mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/11/27 00:35:32
This commit is contained in:
parent
e8e87017b1
commit
3d03809a53
37 changed files with 161 additions and 129 deletions
|
@ -14,7 +14,7 @@
|
|||
"description": "Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-16T01:16:44Z",
|
||||
"updated_at": "2024-08-12T19:34:50Z",
|
||||
"updated_at": "2024-11-26T21:35:03Z",
|
||||
"pushed_at": "2017-12-16T01:19:11Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
|
|
|
@ -462,10 +462,10 @@
|
|||
"description": "Dirty Cow exploit - CVE-2016-5195",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-25T21:08:01Z",
|
||||
"updated_at": "2024-11-19T23:44:17Z",
|
||||
"updated_at": "2024-11-26T21:35:00Z",
|
||||
"pushed_at": "2021-04-08T11:35:12Z",
|
||||
"stargazers_count": 861,
|
||||
"watchers_count": 861,
|
||||
"stargazers_count": 862,
|
||||
"watchers_count": 862,
|
||||
"has_discussions": false,
|
||||
"forks_count": 429,
|
||||
"allow_forking": true,
|
||||
|
@ -478,7 +478,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 429,
|
||||
"watchers": 861,
|
||||
"watchers": 862,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-28T08:44:44Z",
|
||||
"updated_at": "2024-08-12T19:26:18Z",
|
||||
"updated_at": "2024-11-26T22:25:47Z",
|
||||
"pushed_at": "2016-11-28T09:55:46Z",
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 153,
|
||||
"watchers": 152,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by march 2023. Uses CVE-2019-16253 as a payload to obtain a system shell. ",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-19T19:47:13Z",
|
||||
"updated_at": "2024-10-26T22:39:41Z",
|
||||
"updated_at": "2024-11-26T18:44:49Z",
|
||||
"pushed_at": "2024-03-20T19:12:39Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 79,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
}
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2024-11-07T17:59:52Z",
|
||||
"updated_at": "2024-11-26T23:51:11Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 665,
|
||||
"watchers_count": 665,
|
||||
"stargazers_count": 666,
|
||||
"watchers_count": 666,
|
||||
"has_discussions": false,
|
||||
"forks_count": 199,
|
||||
"allow_forking": true,
|
||||
|
@ -152,7 +152,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 199,
|
||||
"watchers": 665,
|
||||
"watchers": 666,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 12,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
"subscribers_count": 11
|
||||
}
|
||||
]
|
|
@ -209,10 +209,10 @@
|
|||
"description": "Privilege escalation with polkit - CVE-2021-3560",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T08:15:17Z",
|
||||
"updated_at": "2024-11-19T19:23:44Z",
|
||||
"updated_at": "2024-11-26T22:44:38Z",
|
||||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -221,7 +221,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 115,
|
||||
"watchers": 116,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -279,6 +279,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -967,10 +967,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2024-11-22T23:12:26Z",
|
||||
"updated_at": "2024-11-26T21:46:55Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 1088,
|
||||
"watchers_count": 1088,
|
||||
"stargazers_count": 1089,
|
||||
"watchers_count": 1089,
|
||||
"has_discussions": false,
|
||||
"forks_count": 189,
|
||||
"allow_forking": true,
|
||||
|
@ -981,7 +981,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 189,
|
||||
"watchers": 1088,
|
||||
"watchers": 1089,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
@ -2465,7 +2465,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 453089649,
|
||||
|
|
|
@ -231,10 +231,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2024-11-24T19:50:02Z",
|
||||
"updated_at": "2024-11-26T21:50:16Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1597,
|
||||
"watchers_count": 1597,
|
||||
"stargazers_count": 1598,
|
||||
"watchers_count": 1598,
|
||||
"has_discussions": false,
|
||||
"forks_count": 483,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 483,
|
||||
"watchers": 1597,
|
||||
"watchers": 1598,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -12048,7 +12048,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 614031542,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "LPE exploit for CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T23:00:27Z",
|
||||
"updated_at": "2024-11-19T02:35:14Z",
|
||||
"updated_at": "2024-11-26T22:22:03Z",
|
||||
"pushed_at": "2023-07-10T16:35:49Z",
|
||||
"stargazers_count": 482,
|
||||
"watchers_count": 482,
|
||||
"stargazers_count": 483,
|
||||
"watchers_count": 483,
|
||||
"has_discussions": false,
|
||||
"forks_count": 163,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 163,
|
||||
"watchers": 482,
|
||||
"watchers": 483,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Ivanti EPM AgentPortal RCE Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-13T14:02:04Z",
|
||||
"updated_at": "2024-10-16T07:49:53Z",
|
||||
"updated_at": "2024-11-26T23:19:45Z",
|
||||
"pushed_at": "2024-09-16T14:24:20Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit code for CVE-2023-42914 \/ pwn2own Vancouver 2023",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-22T11:28:35Z",
|
||||
"updated_at": "2024-11-26T14:20:50Z",
|
||||
"updated_at": "2024-11-26T21:08:44Z",
|
||||
"pushed_at": "2024-11-22T12:10:47Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T07:52:29Z",
|
||||
"updated_at": "2024-11-26T08:09:22Z",
|
||||
"updated_at": "2024-11-26T18:37:26Z",
|
||||
"pushed_at": "2024-11-26T08:06:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -1160,5 +1160,36 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 894667013,
|
||||
"name": "CVE-2023-38646-PoC-Metabase",
|
||||
"full_name": "JayRyz\/CVE-2023-38646-PoC-Metabase",
|
||||
"owner": {
|
||||
"login": "JayRyz",
|
||||
"id": 99511456,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99511456?v=4",
|
||||
"html_url": "https:\/\/github.com\/JayRyz",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JayRyz\/CVE-2023-38646-PoC-Metabase",
|
||||
"description": "Proof-of-Concept script for exploiting CVE-2023-38646. Intended for educational and research purposes only.",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T19:05:35Z",
|
||||
"updated_at": "2024-11-26T20:00:11Z",
|
||||
"pushed_at": "2024-11-26T20:00:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Root takeover via signature spoofing in KernelSU",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T12:08:31Z",
|
||||
"updated_at": "2024-09-18T08:09:52Z",
|
||||
"updated_at": "2024-11-26T18:44:53Z",
|
||||
"pushed_at": "2023-10-11T12:34:37Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 15,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
[
|
||||
{
|
||||
"id": 894423766,
|
||||
"id": 894757253,
|
||||
"name": "CVE-2024-10542",
|
||||
"full_name": "ubaii\/CVE-2024-10542",
|
||||
"owner": {
|
||||
|
@ -11,13 +11,13 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ubaii\/CVE-2024-10542",
|
||||
"description": null,
|
||||
"description": "WordPress Spam protection, AntiSpam, FireWall by CleanTalk Plugin <= 6.43.2 is vulnerable to Unauthenticated Arbitrary Plugin Installation Installation",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T10:32:36Z",
|
||||
"updated_at": "2024-11-26T10:32:52Z",
|
||||
"pushed_at": "2024-11-26T10:32:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"created_at": "2024-11-26T23:47:17Z",
|
||||
"updated_at": "2024-11-26T23:53:51Z",
|
||||
"pushed_at": "2024-11-26T23:49:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -45,12 +45,12 @@
|
|||
"description": "POC - CVE-2024–10914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-10T12:01:21Z",
|
||||
"updated_at": "2024-11-26T14:45:35Z",
|
||||
"updated_at": "2024-11-27T00:06:53Z",
|
||||
"pushed_at": "2024-11-26T14:45:28Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -64,8 +64,8 @@
|
|||
"unauthenticated-rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 19,
|
||||
"forks": 11,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-12T15:07:42Z",
|
||||
"updated_at": "2024-11-26T15:12:53Z",
|
||||
"updated_at": "2024-11-26T21:19:59Z",
|
||||
"pushed_at": "2024-04-18T14:31:34Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -293,10 +293,10 @@
|
|||
"description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-15T12:15:35Z",
|
||||
"updated_at": "2024-11-26T14:45:54Z",
|
||||
"updated_at": "2024-11-26T21:34:48Z",
|
||||
"pushed_at": "2024-11-26T14:45:12Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -310,7 +310,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1013,10 +1013,10 @@
|
|||
"description": "POC - Jenkins File Read Vulnerability - CVE-2024-23897",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-30T16:38:28Z",
|
||||
"updated_at": "2024-11-26T14:47:11Z",
|
||||
"updated_at": "2024-11-26T21:33:10Z",
|
||||
"pushed_at": "2024-11-26T14:46:59Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -1032,7 +1032,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1381,10 +1381,10 @@
|
|||
"description": "POC - CVE-2024–24919 - Check Point Security Gateways",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T06:54:51Z",
|
||||
"updated_at": "2024-11-26T14:46:28Z",
|
||||
"updated_at": "2024-11-26T21:34:45Z",
|
||||
"pushed_at": "2024-11-26T14:45:44Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -1398,7 +1398,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -79,10 +79,10 @@
|
|||
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-06T03:15:03Z",
|
||||
"updated_at": "2024-11-21T14:02:02Z",
|
||||
"updated_at": "2024-11-26T22:50:05Z",
|
||||
"pushed_at": "2024-03-11T07:57:40Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -101,7 +101,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2024-11-25T08:43:52Z",
|
||||
"updated_at": "2024-11-26T23:16:03Z",
|
||||
"pushed_at": "2024-09-30T08:45:56Z",
|
||||
"stargazers_count": 419,
|
||||
"watchers_count": 419,
|
||||
"stargazers_count": 420,
|
||||
"watchers_count": 420,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 419,
|
||||
"watchers": 420,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Ivanti EPM SQL Injection Remote Code Execution Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-12T13:53:32Z",
|
||||
"updated_at": "2024-11-06T12:03:23Z",
|
||||
"updated_at": "2024-11-26T23:18:26Z",
|
||||
"pushed_at": "2024-06-12T14:04:39Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "D-Link NAS CVE-2024-3273 Exploit Tool",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-07T03:09:13Z",
|
||||
"updated_at": "2024-10-26T08:30:03Z",
|
||||
"updated_at": "2024-11-26T21:08:59Z",
|
||||
"pushed_at": "2024-04-07T04:41:26Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 90,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-13T19:30:20Z",
|
||||
"updated_at": "2024-11-25T15:53:56Z",
|
||||
"pushed_at": "2024-11-12T15:28:48Z",
|
||||
"updated_at": "2024-11-26T20:54:21Z",
|
||||
"pushed_at": "2024-11-26T20:54:17Z",
|
||||
"stargazers_count": 210,
|
||||
"watchers_count": 210,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-08T02:40:56Z",
|
||||
"updated_at": "2024-11-20T16:31:00Z",
|
||||
"updated_at": "2024-11-26T22:44:35Z",
|
||||
"pushed_at": "2024-10-02T15:59:28Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": "Authentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T06:30:06Z",
|
||||
"updated_at": "2024-11-26T14:46:50Z",
|
||||
"updated_at": "2024-11-26T21:34:46Z",
|
||||
"pushed_at": "2024-11-26T14:46:07Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -155,7 +155,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-19T12:43:48Z",
|
||||
"updated_at": "2024-11-26T14:48:31Z",
|
||||
"updated_at": "2024-11-26T21:34:47Z",
|
||||
"pushed_at": "2024-11-26T14:47:16Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -64,7 +64,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -410,10 +410,10 @@
|
|||
"description": "POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T10:57:29Z",
|
||||
"updated_at": "2024-11-26T14:46:59Z",
|
||||
"updated_at": "2024-11-26T21:34:44Z",
|
||||
"pushed_at": "2024-11-26T14:46:24Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -426,7 +426,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-16T15:33:46Z",
|
||||
"updated_at": "2024-11-20T16:31:04Z",
|
||||
"updated_at": "2024-11-26T23:19:35Z",
|
||||
"pushed_at": "2024-09-16T15:43:44Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof of Concept Exploit for CVE-2024-9465",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-09T16:22:05Z",
|
||||
"updated_at": "2024-11-25T02:31:41Z",
|
||||
"updated_at": "2024-11-26T23:20:04Z",
|
||||
"pushed_at": "2024-10-09T16:34:42Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -12650,6 +12650,7 @@
|
|||
- [acesoyeo/METABASE-RCE-CVE-2023-38646-](https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646-)
|
||||
- [UserConnecting/Exploit-CVE-2023-38646-Metabase](https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase)
|
||||
- [XiaomingX/cve-2023-38646-poc](https://github.com/XiaomingX/cve-2023-38646-poc)
|
||||
- [JayRyz/CVE-2023-38646-PoC-Metabase](https://github.com/JayRyz/CVE-2023-38646-PoC-Metabase)
|
||||
|
||||
### CVE-2023-38709 (2024-04-04)
|
||||
|
||||
|
|
Loading…
Reference in a new issue