mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/04/24 00:34:30
This commit is contained in:
parent
088444ef3c
commit
2a5c875427
22 changed files with 170 additions and 104 deletions
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2018-8174_python",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-30T03:12:32Z",
|
||||
"updated_at": "2023-11-25T06:08:01Z",
|
||||
"updated_at": "2024-04-23T19:59:36Z",
|
||||
"pushed_at": "2022-04-19T13:24:53Z",
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"has_discussions": false,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 141,
|
||||
"watchers": 140,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -1691,10 +1691,10 @@
|
|||
"description": "Only Hitting PoC [Tested on Windows Server 2008 r2]",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-28T02:25:21Z",
|
||||
"updated_at": "2024-04-12T11:32:24Z",
|
||||
"updated_at": "2024-04-23T19:59:37Z",
|
||||
"pushed_at": "2019-05-28T02:46:19Z",
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -1703,7 +1703,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 128,
|
||||
"watchers": 127,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 7,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-27T15:51:12Z",
|
||||
"updated_at": "2024-04-15T17:24:49Z",
|
||||
"updated_at": "2024-04-23T18:47:26Z",
|
||||
"pushed_at": "2021-10-28T06:37:37Z",
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 229,
|
||||
"watchers": 230,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -10653,7 +10653,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 447404470,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-12-23T10:41:44Z",
|
||||
"updated_at": "2023-03-10T01:13:38Z",
|
||||
"pushed_at": "2024-04-20T08:44:47Z",
|
||||
"pushed_at": "2024-04-23T23:39:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-12-23T12:33:21Z",
|
||||
"updated_at": "2023-03-10T01:15:25Z",
|
||||
"pushed_at": "2024-04-19T08:47:18Z",
|
||||
"pushed_at": "2024-04-23T23:58:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-21T17:39:05Z",
|
||||
"updated_at": "2024-04-23T13:52:33Z",
|
||||
"pushed_at": "2024-04-23T13:52:30Z",
|
||||
"updated_at": "2024-04-23T18:57:44Z",
|
||||
"pushed_at": "2024-04-23T18:57:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:22:26Z",
|
||||
"updated_at": "2024-04-17T04:49:09Z",
|
||||
"updated_at": "2024-04-23T20:02:01Z",
|
||||
"pushed_at": "2023-07-28T13:20:45Z",
|
||||
"stargazers_count": 452,
|
||||
"watchers_count": 452,
|
||||
"stargazers_count": 453,
|
||||
"watchers_count": 453,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 452,
|
||||
"watchers": 453,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-04-23T06:08:08Z",
|
||||
"updated_at": "2024-04-23T20:32:29Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 1875,
|
||||
"watchers_count": 1875,
|
||||
"stargazers_count": 1876,
|
||||
"watchers_count": 1876,
|
||||
"has_discussions": false,
|
||||
"forks_count": 231,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 231,
|
||||
"watchers": 1875,
|
||||
"watchers": 1876,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-12T15:07:42Z",
|
||||
"updated_at": "2024-04-23T17:12:24Z",
|
||||
"updated_at": "2024-04-23T19:51:09Z",
|
||||
"pushed_at": "2024-04-18T14:31:34Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-22T07:05:04Z",
|
||||
"updated_at": "2024-04-23T18:29:42Z",
|
||||
"updated_at": "2024-04-23T23:41:53Z",
|
||||
"pushed_at": "2024-04-22T10:08:45Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 111,
|
||||
"forks": 17,
|
||||
"watchers": 115,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -58,5 +58,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 790920623,
|
||||
"name": "CVE-2024-21338",
|
||||
"full_name": "varwara\/CVE-2024-21338",
|
||||
"owner": {
|
||||
"login": "varwara",
|
||||
"id": 167913816,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167913816?v=4",
|
||||
"html_url": "https:\/\/github.com\/varwara"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/varwara\/CVE-2024-21338",
|
||||
"description": "PoC for the Untrusted Pointer Dereference in the appid.sys driver",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-23T19:09:22Z",
|
||||
"updated_at": "2024-04-23T19:13:56Z",
|
||||
"pushed_at": "2024-04-23T19:13:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-15T19:57:38Z",
|
||||
"updated_at": "2024-04-21T00:11:20Z",
|
||||
"updated_at": "2024-04-23T21:16:13Z",
|
||||
"pushed_at": "2024-02-17T07:08:49Z",
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 140,
|
||||
"watchers": 141,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-17T09:15:22Z",
|
||||
"updated_at": "2024-04-16T02:02:41Z",
|
||||
"updated_at": "2024-04-23T19:36:39Z",
|
||||
"pushed_at": "2024-03-17T09:20:35Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -214,36 +214,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 789406252,
|
||||
"name": "cve-2024-24576-python",
|
||||
"full_name": "p14t1num\/cve-2024-24576-python",
|
||||
"owner": {
|
||||
"login": "p14t1num",
|
||||
"id": 163240981,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163240981?v=4",
|
||||
"html_url": "https:\/\/github.com\/p14t1num"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/p14t1num\/cve-2024-24576-python",
|
||||
"description": "a python proof of concept for cve-2024-24576",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-20T13:07:54Z",
|
||||
"updated_at": "2024-04-20T13:22:46Z",
|
||||
"pushed_at": "2024-04-20T13:14:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 789510981,
|
||||
"name": "CVE-2024-24576-PoC-Rust",
|
||||
|
|
32
2024/CVE-2024-25277.json
Normal file
32
2024/CVE-2024-25277.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 763137888,
|
||||
"name": "CVE-2024-25277",
|
||||
"full_name": "maen08\/CVE-2024-25277",
|
||||
"owner": {
|
||||
"login": "maen08",
|
||||
"id": 48031010,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48031010?v=4",
|
||||
"html_url": "https:\/\/github.com\/maen08"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/maen08\/CVE-2024-25277",
|
||||
"description": "Resources and PoCs",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T16:54:33Z",
|
||||
"updated_at": "2024-04-23T19:11:25Z",
|
||||
"pushed_at": "2024-04-23T19:11:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -279,8 +279,8 @@
|
|||
"description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-22T22:14:24Z",
|
||||
"updated_at": "2024-04-23T16:10:59Z",
|
||||
"pushed_at": "2024-04-23T16:10:56Z",
|
||||
"updated_at": "2024-04-23T20:07:44Z",
|
||||
"pushed_at": "2024-04-23T20:07:41Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "WallEscape vulnerability in util-linux",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-11T00:15:03Z",
|
||||
"updated_at": "2024-04-23T11:47:49Z",
|
||||
"updated_at": "2024-04-23T19:58:26Z",
|
||||
"pushed_at": "2024-03-30T01:32:02Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
|
|
|
@ -493,10 +493,10 @@
|
|||
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-30T22:07:24Z",
|
||||
"updated_at": "2024-04-21T17:07:55Z",
|
||||
"updated_at": "2024-04-23T20:42:52Z",
|
||||
"pushed_at": "2024-04-02T03:38:32Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -510,7 +510,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -1012,10 +1012,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-04-23T13:32:44Z",
|
||||
"updated_at": "2024-04-23T22:41:39Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3417,
|
||||
"watchers_count": 3417,
|
||||
"stargazers_count": 3421,
|
||||
"watchers_count": 3421,
|
||||
"has_discussions": false,
|
||||
"forks_count": 228,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,7 +1024,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 228,
|
||||
"watchers": 3417,
|
||||
"watchers": 3421,
|
||||
"score": 0,
|
||||
"subscribers_count": 36
|
||||
},
|
||||
|
|
|
@ -283,10 +283,10 @@
|
|||
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T14:18:08Z",
|
||||
"updated_at": "2024-04-23T17:24:38Z",
|
||||
"updated_at": "2024-04-23T18:36:25Z",
|
||||
"pushed_at": "2024-04-16T22:35:43Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -295,7 +295,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 114,
|
||||
"watchers": 115,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -313,10 +313,10 @@
|
|||
"description": "CVE-2024-3400-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T16:18:56Z",
|
||||
"updated_at": "2024-04-23T18:18:00Z",
|
||||
"updated_at": "2024-04-23T23:35:06Z",
|
||||
"pushed_at": "2024-04-22T08:50:27Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -325,7 +325,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -493,10 +493,10 @@
|
|||
"description": "Global Protec Palo Alto File Write Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-17T16:01:20Z",
|
||||
"updated_at": "2024-04-19T01:42:25Z",
|
||||
"updated_at": "2024-04-23T21:08:01Z",
|
||||
"pushed_at": "2024-04-17T19:46:15Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -505,7 +505,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Scanner for CVE-2024-4040",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-23T09:31:29Z",
|
||||
"updated_at": "2024-04-23T16:07:32Z",
|
||||
"updated_at": "2024-04-23T23:53:17Z",
|
||||
"pushed_at": "2024-04-23T09:45:57Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,37 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 14,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 791002416,
|
||||
"name": "CVE-2024-4040-RCE-POC",
|
||||
"full_name": "tr4c3rs\/CVE-2024-4040-RCE-POC",
|
||||
"owner": {
|
||||
"login": "tr4c3rs",
|
||||
"id": 167206794,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167206794?v=4",
|
||||
"html_url": "https:\/\/github.com\/tr4c3rs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tr4c3rs\/CVE-2024-4040-RCE-POC",
|
||||
"description": "CVE-2024-4040 (CrushFTP VFS escape) or (CrushFTP unauthenticated RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-23T23:16:36Z",
|
||||
"updated_at": "2024-04-23T23:26:37Z",
|
||||
"pushed_at": "2024-04-23T23:26:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -406,10 +406,11 @@
|
|||
|
||||
### CVE-2024-4040 (2024-04-22)
|
||||
|
||||
<code>VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.\n
|
||||
<code>A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.\n
|
||||
</code>
|
||||
|
||||
- [airbus-cert/CVE-2024-4040](https://github.com/airbus-cert/CVE-2024-4040)
|
||||
- [tr4c3rs/CVE-2024-4040-RCE-POC](https://github.com/tr4c3rs/CVE-2024-4040-RCE-POC)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
@ -508,6 +509,7 @@
|
|||
|
||||
- [hakaioffsec/CVE-2024-21338](https://github.com/hakaioffsec/CVE-2024-21338)
|
||||
- [UMU618/CVE-2024-21338](https://github.com/UMU618/CVE-2024-21338)
|
||||
- [varwara/CVE-2024-21338](https://github.com/varwara/CVE-2024-21338)
|
||||
|
||||
### CVE-2024-21378 (2024-02-13)
|
||||
|
||||
|
@ -1039,7 +1041,6 @@
|
|||
- [corysabol/batbadbut-demo](https://github.com/corysabol/batbadbut-demo)
|
||||
- [mishalhossin/CVE-2024-24576-PoC-Python](https://github.com/mishalhossin/CVE-2024-24576-PoC-Python)
|
||||
- [lpn/CVE-2024-24576.jl](https://github.com/lpn/CVE-2024-24576.jl)
|
||||
- [p14t1num/cve-2024-24576-python](https://github.com/p14t1num/cve-2024-24576-python)
|
||||
- [Gaurav1020/CVE-2024-24576-PoC-Rust](https://github.com/Gaurav1020/CVE-2024-24576-PoC-Rust)
|
||||
- [SheL3G/CVE-2024-24576-PoC-BatBadBut](https://github.com/SheL3G/CVE-2024-24576-PoC-BatBadBut)
|
||||
|
||||
|
@ -1114,6 +1115,9 @@
|
|||
### CVE-2024-25270
|
||||
- [fbkcs/CVE-2024-25270](https://github.com/fbkcs/CVE-2024-25270)
|
||||
|
||||
### CVE-2024-25277
|
||||
- [maen08/CVE-2024-25277](https://github.com/maen08/CVE-2024-25277)
|
||||
|
||||
### CVE-2024-25278
|
||||
- [sajaljat/CVE-2024-25278](https://github.com/sajaljat/CVE-2024-25278)
|
||||
|
||||
|
|
Loading…
Reference in a new issue