mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/07/09 12:29:56
This commit is contained in:
parent
88212b6378
commit
4e291014c2
60 changed files with 453 additions and 247 deletions
|
@ -291,10 +291,10 @@
|
|||
"description": "my own script in python to exploit vulnerable (It based on TryHackMe Intro PoC Scripting room) ",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-10T14:58:11Z",
|
||||
"updated_at": "2024-03-19T05:28:15Z",
|
||||
"updated_at": "2024-07-09T11:22:49Z",
|
||||
"pushed_at": "2024-02-10T14:58:57Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -303,7 +303,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-07-09T01:01:57Z",
|
||||
"updated_at": "2024-07-09T11:27:18Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1954,
|
||||
"watchers_count": 1954,
|
||||
"stargazers_count": 1955,
|
||||
"watchers_count": 1955,
|
||||
"has_discussions": true,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1954,
|
||||
"watchers": 1955,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Gain privileges:system -> root,as a part of https:\/\/github.com\/retme7\/CVE-2014-7911_poc",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-26T07:02:26Z",
|
||||
"updated_at": "2024-01-16T10:46:53Z",
|
||||
"updated_at": "2024-07-09T08:07:47Z",
|
||||
"pushed_at": "2015-01-27T09:23:52Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Local root exploit for Nexus5 Android 4.4.4(KTU84P)",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-26T06:33:52Z",
|
||||
"updated_at": "2023-09-27T08:04:55Z",
|
||||
"updated_at": "2024-07-09T08:07:38Z",
|
||||
"pushed_at": "2015-01-27T09:43:42Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"has_discussions": false,
|
||||
"forks_count": 87,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 87,
|
||||
"watchers": 144,
|
||||
"watchers": 145,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-07-09T01:01:57Z",
|
||||
"updated_at": "2024-07-09T11:27:18Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1954,
|
||||
"watchers_count": 1954,
|
||||
"stargazers_count": 1955,
|
||||
"watchers_count": 1955,
|
||||
"has_discussions": true,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1954,
|
||||
"watchers": 1955,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -1150,13 +1150,13 @@
|
|||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"has_discussions": false,
|
||||
"forks_count": 77,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 77,
|
||||
"forks": 76,
|
||||
"watchers": 271,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
32
2017/CVE-2017-15099.json
Normal file
32
2017/CVE-2017-15099.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 826257213,
|
||||
"name": "CVE-2017-15099",
|
||||
"full_name": "ToontjeM\/CVE-2017-15099",
|
||||
"owner": {
|
||||
"login": "ToontjeM",
|
||||
"id": 98271783,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98271783?v=4",
|
||||
"html_url": "https:\/\/github.com\/ToontjeM"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ToontjeM\/CVE-2017-15099",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-09T11:07:50Z",
|
||||
"updated_at": "2024-07-09T11:07:54Z",
|
||||
"pushed_at": "2024-07-09T11:07:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Fork of the send module to deal with CVE-2017-20165",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-11T10:20:27Z",
|
||||
"updated_at": "2024-07-05T10:37:22Z",
|
||||
"pushed_at": "2024-07-08T16:17:07Z",
|
||||
"updated_at": "2024-07-09T09:45:34Z",
|
||||
"pushed_at": "2024-07-09T10:19:17Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-07-09T01:01:57Z",
|
||||
"updated_at": "2024-07-09T11:27:18Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1954,
|
||||
"watchers_count": 1954,
|
||||
"stargazers_count": 1955,
|
||||
"watchers_count": 1955,
|
||||
"has_discussions": true,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1954,
|
||||
"watchers": 1955,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -383,10 +383,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-02T03:27:31Z",
|
||||
"updated_at": "2024-02-02T05:04:19Z",
|
||||
"updated_at": "2024-07-09T08:34:42Z",
|
||||
"pushed_at": "2024-02-07T10:01:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -395,7 +395,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -260,10 +260,10 @@
|
|||
"description": "Fortinet FortiOS路径遍历漏洞 (CVE-2018-13379)批量检测脚本",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-14T12:17:03Z",
|
||||
"updated_at": "2022-04-13T09:25:18Z",
|
||||
"updated_at": "2024-07-09T07:29:26Z",
|
||||
"pushed_at": "2020-12-14T12:20:00Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -272,7 +272,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -90,17 +90,17 @@
|
|||
"fork": false,
|
||||
"created_at": "2018-08-21T00:09:56Z",
|
||||
"updated_at": "2024-06-30T06:54:44Z",
|
||||
"pushed_at": "2021-11-08T02:19:03Z",
|
||||
"pushed_at": "2024-07-09T09:01:46Z",
|
||||
"stargazers_count": 516,
|
||||
"watchers_count": 516,
|
||||
"has_discussions": false,
|
||||
"forks_count": 183,
|
||||
"forks_count": 184,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 183,
|
||||
"forks": 184,
|
||||
"watchers": 516,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
|
|
|
@ -557,10 +557,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-07-09T01:01:57Z",
|
||||
"updated_at": "2024-07-09T11:27:18Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1954,
|
||||
"watchers_count": 1954,
|
||||
"stargazers_count": 1955,
|
||||
"watchers_count": 1955,
|
||||
"has_discussions": true,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -590,7 +590,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1954,
|
||||
"watchers": 1955,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 642,
|
||||
"watchers_count": 642,
|
||||
"has_discussions": false,
|
||||
"forks_count": 130,
|
||||
"forks_count": 129,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -67,7 +67,7 @@
|
|||
"xss"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 130,
|
||||
"forks": 129,
|
||||
"watchers": 642,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2024-07-02T13:19:00Z",
|
||||
"updated_at": "2024-07-09T09:50:43Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1790,
|
||||
"watchers_count": 1790,
|
||||
"stargazers_count": 1789,
|
||||
"watchers_count": 1789,
|
||||
"has_discussions": false,
|
||||
"forks_count": 247,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 247,
|
||||
"watchers": 1790,
|
||||
"watchers": 1789,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-01T21:35:40Z",
|
||||
"updated_at": "2023-12-12T19:42:30Z",
|
||||
"updated_at": "2024-07-09T07:08:41Z",
|
||||
"pushed_at": "2023-09-02T10:41:51Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-07-07T09:29:52Z",
|
||||
"updated_at": "2024-07-09T12:01:48Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4063,
|
||||
"watchers_count": 4063,
|
||||
"stargazers_count": 4065,
|
||||
"watchers_count": 4065,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1084,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1084,
|
||||
"watchers": 4063,
|
||||
"watchers": 4065,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2024-06-11T16:05:54Z",
|
||||
"updated_at": "2024-07-09T11:28:14Z",
|
||||
"pushed_at": "2024-06-16T15:35:20Z",
|
||||
"stargazers_count": 927,
|
||||
"watchers_count": 927,
|
||||
"stargazers_count": 928,
|
||||
"watchers_count": 928,
|
||||
"has_discussions": false,
|
||||
"forks_count": 179,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 179,
|
||||
"watchers": 927,
|
||||
"watchers": 928,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-07-09T01:01:57Z",
|
||||
"updated_at": "2024-07-09T11:27:18Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1954,
|
||||
"watchers_count": 1954,
|
||||
"stargazers_count": 1955,
|
||||
"watchers_count": 1955,
|
||||
"has_discussions": true,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1954,
|
||||
"watchers": 1955,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
}
|
||||
|
|
|
@ -1660,10 +1660,10 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2024-07-08T05:47:21Z",
|
||||
"updated_at": "2024-07-09T09:42:53Z",
|
||||
"pushed_at": "2022-03-30T14:02:04Z",
|
||||
"stargazers_count": 252,
|
||||
"watchers_count": 252,
|
||||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -1672,7 +1672,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 252,
|
||||
"watchers": 253,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-07-07T09:29:52Z",
|
||||
"updated_at": "2024-07-09T12:01:48Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4063,
|
||||
"watchers_count": 4063,
|
||||
"stargazers_count": 4065,
|
||||
"watchers_count": 4065,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1084,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1084,
|
||||
"watchers": 4063,
|
||||
"watchers": 4065,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-07-09T01:01:57Z",
|
||||
"updated_at": "2024-07-09T11:27:18Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1954,
|
||||
"watchers_count": 1954,
|
||||
"stargazers_count": 1955,
|
||||
"watchers_count": 1955,
|
||||
"has_discussions": true,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1954,
|
||||
"watchers": 1955,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Git-lfs RCE exploit CVE-2020-27955 - tested on Windows on: git, gh cli, GitHub Desktop, Visual Studio, SourceTree etc.",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-03T17:14:22Z",
|
||||
"updated_at": "2023-10-07T06:50:37Z",
|
||||
"updated_at": "2024-07-09T08:31:08Z",
|
||||
"pushed_at": "2021-01-12T10:11:42Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -223,10 +223,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2024-07-09T01:58:42Z",
|
||||
"updated_at": "2024-07-09T07:05:29Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1552,
|
||||
"watchers_count": 1552,
|
||||
"stargazers_count": 1551,
|
||||
"watchers_count": 1551,
|
||||
"has_discussions": false,
|
||||
"forks_count": 481,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 481,
|
||||
"watchers": 1552,
|
||||
"watchers": 1551,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A demo exploit for CVE-2021-44026, a SQL injection in Roundcube",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-14T11:32:36Z",
|
||||
"updated_at": "2024-05-17T08:32:31Z",
|
||||
"updated_at": "2024-07-09T07:40:14Z",
|
||||
"pushed_at": "2023-12-22T11:29:43Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -3641,13 +3641,13 @@
|
|||
"stargazers_count": 3382,
|
||||
"watchers_count": 3382,
|
||||
"has_discussions": true,
|
||||
"forks_count": 741,
|
||||
"forks_count": 740,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 741,
|
||||
"forks": 740,
|
||||
"watchers": 3382,
|
||||
"score": 0,
|
||||
"subscribers_count": 57
|
||||
|
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"has_discussions": false,
|
||||
"forks_count": 77,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 77,
|
||||
"forks": 76,
|
||||
"watchers": 271,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"has_discussions": false,
|
||||
"forks_count": 61,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"forks": 60,
|
||||
"watchers": 217,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -710,13 +710,13 @@
|
|||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"forks": 54,
|
||||
"watchers": 328,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 767696686,
|
||||
"name": "CrackAVFee",
|
||||
"full_name": "pxcs\/CrackAVFee",
|
||||
"owner": {
|
||||
"login": "pxcs",
|
||||
"id": 151133481,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151133481?v=4",
|
||||
"html_url": "https:\/\/github.com\/pxcs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pxcs\/CrackAVFee",
|
||||
"description": "it's a CVE-2022-3368 ( patched ), but feel free to use it for check any outdated software or reseach",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-05T18:31:29Z",
|
||||
"updated_at": "2024-07-09T09:42:07Z",
|
||||
"pushed_at": "2024-07-08T16:18:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2022/CVE-2022-48429.json
Normal file
32
2022/CVE-2022-48429.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 636352279,
|
||||
"name": "CVE-2022-48429_poc",
|
||||
"full_name": "echo-devim\/CVE-2022-48429_poc",
|
||||
"owner": {
|
||||
"login": "echo-devim",
|
||||
"id": 11312542,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11312542?v=4",
|
||||
"html_url": "https:\/\/github.com\/echo-devim"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/echo-devim\/CVE-2022-48429_poc",
|
||||
"description": "PoC for CVE-2022-48429 - Youtrack stored XSS",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-04T16:55:20Z",
|
||||
"updated_at": "2024-07-09T11:39:18Z",
|
||||
"pushed_at": "2023-05-04T17:01:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-06T14:05:09Z",
|
||||
"updated_at": "2024-06-20T09:23:22Z",
|
||||
"updated_at": "2024-07-09T07:18:16Z",
|
||||
"pushed_at": "2023-07-14T10:40:17Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -73,8 +73,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T14:00:48Z",
|
||||
"updated_at": "2024-07-05T14:07:57Z",
|
||||
"pushed_at": "2024-07-05T14:07:54Z",
|
||||
"updated_at": "2024-07-09T08:12:28Z",
|
||||
"pushed_at": "2024-07-09T08:12:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 123,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 778505062,
|
||||
"name": "CrackKeyIso",
|
||||
"full_name": "pxcs\/CrackKeyIso",
|
||||
"owner": {
|
||||
"login": "pxcs",
|
||||
"id": 151133481,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151133481?v=4",
|
||||
"html_url": "https:\/\/github.com\/pxcs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pxcs\/CrackKeyIso",
|
||||
"description": "it's a CVE-2023-28229 ( patched ), but feel free to use it for check any outdated software or reseach",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-27T20:57:46Z",
|
||||
"updated_at": "2024-07-09T09:42:09Z",
|
||||
"pushed_at": "2024-07-08T16:04:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -149,6 +149,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 775566247,
|
||||
"name": "CLFS",
|
||||
"full_name": "pxcs\/CLFS",
|
||||
"owner": {
|
||||
"login": "pxcs",
|
||||
"id": 151133481,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151133481?v=4",
|
||||
"html_url": "https:\/\/github.com\/pxcs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pxcs\/CLFS",
|
||||
"description": "it's a CVE-2023-28252 ( patched ), but feel free to use it for check any outdated software or reseach",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-21T16:16:52Z",
|
||||
"updated_at": "2024-07-09T09:42:04Z",
|
||||
"pushed_at": "2024-07-09T03:43:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 815887734,
|
||||
"name": "CVE-2023-28252",
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-23T18:33:41Z",
|
||||
"updated_at": "2024-07-05T07:21:04Z",
|
||||
"updated_at": "2024-07-09T06:44:24Z",
|
||||
"pushed_at": "2023-10-26T11:44:46Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Demo for CVE-2023-43654 - Remote Code Execution in PyTorch TorchServe",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-28T10:02:13Z",
|
||||
"updated_at": "2024-07-03T06:15:19Z",
|
||||
"updated_at": "2024-07-09T11:32:21Z",
|
||||
"pushed_at": "2024-06-06T08:09:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -62,7 +62,7 @@
|
|||
"proof-of-concept"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"forks": 15,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-07-09T06:01:49Z",
|
||||
"updated_at": "2024-07-09T09:49:12Z",
|
||||
"pushed_at": "2024-07-05T12:35:27Z",
|
||||
"stargazers_count": 963,
|
||||
"watchers_count": 963,
|
||||
"stargazers_count": 964,
|
||||
"watchers_count": 964,
|
||||
"has_discussions": false,
|
||||
"forks_count": 162,
|
||||
"forks_count": 161,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 162,
|
||||
"watchers": 963,
|
||||
"forks": 161,
|
||||
"watchers": 964,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T09:22:59Z",
|
||||
"updated_at": "2024-07-09T05:35:12Z",
|
||||
"updated_at": "2024-07-09T09:20:37Z",
|
||||
"pushed_at": "2024-06-18T09:35:44Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 42,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -43,19 +43,19 @@
|
|||
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T12:30:53Z",
|
||||
"updated_at": "2024-07-09T03:57:13Z",
|
||||
"updated_at": "2024-07-09T11:48:47Z",
|
||||
"pushed_at": "2024-06-19T12:24:50Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 121,
|
||||
"forks": 27,
|
||||
"watchers": 127,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-12T15:07:42Z",
|
||||
"updated_at": "2024-07-02T11:34:01Z",
|
||||
"updated_at": "2024-07-09T07:11:37Z",
|
||||
"pushed_at": "2024-04-18T14:31:34Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -43,19 +43,19 @@
|
|||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T15:17:59Z",
|
||||
"updated_at": "2024-07-05T19:39:01Z",
|
||||
"updated_at": "2024-07-09T11:29:55Z",
|
||||
"pushed_at": "2024-02-19T20:00:35Z",
|
||||
"stargazers_count": 647,
|
||||
"watchers_count": 647,
|
||||
"stargazers_count": 648,
|
||||
"watchers_count": 648,
|
||||
"has_discussions": false,
|
||||
"forks_count": 143,
|
||||
"forks_count": 144,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 143,
|
||||
"watchers": 647,
|
||||
"forks": 144,
|
||||
"watchers": 648,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -168,10 +168,10 @@
|
|||
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-24576",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-14T02:10:55Z",
|
||||
"updated_at": "2024-05-12T07:54:52Z",
|
||||
"updated_at": "2024-07-09T09:14:41Z",
|
||||
"pushed_at": "2024-04-14T02:30:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -180,7 +180,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -248,7 +248,7 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -264,7 +264,7 @@
|
|||
"wp-sqli"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -1012,10 +1012,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-07-09T04:09:30Z",
|
||||
"updated_at": "2024-07-09T07:10:34Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3468,
|
||||
"watchers_count": 3468,
|
||||
"stargazers_count": 3469,
|
||||
"watchers_count": 3469,
|
||||
"has_discussions": false,
|
||||
"forks_count": 235,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,7 +1024,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 235,
|
||||
"watchers": 3468,
|
||||
"watchers": 3469,
|
||||
"score": 0,
|
||||
"subscribers_count": 39
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions with multies ways to exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-06T01:10:28Z",
|
||||
"updated_at": "2024-07-08T16:17:33Z",
|
||||
"updated_at": "2024-07-09T07:21:01Z",
|
||||
"pushed_at": "2024-07-06T01:57:58Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -122,7 +122,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -155,35 +155,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 825518189,
|
||||
"name": "CVE-2024-36401",
|
||||
"full_name": "zjaycyy\/CVE-2024-36401",
|
||||
"owner": {
|
||||
"login": "zjaycyy",
|
||||
"id": 32694091,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32694091?v=4",
|
||||
"html_url": "https:\/\/github.com\/zjaycyy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zjaycyy\/CVE-2024-36401",
|
||||
"description": "CVE-2024-36401-POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T01:53:32Z",
|
||||
"updated_at": "2024-07-08T02:41:11Z",
|
||||
"pushed_at": "2024-07-08T02:41:08Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-06T00:49:40Z",
|
||||
"updated_at": "2024-07-09T04:34:52Z",
|
||||
"updated_at": "2024-07-09T09:46:48Z",
|
||||
"pushed_at": "2024-07-08T12:45:40Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 74,
|
||||
"forks": 16,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC of CVE-2024-37759",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-21T02:58:40Z",
|
||||
"updated_at": "2024-06-23T15:00:46Z",
|
||||
"updated_at": "2024-07-09T09:12:37Z",
|
||||
"pushed_at": "2024-06-23T15:00:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CVE-2024-37770",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T16:13:34Z",
|
||||
"updated_at": "2024-07-05T16:25:35Z",
|
||||
"pushed_at": "2024-07-05T16:25:32Z",
|
||||
"updated_at": "2024-07-09T07:21:57Z",
|
||||
"pushed_at": "2024-07-09T07:21:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
32
2024/CVE-2024-39069.json
Normal file
32
2024/CVE-2024-39069.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 826264577,
|
||||
"name": "CVE-2024-39069",
|
||||
"full_name": "AungSoePaing\/CVE-2024-39069",
|
||||
"owner": {
|
||||
"login": "AungSoePaing",
|
||||
"id": 76258644,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76258644?v=4",
|
||||
"html_url": "https:\/\/github.com\/AungSoePaing"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AungSoePaing\/CVE-2024-39069",
|
||||
"description": "CVE-2024-39069",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-09T11:24:44Z",
|
||||
"updated_at": "2024-07-09T11:28:27Z",
|
||||
"pushed_at": "2024-07-09T11:28:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,8 +43,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-06T17:06:25Z",
|
||||
"updated_at": "2024-07-06T17:30:16Z",
|
||||
"pushed_at": "2024-07-06T17:30:12Z",
|
||||
"updated_at": "2024-07-09T12:31:11Z",
|
||||
"pushed_at": "2024-07-09T12:30:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -358,8 +358,8 @@
|
|||
"description": "CVE-2024-4040 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T05:46:56Z",
|
||||
"updated_at": "2024-07-07T11:54:53Z",
|
||||
"pushed_at": "2024-07-07T11:54:50Z",
|
||||
"updated_at": "2024-07-09T09:48:20Z",
|
||||
"pushed_at": "2024-07-09T09:48:17Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:52:54Z",
|
||||
"updated_at": "2024-07-07T23:49:18Z",
|
||||
"updated_at": "2024-07-09T07:36:57Z",
|
||||
"pushed_at": "2024-06-22T15:13:52Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 162,
|
||||
"watchers": 163,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2024-4883",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T12:14:01Z",
|
||||
"updated_at": "2024-07-09T01:30:04Z",
|
||||
"updated_at": "2024-07-09T11:00:44Z",
|
||||
"pushed_at": "2024-07-08T12:14:18Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -253,10 +253,10 @@
|
|||
"description": "Proof-Of-Concept (POC) for CVE-2024-4956",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-28T21:20:53Z",
|
||||
"updated_at": "2024-07-03T14:17:34Z",
|
||||
"updated_at": "2024-07-09T09:51:32Z",
|
||||
"pushed_at": "2024-05-29T07:37:15Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -273,7 +273,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Exploit for CVE-2024-5009",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T12:15:29Z",
|
||||
"updated_at": "2024-07-09T06:08:48Z",
|
||||
"updated_at": "2024-07-09T08:57:31Z",
|
||||
"pushed_at": "2024-07-08T12:15:41Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -116,10 +116,10 @@
|
|||
"description": "32-bit PoC for CVE-2024-6387 \"regreSSHion\" -- mirror of the original 7etsuo\/cve-2024-6387-poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T12:26:40Z",
|
||||
"updated_at": "2024-07-09T05:08:57Z",
|
||||
"updated_at": "2024-07-09T08:13:51Z",
|
||||
"pushed_at": "2024-07-01T14:16:36Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 90,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -303,10 +303,10 @@
|
|||
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T20:33:20Z",
|
||||
"updated_at": "2024-07-09T05:00:29Z",
|
||||
"updated_at": "2024-07-09T08:22:46Z",
|
||||
"pushed_at": "2024-07-08T18:11:44Z",
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"stargazers_count": 375,
|
||||
"watchers_count": 375,
|
||||
"has_discussions": false,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
|
@ -321,7 +321,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"watchers": 372,
|
||||
"watchers": 375,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -1135,10 +1135,10 @@
|
|||
"description": "CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T11:55:39Z",
|
||||
"updated_at": "2024-07-08T20:39:05Z",
|
||||
"updated_at": "2024-07-09T09:05:25Z",
|
||||
"pushed_at": "2024-07-08T20:39:03Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -1160,7 +1160,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -1316,10 +1316,10 @@
|
|||
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T14:41:43Z",
|
||||
"updated_at": "2024-07-08T18:33:49Z",
|
||||
"updated_at": "2024-07-09T10:38:06Z",
|
||||
"pushed_at": "2024-07-02T15:16:04Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -1338,7 +1338,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1506,10 +1506,10 @@
|
|||
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T18:32:46Z",
|
||||
"updated_at": "2024-07-09T05:01:17Z",
|
||||
"updated_at": "2024-07-09T06:48:51Z",
|
||||
"pushed_at": "2024-07-05T15:19:28Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -1527,7 +1527,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1802,10 +1802,10 @@
|
|||
"description": "SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-03T10:26:23Z",
|
||||
"updated_at": "2024-07-08T07:32:35Z",
|
||||
"updated_at": "2024-07-09T08:22:08Z",
|
||||
"pushed_at": "2024-07-08T07:32:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1820,7 +1820,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -2341,13 +2341,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -2381,5 +2381,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 826287983,
|
||||
"name": "mitigate-CVE-2024-6387",
|
||||
"full_name": "dgourillon\/mitigate-CVE-2024-6387",
|
||||
"owner": {
|
||||
"login": "dgourillon",
|
||||
"id": 50948886,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50948886?v=4",
|
||||
"html_url": "https:\/\/github.com\/dgourillon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dgourillon\/mitigate-CVE-2024-6387",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-09T12:16:44Z",
|
||||
"updated_at": "2024-07-09T12:16:45Z",
|
||||
"pushed_at": "2024-07-09T12:16:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
22
README.md
22
README.md
|
@ -979,6 +979,7 @@
|
|||
- [azurejoga/CVE-2024-6387-how-to-fix](https://github.com/azurejoga/CVE-2024-6387-how-to-fix)
|
||||
- [asterictnl-lvdw/CVE-2024-6387](https://github.com/asterictnl-lvdw/CVE-2024-6387)
|
||||
- [vkaushik-chef/regreSSHion](https://github.com/vkaushik-chef/regreSSHion)
|
||||
- [dgourillon/mitigate-CVE-2024-6387](https://github.com/dgourillon/mitigate-CVE-2024-6387)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
@ -3195,7 +3196,6 @@
|
|||
- [RevoltSecurities/CVE-2024-36401](https://github.com/RevoltSecurities/CVE-2024-36401)
|
||||
- [Mr-xn/CVE-2024-36401](https://github.com/Mr-xn/CVE-2024-36401)
|
||||
- [zgimszhd61/CVE-2024-36401](https://github.com/zgimszhd61/CVE-2024-36401)
|
||||
- [zjaycyy/CVE-2024-36401](https://github.com/zjaycyy/CVE-2024-36401)
|
||||
|
||||
### CVE-2024-36416 (2024-06-10)
|
||||
|
||||
|
@ -3369,6 +3369,9 @@
|
|||
### CVE-2024-39031
|
||||
- [toneemarqus/CVE-2024-39031](https://github.com/toneemarqus/CVE-2024-39031)
|
||||
|
||||
### CVE-2024-39069
|
||||
- [AungSoePaing/CVE-2024-39069](https://github.com/AungSoePaing/CVE-2024-39069)
|
||||
|
||||
### CVE-2024-39203 (2024-07-08)
|
||||
|
||||
<code>A cross-site scripting (XSS) vulnerability in the Backend Theme Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
|
||||
|
@ -6413,6 +6416,7 @@
|
|||
</code>
|
||||
|
||||
- [Y3A/CVE-2023-28229](https://github.com/Y3A/CVE-2023-28229)
|
||||
- [pxcs/CrackKeyIso](https://github.com/pxcs/CrackKeyIso)
|
||||
|
||||
### CVE-2023-28231 (2023-04-11)
|
||||
|
||||
|
@ -6438,6 +6442,7 @@
|
|||
- [Danasuley/CVE-2023-28252-](https://github.com/Danasuley/CVE-2023-28252-)
|
||||
- [bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252](https://github.com/bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252)
|
||||
- [duck-sec/CVE-2023-28252-Compiled-exe](https://github.com/duck-sec/CVE-2023-28252-Compiled-exe)
|
||||
- [pxcs/CLFS](https://github.com/pxcs/CLFS)
|
||||
- [Vulmatch/CVE-2023-28252](https://github.com/Vulmatch/CVE-2023-28252)
|
||||
|
||||
### CVE-2023-28329 (2023-03-23)
|
||||
|
@ -12178,6 +12183,7 @@
|
|||
</code>
|
||||
|
||||
- [Wh04m1001/CVE-2022-3368](https://github.com/Wh04m1001/CVE-2022-3368)
|
||||
- [pxcs/CrackAVFee](https://github.com/pxcs/CrackAVFee)
|
||||
|
||||
### CVE-2022-3464 (2022-10-12)
|
||||
|
||||
|
@ -17906,6 +17912,13 @@
|
|||
|
||||
- [swzhouu/CVE-2022-48311](https://github.com/swzhouu/CVE-2022-48311)
|
||||
|
||||
### CVE-2022-48429 (2023-03-27)
|
||||
|
||||
<code>In JetBrains Hub before 2022.3.15573, 2022.2.15572, 2022.1.15583 reflected XSS in dashboards was possible\n
|
||||
</code>
|
||||
|
||||
- [echo-devim/CVE-2022-48429_poc](https://github.com/echo-devim/CVE-2022-48429_poc)
|
||||
|
||||
### CVE-2022-48474 (2023-09-12)
|
||||
|
||||
<code>Control de Ciber, in its 1.650 version, is affected by a Denial of Service condition through the version function. Sending a malicious request could cause the server to check if an unrecognized component is up to date, causing a memory failure error that shuts down the process.
|
||||
|
@ -39388,6 +39401,13 @@
|
|||
|
||||
- [TheDarthMole/CVE-2017-14980](https://github.com/TheDarthMole/CVE-2017-14980)
|
||||
|
||||
### CVE-2017-15099 (2017-11-09)
|
||||
|
||||
<code>INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.
|
||||
</code>
|
||||
|
||||
- [ToontjeM/CVE-2017-15099](https://github.com/ToontjeM/CVE-2017-15099)
|
||||
|
||||
### CVE-2017-15120 (2018-07-27)
|
||||
|
||||
<code>An issue has been found in the parsing of authoritative answers in PowerDNS Recursor before 4.0.8, leading to a NULL pointer dereference when parsing a specially crafted answer containing a CNAME of a different class than IN. An unauthenticated remote attacker could cause a denial of service.
|
||||
|
|
Loading…
Add table
Reference in a new issue