mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2024/06/14 06:29:37
This commit is contained in:
parent
8213e184bc
commit
48f12450b0
47 changed files with 302 additions and 193 deletions
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-06-08T02:22:57Z",
|
||||
"updated_at": "2024-06-14T01:55:25Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1941,
|
||||
"watchers_count": 1941,
|
||||
"stargazers_count": 1942,
|
||||
"watchers_count": 1942,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 1941,
|
||||
"watchers": 1942,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-06-08T02:22:57Z",
|
||||
"updated_at": "2024-06-14T01:55:25Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1941,
|
||||
"watchers_count": 1941,
|
||||
"stargazers_count": 1942,
|
||||
"watchers_count": 1942,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 1941,
|
||||
"watchers": 1942,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -233,10 +233,10 @@
|
|||
"description": "PoC for Dirty COW (CVE-2016-5195)",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-22T15:25:34Z",
|
||||
"updated_at": "2024-05-30T02:43:08Z",
|
||||
"updated_at": "2024-06-14T02:34:42Z",
|
||||
"pushed_at": "2022-03-16T12:08:54Z",
|
||||
"stargazers_count": 481,
|
||||
"watchers_count": 481,
|
||||
"stargazers_count": 482,
|
||||
"watchers_count": 482,
|
||||
"has_discussions": false,
|
||||
"forks_count": 146,
|
||||
"allow_forking": true,
|
||||
|
@ -245,7 +245,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 146,
|
||||
"watchers": 481,
|
||||
"watchers": 482,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -343,10 +343,10 @@
|
|||
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-13T11:01:41Z",
|
||||
"updated_at": "2024-06-12T22:34:05Z",
|
||||
"updated_at": "2024-06-14T06:04:17Z",
|
||||
"pushed_at": "2022-11-15T09:05:50Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -355,7 +355,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-06-08T02:22:57Z",
|
||||
"updated_at": "2024-06-14T01:55:25Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1941,
|
||||
"watchers_count": 1941,
|
||||
"stargazers_count": 1942,
|
||||
"watchers_count": 1942,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 1941,
|
||||
"watchers": 1942,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T00:28:50Z",
|
||||
"updated_at": "2024-06-12T07:51:56Z",
|
||||
"updated_at": "2024-06-14T02:39:31Z",
|
||||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 748,
|
||||
"watchers_count": 748,
|
||||
"stargazers_count": 749,
|
||||
"watchers_count": 749,
|
||||
"has_discussions": false,
|
||||
"forks_count": 170,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 170,
|
||||
"watchers": 748,
|
||||
"watchers": 749,
|
||||
"score": 0,
|
||||
"subscribers_count": 41
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Tool to exploit CVE-2018-13341 and recover hidden account password on Crestron devices",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-13T01:27:36Z",
|
||||
"updated_at": "2024-05-23T02:37:09Z",
|
||||
"updated_at": "2024-06-14T00:37:55Z",
|
||||
"pushed_at": "2019-12-13T01:36:08Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -557,10 +557,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-06-08T02:22:57Z",
|
||||
"updated_at": "2024-06-14T01:55:25Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1941,
|
||||
"watchers_count": 1941,
|
||||
"stargazers_count": 1942,
|
||||
"watchers_count": 1942,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
@ -590,7 +590,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 1941,
|
||||
"watchers": 1942,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
32
2018/CVE-2018-7490.json
Normal file
32
2018/CVE-2018-7490.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 814936310,
|
||||
"name": "uWSGI-CVE-2018-7490-POC",
|
||||
"full_name": "qinzhu111\/uWSGI-CVE-2018-7490-POC",
|
||||
"owner": {
|
||||
"login": "qinzhu111",
|
||||
"id": 170609894,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170609894?v=4",
|
||||
"html_url": "https:\/\/github.com\/qinzhu111"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/qinzhu111\/uWSGI-CVE-2018-7490-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-14T02:50:35Z",
|
||||
"updated_at": "2024-06-14T02:52:15Z",
|
||||
"pushed_at": "2024-06-14T02:51:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -363,10 +363,10 @@
|
|||
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-17T15:38:15Z",
|
||||
"updated_at": "2024-06-10T19:00:59Z",
|
||||
"updated_at": "2024-06-14T00:28:30Z",
|
||||
"pushed_at": "2018-04-26T15:40:28Z",
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"has_discussions": false,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
|
@ -375,7 +375,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 64,
|
||||
"watchers": 122,
|
||||
"watchers": 123,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal \/ Authenticated Arbitrary File Deletion in Python3",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-24T10:58:53Z",
|
||||
"updated_at": "2024-06-12T21:53:03Z",
|
||||
"updated_at": "2024-06-14T04:13:27Z",
|
||||
"pushed_at": "2023-02-27T16:32:59Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2024-05-24T09:54:43Z",
|
||||
"updated_at": "2024-06-14T04:55:11Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 197,
|
||||
"watchers": 198,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by march 2023. Uses CVE-2019-16253 as a payload to obtain a system shell. ",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-19T19:47:13Z",
|
||||
"updated_at": "2024-06-04T21:13:21Z",
|
||||
"updated_at": "2024-06-14T03:20:19Z",
|
||||
"pushed_at": "2024-03-20T19:12:39Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
}
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-06-08T02:22:57Z",
|
||||
"updated_at": "2024-06-14T01:55:25Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1941,
|
||||
"watchers_count": 1941,
|
||||
"stargazers_count": 1942,
|
||||
"watchers_count": 1942,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 1941,
|
||||
"watchers": 1942,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
}
|
||||
|
|
|
@ -889,10 +889,10 @@
|
|||
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-13T11:01:41Z",
|
||||
"updated_at": "2024-06-12T22:34:05Z",
|
||||
"updated_at": "2024-06-14T06:04:17Z",
|
||||
"pushed_at": "2022-11-15T09:05:50Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -901,7 +901,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-06-08T02:22:57Z",
|
||||
"updated_at": "2024-06-14T01:55:25Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1941,
|
||||
"watchers_count": 1941,
|
||||
"stargazers_count": 1942,
|
||||
"watchers_count": 1942,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 1941,
|
||||
"watchers": 1942,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -509,10 +509,10 @@
|
|||
"description": "PolicyKit CVE-2021-3560 Exploit (Authentication Agent)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T18:57:30Z",
|
||||
"updated_at": "2024-01-04T17:08:11Z",
|
||||
"updated_at": "2024-06-14T04:51:36Z",
|
||||
"pushed_at": "2022-05-02T07:49:01Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -521,7 +521,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 114,
|
||||
"watchers": 113,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -79,10 +79,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2024-06-13T12:36:34Z",
|
||||
"updated_at": "2024-06-14T02:53:58Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1926,
|
||||
"watchers_count": 1926,
|
||||
"stargazers_count": 1928,
|
||||
"watchers_count": 1928,
|
||||
"has_discussions": false,
|
||||
"forks_count": 509,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 509,
|
||||
"watchers": 1926,
|
||||
"watchers": 1928,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
@ -169,10 +169,10 @@
|
|||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T00:56:36Z",
|
||||
"updated_at": "2024-06-08T02:16:00Z",
|
||||
"updated_at": "2024-06-14T05:52:14Z",
|
||||
"pushed_at": "2023-05-04T19:24:39Z",
|
||||
"stargazers_count": 1029,
|
||||
"watchers_count": 1029,
|
||||
"stargazers_count": 1030,
|
||||
"watchers_count": 1030,
|
||||
"has_discussions": false,
|
||||
"forks_count": 308,
|
||||
"allow_forking": true,
|
||||
|
@ -185,7 +185,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 308,
|
||||
"watchers": 1029,
|
||||
"watchers": 1030,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
@ -943,7 +943,7 @@
|
|||
"stargazers_count": 1007,
|
||||
"watchers_count": 1007,
|
||||
"has_discussions": false,
|
||||
"forks_count": 178,
|
||||
"forks_count": 179,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -951,7 +951,7 @@
|
|||
"cve-2021-4034"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 178,
|
||||
"forks": 179,
|
||||
"watchers": 1007,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
|
|
|
@ -1527,7 +1527,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2024-04-29T17:48:37Z",
|
||||
"pushed_at": "2024-06-13T01:46:54Z",
|
||||
"pushed_at": "2024-06-14T01:49:08Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
@ -4705,7 +4705,7 @@
|
|||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
"subscribers_count": 15
|
||||
},
|
||||
{
|
||||
"id": 437960695,
|
||||
|
@ -12648,8 +12648,8 @@
|
|||
"description": "Objective: Demonstrate the exploitation of the Log4Shell vulnerability (CVE-2021-44228) within a simulated banking application environment.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T02:49:42Z",
|
||||
"updated_at": "2024-06-12T21:19:44Z",
|
||||
"pushed_at": "2024-06-12T21:19:41Z",
|
||||
"updated_at": "2024-06-14T02:52:30Z",
|
||||
"pushed_at": "2024-06-14T02:52:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -87,6 +87,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 264,
|
||||
"watchers_count": 264,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"forks": 50,
|
||||
"watchers": 264,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
|
@ -990,8 +990,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-12T08:24:30Z",
|
||||
"updated_at": "2024-06-12T09:38:26Z",
|
||||
"pushed_at": "2024-06-12T09:38:23Z",
|
||||
"updated_at": "2024-06-14T03:02:02Z",
|
||||
"pushed_at": "2024-06-14T03:01:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-13T13:17:23Z",
|
||||
"updated_at": "2024-06-11T17:56:51Z",
|
||||
"updated_at": "2024-06-14T03:40:11Z",
|
||||
"pushed_at": "2023-06-13T14:39:17Z",
|
||||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 228,
|
||||
"watchers": 229,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "GameOver(lay) Ubuntu Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T22:02:42Z",
|
||||
"updated_at": "2024-06-12T15:27:56Z",
|
||||
"updated_at": "2024-06-14T06:02:32Z",
|
||||
"pushed_at": "2023-10-09T22:44:21Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 459,
|
||||
"watchers_count": 459,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"forks": 40,
|
||||
"watchers": 459,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-15T12:14:18Z",
|
||||
"updated_at": "2024-06-08T16:26:21Z",
|
||||
"updated_at": "2024-06-14T04:12:09Z",
|
||||
"pushed_at": "2024-03-08T12:57:53Z",
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 187,
|
||||
"watchers": 188,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -92,6 +92,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,19 +43,19 @@
|
|||
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-27T05:57:21Z",
|
||||
"updated_at": "2024-05-18T21:38:08Z",
|
||||
"updated_at": "2024-06-14T05:20:25Z",
|
||||
"pushed_at": "2024-01-29T02:28:11Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 207,
|
||||
"forks": 29,
|
||||
"watchers": 208,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-17T14:18:54Z",
|
||||
"updated_at": "2024-05-14T15:21:41Z",
|
||||
"updated_at": "2024-06-14T01:14:13Z",
|
||||
"pushed_at": "2023-12-18T02:46:21Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": true,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-52251 There is a Remote Code Execution vulnerability provectus\/kafka-ui.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-06T11:07:36Z",
|
||||
"updated_at": "2024-03-27T09:30:54Z",
|
||||
"updated_at": "2024-06-14T02:52:13Z",
|
||||
"pushed_at": "2024-01-23T19:06:14Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-06-13T08:09:52Z",
|
||||
"updated_at": "2024-06-14T05:36:51Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2110,
|
||||
"watchers_count": 2110,
|
||||
"stargazers_count": 2113,
|
||||
"watchers_count": 2113,
|
||||
"has_discussions": false,
|
||||
"forks_count": 269,
|
||||
"forks_count": 270,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 269,
|
||||
"watchers": 2110,
|
||||
"forks": 270,
|
||||
"watchers": 2113,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-09T14:31:56Z",
|
||||
"updated_at": "2024-05-28T18:18:51Z",
|
||||
"updated_at": "2024-06-14T03:34:24Z",
|
||||
"pushed_at": "2024-02-09T15:14:03Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-13T06:00:24Z",
|
||||
"updated_at": "2024-06-13T16:41:45Z",
|
||||
"updated_at": "2024-06-14T03:05:11Z",
|
||||
"pushed_at": "2024-06-13T07:00:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,9 +55,9 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 814570994,
|
||||
|
@ -87,7 +87,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 814670168,
|
||||
|
@ -117,6 +117,36 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 814916351,
|
||||
"name": "CVE-2024-23692",
|
||||
"full_name": "Mr-r00t11\/CVE-2024-23692",
|
||||
"owner": {
|
||||
"login": "Mr-r00t11",
|
||||
"id": 68824333,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68824333?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mr-r00t11"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mr-r00t11\/CVE-2024-23692",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-14T01:33:19Z",
|
||||
"updated_at": "2024-06-14T01:47:48Z",
|
||||
"pushed_at": "2024-06-14T01:47:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Proof of concept for CVE-2024-24590",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-11T22:30:26Z",
|
||||
"updated_at": "2024-06-13T22:30:19Z",
|
||||
"updated_at": "2024-06-14T02:24:46Z",
|
||||
"pushed_at": "2024-06-13T11:33:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -117,6 +117,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,21 +13,21 @@
|
|||
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T17:02:03Z",
|
||||
"updated_at": "2024-06-14T00:29:29Z",
|
||||
"updated_at": "2024-06-14T06:17:08Z",
|
||||
"pushed_at": "2024-06-10T17:17:44Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 174,
|
||||
"forks": 37,
|
||||
"watchers": 184,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 813503450,
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "Windows LPE",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-11T08:03:29Z",
|
||||
"updated_at": "2024-06-13T14:22:33Z",
|
||||
"updated_at": "2024-06-14T00:57:37Z",
|
||||
"pushed_at": "2024-06-11T20:41:59Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 30,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -73,20 +73,20 @@
|
|||
"description": "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-12T11:11:16Z",
|
||||
"updated_at": "2024-06-14T00:24:39Z",
|
||||
"updated_at": "2024-06-14T06:27:53Z",
|
||||
"pushed_at": "2024-06-13T07:30:48Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 37,
|
||||
"forks": 7,
|
||||
"watchers": 72,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2024-27130",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T07:58:01Z",
|
||||
"updated_at": "2024-06-12T14:52:37Z",
|
||||
"updated_at": "2024-06-14T06:22:42Z",
|
||||
"pushed_at": "2024-05-17T10:27:07Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-27804",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T14:17:06Z",
|
||||
"updated_at": "2024-06-12T08:52:06Z",
|
||||
"updated_at": "2024-06-14T05:59:05Z",
|
||||
"pushed_at": "2024-05-14T14:55:23Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 116,
|
||||
"watchers": 117,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T14:21:49Z",
|
||||
"updated_at": "2024-06-12T10:56:17Z",
|
||||
"updated_at": "2024-06-14T02:22:15Z",
|
||||
"pushed_at": "2024-05-29T03:43:05Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -195,7 +195,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -327,6 +327,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2024/CVE-2024-28995.json
Normal file
32
2024/CVE-2024-28995.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 814960106,
|
||||
"name": "CVE-2024-28995",
|
||||
"full_name": "krypton-kry\/CVE-2024-28995",
|
||||
"owner": {
|
||||
"login": "krypton-kry",
|
||||
"id": 66370436,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66370436?v=4",
|
||||
"html_url": "https:\/\/github.com\/krypton-kry"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/krypton-kry\/CVE-2024-28995",
|
||||
"description": "CVE-2024-28995 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-14T04:06:58Z",
|
||||
"updated_at": "2024-06-14T04:09:37Z",
|
||||
"pushed_at": "2024-06-14T04:07:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 11,
|
||||
"watchers": 72,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,20 +13,20 @@
|
|||
"description": "PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-13T08:32:55Z",
|
||||
"updated_at": "2024-06-13T11:23:13Z",
|
||||
"updated_at": "2024-06-14T04:05:30Z",
|
||||
"pushed_at": "2024-06-13T11:23:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1012,10 +1012,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-06-11T20:06:10Z",
|
||||
"updated_at": "2024-06-14T02:11:52Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3466,
|
||||
"watchers_count": 3466,
|
||||
"stargazers_count": 3465,
|
||||
"watchers_count": 3465,
|
||||
"has_discussions": false,
|
||||
"forks_count": 234,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,9 +1024,9 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 234,
|
||||
"watchers": 3466,
|
||||
"watchers": 3465,
|
||||
"score": 0,
|
||||
"subscribers_count": 39
|
||||
"subscribers_count": 40
|
||||
},
|
||||
{
|
||||
"id": 780480213,
|
||||
|
|
|
@ -78,7 +78,7 @@
|
|||
"stargazers_count": 441,
|
||||
"watchers_count": 441,
|
||||
"has_discussions": false,
|
||||
"forks_count": 121,
|
||||
"forks_count": 122,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -89,7 +89,7 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 121,
|
||||
"forks": 122,
|
||||
"watchers": 441,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-37051 poc and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-11T16:01:13Z",
|
||||
"updated_at": "2024-06-13T11:23:35Z",
|
||||
"updated_at": "2024-06-14T05:14:00Z",
|
||||
"pushed_at": "2024-06-11T19:02:40Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -61,6 +61,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T10:02:23Z",
|
||||
"updated_at": "2024-06-13T15:37:33Z",
|
||||
"updated_at": "2024-06-14T05:55:18Z",
|
||||
"pushed_at": "2024-06-07T03:28:00Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -104,7 +104,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-05-22T23:18:20Z",
|
||||
"updated_at": "2024-06-12T16:35:44Z",
|
||||
"pushed_at": "2024-06-12T16:35:41Z",
|
||||
"pushed_at": "2024-06-14T02:21:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -193,6 +193,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -177,7 +177,7 @@
|
|||
"forks": 29,
|
||||
"watchers": 122,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 811787647,
|
||||
|
@ -888,7 +888,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 814702003,
|
||||
|
@ -918,6 +918,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
15
README.md
15
README.md
|
@ -1220,6 +1220,7 @@
|
|||
- [jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS](https://github.com/jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS)
|
||||
- [vanboomqi/CVE-2024-23692](https://github.com/vanboomqi/CVE-2024-23692)
|
||||
- [WanLiChangChengWanLiChang/CVE-2024-23692-RCE](https://github.com/WanLiChangChengWanLiChang/CVE-2024-23692-RCE)
|
||||
- [Mr-r00t11/CVE-2024-23692](https://github.com/Mr-r00t11/CVE-2024-23692)
|
||||
|
||||
### CVE-2024-23722 (2024-03-26)
|
||||
|
||||
|
@ -2052,6 +2053,13 @@
|
|||
- [saurabh2088/expat_2_1_0_CVE-2024-28757](https://github.com/saurabh2088/expat_2_1_0_CVE-2024-28757)
|
||||
- [saurabh2088/expat_2_1_1_CVE-2024-28757](https://github.com/saurabh2088/expat_2_1_1_CVE-2024-28757)
|
||||
|
||||
### CVE-2024-28995 (2024-06-06)
|
||||
|
||||
<code>\n\n\n\n\n\n\n\n\n\n\n\nSolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine. \n\n\n\n\n\n\n\n
|
||||
</code>
|
||||
|
||||
- [krypton-kry/CVE-2024-28995](https://github.com/krypton-kry/CVE-2024-28995)
|
||||
|
||||
### CVE-2024-29059 (2024-03-22)
|
||||
|
||||
<code>.NET Framework Information Disclosure Vulnerability
|
||||
|
@ -34234,6 +34242,13 @@
|
|||
|
||||
- [tafamace/CVE-2018-7489](https://github.com/tafamace/CVE-2018-7489)
|
||||
|
||||
### CVE-2018-7490 (2018-02-26)
|
||||
|
||||
<code>uWSGI before 2.0.17 mishandles a DOCUMENT_ROOT check during use of the --php-docroot option, allowing directory traversal.
|
||||
</code>
|
||||
|
||||
- [qinzhu111/uWSGI-CVE-2018-7490-POC](https://github.com/qinzhu111/uWSGI-CVE-2018-7490-POC)
|
||||
|
||||
### CVE-2018-7600 (2018-03-29)
|
||||
|
||||
<code>Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
|
||||
|
|
Loading…
Add table
Reference in a new issue