mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2025/01/03 18:32:25
This commit is contained in:
parent
99448ee771
commit
2a366a4f22
29 changed files with 219 additions and 99 deletions
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2015-09-08T14:37:25Z",
|
||||
"updated_at": "2017-03-17T07:12:48Z",
|
||||
"updated_at": "2025-01-03T12:20:42Z",
|
||||
"pushed_at": "2015-09-08T14:40:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "OpenSSL CVE-2014-0160 Heartbleed vulnerability test",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-08T04:25:23Z",
|
||||
"updated_at": "2024-12-20T15:54:03Z",
|
||||
"updated_at": "2025-01-03T16:50:21Z",
|
||||
"pushed_at": "2014-05-27T22:32:26Z",
|
||||
"stargazers_count": 450,
|
||||
"watchers_count": 450,
|
||||
"stargazers_count": 451,
|
||||
"watchers_count": 451,
|
||||
"has_discussions": false,
|
||||
"forks_count": 86,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 86,
|
||||
"watchers": 450,
|
||||
"watchers": 451,
|
||||
"score": 0,
|
||||
"subscribers_count": 30
|
||||
},
|
||||
|
@ -169,10 +169,10 @@
|
|||
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-08T10:10:43Z",
|
||||
"updated_at": "2024-08-12T19:23:38Z",
|
||||
"updated_at": "2025-01-03T16:50:42Z",
|
||||
"pushed_at": "2015-07-02T14:47:31Z",
|
||||
"stargazers_count": 572,
|
||||
"watchers_count": 572,
|
||||
"stargazers_count": 573,
|
||||
"watchers_count": 573,
|
||||
"has_discussions": false,
|
||||
"forks_count": 213,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 213,
|
||||
"watchers": 572,
|
||||
"watchers": 573,
|
||||
"score": 0,
|
||||
"subscribers_count": 57
|
||||
},
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Fork of the send module to deal with CVE-2017-20165",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-11T10:20:27Z",
|
||||
"updated_at": "2024-12-29T10:28:34Z",
|
||||
"pushed_at": "2024-12-22T17:22:54Z",
|
||||
"updated_at": "2025-01-03T17:29:40Z",
|
||||
"pushed_at": "2025-01-03T17:29:41Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-29T16:08:35Z",
|
||||
"updated_at": "2024-12-25T13:08:20Z",
|
||||
"updated_at": "2025-01-03T14:57:57Z",
|
||||
"pushed_at": "2021-01-29T16:22:39Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -138,10 +138,10 @@
|
|||
"description": "CVE-2019-2890 WebLogic 反序列化RCE漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-08T05:03:32Z",
|
||||
"updated_at": "2024-11-25T09:55:59Z",
|
||||
"updated_at": "2025-01-03T14:34:21Z",
|
||||
"pushed_at": "2019-12-08T05:50:42Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -467,7 +467,7 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -476,7 +476,7 @@
|
|||
"penetration-testing"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Disclosure report of CVE-2020-9038",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T11:02:16Z",
|
||||
"updated_at": "2024-08-12T19:58:10Z",
|
||||
"updated_at": "2025-01-03T18:12:10Z",
|
||||
"pushed_at": "2020-02-27T11:38:30Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-15T06:40:49Z",
|
||||
"updated_at": "2024-10-06T15:29:45Z",
|
||||
"updated_at": "2025-01-03T13:24:24Z",
|
||||
"pushed_at": "2023-06-29T15:57:12Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -3749,10 +3749,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2025-01-03T06:15:33Z",
|
||||
"updated_at": "2025-01-03T17:53:38Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3405,
|
||||
"watchers_count": 3405,
|
||||
"stargazers_count": 3404,
|
||||
"watchers_count": 3404,
|
||||
"has_discussions": true,
|
||||
"forks_count": 739,
|
||||
"allow_forking": true,
|
||||
|
@ -3761,7 +3761,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 739,
|
||||
"watchers": 3405,
|
||||
"watchers": 3404,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
@ -12768,7 +12768,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2025-01-03T10:15:17Z",
|
||||
"updated_at": "2025-01-03T10:15:21Z",
|
||||
"pushed_at": "2025-01-03T10:18:47Z",
|
||||
"pushed_at": "2025-01-03T16:36:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -501,10 +501,10 @@
|
|||
"description": "CVE-2022-29464 PoC for WSO2 products",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-04T16:46:52Z",
|
||||
"updated_at": "2024-11-25T04:18:25Z",
|
||||
"updated_at": "2025-01-03T16:28:31Z",
|
||||
"pushed_at": "2022-06-04T17:55:28Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -513,7 +513,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -51,10 +51,10 @@
|
|||
"description": "Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-09T10:29:48Z",
|
||||
"updated_at": "2024-08-12T20:26:01Z",
|
||||
"updated_at": "2025-01-03T17:27:02Z",
|
||||
"pushed_at": "2022-08-09T14:55:35Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -68,7 +68,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 26,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -146,10 +146,10 @@
|
|||
"description": "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T16:56:06Z",
|
||||
"updated_at": "2024-11-30T08:26:52Z",
|
||||
"updated_at": "2025-01-03T17:25:08Z",
|
||||
"pushed_at": "2023-05-05T18:06:58Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -162,7 +162,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 30,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2023-28434 nuclei templates",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T14:44:24Z",
|
||||
"updated_at": "2024-06-21T10:46:37Z",
|
||||
"updated_at": "2025-01-03T14:32:47Z",
|
||||
"pushed_at": "2023-03-23T15:53:05Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2025-01-03T06:37:24Z",
|
||||
"updated_at": "2025-01-03T17:36:59Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1323,
|
||||
"watchers_count": 1323,
|
||||
"stargazers_count": 1332,
|
||||
"watchers_count": 1332,
|
||||
"has_discussions": false,
|
||||
"forks_count": 227,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 227,
|
||||
"watchers": 1323,
|
||||
"watchers": 1332,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -699,7 +699,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-04-17T13:10:34Z",
|
||||
"updated_at": "2024-10-30T15:47:10Z",
|
||||
"pushed_at": "2024-12-27T16:46:46Z",
|
||||
"pushed_at": "2025-01-03T16:59:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-10793 poc exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-17T18:44:53Z",
|
||||
"updated_at": "2024-12-30T01:27:43Z",
|
||||
"updated_at": "2025-01-03T14:51:08Z",
|
||||
"pushed_at": "2024-11-17T19:51:53Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2025-01-03T10:51:03Z",
|
||||
"updated_at": "2025-01-03T15:13:52Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2317,
|
||||
"watchers_count": 2317,
|
||||
"stargazers_count": 2318,
|
||||
"watchers_count": 2318,
|
||||
"has_discussions": false,
|
||||
"forks_count": 300,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 300,
|
||||
"watchers": 2317,
|
||||
"watchers": 2318,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-12356: Improper Neutralization of Special Elements used in a Command ('Command Injection') (CWE-77)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-17T15:01:37Z",
|
||||
"updated_at": "2024-12-27T01:00:33Z",
|
||||
"updated_at": "2025-01-03T13:01:56Z",
|
||||
"pushed_at": "2024-12-17T15:31:40Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-14T09:22:33Z",
|
||||
"updated_at": "2025-01-02T23:24:33Z",
|
||||
"updated_at": "2025-01-03T14:51:17Z",
|
||||
"pushed_at": "2024-12-14T10:13:45Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -200,8 +200,8 @@
|
|||
"description": "Zabbix CVE-2024-42327 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-01T18:25:44Z",
|
||||
"updated_at": "2025-01-02T20:40:49Z",
|
||||
"pushed_at": "2025-01-02T20:40:45Z",
|
||||
"updated_at": "2025-01-03T13:49:06Z",
|
||||
"pushed_at": "2025-01-03T13:49:03Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-01T15:48:38Z",
|
||||
"updated_at": "2025-01-03T12:27:54Z",
|
||||
"updated_at": "2025-01-03T18:07:23Z",
|
||||
"pushed_at": "2025-01-02T16:07:23Z",
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 304,
|
||||
"forks": 70,
|
||||
"watchers": 319,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -45,10 +45,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-03T07:05:33Z",
|
||||
"updated_at": "2025-01-03T08:20:06Z",
|
||||
"updated_at": "2025-01-03T17:00:41Z",
|
||||
"pushed_at": "2025-01-03T08:20:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T17:42:55Z",
|
||||
"updated_at": "2025-01-02T13:20:33Z",
|
||||
"updated_at": "2025-01-03T14:51:03Z",
|
||||
"pushed_at": "2024-12-20T10:05:15Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-30T01:07:48Z",
|
||||
"updated_at": "2025-01-03T11:24:41Z",
|
||||
"updated_at": "2025-01-03T13:29:47Z",
|
||||
"pushed_at": "2024-12-30T01:08:00Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
33
2024/CVE-2024-54330.json
Normal file
33
2024/CVE-2024-54330.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 911139468,
|
||||
"name": "CVE-2024-54330",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-54330",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54330",
|
||||
"description": "Hurrakify <= 2.4 - Unauthenticated Server-Side Request Forgery",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-02T10:31:51Z",
|
||||
"updated_at": "2025-01-03T15:42:04Z",
|
||||
"pushed_at": "2025-01-02T10:32:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T06:21:36Z",
|
||||
"updated_at": "2024-12-19T13:21:39Z",
|
||||
"updated_at": "2025-01-03T14:51:11Z",
|
||||
"pushed_at": "2024-12-13T07:28:34Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
33
2024/CVE-2024-55988.json
Normal file
33
2024/CVE-2024-55988.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 911576506,
|
||||
"name": "CVE-2024-55988",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-55988",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55988",
|
||||
"description": "Navayan CSV Export <= 1.0.9 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-03T10:45:42Z",
|
||||
"updated_at": "2025-01-03T15:33:26Z",
|
||||
"pushed_at": "2025-01-03T11:02:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-56433.json
Normal file
33
2024/CVE-2024-56433.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 911625725,
|
||||
"name": "CVE-2024-56433",
|
||||
"full_name": "JonnyWhatshisface\/CVE-2024-56433",
|
||||
"owner": {
|
||||
"login": "JonnyWhatshisface",
|
||||
"id": 6776518,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6776518?v=4",
|
||||
"html_url": "https:\/\/github.com\/JonnyWhatshisface",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JonnyWhatshisface\/CVE-2024-56433",
|
||||
"description": "CVE-2024-56433 - shadow-utils Default subordinate ID for local users creates risk of collision",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-03T13:11:25Z",
|
||||
"updated_at": "2025-01-03T13:44:45Z",
|
||||
"pushed_at": "2025-01-03T13:44:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
21
README.md
21
README.md
|
@ -7749,6 +7749,13 @@
|
|||
|
||||
- [RandomRobbieBF/CVE-2024-54262](https://github.com/RandomRobbieBF/CVE-2024-54262)
|
||||
|
||||
### CVE-2024-54330 (2024-12-13)
|
||||
|
||||
<code>Server-Side Request Forgery (SSRF) vulnerability in Hep Hep Hurra (HHH) Hurrakify allows Server Side Request Forgery.This issue affects Hurrakify: from n/a through 2.4.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-54330](https://github.com/RandomRobbieBF/CVE-2024-54330)
|
||||
|
||||
### CVE-2024-54679 (2024-12-05)
|
||||
|
||||
<code>CyberPanel (aka Cyber Panel) before 6778ad1 does not require the FilemanagerAdmin capability for restartMySQL actions.
|
||||
|
@ -7791,6 +7798,13 @@
|
|||
- [Wi1DN00B/CVE-2024-55968](https://github.com/Wi1DN00B/CVE-2024-55968)
|
||||
- [null-event/CVE-2024-55968](https://github.com/null-event/CVE-2024-55968)
|
||||
|
||||
### CVE-2024-55988 (2024-12-16)
|
||||
|
||||
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Amol Nirmala Waman Navayan CSV Export allows Blind SQL Injection.This issue affects Navayan CSV Export: from n/a through 1.0.9.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-55988](https://github.com/RandomRobbieBF/CVE-2024-55988)
|
||||
|
||||
### CVE-2024-56115 (2024-12-18)
|
||||
|
||||
<code>A vulnerability in Amiro.CMS before 7.8.4 exists due to the failure to take measures to neutralize special elements. It allows remote attackers to conduct a Cross-Site Scripting (XSS) attack.
|
||||
|
@ -7827,6 +7841,13 @@
|
|||
|
||||
- [UnionTech-Software/libtheora-CVE-2024-56431-PoC](https://github.com/UnionTech-Software/libtheora-CVE-2024-56431-PoC)
|
||||
|
||||
### CVE-2024-56433 (2024-12-26)
|
||||
|
||||
<code>shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.
|
||||
</code>
|
||||
|
||||
- [JonnyWhatshisface/CVE-2024-56433](https://github.com/JonnyWhatshisface/CVE-2024-56433)
|
||||
|
||||
### CVE-2024-1642470
|
||||
- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)
|
||||
|
||||
|
|
Loading…
Reference in a new issue