
"updated_at": "2024-11-23T19:24:29Z",
|
||||
"pushed_at": "2022-04-03T01:36:45Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 199,
|
||||
"watchers": 200,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "win32k LPE ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T03:44:10Z",
|
||||
"updated_at": "2024-11-23T10:36:35Z",
|
||||
"updated_at": "2024-11-23T23:29:14Z",
|
||||
"pushed_at": "2022-01-27T04:18:18Z",
|
||||
"stargazers_count": 459,
|
||||
"watchers_count": 459,
|
||||
"stargazers_count": 460,
|
||||
"watchers_count": 460,
|
||||
"has_discussions": false,
|
||||
"forks_count": 134,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 134,
|
||||
"watchers": 459,
|
||||
"watchers": 460,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "spring-cloud \/ spring-cloud-function,spring.cloud.function.routing-expression,RCE,0day,0-day,POC,EXP,CVE-2022-22963",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-26T01:40:04Z",
|
||||
"updated_at": "2024-10-01T15:21:07Z",
|
||||
"updated_at": "2024-11-23T23:33:13Z",
|
||||
"pushed_at": "2023-03-05T12:41:19Z",
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"has_discussions": false,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
|
@ -36,7 +36,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 354,
|
||||
"watchers": 355,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -179,10 +179,10 @@
|
|||
"description": "Exploit for CVE-2022–25765 (pdfkit) - Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-10T00:50:35Z",
|
||||
"updated_at": "2024-11-11T01:50:23Z",
|
||||
"updated_at": "2024-11-23T22:33:04Z",
|
||||
"pushed_at": "2024-05-20T00:34:48Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "exploit for CVE-2022-2588",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-11T06:01:24Z",
|
||||
"updated_at": "2024-10-28T18:14:27Z",
|
||||
"updated_at": "2024-11-23T23:32:37Z",
|
||||
"pushed_at": "2023-03-04T05:52:28Z",
|
||||
"stargazers_count": 466,
|
||||
"watchers_count": 466,
|
||||
"stargazers_count": 467,
|
||||
"watchers_count": 467,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 466,
|
||||
"watchers": 467,
|
||||
"score": 0,
|
||||
"subscribers_count": 49
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-02T18:38:01Z",
|
||||
"updated_at": "2024-11-15T16:44:19Z",
|
||||
"updated_at": "2024-11-23T23:33:47Z",
|
||||
"pushed_at": "2024-11-10T17:21:28Z",
|
||||
"stargazers_count": 394,
|
||||
"watchers_count": 394,
|
||||
"stargazers_count": 395,
|
||||
"watchers_count": 395,
|
||||
"has_discussions": false,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 394,
|
||||
"watchers": 395,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -45,8 +45,8 @@
|
|||
"description": "CVE-2022-45354 Download Monitor <= 4.7.60 - Sensitive Information Exposure via REST API",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-23T09:56:19Z",
|
||||
"updated_at": "2024-11-23T10:03:17Z",
|
||||
"pushed_at": "2024-11-23T10:02:04Z",
|
||||
"updated_at": "2024-11-24T00:04:48Z",
|
||||
"pushed_at": "2024-11-24T00:04:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
33
2023/CVE-2023-50094.json
Normal file
33
2023/CVE-2023-50094.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 893203261,
|
||||
"name": "CVE-2023-50094_POC",
|
||||
"full_name": "Zierax\/CVE-2023-50094_POC",
|
||||
"owner": {
|
||||
"login": "Zierax",
|
||||
"id": 153237520,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153237520?v=4",
|
||||
"html_url": "https:\/\/github.com\/Zierax",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Zierax\/CVE-2023-50094_POC",
|
||||
"description": "poc for CVE-2023-50094 (rengine command injection)",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-23T20:00:29Z",
|
||||
"updated_at": "2024-11-23T20:11:04Z",
|
||||
"pushed_at": "2024-11-23T20:11:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -380,15 +380,15 @@
|
|||
{
|
||||
"id": 845342869,
|
||||
"name": "CVE-2023-7028",
|
||||
"full_name": "fa-rrel\/CVE-2023-7028",
|
||||
"full_name": "gh-ost00\/CVE-2023-7028",
|
||||
"owner": {
|
||||
"login": "fa-rrel",
|
||||
"login": "gh-ost00",
|
||||
"id": 153366162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2023-7028",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2023-7028",
|
||||
"description": "CVE-2023-7028 POC && Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-21T04:14:55Z",
|
||||
|
|
|
@ -40,15 +40,15 @@
|
|||
{
|
||||
"id": 850225780,
|
||||
"name": "CVE-2024-0195-SpiderFlow",
|
||||
"full_name": "fa-rrel\/CVE-2024-0195-SpiderFlow",
|
||||
"full_name": "gh-ost00\/CVE-2024-0195-SpiderFlow",
|
||||
"owner": {
|
||||
"login": "fa-rrel",
|
||||
"login": "gh-ost00",
|
||||
"id": 153366162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-0195-SpiderFlow",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-0195-SpiderFlow",
|
||||
"description": "CVE-2024-0195 Improper Control of Generation of Code ('Code Injection')",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-31T07:37:55Z",
|
||||
|
|
|
@ -126,15 +126,15 @@
|
|||
{
|
||||
"id": 849694443,
|
||||
"name": "CVE-2024-1071-SQL-Injection",
|
||||
"full_name": "fa-rrel\/CVE-2024-1071-SQL-Injection",
|
||||
"full_name": "gh-ost00\/CVE-2024-1071-SQL-Injection",
|
||||
"owner": {
|
||||
"login": "fa-rrel",
|
||||
"login": "gh-ost00",
|
||||
"id": 153366162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-1071-SQL-Injection",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-1071-SQL-Injection",
|
||||
"description": "Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-30T04:23:04Z",
|
||||
|
|
33
2024/CVE-2024-11199.json
Normal file
33
2024/CVE-2024-11199.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 893229030,
|
||||
"name": "CVE-2024-11199",
|
||||
"full_name": "windz3r0day\/CVE-2024-11199",
|
||||
"owner": {
|
||||
"login": "windz3r0day",
|
||||
"id": 179751303,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179751303?v=4",
|
||||
"html_url": "https:\/\/github.com\/windz3r0day",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/windz3r0day\/CVE-2024-11199",
|
||||
"description": "CVE-2024-11199 poc exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-23T21:43:20Z",
|
||||
"updated_at": "2024-11-23T21:52:42Z",
|
||||
"pushed_at": "2024-11-23T21:44:58Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-12T15:07:42Z",
|
||||
"updated_at": "2024-11-23T05:51:45Z",
|
||||
"updated_at": "2024-11-23T22:52:39Z",
|
||||
"pushed_at": "2024-04-18T14:31:34Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T15:17:59Z",
|
||||
"updated_at": "2024-11-23T17:18:52Z",
|
||||
"updated_at": "2024-11-23T21:06:27Z",
|
||||
"pushed_at": "2024-02-19T20:00:35Z",
|
||||
"stargazers_count": 689,
|
||||
"watchers_count": 689,
|
||||
"stargazers_count": 692,
|
||||
"watchers_count": 692,
|
||||
"has_discussions": false,
|
||||
"forks_count": 152,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 152,
|
||||
"watchers": 689,
|
||||
"watchers": 692,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 851552545,
|
||||
"name": "CVE-2024-24809-Proof-of-concept",
|
||||
"full_name": "fa-rrel\/CVE-2024-24809-Proof-of-concept",
|
||||
"full_name": "gh-ost00\/CVE-2024-24809-Proof-of-concept",
|
||||
"owner": {
|
||||
"login": "fa-rrel",
|
||||
"login": "gh-ost00",
|
||||
"id": 153366162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-24809-Proof-of-concept",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-24809-Proof-of-concept",
|
||||
"description": "Critical Flaws in Traccar GPS System Expose Users to Remote Attacks",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-03T09:56:13Z",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-26218",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-26T16:41:04Z",
|
||||
"updated_at": "2024-11-22T06:02:01Z",
|
||||
"updated_at": "2024-11-23T23:34:02Z",
|
||||
"pushed_at": "2024-04-26T16:46:15Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 880016834,
|
||||
"name": "CVE-2024-27954",
|
||||
"full_name": "fa-rrel\/CVE-2024-27954",
|
||||
"full_name": "gh-ost00\/CVE-2024-27954",
|
||||
"owner": {
|
||||
"login": "fa-rrel",
|
||||
"login": "gh-ost00",
|
||||
"id": 153366162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-27954",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-27954",
|
||||
"description": "Automatic Plugin for WordPress < 3.92.1 Multiples Vulnerabilities",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-29T00:46:35Z",
|
||||
|
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 852696537,
|
||||
"name": "CVE-2024-28987-POC",
|
||||
"full_name": "fa-rrel\/CVE-2024-28987-POC",
|
||||
"full_name": "gh-ost00\/CVE-2024-28987-POC",
|
||||
"owner": {
|
||||
"login": "fa-rrel",
|
||||
"login": "gh-ost00",
|
||||
"id": 153366162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-28987-POC",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-28987-POC",
|
||||
"description": "Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-05T09:01:58Z",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Scanner for CVE-2024-4040",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-23T09:31:29Z",
|
||||
"updated_at": "2024-11-20T16:30:45Z",
|
||||
"updated_at": "2024-11-23T22:43:47Z",
|
||||
"pushed_at": "2024-05-17T06:48:43Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -162,15 +162,15 @@
|
|||
{
|
||||
"id": 846915417,
|
||||
"name": "CVE-2024-4358",
|
||||
"full_name": "fa-rrel\/CVE-2024-4358",
|
||||
"full_name": "gh-ost00\/CVE-2024-4358",
|
||||
"owner": {
|
||||
"login": "fa-rrel",
|
||||
"login": "gh-ost00",
|
||||
"id": 153366162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-4358",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-4358",
|
||||
"description": "Telerik Report Server deserialization and authentication bypass exploit chain for CVE-2024-4358\/CVE-2024-1800",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T10:09:09Z",
|
||||
|
|
|
@ -169,10 +169,10 @@
|
|||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:52:54Z",
|
||||
"updated_at": "2024-11-22T18:42:57Z",
|
||||
"updated_at": "2024-11-23T22:12:19Z",
|
||||
"pushed_at": "2024-06-22T15:13:52Z",
|
||||
"stargazers_count": 234,
|
||||
"watchers_count": 234,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 234,
|
||||
"watchers": 235,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -1456,15 +1456,15 @@
|
|||
{
|
||||
"id": 844815719,
|
||||
"name": "CVE-2024-4577-RCE",
|
||||
"full_name": "fa-rrel\/CVE-2024-4577-RCE",
|
||||
"full_name": "gh-ost00\/CVE-2024-4577-RCE",
|
||||
"owner": {
|
||||
"login": "fa-rrel",
|
||||
"login": "gh-ost00",
|
||||
"id": 153366162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-4577-RCE",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-4577-RCE",
|
||||
"description": "PHP CGI Argument Injection (CVE-2024-4577) RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-20T02:56:03Z",
|
||||
|
|
|
@ -219,15 +219,15 @@
|
|||
{
|
||||
"id": 848057101,
|
||||
"name": "CVE-2024-4879",
|
||||
"full_name": "fa-rrel\/CVE-2024-4879",
|
||||
"full_name": "gh-ost00\/CVE-2024-4879",
|
||||
"owner": {
|
||||
"login": "fa-rrel",
|
||||
"login": "gh-ost00",
|
||||
"id": 153366162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-4879",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-4879",
|
||||
"description": "Jelly Template Injection Vulnerability in ServiceNow | POC CVE-2024-4879",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-27T03:43:28Z",
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "PoC for CVE-2024-48990",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-20T18:41:25Z",
|
||||
"updated_at": "2024-11-23T17:08:05Z",
|
||||
"updated_at": "2024-11-23T23:12:29Z",
|
||||
"pushed_at": "2024-11-20T18:49:33Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 46,
|
||||
"forks": 9,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 851185555,
|
||||
"name": "CVE-2024-5420-XSS",
|
||||
"full_name": "fa-rrel\/CVE-2024-5420-XSS",
|
||||
"full_name": "gh-ost00\/CVE-2024-5420-XSS",
|
||||
"owner": {
|
||||
"login": "fa-rrel",
|
||||
"login": "gh-ost00",
|
||||
"id": 153366162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-5420-XSS",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-5420-XSS",
|
||||
"description": "SEH utnserver Pro\/ProMAX \/ INU-100 20.1.22 - XSS ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-02T15:29:22Z",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "a signal handler race condition in OpenSSH's server (sshd)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T10:55:29Z",
|
||||
"updated_at": "2024-11-21T05:21:18Z",
|
||||
"updated_at": "2024-11-23T21:45:17Z",
|
||||
"pushed_at": "2024-07-01T10:54:02Z",
|
||||
"stargazers_count": 461,
|
||||
"watchers_count": 461,
|
||||
"stargazers_count": 462,
|
||||
"watchers_count": 462,
|
||||
"has_discussions": false,
|
||||
"forks_count": 182,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 182,
|
||||
"watchers": 461,
|
||||
"watchers": 462,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -269,10 +269,10 @@
|
|||
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T20:33:20Z",
|
||||
"updated_at": "2024-11-21T21:47:41Z",
|
||||
"updated_at": "2024-11-23T21:43:26Z",
|
||||
"pushed_at": "2024-09-24T19:18:56Z",
|
||||
"stargazers_count": 458,
|
||||
"watchers_count": 458,
|
||||
"stargazers_count": 459,
|
||||
"watchers_count": 459,
|
||||
"has_discussions": false,
|
||||
"forks_count": 88,
|
||||
"allow_forking": true,
|
||||
|
@ -287,7 +287,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 88,
|
||||
"watchers": 458,
|
||||
"watchers": 459,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
@ -684,10 +684,10 @@
|
|||
"description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T06:53:35Z",
|
||||
"updated_at": "2024-11-21T13:13:49Z",
|
||||
"updated_at": "2024-11-23T21:35:05Z",
|
||||
"pushed_at": "2024-07-04T20:04:30Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -696,7 +696,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1386,10 +1386,10 @@
|
|||
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T18:32:46Z",
|
||||
"updated_at": "2024-11-03T06:33:12Z",
|
||||
"updated_at": "2024-11-23T21:43:00Z",
|
||||
"pushed_at": "2024-07-05T15:19:28Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -1407,7 +1407,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 849964284,
|
||||
"name": "CVE-2024-7120",
|
||||
"full_name": "fa-rrel\/CVE-2024-7120",
|
||||
"full_name": "gh-ost00\/CVE-2024-7120",
|
||||
"owner": {
|
||||
"login": "fa-rrel",
|
||||
"login": "gh-ost00",
|
||||
"id": 153366162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-7120",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-7120",
|
||||
"description": "⚠️⚠️ CVE-2024-7120 Command Injection Vulnerability in RAISECOM Gateway Devices",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-30T15:50:50Z",
|
||||
|
|
|
@ -33,15 +33,15 @@
|
|||
{
|
||||
"id": 845013815,
|
||||
"name": "CVE-2024-7928",
|
||||
"full_name": "fa-rrel\/CVE-2024-7928",
|
||||
"full_name": "gh-ost00\/CVE-2024-7928",
|
||||
"owner": {
|
||||
"login": "fa-rrel",
|
||||
"login": "gh-ost00",
|
||||
"id": 153366162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-7928",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-7928",
|
||||
"description": "CVE-2024-7928 fastadmin vulnerability POC & Scanning",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-20T12:15:48Z",
|
||||
|
|
|
@ -64,15 +64,15 @@
|
|||
{
|
||||
"id": 850636095,
|
||||
"name": "CVE-2024-7954-RCE",
|
||||
"full_name": "fa-rrel\/CVE-2024-7954-RCE",
|
||||
"full_name": "gh-ost00\/CVE-2024-7954-RCE",
|
||||
"owner": {
|
||||
"login": "fa-rrel",
|
||||
"login": "gh-ost00",
|
||||
"id": 153366162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-7954-RCE",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-7954-RCE",
|
||||
"description": "Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-01T10:59:45Z",
|
||||
|
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 864585046,
|
||||
"name": "CVE-2024-8949-POC",
|
||||
"full_name": "fa-rrel\/CVE-2024-8949-POC",
|
||||
"full_name": "gh-ost00\/CVE-2024-8949-POC",
|
||||
"owner": {
|
||||
"login": "fa-rrel",
|
||||
"login": "gh-ost00",
|
||||
"id": 153366162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
||||
"html_url": "https:\/\/github.com\/fa-rrel",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-8949-POC",
|
||||
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-8949-POC",
|
||||
"description": "SourceCodester Online Eyewear Shop Remote File Inclusion Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-28T15:58:54Z",
|
||||
|
|
Loading…
Reference in a new issue