mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/03/24 12:26:52
This commit is contained in:
parent
c6eb434f0e
commit
49c0d5439f
36 changed files with 317 additions and 115 deletions
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-03-16T11:08:04Z",
|
||||
"updated_at": "2024-03-24T09:06:37Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1896,
|
||||
"watchers_count": 1896,
|
||||
"stargazers_count": 1897,
|
||||
"watchers_count": 1897,
|
||||
"has_discussions": true,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1896,
|
||||
"watchers": 1897,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-03-16T11:08:04Z",
|
||||
"updated_at": "2024-03-24T09:06:37Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1896,
|
||||
"watchers_count": 1896,
|
||||
"stargazers_count": 1897,
|
||||
"watchers_count": 1897,
|
||||
"has_discussions": true,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1896,
|
||||
"watchers": 1897,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-03-16T11:08:04Z",
|
||||
"updated_at": "2024-03-24T09:06:37Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1896,
|
||||
"watchers_count": 1896,
|
||||
"stargazers_count": 1897,
|
||||
"watchers_count": 1897,
|
||||
"has_discussions": true,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1896,
|
||||
"watchers": 1897,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -557,10 +557,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-03-16T11:08:04Z",
|
||||
"updated_at": "2024-03-24T09:06:37Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1896,
|
||||
"watchers_count": 1896,
|
||||
"stargazers_count": 1897,
|
||||
"watchers_count": 1897,
|
||||
"has_discussions": true,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -590,7 +590,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1896,
|
||||
"watchers": 1897,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by march 2023. Uses CVE-2019-16253 as a payload to obtain a system shell. ",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-19T19:47:13Z",
|
||||
"updated_at": "2024-03-23T13:26:57Z",
|
||||
"updated_at": "2024-03-24T08:10:00Z",
|
||||
"pushed_at": "2024-03-20T19:12:39Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
}
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-03-16T11:08:04Z",
|
||||
"updated_at": "2024-03-24T09:06:37Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1896,
|
||||
"watchers_count": 1896,
|
||||
"stargazers_count": 1897,
|
||||
"watchers_count": 1897,
|
||||
"has_discussions": true,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1896,
|
||||
"watchers": 1897,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T22:07:47Z",
|
||||
"updated_at": "2024-03-14T10:40:36Z",
|
||||
"updated_at": "2024-03-24T09:42:22Z",
|
||||
"pushed_at": "2019-02-20T15:35:34Z",
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"has_discussions": false,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 206,
|
||||
"watchers": 207,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-03-16T11:08:04Z",
|
||||
"updated_at": "2024-03-24T09:06:37Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1896,
|
||||
"watchers_count": 1896,
|
||||
"stargazers_count": 1897,
|
||||
"watchers_count": 1897,
|
||||
"has_discussions": true,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1896,
|
||||
"watchers": 1897,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Confluence Server Webwork OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T07:15:17Z",
|
||||
"updated_at": "2024-03-14T10:40:52Z",
|
||||
"updated_at": "2024-03-24T11:20:48Z",
|
||||
"pushed_at": "2021-12-03T22:09:31Z",
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"has_discussions": false,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 83,
|
||||
"watchers": 301,
|
||||
"watchers": 302,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2021-30807",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-09T20:11:42Z",
|
||||
"updated_at": "2024-03-23T02:12:52Z",
|
||||
"updated_at": "2024-03-24T11:23:16Z",
|
||||
"pushed_at": "2021-11-29T13:50:42Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 130,
|
||||
"watchers": 131,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -470,10 +470,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2024-03-22T16:11:16Z",
|
||||
"updated_at": "2024-03-24T09:25:36Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 913,
|
||||
"watchers_count": 913,
|
||||
"stargazers_count": 914,
|
||||
"watchers_count": 914,
|
||||
"has_discussions": false,
|
||||
"forks_count": 235,
|
||||
"allow_forking": true,
|
||||
|
@ -482,7 +482,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 235,
|
||||
"watchers": 913,
|
||||
"watchers": 914,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
@ -1074,10 +1074,10 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2024-03-12T10:57:18Z",
|
||||
"updated_at": "2024-03-24T09:17:44Z",
|
||||
"pushed_at": "2022-01-13T05:48:01Z",
|
||||
"stargazers_count": 703,
|
||||
"watchers_count": 703,
|
||||
"stargazers_count": 704,
|
||||
"watchers_count": 704,
|
||||
"has_discussions": false,
|
||||
"forks_count": 165,
|
||||
"allow_forking": true,
|
||||
|
@ -1086,7 +1086,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 165,
|
||||
"watchers": 703,
|
||||
"watchers": 704,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -750,5 +750,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 776748749,
|
||||
"name": "CVE-2021-3560-EXPLOIT",
|
||||
"full_name": "Kyyomaa\/CVE-2021-3560-EXPLOIT",
|
||||
"owner": {
|
||||
"login": "Kyyomaa",
|
||||
"id": 123502260,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123502260?v=4",
|
||||
"html_url": "https:\/\/github.com\/Kyyomaa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Kyyomaa\/CVE-2021-3560-EXPLOIT",
|
||||
"description": "Part of my cybersecurity thesis consists in exploring and exploiting this vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-24T11:37:18Z",
|
||||
"updated_at": "2024-03-24T11:39:41Z",
|
||||
"pushed_at": "2024-03-24T12:05:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-03-23T22:49:13Z",
|
||||
"updated_at": "2024-03-24T07:07:43Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1729,
|
||||
"watchers_count": 1729,
|
||||
"stargazers_count": 1730,
|
||||
"watchers_count": 1730,
|
||||
"has_discussions": false,
|
||||
"forks_count": 516,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 516,
|
||||
"watchers": 1729,
|
||||
"watchers": 1730,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "Docker Breakout Checker and PoC via CAP_SYS_ADMIN and via user namespaces (CVE-2022-0492)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-18T04:48:25Z",
|
||||
"updated_at": "2023-05-30T00:56:36Z",
|
||||
"updated_at": "2024-03-24T09:39:48Z",
|
||||
"pushed_at": "2023-02-18T05:28:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -212,7 +212,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-21660",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-10T05:50:35Z",
|
||||
"updated_at": "2024-01-26T09:40:56Z",
|
||||
"updated_at": "2024-03-24T07:37:20Z",
|
||||
"pushed_at": "2022-01-10T05:52:03Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -309,5 +309,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 776679745,
|
||||
"name": "WordPress--CVE-2022-21661",
|
||||
"full_name": "CharonDefalt\/WordPress--CVE-2022-21661",
|
||||
"owner": {
|
||||
"login": "CharonDefalt",
|
||||
"id": 103410775,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103410775?v=4",
|
||||
"html_url": "https:\/\/github.com\/CharonDefalt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CharonDefalt\/WordPress--CVE-2022-21661",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-24T07:03:35Z",
|
||||
"updated_at": "2024-03-24T07:03:35Z",
|
||||
"pushed_at": "2024-03-24T07:03:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -153,5 +153,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 776718207,
|
||||
"name": "spring-security-CVE-2022-22978",
|
||||
"full_name": "mukeshkumar286\/spring-security-CVE-2022-22978",
|
||||
"owner": {
|
||||
"login": "mukeshkumar286",
|
||||
"id": 17064062,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17064062?v=4",
|
||||
"html_url": "https:\/\/github.com\/mukeshkumar286"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mukeshkumar286\/spring-security-CVE-2022-22978",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-24T09:42:40Z",
|
||||
"updated_at": "2024-03-24T09:42:40Z",
|
||||
"pushed_at": "2024-03-24T10:28:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2022/CVE-2022-32898.json
Normal file
32
2022/CVE-2022-32898.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 776714071,
|
||||
"name": "CVE-2022-32898",
|
||||
"full_name": "ox1111\/CVE-2022-32898",
|
||||
"owner": {
|
||||
"login": "ox1111",
|
||||
"id": 31942498,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31942498?v=4",
|
||||
"html_url": "https:\/\/github.com\/ox1111"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ox1111\/CVE-2022-32898",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-24T09:26:29Z",
|
||||
"updated_at": "2024-03-24T09:26:29Z",
|
||||
"pushed_at": "2024-03-24T10:41:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -360,7 +360,7 @@
|
|||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -373,7 +373,7 @@
|
|||
"macos"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-46718: an app may be able to read sensitive location information.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T18:34:52Z",
|
||||
"updated_at": "2024-03-24T01:36:11Z",
|
||||
"updated_at": "2024-03-24T09:17:07Z",
|
||||
"pushed_at": "2023-05-01T18:48:34Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -43,19 +43,19 @@
|
|||
"description": "GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-17T23:17:22Z",
|
||||
"updated_at": "2024-01-28T17:45:12Z",
|
||||
"updated_at": "2024-03-24T07:52:03Z",
|
||||
"pushed_at": "2023-09-17T23:38:32Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "xortigate-cve-2023-27997",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-12T16:12:41Z",
|
||||
"updated_at": "2024-03-18T13:17:04Z",
|
||||
"updated_at": "2024-03-24T10:14:48Z",
|
||||
"pushed_at": "2023-10-12T16:17:23Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-29T14:21:08Z",
|
||||
"updated_at": "2024-01-13T12:40:11Z",
|
||||
"updated_at": "2024-03-24T10:22:10Z",
|
||||
"pushed_at": "2023-07-06T08:14:17Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-21T21:39:24Z",
|
||||
"updated_at": "2024-03-24T04:25:00Z",
|
||||
"updated_at": "2024-03-24T11:48:55Z",
|
||||
"pushed_at": "2024-03-22T06:45:43Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 58,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -743,10 +743,10 @@
|
|||
"description": "Exploit script for Pre-Auth RCE in Metabase (CVE-2023-38646)",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-15T01:29:37Z",
|
||||
"updated_at": "2024-01-03T23:07:05Z",
|
||||
"updated_at": "2024-03-24T09:15:02Z",
|
||||
"pushed_at": "2023-10-15T01:51:31Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -755,7 +755,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
32
2023/CVE-2023-41724.json
Normal file
32
2023/CVE-2023-41724.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 776684778,
|
||||
"name": "CVE-2023-41724",
|
||||
"full_name": "russhackerr\/CVE-2023-41724",
|
||||
"owner": {
|
||||
"login": "russhackerr",
|
||||
"id": 164726028,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164726028?v=4",
|
||||
"html_url": "https:\/\/github.com\/russhackerr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/russhackerr\/CVE-2023-41724",
|
||||
"description": "CVE-2023-41724 POC RCE Ivanti",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-24T07:25:46Z",
|
||||
"updated_at": "2024-03-24T08:37:45Z",
|
||||
"pushed_at": "2024-03-24T08:23:15Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Fortinet FortiClient EMS SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-18T20:50:48Z",
|
||||
"updated_at": "2024-03-24T00:48:18Z",
|
||||
"updated_at": "2024-03-24T10:10:36Z",
|
||||
"pushed_at": "2024-03-20T20:42:41Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 16,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "KeyTrap (DNSSEC)",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-18T21:50:04Z",
|
||||
"updated_at": "2024-03-19T22:48:35Z",
|
||||
"updated_at": "2024-03-24T10:24:32Z",
|
||||
"pushed_at": "2024-02-18T22:15:14Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -125,7 +125,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-01-02T14:20:10Z",
|
||||
"updated_at": "2024-03-21T14:04:33Z",
|
||||
"pushed_at": "2024-03-05T14:06:45Z",
|
||||
"pushed_at": "2024-03-24T06:38:33Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Ultimate Member Unauthorized Database Access \/ SQLi",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-27T11:41:53Z",
|
||||
"updated_at": "2024-03-13T21:52:04Z",
|
||||
"updated_at": "2024-03-24T10:08:34Z",
|
||||
"pushed_at": "2024-02-27T11:45:50Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Unauthenticated Command Injection In Progress Kemp LoadMaster",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-19T22:23:18Z",
|
||||
"updated_at": "2024-03-23T17:56:13Z",
|
||||
"updated_at": "2024-03-24T08:01:02Z",
|
||||
"pushed_at": "2024-03-19T22:25:21Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 68,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
32
2024/CVE-2024-2169.json
Normal file
32
2024/CVE-2024-2169.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 776691365,
|
||||
"name": "G3-Loop-DoS",
|
||||
"full_name": "douglasbuzatto\/G3-Loop-DoS",
|
||||
"owner": {
|
||||
"login": "douglasbuzatto",
|
||||
"id": 10249957,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10249957?v=4",
|
||||
"html_url": "https:\/\/github.com\/douglasbuzatto"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/douglasbuzatto\/G3-Loop-DoS",
|
||||
"description": "This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-24T07:53:52Z",
|
||||
"updated_at": "2024-03-24T07:56:54Z",
|
||||
"pushed_at": "2024-03-24T08:00:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -163,10 +163,10 @@
|
|||
"description": "The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-17T09:15:22Z",
|
||||
"updated_at": "2024-03-19T21:43:36Z",
|
||||
"updated_at": "2024-03-24T09:36:06Z",
|
||||
"pushed_at": "2024-03-17T09:20:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-concept exploit for CVE-2024-25153.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-12T17:26:10Z",
|
||||
"updated_at": "2024-03-23T01:14:43Z",
|
||||
"updated_at": "2024-03-24T10:03:04Z",
|
||||
"pushed_at": "2024-03-13T09:46:07Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
16
README.md
16
README.md
|
@ -158,6 +158,9 @@
|
|||
|
||||
- [yuziiiiiiiiii/CVE-2024-2074](https://github.com/yuziiiiiiiiii/CVE-2024-2074)
|
||||
|
||||
### CVE-2024-2169
|
||||
- [douglasbuzatto/G3-Loop-DoS](https://github.com/douglasbuzatto/G3-Loop-DoS)
|
||||
|
||||
### CVE-2024-2432
|
||||
- [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP)
|
||||
|
||||
|
@ -6347,6 +6350,9 @@
|
|||
|
||||
- [federella/CVE-2023-41717](https://github.com/federella/CVE-2023-41717)
|
||||
|
||||
### CVE-2023-41724
|
||||
- [russhackerr/CVE-2023-41724](https://github.com/russhackerr/CVE-2023-41724)
|
||||
|
||||
### CVE-2023-41772 (2023-10-10)
|
||||
|
||||
<code>Win32k Elevation of Privilege Vulnerability
|
||||
|
@ -9590,6 +9596,7 @@
|
|||
- [daniel616/CVE-2022-21661-Demo](https://github.com/daniel616/CVE-2022-21661-Demo)
|
||||
- [sealldeveloper/CVE-2022-21661-PoC](https://github.com/sealldeveloper/CVE-2022-21661-PoC)
|
||||
- [p4ncontomat3/CVE-2022-21661](https://github.com/p4ncontomat3/CVE-2022-21661)
|
||||
- [CharonDefalt/WordPress--CVE-2022-21661](https://github.com/CharonDefalt/WordPress--CVE-2022-21661)
|
||||
|
||||
### CVE-2022-21668 (2022-01-10)
|
||||
|
||||
|
@ -10168,6 +10175,7 @@
|
|||
- [aeifkz/CVE-2022-22978](https://github.com/aeifkz/CVE-2022-22978)
|
||||
- [umakant76705/CVE-2022-22978](https://github.com/umakant76705/CVE-2022-22978)
|
||||
- [Raghvendra1207/CVE-2022-22978](https://github.com/Raghvendra1207/CVE-2022-22978)
|
||||
- [mukeshkumar286/spring-security-CVE-2022-22978](https://github.com/mukeshkumar286/spring-security-CVE-2022-22978)
|
||||
|
||||
### CVE-2022-22980 (2022-06-22)
|
||||
|
||||
|
@ -12500,6 +12508,13 @@
|
|||
|
||||
- [breakpointHQ/CVE-2022-32883](https://github.com/breakpointHQ/CVE-2022-32883)
|
||||
|
||||
### CVE-2022-32898 (2022-11-01)
|
||||
|
||||
<code>The issue was addressed with improved memory handling. This issue is fixed in iOS 15.7 and iPadOS 15.7, iOS 16, macOS Ventura 13, watchOS 9. An app may be able to execute arbitrary code with kernel privileges.
|
||||
</code>
|
||||
|
||||
- [ox1111/CVE-2022-32898](https://github.com/ox1111/CVE-2022-32898)
|
||||
|
||||
### CVE-2022-32947 (2022-11-01)
|
||||
|
||||
<code>The issue was addressed with improved memory handling. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13, watchOS 9.1. An app may be able to execute arbitrary code with kernel privileges.
|
||||
|
@ -15748,6 +15763,7 @@
|
|||
- [TieuLong21Prosper/CVE-2021-3560](https://github.com/TieuLong21Prosper/CVE-2021-3560)
|
||||
- [LucasPDiniz/CVE-2021-3560](https://github.com/LucasPDiniz/CVE-2021-3560)
|
||||
- [markyu0401/CVE-2021-3560-Polkit-Privilege-Escalation](https://github.com/markyu0401/CVE-2021-3560-Polkit-Privilege-Escalation)
|
||||
- [Kyyomaa/CVE-2021-3560-EXPLOIT](https://github.com/Kyyomaa/CVE-2021-3560-EXPLOIT)
|
||||
|
||||
### CVE-2021-3572 (2021-11-10)
|
||||
|
||||
|
|
Loading…
Reference in a new issue