mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/07/21 00:29:26
This commit is contained in:
parent
dbc4a9e163
commit
36b23f189e
26 changed files with 119 additions and 88 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2007-2447 - Samba usermap script",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-03T18:39:56Z",
|
||||
"updated_at": "2024-04-15T13:24:04Z",
|
||||
"updated_at": "2024-07-20T20:59:38Z",
|
||||
"pushed_at": "2020-08-16T18:54:38Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -152,14 +152,14 @@
|
|||
{
|
||||
"id": 831187562,
|
||||
"name": "CVE-2012-1823",
|
||||
"full_name": "Fatalityx84\/CVE-2012-1823",
|
||||
"full_name": "Fatalitysec\/CVE-2012-1823",
|
||||
"owner": {
|
||||
"login": "Fatalityx84",
|
||||
"login": "Fatalitysec",
|
||||
"id": 168249911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168249911?v=4",
|
||||
"html_url": "https:\/\/github.com\/Fatalityx84"
|
||||
"html_url": "https:\/\/github.com\/Fatalitysec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Fatalityx84\/CVE-2012-1823",
|
||||
"html_url": "https:\/\/github.com\/Fatalitysec\/CVE-2012-1823",
|
||||
"description": "Prova de conceito de PHP CGI Argument Injection.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-19T21:53:37Z",
|
||||
|
|
|
@ -78,7 +78,7 @@
|
|||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -91,7 +91,7 @@
|
|||
"vulnerable-container"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"forks": 52,
|
||||
"watchers": 128,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -103,7 +103,7 @@
|
|||
"description": "CVE-2017-5689 Proof-of-Concept exploit",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-27T21:06:08Z",
|
||||
"updated_at": "2024-05-24T20:16:55Z",
|
||||
"updated_at": "2024-07-20T21:35:26Z",
|
||||
"pushed_at": "2017-07-27T21:08:49Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Hikvision camera CVE-2017-7921-EXP",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-27T11:49:40Z",
|
||||
"updated_at": "2024-06-11T08:22:17Z",
|
||||
"updated_at": "2024-07-20T21:25:23Z",
|
||||
"pushed_at": "2023-12-04T15:47:16Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2024-07-17T15:56:42Z",
|
||||
"updated_at": "2024-07-20T22:39:02Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1788,
|
||||
"watchers_count": 1788,
|
||||
"stargazers_count": 1789,
|
||||
"watchers_count": 1789,
|
||||
"has_discussions": false,
|
||||
"forks_count": 247,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 247,
|
||||
"watchers": 1788,
|
||||
"watchers": 1789,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-30T04:39:58Z",
|
||||
"updated_at": "2024-07-18T12:42:25Z",
|
||||
"updated_at": "2024-07-20T19:54:10Z",
|
||||
"pushed_at": "2023-11-12T16:29:03Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -2042,10 +2042,10 @@
|
|||
"description": "Pre-compiled builds for CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T17:43:24Z",
|
||||
"updated_at": "2024-05-30T10:52:20Z",
|
||||
"updated_at": "2024-07-21T00:17:17Z",
|
||||
"pushed_at": "2022-03-30T15:38:20Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -2054,7 +2054,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "exploit for CVE-2022-2588",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-11T06:01:24Z",
|
||||
"updated_at": "2024-07-03T12:34:56Z",
|
||||
"updated_at": "2024-07-20T20:55:40Z",
|
||||
"pushed_at": "2023-03-04T05:52:28Z",
|
||||
"stargazers_count": 463,
|
||||
"watchers_count": 463,
|
||||
"stargazers_count": 464,
|
||||
"watchers_count": 464,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"forks_count": 72,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 463,
|
||||
"forks": 72,
|
||||
"watchers": 464,
|
||||
"score": 0,
|
||||
"subscribers_count": 50
|
||||
},
|
||||
|
|
|
@ -1493,10 +1493,10 @@
|
|||
"description": "Proof of Concept of CVE-2022-30190",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-08T10:58:23Z",
|
||||
"updated_at": "2024-04-02T17:40:41Z",
|
||||
"updated_at": "2024-07-20T23:16:34Z",
|
||||
"pushed_at": "2022-10-06T14:49:56Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -1513,7 +1513,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -2613,18 +2613,18 @@
|
|||
"description": "Educational exploit for CVE-2022-30190",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-20T17:50:48Z",
|
||||
"updated_at": "2024-07-20T18:23:41Z",
|
||||
"updated_at": "2024-07-20T19:56:33Z",
|
||||
"pushed_at": "2024-07-20T18:23:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -453,10 +453,10 @@
|
|||
"description": "PoC of Imagemagick's Arbitrary File Read",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-03T18:13:44Z",
|
||||
"updated_at": "2024-05-09T13:17:28Z",
|
||||
"updated_at": "2024-07-21T00:04:34Z",
|
||||
"pushed_at": "2023-07-03T18:34:24Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -465,7 +465,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -168,7 +168,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-07-10T05:39:01Z",
|
||||
"updated_at": "2024-07-17T01:01:38Z",
|
||||
"pushed_at": "2024-07-17T01:01:35Z",
|
||||
"pushed_at": "2024-07-20T23:27:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-03T22:06:09Z",
|
||||
"updated_at": "2024-07-03T04:25:40Z",
|
||||
"updated_at": "2024-07-20T19:08:56Z",
|
||||
"pushed_at": "2024-01-20T16:59:23Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T12:30:53Z",
|
||||
"updated_at": "2024-07-17T06:24:33Z",
|
||||
"updated_at": "2024-07-20T22:11:54Z",
|
||||
"pushed_at": "2024-06-19T12:24:50Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -77,10 +77,10 @@
|
|||
"description": "This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the server.",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-24T05:38:18Z",
|
||||
"updated_at": "2024-07-10T04:22:47Z",
|
||||
"updated_at": "2024-07-20T19:16:57Z",
|
||||
"pushed_at": "2024-05-24T05:56:48Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -89,7 +89,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T17:02:03Z",
|
||||
"updated_at": "2024-07-20T10:03:05Z",
|
||||
"updated_at": "2024-07-20T23:14:08Z",
|
||||
"pushed_at": "2024-07-04T10:39:15Z",
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"stargazers_count": 279,
|
||||
"watchers_count": 279,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 278,
|
||||
"watchers": 279,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -103,19 +103,19 @@
|
|||
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-15T08:07:05Z",
|
||||
"updated_at": "2024-07-20T18:27:00Z",
|
||||
"updated_at": "2024-07-20T23:37:09Z",
|
||||
"pushed_at": "2024-07-18T01:28:46Z",
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 224,
|
||||
"forks": 21,
|
||||
"watchers": 227,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
}
|
||||
|
|
|
@ -1813,8 +1813,8 @@
|
|||
"description": "GNU IFUNC is the real culprit behind CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T18:36:16Z",
|
||||
"updated_at": "2024-07-20T17:35:41Z",
|
||||
"pushed_at": "2024-07-20T17:35:38Z",
|
||||
"updated_at": "2024-07-20T19:46:42Z",
|
||||
"pushed_at": "2024-07-20T19:46:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -523,5 +523,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 831567895,
|
||||
"name": "CVE-2024-34102-PoC",
|
||||
"full_name": "ex-ARnX\/CVE-2024-34102-PoC",
|
||||
"owner": {
|
||||
"login": "ex-ARnX",
|
||||
"id": 176180820,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176180820?v=4",
|
||||
"html_url": "https:\/\/github.com\/ex-ARnX"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ex-ARnX\/CVE-2024-34102-PoC",
|
||||
"description": "CVE-2024-34102 unauthenticated RCE PoC for Magento\/adobe commerce and (NEW 0DAY)?",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-21T00:22:54Z",
|
||||
"updated_at": "2024-07-21T00:25:18Z",
|
||||
"pushed_at": "2024-07-21T00:25:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Exploiter a Vulnerability detection and Exploitation tool for GeoServer Unauthenticated Remote Code Execution CVE-2024-36401.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T15:24:50Z",
|
||||
"updated_at": "2024-07-05T15:33:12Z",
|
||||
"updated_at": "2024-07-20T21:01:18Z",
|
||||
"pushed_at": "2024-07-05T15:33:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-06T00:49:40Z",
|
||||
"updated_at": "2024-07-20T09:39:49Z",
|
||||
"updated_at": "2024-07-20T23:23:18Z",
|
||||
"pushed_at": "2024-07-12T00:41:36Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-19T03:51:54Z",
|
||||
"updated_at": "2024-07-20T15:52:40Z",
|
||||
"updated_at": "2024-07-21T00:11:43Z",
|
||||
"pushed_at": "2024-07-19T04:01:13Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T05:50:23Z",
|
||||
"updated_at": "2024-06-25T10:23:02Z",
|
||||
"updated_at": "2024-07-20T23:31:20Z",
|
||||
"pushed_at": "2024-06-11T04:46:42Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 71,
|
||||
"watchers": 73,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "a signal handler race condition in OpenSSH's server (sshd)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T10:55:29Z",
|
||||
"updated_at": "2024-07-20T11:10:29Z",
|
||||
"updated_at": "2024-07-20T22:34:17Z",
|
||||
"pushed_at": "2024-07-01T10:54:02Z",
|
||||
"stargazers_count": 428,
|
||||
"watchers_count": 428,
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"has_discussions": false,
|
||||
"forks_count": 180,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 180,
|
||||
"watchers": 428,
|
||||
"watchers": 429,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -3059,6 +3059,7 @@
|
|||
- [bughuntar/CVE-2024-34102](https://github.com/bughuntar/CVE-2024-34102)
|
||||
- [bughuntar/CVE-2024-34102-Python](https://github.com/bughuntar/CVE-2024-34102-Python)
|
||||
- [Phantom-IN/CVE-2024-34102](https://github.com/Phantom-IN/CVE-2024-34102)
|
||||
- [ex-ARnX/CVE-2024-34102-PoC](https://github.com/ex-ARnX/CVE-2024-34102-PoC)
|
||||
|
||||
### CVE-2024-34220 (-)
|
||||
|
||||
|
@ -43708,7 +43709,7 @@
|
|||
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
|
||||
- [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823)
|
||||
- [0xl0k1/CVE-2012-1823](https://github.com/0xl0k1/CVE-2012-1823)
|
||||
- [Fatalityx84/CVE-2012-1823](https://github.com/Fatalityx84/CVE-2012-1823)
|
||||
- [Fatalitysec/CVE-2012-1823](https://github.com/Fatalitysec/CVE-2012-1823)
|
||||
|
||||
### CVE-2012-1870 (2012-07-10)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue