mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 17:44:10 +01:00
Auto Update 2024/03/08 00:26:43
This commit is contained in:
parent
8ac77864a3
commit
3b1c0d1b7d
29 changed files with 177 additions and 103 deletions
2015
2016
2017
2018
2019
2020
CVE-2020-0601.jsonCVE-2020-0688.jsonCVE-2020-0796.jsonCVE-2020-1472.jsonCVE-2020-14882.jsonCVE-2020-1938.json
2021
2022
2023
2024
README.md
|
@ -168,7 +168,7 @@
|
|||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 7,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2024-02-23T03:46:33Z",
|
||||
"updated_at": "2024-03-07T22:03:37Z",
|
||||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 941,
|
||||
"watchers_count": 941,
|
||||
"stargazers_count": 942,
|
||||
"watchers_count": 942,
|
||||
"has_discussions": false,
|
||||
"forks_count": 392,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 392,
|
||||
"watchers": 941,
|
||||
"watchers": 942,
|
||||
"score": 0,
|
||||
"subscribers_count": 65
|
||||
},
|
||||
|
|
|
@ -198,10 +198,10 @@
|
|||
"description": "iis6 exploit 2017 CVE-2017-7269",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-05T23:21:12Z",
|
||||
"updated_at": "2024-02-22T01:55:01Z",
|
||||
"updated_at": "2024-03-07T19:15:03Z",
|
||||
"pushed_at": "2023-02-04T09:09:35Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -210,7 +210,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 81,
|
||||
"watchers": 82,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "simple Python exploit using CVE-2018-7449 on embOS\/IP FTP Server v3.22",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-05T10:38:23Z",
|
||||
"updated_at": "2023-08-17T22:48:25Z",
|
||||
"updated_at": "2024-03-07T18:37:48Z",
|
||||
"pushed_at": "2023-05-08T08:18:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"forks": 16,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2024-02-29T05:59:21Z",
|
||||
"updated_at": "2024-03-07T23:39:40Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1775,
|
||||
"watchers_count": 1775,
|
||||
"stargazers_count": 1777,
|
||||
"watchers_count": 1777,
|
||||
"has_discussions": false,
|
||||
"forks_count": 259,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 259,
|
||||
"watchers": 1775,
|
||||
"watchers": 1777,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Local Privilege Escalation in HP Support Assistant",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-13T09:20:16Z",
|
||||
"updated_at": "2022-05-06T17:30:55Z",
|
||||
"updated_at": "2024-03-07T20:01:21Z",
|
||||
"pushed_at": "2022-05-06T17:33:21Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -184,7 +184,7 @@
|
|||
"forks": 277,
|
||||
"watchers": 887,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
"subscribers_count": 33
|
||||
},
|
||||
{
|
||||
"id": 234192123,
|
||||
|
|
|
@ -219,7 +219,7 @@
|
|||
"forks": 13,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 243813543,
|
||||
|
@ -279,7 +279,7 @@
|
|||
"forks": 81,
|
||||
"watchers": 343,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
"subscribers_count": 9
|
||||
},
|
||||
{
|
||||
"id": 245013193,
|
||||
|
|
|
@ -149,7 +149,7 @@
|
|||
"forks": 206,
|
||||
"watchers": 649,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
"subscribers_count": 26
|
||||
},
|
||||
{
|
||||
"id": 246621836,
|
||||
|
|
|
@ -399,14 +399,14 @@
|
|||
{
|
||||
"id": 295903888,
|
||||
"name": "zabbix-template-CVE-2020-1472",
|
||||
"full_name": "scv-m\/zabbix-template-CVE-2020-1472",
|
||||
"full_name": "okay-scam\/zabbix-template-CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "scv-m",
|
||||
"login": "okay-scam",
|
||||
"id": 965541,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/965541?v=4",
|
||||
"html_url": "https:\/\/github.com\/scv-m"
|
||||
"html_url": "https:\/\/github.com\/okay-scam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/scv-m\/zabbix-template-CVE-2020-1472",
|
||||
"html_url": "https:\/\/github.com\/okay-scam\/zabbix-template-CVE-2020-1472",
|
||||
"description": "Zabbix Template to monitor for Windows Event Viewer event's related to Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472. Monitors event ID's 5827, 5828 & 5829. See: https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T02:37:52Z",
|
||||
|
|
|
@ -68,13 +68,13 @@
|
|||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"forks": 59,
|
||||
"watchers": 282,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
|
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"forks": 68,
|
||||
"watchers": 116,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T06:15:38Z",
|
||||
"updated_at": "2024-02-23T03:22:32Z",
|
||||
"updated_at": "2024-03-07T18:33:43Z",
|
||||
"pushed_at": "2021-12-16T01:33:48Z",
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -153,7 +153,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 179,
|
||||
"watchers": 180,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -374,7 +374,7 @@
|
|||
"stargazers_count": 1084,
|
||||
"watchers_count": 1084,
|
||||
"has_discussions": false,
|
||||
"forks_count": 519,
|
||||
"forks_count": 520,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -382,7 +382,7 @@
|
|||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 519,
|
||||
"forks": 520,
|
||||
"watchers": 1084,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
|
@ -857,10 +857,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2024-03-06T10:23:03Z",
|
||||
"updated_at": "2024-03-07T18:33:43Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 917,
|
||||
"watchers_count": 917,
|
||||
"stargazers_count": 918,
|
||||
"watchers_count": 918,
|
||||
"has_discussions": false,
|
||||
"forks_count": 141,
|
||||
"allow_forking": true,
|
||||
|
@ -889,7 +889,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 141,
|
||||
"watchers": 917,
|
||||
"watchers": 918,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
@ -1423,10 +1423,10 @@
|
|||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:18:46Z",
|
||||
"updated_at": "2024-02-25T00:31:58Z",
|
||||
"updated_at": "2024-03-07T21:46:24Z",
|
||||
"pushed_at": "2022-04-07T14:47:03Z",
|
||||
"stargazers_count": 855,
|
||||
"watchers_count": 855,
|
||||
"stargazers_count": 854,
|
||||
"watchers_count": 854,
|
||||
"has_discussions": false,
|
||||
"forks_count": 178,
|
||||
"allow_forking": true,
|
||||
|
@ -1448,7 +1448,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 178,
|
||||
"watchers": 855,
|
||||
"watchers": 854,
|
||||
"score": 0,
|
||||
"subscribers_count": 33
|
||||
},
|
||||
|
@ -3666,10 +3666,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2024-03-07T06:30:29Z",
|
||||
"updated_at": "2024-03-07T18:33:44Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3339,
|
||||
"watchers_count": 3339,
|
||||
"stargazers_count": 3340,
|
||||
"watchers_count": 3340,
|
||||
"has_discussions": true,
|
||||
"forks_count": 740,
|
||||
"allow_forking": true,
|
||||
|
@ -3678,7 +3678,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 740,
|
||||
"watchers": 3339,
|
||||
"watchers": 3340,
|
||||
"score": 0,
|
||||
"subscribers_count": 57
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-28T02:08:59Z",
|
||||
"updated_at": "2023-08-21T09:55:51Z",
|
||||
"updated_at": "2024-03-07T19:41:19Z",
|
||||
"pushed_at": "2023-03-09T16:25:57Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T03:20:23Z",
|
||||
"updated_at": "2024-02-24T11:42:42Z",
|
||||
"updated_at": "2024-03-07T20:27:30Z",
|
||||
"pushed_at": "2022-06-07T03:41:13Z",
|
||||
"stargazers_count": 556,
|
||||
"watchers_count": 556,
|
||||
"stargazers_count": 557,
|
||||
"watchers_count": 557,
|
||||
"has_discussions": false,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 95,
|
||||
"watchers": 556,
|
||||
"watchers": 557,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Windows Network File System Remote exploit for CVE-2022-30136",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-15T10:59:08Z",
|
||||
"updated_at": "2023-10-03T20:31:04Z",
|
||||
"updated_at": "2024-03-07T18:39:43Z",
|
||||
"pushed_at": "2023-07-11T16:57:26Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 8,
|
||||
"forks": 13,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Windows LPE exploit for CVE-2022-37969",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-09T21:17:44Z",
|
||||
"updated_at": "2024-01-22T08:01:46Z",
|
||||
"updated_at": "2024-03-07T18:41:03Z",
|
||||
"pushed_at": "2023-07-11T16:50:28Z",
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 122,
|
||||
"watchers": 123,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux Bluetooth - Run arbitrary management commands as an unprivileged user",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-16T10:05:13Z",
|
||||
"updated_at": "2024-02-29T10:33:36Z",
|
||||
"updated_at": "2024-03-08T00:02:23Z",
|
||||
"pushed_at": "2023-05-31T16:06:34Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -52,7 +52,7 @@
|
|||
"stargazers_count": 245,
|
||||
"watchers_count": 245,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -66,7 +66,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"forks": 35,
|
||||
"watchers": 245,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "GameOver(lay) Ubuntu Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T22:02:42Z",
|
||||
"updated_at": "2024-03-06T15:15:05Z",
|
||||
"updated_at": "2024-03-07T21:55:57Z",
|
||||
"pushed_at": "2023-10-09T22:44:21Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 86,
|
||||
"watchers": 85,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-27T12:22:05Z",
|
||||
"updated_at": "2024-03-05T05:43:18Z",
|
||||
"updated_at": "2024-03-07T18:41:48Z",
|
||||
"pushed_at": "2023-07-10T16:57:44Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 160,
|
||||
"watchers": 161,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-13T20:26:59Z",
|
||||
"updated_at": "2024-03-03T20:41:43Z",
|
||||
"updated_at": "2024-03-07T21:15:12Z",
|
||||
"pushed_at": "2024-02-06T23:22:31Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -39,7 +39,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Progress OpenEdge Authentication Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-06T15:27:18Z",
|
||||
"updated_at": "2024-03-07T07:45:51Z",
|
||||
"updated_at": "2024-03-07T22:00:43Z",
|
||||
"pushed_at": "2024-03-06T15:31:56Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -52,10 +52,10 @@
|
|||
"description": "A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-23T17:26:28Z",
|
||||
"updated_at": "2024-02-29T14:55:27Z",
|
||||
"updated_at": "2024-03-07T18:43:45Z",
|
||||
"pushed_at": "2024-02-26T12:00:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -64,7 +64,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
32
2024/CVE-2024-21338.json
Normal file
32
2024/CVE-2024-21338.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 768828187,
|
||||
"name": "CVE-2024-21338-POC",
|
||||
"full_name": "crackmapEZec\/CVE-2024-21338-POC",
|
||||
"owner": {
|
||||
"login": "crackmapEZec",
|
||||
"id": 162632735,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162632735?v=4",
|
||||
"html_url": "https:\/\/github.com\/crackmapEZec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/crackmapEZec\/CVE-2024-21338-POC",
|
||||
"description": "CVE-2024-21338 Windows Kernel Elevation of Privilege Vulnerability Zero-day",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-07T20:09:35Z",
|
||||
"updated_at": "2024-03-07T20:26:05Z",
|
||||
"pushed_at": "2024-03-07T20:12:55Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -118,5 +118,35 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 768881270,
|
||||
"name": "CVE-2024-21762-Exploit-POC",
|
||||
"full_name": "RequestXss\/CVE-2024-21762-Exploit-POC",
|
||||
"owner": {
|
||||
"login": "RequestXss",
|
||||
"id": 162373520,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162373520?v=4",
|
||||
"html_url": "https:\/\/github.com\/RequestXss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RequestXss\/CVE-2024-21762-Exploit-POC",
|
||||
"description": "Real proof-of-concept out-of-bound write vuln in FortiOS ---> RCE ",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-07T22:51:59Z",
|
||||
"updated_at": "2024-03-07T23:11:18Z",
|
||||
"pushed_at": "2024-03-07T23:12:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-06T03:15:03Z",
|
||||
"updated_at": "2024-03-07T18:05:04Z",
|
||||
"updated_at": "2024-03-07T19:05:06Z",
|
||||
"pushed_at": "2024-03-06T05:08:41Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -121,7 +121,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
16
README.md
16
README.md
|
@ -194,6 +194,13 @@
|
|||
|
||||
- [tandasat/CVE-2024-21305](https://github.com/tandasat/CVE-2024-21305)
|
||||
|
||||
### CVE-2024-21338 (2024-02-13)
|
||||
|
||||
<code>Windows Kernel Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [crackmapEZec/CVE-2024-21338-POC](https://github.com/crackmapEZec/CVE-2024-21338-POC)
|
||||
|
||||
### CVE-2024-21410 (2024-02-13)
|
||||
|
||||
<code>Microsoft Exchange Server Elevation of Privilege Vulnerability
|
||||
|
@ -247,6 +254,7 @@
|
|||
- [BishopFox/cve-2024-21762-check](https://github.com/BishopFox/cve-2024-21762-check)
|
||||
- [redCode001/CVE-2024-21762-POC](https://github.com/redCode001/CVE-2024-21762-POC)
|
||||
- [c0d3b3af/CVE-2024-21762-Exploit](https://github.com/c0d3b3af/CVE-2024-21762-Exploit)
|
||||
- [RequestXss/CVE-2024-21762-Exploit-POC](https://github.com/RequestXss/CVE-2024-21762-Exploit-POC)
|
||||
|
||||
### CVE-2024-21887 (2024-01-12)
|
||||
|
||||
|
@ -539,7 +547,11 @@
|
|||
|
||||
- [ELIZEUOPAIN/CVE-2024-24034](https://github.com/ELIZEUOPAIN/CVE-2024-24034)
|
||||
|
||||
### CVE-2024-24035
|
||||
### CVE-2024-24035 (-)
|
||||
|
||||
<code>Cross Site Scripting (XSS) vulnerability in Setor Informatica SIL 3.1 allows attackers to run arbitrary code via the hmessage parameter.
|
||||
</code>
|
||||
|
||||
- [ELIZEUOPAIN/CVE-2024-24035](https://github.com/ELIZEUOPAIN/CVE-2024-24035)
|
||||
|
||||
### CVE-2024-24092
|
||||
|
@ -22059,7 +22071,7 @@
|
|||
- [thatonesecguy/zerologon-CVE-2020-1472](https://github.com/thatonesecguy/zerologon-CVE-2020-1472)
|
||||
- [k8gege/CVE-2020-1472-EXP](https://github.com/k8gege/CVE-2020-1472-EXP)
|
||||
- [jiushill/CVE-2020-1472](https://github.com/jiushill/CVE-2020-1472)
|
||||
- [scv-m/zabbix-template-CVE-2020-1472](https://github.com/scv-m/zabbix-template-CVE-2020-1472)
|
||||
- [okay-scam/zabbix-template-CVE-2020-1472](https://github.com/okay-scam/zabbix-template-CVE-2020-1472)
|
||||
- [mstxq17/cve-2020-1472](https://github.com/mstxq17/cve-2020-1472)
|
||||
- [Fa1c0n35/CVE-2020-1472](https://github.com/Fa1c0n35/CVE-2020-1472)
|
||||
- [Fa1c0n35/SecuraBV-CVE-2020-1472](https://github.com/Fa1c0n35/SecuraBV-CVE-2020-1472)
|
||||
|
|
Loading…
Add table
Reference in a new issue