mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/09/27 00:30:25
This commit is contained in:
parent
8b7b4e9b6d
commit
39ebc3c9bb
22 changed files with 223 additions and 64 deletions
|
@ -258,10 +258,10 @@
|
|||
"description": "cve-2018-10933 libssh authentication bypass",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T19:13:45Z",
|
||||
"updated_at": "2024-09-03T16:05:32Z",
|
||||
"updated_at": "2024-09-26T19:51:39Z",
|
||||
"pushed_at": "2018-10-21T21:24:29Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -270,7 +270,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2024-09-25T03:14:00Z",
|
||||
"updated_at": "2024-09-26T23:52:27Z",
|
||||
"pushed_at": "2023-07-20T10:51:42Z",
|
||||
"stargazers_count": 1724,
|
||||
"watchers_count": 1724,
|
||||
"stargazers_count": 1725,
|
||||
"watchers_count": 1725,
|
||||
"has_discussions": false,
|
||||
"forks_count": 359,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 359,
|
||||
"watchers": 1724,
|
||||
"watchers": 1725,
|
||||
"score": 0,
|
||||
"subscribers_count": 86
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-30T04:39:58Z",
|
||||
"updated_at": "2024-09-24T08:27:54Z",
|
||||
"updated_at": "2024-09-26T20:04:04Z",
|
||||
"pushed_at": "2023-11-12T16:29:03Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -58,7 +58,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "SQLPad - Template injection (POC exploit for SQLPad RCE [CVE-2022-0944])",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-09T19:09:43Z",
|
||||
"updated_at": "2024-09-19T09:06:14Z",
|
||||
"updated_at": "2024-09-27T00:09:01Z",
|
||||
"pushed_at": "2024-09-10T14:23:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-09-20T09:50:26Z",
|
||||
"updated_at": "2024-09-26T21:07:54Z",
|
||||
"pushed_at": "2024-08-01T15:09:15Z",
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"stargazers_count": 260,
|
||||
"watchers_count": 260,
|
||||
"has_discussions": true,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 259,
|
||||
"watchers": 260,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 840469662,
|
||||
"name": "CVE-2022-44149",
|
||||
"full_name": "geniuszlyy\/CVE-2022-44149",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-44149",
|
||||
"description": "it is script designed to interact with a router by sending a payload to its system tools. The script retrieves the router's configuration from environment variables to ensure security. It includes functions for generating an authorization header, sending a payload, and logging the process.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-09T19:27:22Z",
|
||||
"updated_at": "2024-08-12T17:34:44Z",
|
||||
"pushed_at": "2024-08-09T19:28:51Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 840470520,
|
||||
"name": "CVE-2022-45701",
|
||||
"full_name": "geniuszlyy\/CVE-2022-45701",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-45701",
|
||||
"description": "it is script designed to exploit certain vulnerabilities in routers by sending payloads through SNMP (Simple Network Management Protocol). The script automates the process of authorization, payload generation, and execution, allowing for remote command execution on the target device.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-09T19:30:20Z",
|
||||
"updated_at": "2024-08-12T17:34:44Z",
|
||||
"pushed_at": "2024-08-09T19:31:12Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 840471119,
|
||||
"name": "CVE-2022-46080",
|
||||
"full_name": "geniuszlyy\/CVE-2022-46080",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-46080",
|
||||
"description": "it is script that enables Telnet on routers by sending a specially crafted request. The script allows users to specify the router's URL, Telnet port, and password. It validates the inputs and logs the process, providing feedback on whether the exploit was successful.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-09T19:32:32Z",
|
||||
"updated_at": "2024-08-12T17:34:44Z",
|
||||
"pushed_at": "2024-08-11T07:29:30Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-16T20:15:36Z",
|
||||
"updated_at": "2024-09-16T09:35:08Z",
|
||||
"updated_at": "2024-09-26T21:58:53Z",
|
||||
"pushed_at": "2024-05-08T16:17:07Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 127,
|
||||
"watchers": 128,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -1464,5 +1464,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 863722602,
|
||||
"name": "LAB-DFIR-cve-2023-38831",
|
||||
"full_name": "ra3edAJ\/LAB-DFIR-cve-2023-38831",
|
||||
"owner": {
|
||||
"login": "ra3edAJ",
|
||||
"id": 122083416,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122083416?v=4",
|
||||
"html_url": "https:\/\/github.com\/ra3edAJ"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ra3edAJ\/LAB-DFIR-cve-2023-38831",
|
||||
"description": "d",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-26T19:44:08Z",
|
||||
"updated_at": "2024-09-26T19:49:33Z",
|
||||
"pushed_at": "2024-09-26T19:49:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2023-4634",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-05T07:44:15Z",
|
||||
"updated_at": "2024-09-24T08:47:25Z",
|
||||
"updated_at": "2024-09-26T22:02:48Z",
|
||||
"pushed_at": "2023-09-07T05:36:10Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 43,
|
||||
"forks": 9,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CVE-2024-25731",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-06T04:38:12Z",
|
||||
"updated_at": "2024-03-01T23:54:51Z",
|
||||
"pushed_at": "2024-03-01T23:57:56Z",
|
||||
"updated_at": "2024-09-26T23:51:13Z",
|
||||
"pushed_at": "2024-09-26T23:51:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Proof of Concept Exploit for CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T18:12:38Z",
|
||||
"updated_at": "2024-09-26T10:20:55Z",
|
||||
"updated_at": "2024-09-26T23:12:16Z",
|
||||
"pushed_at": "2024-09-24T18:27:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-15T08:07:05Z",
|
||||
"updated_at": "2024-09-25T14:38:35Z",
|
||||
"updated_at": "2024-09-26T19:28:32Z",
|
||||
"pushed_at": "2024-09-08T21:23:34Z",
|
||||
"stargazers_count": 360,
|
||||
"watchers_count": 360,
|
||||
"stargazers_count": 361,
|
||||
"watchers_count": 361,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 360,
|
||||
"watchers": 361,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T19:24:55Z",
|
||||
"updated_at": "2024-09-26T18:26:36Z",
|
||||
"updated_at": "2024-09-26T20:59:32Z",
|
||||
"pushed_at": "2024-09-25T21:57:51Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"forks": 7,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WBW Product Table Pro <= 1.9.4 - Unauthenticated Arbitrary SQL Execution to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T05:50:03Z",
|
||||
"updated_at": "2024-09-25T13:15:25Z",
|
||||
"updated_at": "2024-09-26T18:48:28Z",
|
||||
"pushed_at": "2024-09-24T05:52:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A proof of concept of traefik CVE to understand the impact",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-26T09:58:27Z",
|
||||
"updated_at": "2024-09-26T13:45:12Z",
|
||||
"updated_at": "2024-09-26T21:26:32Z",
|
||||
"pushed_at": "2024-09-26T13:45:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -133,8 +133,8 @@
|
|||
"description": "[CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-26T06:50:48Z",
|
||||
"updated_at": "2024-09-21T09:10:12Z",
|
||||
"pushed_at": "2024-09-21T09:10:09Z",
|
||||
"updated_at": "2024-09-26T23:28:23Z",
|
||||
"pushed_at": "2024-09-26T23:28:20Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1183,10 +1183,10 @@
|
|||
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T14:41:43Z",
|
||||
"updated_at": "2024-09-19T07:50:40Z",
|
||||
"updated_at": "2024-09-26T18:36:14Z",
|
||||
"pushed_at": "2024-07-02T15:16:04Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -1205,7 +1205,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
32
2024/CVE-2024-6769.json
Normal file
32
2024/CVE-2024-6769.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 849466467,
|
||||
"name": "CVE-2024-6769",
|
||||
"full_name": "fortra\/CVE-2024-6769",
|
||||
"owner": {
|
||||
"login": "fortra",
|
||||
"id": 117669217,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117669217?v=4",
|
||||
"html_url": "https:\/\/github.com\/fortra"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fortra\/CVE-2024-6769",
|
||||
"description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T16:40:49Z",
|
||||
"updated_at": "2024-09-26T20:33:30Z",
|
||||
"pushed_at": "2024-09-25T12:00:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-16T19:04:57Z",
|
||||
"updated_at": "2024-09-24T08:22:44Z",
|
||||
"updated_at": "2024-09-26T22:30:08Z",
|
||||
"pushed_at": "2024-09-16T19:44:54Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -1363,6 +1363,9 @@
|
|||
|
||||
- [fortra/CVE-2024-6768](https://github.com/fortra/CVE-2024-6768)
|
||||
|
||||
### CVE-2024-6769
|
||||
- [fortra/CVE-2024-6769](https://github.com/fortra/CVE-2024-6769)
|
||||
|
||||
### CVE-2024-6782 (2024-08-06)
|
||||
|
||||
<code>Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.
|
||||
|
@ -10636,6 +10639,7 @@
|
|||
- [MaorBuskila/Windows-X64-RAT](https://github.com/MaorBuskila/Windows-X64-RAT)
|
||||
- [yezzfusl/cve_2023_38831_scanner](https://github.com/yezzfusl/cve_2023_38831_scanner)
|
||||
- [FirFirdaus/CVE-2023-38831](https://github.com/FirFirdaus/CVE-2023-38831)
|
||||
- [ra3edAJ/LAB-DFIR-cve-2023-38831](https://github.com/ra3edAJ/LAB-DFIR-cve-2023-38831)
|
||||
|
||||
### CVE-2023-38836 (2023-08-21)
|
||||
|
||||
|
@ -19295,6 +19299,7 @@
|
|||
</code>
|
||||
|
||||
- [yerodin/CVE-2022-44149](https://github.com/yerodin/CVE-2022-44149)
|
||||
- [geniuszlyy/CVE-2022-44149](https://github.com/geniuszlyy/CVE-2022-44149)
|
||||
|
||||
### CVE-2022-44183 (2022-11-21)
|
||||
|
||||
|
@ -19577,6 +19582,7 @@
|
|||
</code>
|
||||
|
||||
- [yerodin/CVE-2022-45701](https://github.com/yerodin/CVE-2022-45701)
|
||||
- [geniuszlyy/CVE-2022-45701](https://github.com/geniuszlyy/CVE-2022-45701)
|
||||
|
||||
### CVE-2022-45728 (2023-01-12)
|
||||
|
||||
|
@ -19636,6 +19642,7 @@
|
|||
</code>
|
||||
|
||||
- [yerodin/CVE-2022-46080](https://github.com/yerodin/CVE-2022-46080)
|
||||
- [geniuszlyy/CVE-2022-46080](https://github.com/geniuszlyy/CVE-2022-46080)
|
||||
|
||||
### CVE-2022-46087 (2023-01-30)
|
||||
|
||||
|
|
Loading…
Reference in a new issue