mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2024/10/20 18:30:45
This commit is contained in:
parent
255c4b0cf2
commit
36386a473c
35 changed files with 226 additions and 158 deletions
|
@ -14,10 +14,10 @@
|
|||
"description": "This app verifies if your device is still vulnerable to CVE-2015-3825 \/ CVE-2015-3837, aka \"One Class to Rule Them All\", by checking if it contains the vulnerable conscrypt's OpenSSLX509Certificate class. A patch was released in August 2015 by Google.",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-13T08:57:44Z",
|
||||
"updated_at": "2021-10-12T02:19:42Z",
|
||||
"updated_at": "2024-10-20T16:26:49Z",
|
||||
"pushed_at": "2016-02-13T09:16:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Motorola Untethered Jailbreak: Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass ",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-06T12:00:27Z",
|
||||
"updated_at": "2024-09-22T17:07:19Z",
|
||||
"updated_at": "2024-10-20T16:21:02Z",
|
||||
"pushed_at": "2017-08-30T15:17:08Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Pixel bootlaoder exploit for reading flash storage",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-28T16:26:18Z",
|
||||
"updated_at": "2024-03-06T06:35:34Z",
|
||||
"updated_at": "2024-10-20T16:28:09Z",
|
||||
"pushed_at": "2017-01-05T18:55:56Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This app checks if you're vulnerable to CVE-2016-8467 and\/or if your bootmode property has been tampered with.",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T12:14:57Z",
|
||||
"updated_at": "2017-12-22T21:03:43Z",
|
||||
"updated_at": "2024-10-20T16:26:34Z",
|
||||
"pushed_at": "2017-01-08T13:17:27Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-20T23:32:29Z",
|
||||
"updated_at": "2024-10-16T02:21:12Z",
|
||||
"updated_at": "2024-10-20T16:30:15Z",
|
||||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 461,
|
||||
"watchers_count": 461,
|
||||
"stargazers_count": 462,
|
||||
"watchers_count": 462,
|
||||
"has_discussions": false,
|
||||
"forks_count": 186,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 186,
|
||||
"watchers": 461,
|
||||
"watchers": 462,
|
||||
"score": 0,
|
||||
"subscribers_count": 45
|
||||
},
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-07T22:29:08Z",
|
||||
"updated_at": "2024-10-03T05:15:35Z",
|
||||
"updated_at": "2024-10-20T15:46:59Z",
|
||||
"pushed_at": "2021-06-07T22:31:35Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -575,15 +575,15 @@
|
|||
{
|
||||
"id": 415535559,
|
||||
"name": "CVE-2019-15107_detection",
|
||||
"full_name": "Tuz-Wwsd\/CVE-2019-15107_detection",
|
||||
"full_name": "CyberTuz\/CVE-2019-15107_detection",
|
||||
"owner": {
|
||||
"login": "Tuz-Wwsd",
|
||||
"login": "CyberTuz",
|
||||
"id": 50274376,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50274376?v=4",
|
||||
"html_url": "https:\/\/github.com\/Tuz-Wwsd",
|
||||
"html_url": "https:\/\/github.com\/CyberTuz",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Tuz-Wwsd\/CVE-2019-15107_detection",
|
||||
"html_url": "https:\/\/github.com\/CyberTuz\/CVE-2019-15107_detection",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-10T09:05:55Z",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T10:12:44Z",
|
||||
"updated_at": "2024-10-15T10:20:42Z",
|
||||
"updated_at": "2024-10-20T14:11:30Z",
|
||||
"pushed_at": "2019-02-08T12:38:05Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"has_discussions": false,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 225,
|
||||
"watchers": 226,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -1652,10 +1652,10 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2024-10-15T10:56:28Z",
|
||||
"updated_at": "2024-10-20T14:10:38Z",
|
||||
"pushed_at": "2022-03-30T14:02:04Z",
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"stargazers_count": 264,
|
||||
"watchers_count": 264,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -1664,7 +1664,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 263,
|
||||
"watchers": 264,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "password-disclosure issue in the web interface on certain TP-Link devices",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-18T17:08:54Z",
|
||||
"updated_at": "2024-10-18T17:14:22Z",
|
||||
"updated_at": "2024-10-20T14:09:27Z",
|
||||
"pushed_at": "2024-10-18T17:14:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -200,10 +200,10 @@
|
|||
"description": "Automated Exploit for CVE-2020-6287",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-07T14:29:34Z",
|
||||
"updated_at": "2024-10-07T14:45:03Z",
|
||||
"updated_at": "2024-10-20T14:11:53Z",
|
||||
"pushed_at": "2024-10-07T14:45:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -212,7 +212,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -566,10 +566,10 @@
|
|||
"description": "Laravel Debug mode RCE漏洞(CVE-2021-3129)poc \/ exp",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-04T17:04:38Z",
|
||||
"updated_at": "2024-04-22T11:52:24Z",
|
||||
"updated_at": "2024-10-20T13:20:58Z",
|
||||
"pushed_at": "2023-03-04T17:10:43Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -578,7 +578,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -2044,10 +2044,10 @@
|
|||
"description": "Exploit for Ubuntu 20.04 using CVE-2021-3156 enhanced with post-exploitation scripts",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-13T01:02:32Z",
|
||||
"updated_at": "2024-08-28T22:51:33Z",
|
||||
"updated_at": "2024-10-20T12:44:50Z",
|
||||
"pushed_at": "2023-05-13T07:48:55Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -2056,7 +2056,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-17T06:28:17Z",
|
||||
"updated_at": "2024-10-19T04:08:26Z",
|
||||
"updated_at": "2024-10-20T14:41:47Z",
|
||||
"pushed_at": "2024-10-16T22:27:13Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:22:26Z",
|
||||
"updated_at": "2024-10-17T16:25:49Z",
|
||||
"updated_at": "2024-10-20T15:33:49Z",
|
||||
"pushed_at": "2023-07-28T13:20:45Z",
|
||||
"stargazers_count": 463,
|
||||
"watchers_count": 463,
|
||||
"stargazers_count": 464,
|
||||
"watchers_count": 464,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 463,
|
||||
"watchers": 464,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-10-20T11:08:25Z",
|
||||
"updated_at": "2024-10-20T18:14:18Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1227,
|
||||
"watchers_count": 1227,
|
||||
|
|
33
2024/CVE-2024-10140.json
Normal file
33
2024/CVE-2024-10140.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 875667904,
|
||||
"name": "CVE-2024-10140",
|
||||
"full_name": "holypryx\/CVE-2024-10140",
|
||||
"owner": {
|
||||
"login": "holypryx",
|
||||
"id": 182792867,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/182792867?v=4",
|
||||
"html_url": "https:\/\/github.com\/holypryx",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/holypryx\/CVE-2024-10140",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-20T15:29:14Z",
|
||||
"updated_at": "2024-10-20T15:31:06Z",
|
||||
"pushed_at": "2024-10-20T15:31:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -76,10 +76,10 @@
|
|||
"description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-18T20:39:27Z",
|
||||
"updated_at": "2024-10-20T00:25:51Z",
|
||||
"updated_at": "2024-10-20T15:02:10Z",
|
||||
"pushed_at": "2024-03-19T06:37:30Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -218,5 +218,36 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 875667799,
|
||||
"name": "CVE-2024-23334",
|
||||
"full_name": "wizarddos\/CVE-2024-23334",
|
||||
"owner": {
|
||||
"login": "wizarddos",
|
||||
"id": 69435721,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69435721?v=4",
|
||||
"html_url": "https:\/\/github.com\/wizarddos",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wizarddos\/CVE-2024-23334",
|
||||
"description": "Proof-of-Concept for LFI\/Path Traversal vulnerability in Aiohttp =< 3.9.1",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-20T15:28:58Z",
|
||||
"updated_at": "2024-10-20T16:48:57Z",
|
||||
"pushed_at": "2024-10-20T16:48:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -76,19 +76,19 @@
|
|||
"description": "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-13T11:57:50Z",
|
||||
"updated_at": "2024-10-19T09:51:41Z",
|
||||
"updated_at": "2024-10-20T12:51:43Z",
|
||||
"pushed_at": "2024-06-13T07:30:48Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 12,
|
||||
"forks": 30,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2024-10-18T18:45:42Z",
|
||||
"updated_at": "2024-10-20T17:01:44Z",
|
||||
"pushed_at": "2024-09-30T08:45:56Z",
|
||||
"stargazers_count": 400,
|
||||
"watchers_count": 400,
|
||||
"stargazers_count": 401,
|
||||
"watchers_count": 401,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 400,
|
||||
"watchers": 401,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -184,36 +184,5 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 875255026,
|
||||
"name": "CVE-2024-30088",
|
||||
"full_name": "l0n3m4n\/CVE-2024-30088",
|
||||
"owner": {
|
||||
"login": "l0n3m4n",
|
||||
"id": 143868630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143868630?v=4",
|
||||
"html_url": "https:\/\/github.com\/l0n3m4n",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/l0n3m4n\/CVE-2024-30088",
|
||||
"description": "Windows Kernel Elevation of Privilege (PoC) ",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-19T13:54:33Z",
|
||||
"updated_at": "2024-10-20T00:35:42Z",
|
||||
"pushed_at": "2024-10-19T14:41:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-30090 - LPE PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-17T08:38:47Z",
|
||||
"updated_at": "2024-10-20T11:11:22Z",
|
||||
"updated_at": "2024-10-20T17:13:28Z",
|
||||
"pushed_at": "2024-10-17T09:53:33Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 54,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Dirty Stream exploit for MI-File Explorer V1-210567 version. CVE-2024-35205",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-17T08:10:47Z",
|
||||
"updated_at": "2024-10-08T07:21:08Z",
|
||||
"updated_at": "2024-10-20T18:12:32Z",
|
||||
"pushed_at": "2024-09-30T09:06:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-13T19:30:20Z",
|
||||
"updated_at": "2024-10-20T11:06:17Z",
|
||||
"updated_at": "2024-10-20T14:07:09Z",
|
||||
"pushed_at": "2024-10-17T18:36:54Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 168,
|
||||
"watchers": 170,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-17T14:58:36Z",
|
||||
"updated_at": "2024-10-16T23:54:39Z",
|
||||
"updated_at": "2024-10-20T15:54:12Z",
|
||||
"pushed_at": "2024-08-28T20:56:40Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-17T06:28:17Z",
|
||||
"updated_at": "2024-10-19T04:08:26Z",
|
||||
"updated_at": "2024-10-20T14:41:47Z",
|
||||
"pushed_at": "2024-10-16T22:27:13Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Unauthenticated Remote Code Execution via Angular-Base64-Upload Library ",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-09T14:35:06Z",
|
||||
"updated_at": "2024-10-20T06:34:36Z",
|
||||
"updated_at": "2024-10-20T15:09:49Z",
|
||||
"pushed_at": "2024-10-18T15:10:13Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 73,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T00:15:18Z",
|
||||
"updated_at": "2024-10-19T21:15:51Z",
|
||||
"updated_at": "2024-10-20T14:38:18Z",
|
||||
"pushed_at": "2024-10-05T00:18:49Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 96,
|
||||
"watchers": 97,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -143,13 +143,13 @@
|
|||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Proof of concept of multiple Reflected Cross-Site Scripting (XSS) vulnerabilities discovered in Veritas Data Insight before 7.1.",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-19T13:38:23Z",
|
||||
"updated_at": "2024-10-19T14:45:04Z",
|
||||
"pushed_at": "2024-10-19T14:45:01Z",
|
||||
"updated_at": "2024-10-20T18:11:25Z",
|
||||
"pushed_at": "2024-10-20T18:11:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -2273,10 +2273,10 @@
|
|||
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T11:27:49Z",
|
||||
"updated_at": "2024-10-18T16:44:55Z",
|
||||
"updated_at": "2024-10-20T15:22:33Z",
|
||||
"pushed_at": "2024-08-22T08:50:25Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -2285,7 +2285,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-10T06:27:59Z",
|
||||
"updated_at": "2024-10-20T04:34:05Z",
|
||||
"updated_at": "2024-10-20T17:07:59Z",
|
||||
"pushed_at": "2024-10-17T05:12:29Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,8 +26,39 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 25,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 875609314,
|
||||
"name": "POC-CVE-2024-6778",
|
||||
"full_name": "r00tjunip3r1\/POC-CVE-2024-6778",
|
||||
"owner": {
|
||||
"login": "r00tjunip3r1",
|
||||
"id": 185687343,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185687343?v=4",
|
||||
"html_url": "https:\/\/github.com\/r00tjunip3r1",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r00tjunip3r1\/POC-CVE-2024-6778",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-20T12:47:53Z",
|
||||
"updated_at": "2024-10-20T12:50:37Z",
|
||||
"pushed_at": "2024-10-20T12:50:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit for Grafana arbitrary file-read (CVE-2024-9264)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-19T13:50:52Z",
|
||||
"updated_at": "2024-10-20T12:15:41Z",
|
||||
"updated_at": "2024-10-20T17:21:55Z",
|
||||
"pushed_at": "2024-10-19T16:01:12Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -38,7 +38,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 15,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -57,10 +57,10 @@
|
|||
"description": "File Read Proof of Concept for CVE-2024-9264",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-20T01:13:37Z",
|
||||
"updated_at": "2024-10-20T11:46:38Z",
|
||||
"updated_at": "2024-10-20T14:07:36Z",
|
||||
"pushed_at": "2024-10-20T11:46:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -74,7 +74,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -1399,6 +1399,7 @@
|
|||
</code>
|
||||
|
||||
- [ading2210/CVE-2024-6778-POC](https://github.com/ading2210/CVE-2024-6778-POC)
|
||||
- [r00tjunip3r1/POC-CVE-2024-6778](https://github.com/r00tjunip3r1/POC-CVE-2024-6778)
|
||||
|
||||
### CVE-2024-6782 (2024-08-06)
|
||||
|
||||
|
@ -1648,6 +1649,9 @@
|
|||
### CVE-2024-9821
|
||||
- [RandomRobbieBF/CVE-2024-9821](https://github.com/RandomRobbieBF/CVE-2024-9821)
|
||||
|
||||
### CVE-2024-10140
|
||||
- [holypryx/CVE-2024-10140](https://github.com/holypryx/CVE-2024-10140)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
||||
|
@ -2257,6 +2261,7 @@
|
|||
- [brian-edgar-re/poc-cve-2024-23334](https://github.com/brian-edgar-re/poc-cve-2024-23334)
|
||||
- [binaryninja/CVE-2024-23334](https://github.com/binaryninja/CVE-2024-23334)
|
||||
- [s4botai/CVE-2024-23334-PoC](https://github.com/s4botai/CVE-2024-23334-PoC)
|
||||
- [wizarddos/CVE-2024-23334](https://github.com/wizarddos/CVE-2024-23334)
|
||||
|
||||
### CVE-2024-23339 (2024-01-22)
|
||||
|
||||
|
@ -3616,7 +3621,6 @@
|
|||
- [exploits-forsale/collateral-damage](https://github.com/exploits-forsale/collateral-damage)
|
||||
- [Admin9961/CVE-2024-30088](https://github.com/Admin9961/CVE-2024-30088)
|
||||
- [Justintroup85/exploits-forsale-collateral-damage](https://github.com/Justintroup85/exploits-forsale-collateral-damage)
|
||||
- [l0n3m4n/CVE-2024-30088](https://github.com/l0n3m4n/CVE-2024-30088)
|
||||
|
||||
### CVE-2024-30090 (2024-06-11)
|
||||
|
||||
|
@ -35466,7 +35470,7 @@
|
|||
- [whokilleddb/CVE-2019-15107](https://github.com/whokilleddb/CVE-2019-15107)
|
||||
- [darrenmartyn/CVE-2019-15107](https://github.com/darrenmartyn/CVE-2019-15107)
|
||||
- [hacknotes/CVE-2019-15107-Exploit](https://github.com/hacknotes/CVE-2019-15107-Exploit)
|
||||
- [Tuz-Wwsd/CVE-2019-15107_detection](https://github.com/Tuz-Wwsd/CVE-2019-15107_detection)
|
||||
- [CyberTuz/CVE-2019-15107_detection](https://github.com/CyberTuz/CVE-2019-15107_detection)
|
||||
- [hadrian3689/webmin_1.920](https://github.com/hadrian3689/webmin_1.920)
|
||||
- [f0rkr/CVE-2019-15107](https://github.com/f0rkr/CVE-2019-15107)
|
||||
- [psw01/CVE-2019-15107_webminRCE](https://github.com/psw01/CVE-2019-15107_webminRCE)
|
||||
|
|
Loading…
Reference in a new issue