mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 01:54:09 +01:00
Auto Update 2025/01/17 18:32:54
This commit is contained in:
parent
8ac38987b1
commit
37bb376d06
28 changed files with 291 additions and 107 deletions
|
@ -182,7 +182,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-11-14T04:35:59Z",
|
||||
"updated_at": "2025-01-05T15:26:10Z",
|
||||
"pushed_at": "2025-01-15T16:40:32Z",
|
||||
"pushed_at": "2025-01-17T14:30:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -417,10 +417,10 @@
|
|||
"description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2025-01-17T08:44:37Z",
|
||||
"updated_at": "2025-01-17T13:35:40Z",
|
||||
"pushed_at": "2024-11-13T03:12:58Z",
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -437,7 +437,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 178,
|
||||
"watchers": 179,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-12T05:48:13Z",
|
||||
"updated_at": "2025-01-17T07:31:00Z",
|
||||
"updated_at": "2025-01-17T12:15:05Z",
|
||||
"pushed_at": "2023-04-09T13:50:29Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"has_discussions": false,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 225,
|
||||
"watchers": 226,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
}
|
||||
|
|
|
@ -79,10 +79,10 @@
|
|||
"description": "Sudo exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-15T19:26:42Z",
|
||||
"updated_at": "2024-09-11T11:02:38Z",
|
||||
"updated_at": "2025-01-17T15:58:31Z",
|
||||
"pushed_at": "2019-10-15T20:02:57Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files and all non-administator passwords, private keys and High Availability passwords.",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-08T11:00:40Z",
|
||||
"updated_at": "2024-12-12T08:46:17Z",
|
||||
"updated_at": "2025-01-17T12:43:47Z",
|
||||
"pushed_at": "2023-12-19T16:39:37Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -981,10 +981,10 @@
|
|||
"description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2025-01-17T08:44:37Z",
|
||||
"updated_at": "2025-01-17T13:35:40Z",
|
||||
"pushed_at": "2024-11-13T03:12:58Z",
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -1001,7 +1001,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 178,
|
||||
"watchers": 179,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Android kernel exploitation for CVE-2022-20409",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-21T22:42:50Z",
|
||||
"updated_at": "2025-01-05T19:20:06Z",
|
||||
"updated_at": "2025-01-17T14:16:03Z",
|
||||
"pushed_at": "2024-10-17T16:26:39Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 164,
|
||||
"watchers": 165,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
33
2022/CVE-2022-24816.json
Normal file
33
2022/CVE-2022-24816.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 918197519,
|
||||
"name": "CVE-2022-24816",
|
||||
"full_name": "c1ph3rbyt3\/CVE-2022-24816",
|
||||
"owner": {
|
||||
"login": "c1ph3rbyt3",
|
||||
"id": 175246639,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175246639?v=4",
|
||||
"html_url": "https:\/\/github.com\/c1ph3rbyt3",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c1ph3rbyt3\/CVE-2022-24816",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-17T12:50:48Z",
|
||||
"updated_at": "2025-01-17T12:53:50Z",
|
||||
"pushed_at": "2025-01-17T12:53:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -937,5 +937,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 918322526,
|
||||
"name": "CVE-2022-29464",
|
||||
"full_name": "c1ph3rbyt3\/CVE-2022-29464",
|
||||
"owner": {
|
||||
"login": "c1ph3rbyt3",
|
||||
"id": 175246639,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175246639?v=4",
|
||||
"html_url": "https:\/\/github.com\/c1ph3rbyt3",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c1ph3rbyt3\/CVE-2022-29464",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-17T17:34:34Z",
|
||||
"updated_at": "2025-01-17T17:41:12Z",
|
||||
"pushed_at": "2025-01-17T17:41:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -60,5 +60,36 @@
|
|||
"watchers": 89,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 918268815,
|
||||
"name": "CVE-2022-34169",
|
||||
"full_name": "Disnaming\/CVE-2022-34169",
|
||||
"owner": {
|
||||
"login": "Disnaming",
|
||||
"id": 45449541,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45449541?v=4",
|
||||
"html_url": "https:\/\/github.com\/Disnaming",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Disnaming\/CVE-2022-34169",
|
||||
"description": "A PoC for CVE-2022-34169, for the SU_PWN challenge from SUCTF 2025",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-17T15:32:37Z",
|
||||
"updated_at": "2025-01-17T15:32:38Z",
|
||||
"pushed_at": "2025-01-17T15:32:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -743,10 +743,10 @@
|
|||
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T06:54:15Z",
|
||||
"updated_at": "2025-01-17T11:03:19Z",
|
||||
"updated_at": "2025-01-17T18:21:22Z",
|
||||
"pushed_at": "2025-01-16T09:56:36Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -755,7 +755,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 37,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -115,10 +115,10 @@
|
|||
"description": "Windows_AFD_LPE_CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-13T20:32:50Z",
|
||||
"updated_at": "2024-12-07T02:44:35Z",
|
||||
"updated_at": "2025-01-17T13:55:24Z",
|
||||
"pushed_at": "2023-08-27T10:41:40Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -127,7 +127,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "It was discovered two reflected cross site scripting (XSS) vulnerabilities in the Squidex open source headless CMS software. The Reflected Cross Site Scripting vulnerabilities affect all versions of Squidex prior to 7.4.0 and affect both authenticated and unauthenticated victim users.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-23T13:10:47Z",
|
||||
"updated_at": "2025-01-09T12:46:25Z",
|
||||
"updated_at": "2025-01-17T15:53:53Z",
|
||||
"pushed_at": "2024-12-23T13:22:22Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -433,8 +433,8 @@
|
|||
"description": "CVE-2023-4966-exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-18T09:09:20Z",
|
||||
"updated_at": "2024-12-18T09:14:49Z",
|
||||
"pushed_at": "2024-12-18T09:14:46Z",
|
||||
"updated_at": "2025-01-17T12:32:36Z",
|
||||
"pushed_at": "2025-01-17T12:32:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,12 +14,12 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2025-01-17T06:00:34Z",
|
||||
"updated_at": "2025-01-17T13:54:07Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2327,
|
||||
"watchers_count": 2327,
|
||||
"stargazers_count": 2328,
|
||||
"watchers_count": 2328,
|
||||
"has_discussions": false,
|
||||
"forks_count": 302,
|
||||
"forks_count": 303,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -31,8 +31,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 302,
|
||||
"watchers": 2327,
|
||||
"forks": 303,
|
||||
"watchers": 2328,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -1,33 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 776691365,
|
||||
"id": 779281251,
|
||||
"name": "G3-Loop-DoS",
|
||||
"full_name": "douglasbuzatto\/G3-Loop-DoS",
|
||||
"full_name": "renancesarr\/G3-Loop-DoS",
|
||||
"owner": {
|
||||
"login": "douglasbuzatto",
|
||||
"id": 10249957,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10249957?v=4",
|
||||
"html_url": "https:\/\/github.com\/douglasbuzatto",
|
||||
"login": "renancesarr",
|
||||
"id": 19899076,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19899076?v=4",
|
||||
"html_url": "https:\/\/github.com\/renancesarr",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/douglasbuzatto\/G3-Loop-DoS",
|
||||
"html_url": "https:\/\/github.com\/renancesarr\/G3-Loop-DoS",
|
||||
"description": "This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-24T07:53:52Z",
|
||||
"updated_at": "2024-11-06T16:58:54Z",
|
||||
"created_at": "2024-03-29T13:14:29Z",
|
||||
"updated_at": "2024-03-29T13:14:29Z",
|
||||
"pushed_at": "2024-03-24T08:00:24Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T12:39:44Z",
|
||||
"updated_at": "2025-01-17T12:18:16Z",
|
||||
"updated_at": "2025-01-17T18:21:50Z",
|
||||
"pushed_at": "2025-01-16T09:48:07Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 32,
|
||||
"forks": 7,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -42,13 +42,13 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nikallass\/CVE-2024-43468_mTLS_go",
|
||||
"description": "CVE-2024-43468 SCCM SQL Injection Exploit (mTLS version)",
|
||||
"description": "CVE-2024-43468 SCCM SQL Injection Exploit (mTLS unextractable client cert from MacOS keychain version)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-17T12:20:09Z",
|
||||
"updated_at": "2025-01-17T12:24:24Z",
|
||||
"pushed_at": "2025-01-17T12:24:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2025-01-17T12:43:47Z",
|
||||
"pushed_at": "2025-01-17T12:42:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -553,13 +553,13 @@
|
|||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"forks": 32,
|
||||
"watchers": 127,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "POC exploit for CVE-2024-49138",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-15T00:43:37Z",
|
||||
"updated_at": "2025-01-17T07:12:54Z",
|
||||
"updated_at": "2025-01-17T14:04:02Z",
|
||||
"pushed_at": "2025-01-15T01:01:21Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 144,
|
||||
"watchers": 145,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "DATAGERRY Broken Access Control",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T13:38:20Z",
|
||||
"updated_at": "2025-01-16T13:39:48Z",
|
||||
"pushed_at": "2025-01-16T13:39:47Z",
|
||||
"updated_at": "2025-01-17T14:38:57Z",
|
||||
"pushed_at": "2025-01-17T14:38:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -15,7 +15,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2025-01-16T19:51:01Z",
|
||||
"updated_at": "2025-01-17T10:12:45Z",
|
||||
"pushed_at": "2025-01-17T10:12:44Z",
|
||||
"pushed_at": "2025-01-17T13:36:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T07:26:15Z",
|
||||
"updated_at": "2025-01-17T10:16:00Z",
|
||||
"updated_at": "2025-01-17T18:16:57Z",
|
||||
"pushed_at": "2025-01-16T08:58:49Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 34,
|
||||
"forks": 8,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
33
2024/CVE-2024-57252.json
Normal file
33
2024/CVE-2024-57252.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 902776810,
|
||||
"name": "CVE-2024-57252",
|
||||
"full_name": "J-0k3r\/CVE-2024-57252",
|
||||
"owner": {
|
||||
"login": "J-0k3r",
|
||||
"id": 120563547,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120563547?v=4",
|
||||
"html_url": "https:\/\/github.com\/J-0k3r",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/J-0k3r\/CVE-2024-57252",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T08:46:54Z",
|
||||
"updated_at": "2025-01-17T17:09:11Z",
|
||||
"pushed_at": "2025-01-17T17:08:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-57727.json
Normal file
33
2024/CVE-2024-57727.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 918274803,
|
||||
"name": "CVE-2024-57727",
|
||||
"full_name": "imjdl\/CVE-2024-57727",
|
||||
"owner": {
|
||||
"login": "imjdl",
|
||||
"id": 31382943,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4",
|
||||
"html_url": "https:\/\/github.com\/imjdl",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/imjdl\/CVE-2024-57727",
|
||||
"description": "CVE-2024-57727",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-17T15:45:51Z",
|
||||
"updated_at": "2025-01-17T16:01:18Z",
|
||||
"pushed_at": "2025-01-17T16:00:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-10T06:27:59Z",
|
||||
"updated_at": "2024-12-21T06:44:02Z",
|
||||
"updated_at": "2025-01-17T13:23:16Z",
|
||||
"pushed_at": "2024-10-17T05:12:29Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 84,
|
||||
"watchers": 85,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-11T02:06:51Z",
|
||||
"updated_at": "2025-01-17T09:43:45Z",
|
||||
"updated_at": "2025-01-17T15:52:15Z",
|
||||
"pushed_at": "2025-01-11T23:54:06Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 31,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -143,13 +143,13 @@
|
|||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
@ -169,10 +169,10 @@
|
|||
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T14:45:53Z",
|
||||
"updated_at": "2025-01-17T11:25:38Z",
|
||||
"updated_at": "2025-01-17T12:35:08Z",
|
||||
"pushed_at": "2025-01-16T20:09:52Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
27
README.md
27
README.md
|
@ -589,7 +589,7 @@
|
|||
<code>Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources.
|
||||
</code>
|
||||
|
||||
- [douglasbuzatto/G3-Loop-DoS](https://github.com/douglasbuzatto/G3-Loop-DoS)
|
||||
- [renancesarr/G3-Loop-DoS](https://github.com/renancesarr/G3-Loop-DoS)
|
||||
|
||||
### CVE-2024-2188 (2024-03-05)
|
||||
|
||||
|
@ -7845,7 +7845,11 @@
|
|||
### CVE-2024-50964
|
||||
- [fdzdev/CVE-2024-50964](https://github.com/fdzdev/CVE-2024-50964)
|
||||
|
||||
### CVE-2024-50967
|
||||
### CVE-2024-50967 (2025-01-17)
|
||||
|
||||
<code>The /rest/rights/ REST API endpoint in Becon DATAGerry through 2.2.0 contains an Incorrect Access Control vulnerability. An attacker can remotely access this endpoint without authentication, leading to unauthorized disclosure of sensitive information.
|
||||
</code>
|
||||
|
||||
- [0xByteHunter/CVE-2024-50967](https://github.com/0xByteHunter/CVE-2024-50967)
|
||||
|
||||
### CVE-2024-50968 (2024-11-14)
|
||||
|
@ -8484,6 +8488,9 @@
|
|||
|
||||
- [absholi7ly/CVE-2024-56512-Apache-NiFi-Exploit](https://github.com/absholi7ly/CVE-2024-56512-Apache-NiFi-Exploit)
|
||||
|
||||
### CVE-2024-57252
|
||||
- [J-0k3r/CVE-2024-57252](https://github.com/J-0k3r/CVE-2024-57252)
|
||||
|
||||
### CVE-2024-57487 (2025-01-13)
|
||||
|
||||
<code>In Code-Projects Online Car Rental System 1.0, the file upload feature does not validate file extensions or MIME types allowing an attacker to upload a PHP shell without any restrictions and execute commands on the server.
|
||||
|
@ -8497,6 +8504,13 @@
|
|||
### CVE-2024-57523
|
||||
- [HackWidMaddy/CVE-2024-57523.](https://github.com/HackWidMaddy/CVE-2024-57523.)
|
||||
|
||||
### CVE-2024-57727 (2025-01-15)
|
||||
|
||||
<code>SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.
|
||||
</code>
|
||||
|
||||
- [imjdl/CVE-2024-57727](https://github.com/imjdl/CVE-2024-57727)
|
||||
|
||||
### CVE-2024-57784 (2025-01-16)
|
||||
|
||||
<code>An issue in the component /php/script_uploads.php of Zenitel AlphaWeb XE v11.2.3.10 allows attackers to execute a directory traversal.
|
||||
|
@ -19629,6 +19643,13 @@
|
|||
|
||||
- [Acceis/exploit-CVE-2022-24780](https://github.com/Acceis/exploit-CVE-2022-24780)
|
||||
|
||||
### CVE-2022-24816 (2022-04-13)
|
||||
|
||||
<code>JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project. Version 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script. Users unable to upgrade may negate the ability to compile Jiffle scripts from the final application, by removing janino-x.y.z.jar from the classpath.
|
||||
</code>
|
||||
|
||||
- [c1ph3rbyt3/CVE-2022-24816](https://github.com/c1ph3rbyt3/CVE-2022-24816)
|
||||
|
||||
### CVE-2022-24818 (2022-04-13)
|
||||
|
||||
<code>GeoTools is an open source Java library that provides tools for geospatial data. The GeoTools library has a number of data sources that can perform unchecked JNDI lookups, which in turn can be used to perform class deserialization and result in arbitrary code execution. Similar to the Log4J case, the vulnerability can be triggered if the JNDI names are user-provided, but requires admin-level login to be triggered. The lookups are now restricted in GeoTools 26.4, GeoTools 25.6, and GeoTools 24.6. Users unable to upgrade should ensure that any downstream application should not allow usage of remotely provided JNDI strings.
|
||||
|
@ -20701,6 +20722,7 @@
|
|||
- [Pushkarup/CVE-2022-29464](https://github.com/Pushkarup/CVE-2022-29464)
|
||||
- [SynixCyberCrimeMy/CVE-2022-29464](https://github.com/SynixCyberCrimeMy/CVE-2022-29464)
|
||||
- [cc3305/CVE-2022-29464](https://github.com/cc3305/CVE-2022-29464)
|
||||
- [c1ph3rbyt3/CVE-2022-29464](https://github.com/c1ph3rbyt3/CVE-2022-29464)
|
||||
|
||||
### CVE-2022-29465 (2022-08-05)
|
||||
|
||||
|
@ -21640,6 +21662,7 @@
|
|||
|
||||
- [bor8/CVE-2022-34169](https://github.com/bor8/CVE-2022-34169)
|
||||
- [flowerwind/AutoGenerateXalanPayload](https://github.com/flowerwind/AutoGenerateXalanPayload)
|
||||
- [Disnaming/CVE-2022-34169](https://github.com/Disnaming/CVE-2022-34169)
|
||||
|
||||
### CVE-2022-34265 (2022-07-04)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue