mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-30 03:20:10 +01:00
Auto Update 2025/01/28 12:32:45
This commit is contained in:
parent
eed80f6f73
commit
4323eb99fd
37 changed files with 168 additions and 209 deletions
|
@ -88,10 +88,10 @@
|
|||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-01-28T05:52:27Z",
|
||||
"pushed_at": "2025-01-28T05:52:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2025-01-28T09:46:42Z",
|
||||
"pushed_at": "2025-01-28T07:36:12Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -100,7 +100,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-01-28T05:52:27Z",
|
||||
"pushed_at": "2025-01-28T05:52:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2025-01-28T09:46:42Z",
|
||||
"pushed_at": "2025-01-28T07:36:12Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -81,13 +81,13 @@
|
|||
"stargazers_count": 726,
|
||||
"watchers_count": 726,
|
||||
"has_discussions": false,
|
||||
"forks_count": 260,
|
||||
"forks_count": 259,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 260,
|
||||
"forks": 259,
|
||||
"watchers": 726,
|
||||
"score": 0,
|
||||
"subscribers_count": 46
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"has_discussions": false,
|
||||
"forks_count": 182,
|
||||
"forks_count": 181,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 182,
|
||||
"forks": 181,
|
||||
"watchers": 493,
|
||||
"score": 0,
|
||||
"subscribers_count": 39
|
||||
|
|
|
@ -210,13 +210,13 @@
|
|||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"has_discussions": false,
|
||||
"forks_count": 109,
|
||||
"forks_count": 108,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 109,
|
||||
"forks": 108,
|
||||
"watchers": 318,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
|
|
|
@ -324,10 +324,10 @@
|
|||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-01-28T05:52:27Z",
|
||||
"pushed_at": "2025-01-28T05:52:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2025-01-28T09:46:42Z",
|
||||
"pushed_at": "2025-01-28T07:36:12Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -336,7 +336,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-08T20:06:15Z",
|
||||
"updated_at": "2025-01-28T00:04:46Z",
|
||||
"updated_at": "2025-01-28T07:59:55Z",
|
||||
"pushed_at": "2019-10-26T13:28:34Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -814,10 +814,10 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T15:20:25Z",
|
||||
"updated_at": "2024-08-05T03:06:48Z",
|
||||
"updated_at": "2025-01-28T07:15:50Z",
|
||||
"pushed_at": "2020-03-25T05:07:43Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -826,7 +826,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -336,10 +336,10 @@
|
|||
"description": "CVE-2019-2215",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-07T16:48:40Z",
|
||||
"updated_at": "2023-11-06T16:51:26Z",
|
||||
"updated_at": "2025-01-28T07:34:24Z",
|
||||
"pushed_at": "2021-06-30T15:55:46Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -348,7 +348,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -61,8 +61,8 @@
|
|||
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-23T20:21:00Z",
|
||||
"updated_at": "2025-01-28T06:05:58Z",
|
||||
"pushed_at": "2025-01-28T06:05:54Z",
|
||||
"updated_at": "2025-01-28T12:09:55Z",
|
||||
"pushed_at": "2025-01-28T12:09:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -60,41 +60,5 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 912256328,
|
||||
"name": "poc-cve-2020-25223",
|
||||
"full_name": "gh-2025-02\/poc-cve-2020-25223",
|
||||
"owner": {
|
||||
"login": "gh-2025-02",
|
||||
"id": 193763189,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193763189?v=4",
|
||||
"html_url": "https:\/\/github.com\/gh-2025-02",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gh-2025-02\/poc-cve-2020-25223",
|
||||
"description": "poc-cve-2020-25223",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-05T03:34:33Z",
|
||||
"updated_at": "2025-01-05T17:28:34Z",
|
||||
"pushed_at": "2025-01-05T03:40:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2020-25223",
|
||||
"poc",
|
||||
"poc-cve-2020-25223",
|
||||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-01-28T05:52:27Z",
|
||||
"pushed_at": "2025-01-28T05:52:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2025-01-28T09:46:42Z",
|
||||
"pushed_at": "2025-01-28T07:36:12Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T11:53:57Z",
|
||||
"updated_at": "2025-01-06T18:55:22Z",
|
||||
"updated_at": "2025-01-28T11:37:58Z",
|
||||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -41,7 +41,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 164,
|
||||
"watchers": 165,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -231,10 +231,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2025-01-27T21:50:44Z",
|
||||
"updated_at": "2025-01-28T11:04:09Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1610,
|
||||
"watchers_count": 1610,
|
||||
"stargazers_count": 1611,
|
||||
"watchers_count": 1611,
|
||||
"has_discussions": false,
|
||||
"forks_count": 483,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 483,
|
||||
"watchers": 1610,
|
||||
"watchers": 1611,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -884,10 +884,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2025-01-24T09:23:18Z",
|
||||
"updated_at": "2025-01-28T11:38:46Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 937,
|
||||
"watchers_count": 937,
|
||||
"stargazers_count": 938,
|
||||
"watchers_count": 938,
|
||||
"has_discussions": false,
|
||||
"forks_count": 141,
|
||||
"allow_forking": true,
|
||||
|
@ -916,7 +916,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 141,
|
||||
"watchers": 937,
|
||||
"watchers": 938,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-19T08:10:46Z",
|
||||
"updated_at": "2025-01-08T10:55:34Z",
|
||||
"updated_at": "2025-01-28T11:38:51Z",
|
||||
"pushed_at": "2022-09-04T17:28:56Z",
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -42,7 +42,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 329,
|
||||
"watchers": 330,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -634,10 +634,10 @@
|
|||
"description": "Atlassian Confluence 远程代码执行漏洞(CVE-2022-26134)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T06:57:02Z",
|
||||
"updated_at": "2024-08-12T20:23:55Z",
|
||||
"updated_at": "2025-01-28T12:11:34Z",
|
||||
"pushed_at": "2022-06-30T01:07:17Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -646,7 +646,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Attacks against QUIC (CVE-2022-30591)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-30T18:25:23Z",
|
||||
"updated_at": "2024-12-21T09:02:33Z",
|
||||
"updated_at": "2025-01-28T11:46:49Z",
|
||||
"pushed_at": "2022-12-31T01:55:15Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "POC for CVE-2022-39952",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-20T15:12:33Z",
|
||||
"updated_at": "2024-12-03T03:14:06Z",
|
||||
"updated_at": "2025-01-28T08:46:17Z",
|
||||
"pushed_at": "2023-02-25T08:52:03Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 265,
|
||||
"watchers": 266,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -743,10 +743,10 @@
|
|||
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T06:54:15Z",
|
||||
"updated_at": "2025-01-28T06:10:44Z",
|
||||
"updated_at": "2025-01-28T10:02:25Z",
|
||||
"pushed_at": "2025-01-16T09:56:36Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -755,7 +755,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
@ -790,41 +790,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 918683582,
|
||||
"name": "fortigate-belsen-leak",
|
||||
"full_name": "AKboss1221\/fortigate-belsen-leak",
|
||||
"owner": {
|
||||
"login": "AKboss1221",
|
||||
"id": 58637001,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58637001?v=4",
|
||||
"html_url": "https:\/\/github.com\/AKboss1221",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AKboss1221\/fortigate-belsen-leak",
|
||||
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T15:32:21Z",
|
||||
"updated_at": "2025-01-28T06:03:23Z",
|
||||
"pushed_at": "2025-01-28T06:03:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"belsen",
|
||||
"fortigate",
|
||||
"leak"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 921262750,
|
||||
"name": "Fortigate-Belsen-Leak-Dump-CVE-2022-40684-",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-07T05:43:48Z",
|
||||
"updated_at": "2025-01-23T03:50:49Z",
|
||||
"updated_at": "2025-01-28T08:28:23Z",
|
||||
"pushed_at": "2024-04-05T00:05:44Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -221,10 +221,10 @@
|
|||
"description": "Confluence Data Center & Server 权限提升漏洞 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-13T05:18:54Z",
|
||||
"updated_at": "2023-10-16T05:58:42Z",
|
||||
"updated_at": "2025-01-28T12:18:38Z",
|
||||
"pushed_at": "2023-10-13T05:21:37Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -233,7 +233,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -606,19 +606,19 @@
|
|||
"description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-26T02:34:44Z",
|
||||
"updated_at": "2025-01-13T08:27:08Z",
|
||||
"updated_at": "2025-01-28T12:13:37Z",
|
||||
"pushed_at": "2024-04-24T02:34:16Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 39,
|
||||
"forks": 2,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -111,10 +111,10 @@
|
|||
"description": "CVE-2023-24055 POC written in PowerShell.",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-30T13:22:22Z",
|
||||
"updated_at": "2024-08-12T20:29:34Z",
|
||||
"updated_at": "2025-01-28T08:56:36Z",
|
||||
"pushed_at": "2023-02-04T19:44:43Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -129,7 +129,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -81,13 +81,13 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -306,10 +306,10 @@
|
|||
"description": "Xss injection, WonderCMS 3.2.0 -3.4.2 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-24T17:39:45Z",
|
||||
"updated_at": "2025-01-19T19:40:02Z",
|
||||
"updated_at": "2025-01-28T09:12:36Z",
|
||||
"pushed_at": "2025-01-19T19:34:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -318,7 +318,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -262,7 +262,7 @@
|
|||
"description": "CVE-2024-0044",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-19T02:51:14Z",
|
||||
"updated_at": "2025-01-27T19:50:40Z",
|
||||
"updated_at": "2025-01-28T12:26:33Z",
|
||||
"pushed_at": "2024-08-24T06:32:58Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2025-01-27T16:49:45Z",
|
||||
"updated_at": "2025-01-28T10:08:00Z",
|
||||
"pushed_at": "2024-09-30T08:45:56Z",
|
||||
"stargazers_count": 436,
|
||||
"watchers_count": 436,
|
||||
"stargazers_count": 438,
|
||||
"watchers_count": 438,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 436,
|
||||
"watchers": 438,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Nuclei template to detect Apache servers vulnerable to CVE-2024-38473",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-23T14:39:31Z",
|
||||
"updated_at": "2024-12-22T21:45:53Z",
|
||||
"updated_at": "2025-01-28T10:34:20Z",
|
||||
"pushed_at": "2024-08-24T22:42:42Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -11,10 +11,10 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Dirac231\/CVE-2024-40498",
|
||||
"description": null,
|
||||
"description": "Blind SQL Injection to RCE in a PHP open source application",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-29T10:13:15Z",
|
||||
"updated_at": "2024-07-29T10:18:44Z",
|
||||
"updated_at": "2025-01-28T09:44:47Z",
|
||||
"pushed_at": "2024-07-29T10:18:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T07:26:15Z",
|
||||
"updated_at": "2025-01-25T09:34:26Z",
|
||||
"updated_at": "2025-01-28T09:48:19Z",
|
||||
"pushed_at": "2025-01-16T08:58:49Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -138,10 +138,10 @@
|
|||
"description": "An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy may allow a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-24T20:29:56Z",
|
||||
"updated_at": "2025-01-27T21:22:53Z",
|
||||
"pushed_at": "2025-01-27T21:22:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2025-01-28T12:25:54Z",
|
||||
"pushed_at": "2025-01-28T12:21:43Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -169,10 +169,10 @@
|
|||
"description": "CVE-2024-55591 Opening CMD (Command Line Interface), Creating a Superuser, and Managing VPN Groups",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-25T14:35:57Z",
|
||||
"updated_at": "2025-01-26T17:43:42Z",
|
||||
"updated_at": "2025-01-28T06:51:32Z",
|
||||
"pushed_at": "2025-01-26T17:43:39Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -200,19 +200,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T06:25:53Z",
|
||||
"updated_at": "2025-01-28T04:10:50Z",
|
||||
"updated_at": "2025-01-28T12:00:33Z",
|
||||
"pushed_at": "2025-01-27T19:11:46Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -61,8 +61,8 @@
|
|||
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-23T20:21:00Z",
|
||||
"updated_at": "2025-01-28T06:26:23Z",
|
||||
"pushed_at": "2025-01-28T06:26:21Z",
|
||||
"updated_at": "2025-01-28T12:30:28Z",
|
||||
"pushed_at": "2025-01-28T12:30:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -215,5 +215,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 923420005,
|
||||
"name": "CVE-2025-0282",
|
||||
"full_name": "AdaniKamal\/CVE-2025-0282",
|
||||
"owner": {
|
||||
"login": "AdaniKamal",
|
||||
"id": 44063862,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44063862?v=4",
|
||||
"html_url": "https:\/\/github.com\/AdaniKamal",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AdaniKamal\/CVE-2025-0282",
|
||||
"description": "Ivanti Connect Secure, Policy Secure & ZTA Gateways - CVE-2025-0282",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-28T07:56:05Z",
|
||||
"updated_at": "2025-01-28T08:46:48Z",
|
||||
"pushed_at": "2025-01-28T08:46:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -32,7 +32,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"forks": 18,
|
||||
"watchers": 73,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
@ -52,8 +52,8 @@
|
|||
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-25T18:07:12Z",
|
||||
"updated_at": "2025-01-28T06:26:45Z",
|
||||
"pushed_at": "2025-01-28T06:26:42Z",
|
||||
"updated_at": "2025-01-28T12:31:07Z",
|
||||
"pushed_at": "2025-01-28T12:31:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"forks": 17,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -13,6 +13,7 @@
|
|||
- [sfewer-r7/CVE-2025-0282](https://github.com/sfewer-r7/CVE-2025-0282)
|
||||
- [Hexastrike/Ivanti-Connect-Secure-Logs-Parser](https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser)
|
||||
- [chiefchainer/CVE-2025-0282](https://github.com/chiefchainer/CVE-2025-0282)
|
||||
- [AdaniKamal/CVE-2025-0282](https://github.com/AdaniKamal/CVE-2025-0282)
|
||||
|
||||
### CVE-2025-0411 (2025-01-25)
|
||||
|
||||
|
@ -22779,7 +22780,6 @@
|
|||
- [Anthony1500/CVE-2022-40684](https://github.com/Anthony1500/CVE-2022-40684)
|
||||
- [arsolutioner/fortigate-belsen-leak](https://github.com/arsolutioner/fortigate-belsen-leak)
|
||||
- [Rofell0s/Fortigate-Leak-CVE-2022-40684](https://github.com/Rofell0s/Fortigate-Leak-CVE-2022-40684)
|
||||
- [AKboss1221/fortigate-belsen-leak](https://github.com/AKboss1221/fortigate-belsen-leak)
|
||||
- [XalfiE/Fortigate-Belsen-Leak-Dump-CVE-2022-40684-](https://github.com/XalfiE/Fortigate-Belsen-Leak-Dump-CVE-2022-40684-)
|
||||
- [niklasmato/fortileak-01-2025-Be](https://github.com/niklasmato/fortileak-01-2025-Be)
|
||||
|
||||
|
@ -35219,7 +35219,6 @@
|
|||
|
||||
- [darrenmartyn/sophucked](https://github.com/darrenmartyn/sophucked)
|
||||
- [twentybel0w/CVE-2020-25223](https://github.com/twentybel0w/CVE-2020-25223)
|
||||
- [gh-2025-02/poc-cve-2020-25223](https://github.com/gh-2025-02/poc-cve-2020-25223)
|
||||
|
||||
### CVE-2020-25265 (2020-12-02)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue