mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/14 06:31:39
This commit is contained in:
parent
471aa30680
commit
4ec203285f
16 changed files with 94 additions and 54 deletions
|
@ -50,13 +50,13 @@
|
||||||
"stargazers_count": 34,
|
"stargazers_count": 34,
|
||||||
"watchers_count": 34,
|
"watchers_count": 34,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 17,
|
"forks_count": 18,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 17,
|
"forks": 18,
|
||||||
"watchers": 34,
|
"watchers": 34,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326",
|
"description": "Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-01-17T21:35:19Z",
|
"created_at": "2022-01-17T21:35:19Z",
|
||||||
"updated_at": "2024-08-12T20:19:50Z",
|
"updated_at": "2024-12-14T01:27:34Z",
|
||||||
"pushed_at": "2022-03-16T02:58:42Z",
|
"pushed_at": "2022-03-16T02:58:42Z",
|
||||||
"stargazers_count": 16,
|
"stargazers_count": 17,
|
||||||
"watchers_count": 16,
|
"watchers_count": 17,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 6,
|
"forks_count": 6,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 6,
|
"forks": 6,
|
||||||
"watchers": 16,
|
"watchers": 17,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -892,6 +892,6 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -169,10 +169,10 @@
|
||||||
"description": "Bitbucket CVE-2022-36804 unauthenticated remote command execution",
|
"description": "Bitbucket CVE-2022-36804 unauthenticated remote command execution",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-09-21T10:36:50Z",
|
"created_at": "2022-09-21T10:36:50Z",
|
||||||
"updated_at": "2024-08-12T20:27:12Z",
|
"updated_at": "2024-12-14T03:54:12Z",
|
||||||
"pushed_at": "2023-01-21T02:14:15Z",
|
"pushed_at": "2023-01-21T02:14:15Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 7,
|
||||||
"watchers_count": 6,
|
"watchers_count": 7,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -196,7 +196,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 6,
|
"watchers": 7,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -282,10 +282,10 @@
|
||||||
"description": "Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.",
|
"description": "Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-10-19T11:49:08Z",
|
"created_at": "2022-10-19T11:49:08Z",
|
||||||
"updated_at": "2024-11-16T11:46:08Z",
|
"updated_at": "2024-12-14T03:52:45Z",
|
||||||
"pushed_at": "2023-12-29T14:57:34Z",
|
"pushed_at": "2023-12-29T14:57:34Z",
|
||||||
"stargazers_count": 54,
|
"stargazers_count": 55,
|
||||||
"watchers_count": 54,
|
"watchers_count": 55,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 9,
|
"forks_count": 9,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -306,7 +306,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 9,
|
"forks": 9,
|
||||||
"watchers": 54,
|
"watchers": 55,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -48,10 +48,10 @@
|
||||||
"description": "Juniper Firewalls CVE-2023-36845 - RCE",
|
"description": "Juniper Firewalls CVE-2023-36845 - RCE",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-09-26T17:56:55Z",
|
"created_at": "2023-09-26T17:56:55Z",
|
||||||
"updated_at": "2024-12-02T02:41:52Z",
|
"updated_at": "2024-12-14T03:56:10Z",
|
||||||
"pushed_at": "2023-12-29T14:56:44Z",
|
"pushed_at": "2023-12-29T14:56:44Z",
|
||||||
"stargazers_count": 49,
|
"stargazers_count": 50,
|
||||||
"watchers_count": 49,
|
"watchers_count": 50,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 13,
|
"forks_count": 13,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -79,7 +79,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 13,
|
"forks": 13,
|
||||||
"watchers": 49,
|
"watchers": 50,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -121,6 +121,6 @@
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-01-16T06:52:02Z",
|
"created_at": "2024-01-16T06:52:02Z",
|
||||||
"updated_at": "2024-12-11T09:51:18Z",
|
"updated_at": "2024-12-14T02:23:26Z",
|
||||||
"pushed_at": "2024-08-18T08:26:46Z",
|
"pushed_at": "2024-08-18T08:26:46Z",
|
||||||
"stargazers_count": 1290,
|
"stargazers_count": 1289,
|
||||||
"watchers_count": 1290,
|
"watchers_count": 1289,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 220,
|
"forks_count": 220,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 220,
|
"forks": 220,
|
||||||
"watchers": 1290,
|
"watchers": 1289,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 21
|
"subscribers_count": 21
|
||||||
},
|
},
|
||||||
|
|
|
@ -267,10 +267,10 @@
|
||||||
"description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.",
|
"description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-11T18:13:32Z",
|
"created_at": "2024-12-11T18:13:32Z",
|
||||||
"updated_at": "2024-12-13T03:48:26Z",
|
"updated_at": "2024-12-14T02:34:33Z",
|
||||||
"pushed_at": "2024-12-12T15:48:10Z",
|
"pushed_at": "2024-12-12T15:48:10Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 2,
|
"watchers_count": 3,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -279,7 +279,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 2,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -52,10 +52,10 @@
|
||||||
"description": "Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit ",
|
"description": "Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-06-03T19:08:24Z",
|
"created_at": "2024-06-03T19:08:24Z",
|
||||||
"updated_at": "2024-10-03T04:22:14Z",
|
"updated_at": "2024-12-14T03:58:01Z",
|
||||||
"pushed_at": "2024-06-03T19:20:10Z",
|
"pushed_at": "2024-06-03T19:20:10Z",
|
||||||
"stargazers_count": 16,
|
"stargazers_count": 17,
|
||||||
"watchers_count": 16,
|
"watchers_count": 17,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -85,7 +85,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 8,
|
||||||
"watchers": 16,
|
"watchers": 17,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -107,10 +107,10 @@
|
||||||
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
|
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-15T08:07:05Z",
|
"created_at": "2024-07-15T08:07:05Z",
|
||||||
"updated_at": "2024-12-07T17:15:32Z",
|
"updated_at": "2024-12-14T04:28:35Z",
|
||||||
"pushed_at": "2024-09-08T21:23:34Z",
|
"pushed_at": "2024-09-08T21:23:34Z",
|
||||||
"stargazers_count": 427,
|
"stargazers_count": 428,
|
||||||
"watchers_count": 427,
|
"watchers_count": 428,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 31,
|
"forks_count": 31,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -119,7 +119,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 31,
|
"forks": 31,
|
||||||
"watchers": 427,
|
"watchers": 428,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 20
|
"subscribers_count": 20
|
||||||
},
|
},
|
||||||
|
|
33
2024/CVE-2024-3690.json
Normal file
33
2024/CVE-2024-3690.json
Normal file
|
@ -0,0 +1,33 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 903200657,
|
||||||
|
"name": "CVE-2024-3690",
|
||||||
|
"full_name": "taeseongk\/CVE-2024-3690",
|
||||||
|
"owner": {
|
||||||
|
"login": "taeseongk",
|
||||||
|
"id": 102262849,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102262849?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/taeseongk",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/taeseongk\/CVE-2024-3690",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-12-14T01:26:56Z",
|
||||||
|
"updated_at": "2024-12-14T01:44:49Z",
|
||||||
|
"pushed_at": "2024-12-14T01:44:46Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 1,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 1,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -169,10 +169,10 @@
|
||||||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-06-07T09:52:54Z",
|
"created_at": "2024-06-07T09:52:54Z",
|
||||||
"updated_at": "2024-12-12T06:28:25Z",
|
"updated_at": "2024-12-14T02:25:02Z",
|
||||||
"pushed_at": "2024-06-22T15:13:52Z",
|
"pushed_at": "2024-06-22T15:13:52Z",
|
||||||
"stargazers_count": 241,
|
"stargazers_count": 240,
|
||||||
"watchers_count": 241,
|
"watchers_count": 240,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 52,
|
"forks_count": 52,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -181,7 +181,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 52,
|
"forks": 52,
|
||||||
"watchers": 241,
|
"watchers": 240,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,19 +14,19 @@
|
||||||
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
|
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-11T14:19:55Z",
|
"created_at": "2024-12-11T14:19:55Z",
|
||||||
"updated_at": "2024-12-13T08:33:10Z",
|
"updated_at": "2024-12-14T05:23:26Z",
|
||||||
"pushed_at": "2024-12-11T14:23:19Z",
|
"pushed_at": "2024-12-11T14:23:19Z",
|
||||||
"stargazers_count": 15,
|
"stargazers_count": 16,
|
||||||
"watchers_count": 15,
|
"watchers_count": 16,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 3,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 4,
|
||||||
"watchers": 15,
|
"watchers": 16,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "a signal handler race condition in OpenSSH's server (sshd)",
|
"description": "a signal handler race condition in OpenSSH's server (sshd)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-01T10:55:29Z",
|
"created_at": "2024-07-01T10:55:29Z",
|
||||||
"updated_at": "2024-12-11T20:03:37Z",
|
"updated_at": "2024-12-14T04:05:34Z",
|
||||||
"pushed_at": "2024-07-01T10:54:02Z",
|
"pushed_at": "2024-07-01T10:54:02Z",
|
||||||
"stargazers_count": 468,
|
"stargazers_count": 469,
|
||||||
"watchers_count": 468,
|
"watchers_count": 469,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 181,
|
"forks_count": 181,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 181,
|
"forks": 181,
|
||||||
"watchers": 468,
|
"watchers": 469,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 5
|
"subscribers_count": 5
|
||||||
},
|
},
|
||||||
|
@ -1159,10 +1159,10 @@
|
||||||
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
|
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-02T14:41:43Z",
|
"created_at": "2024-07-02T14:41:43Z",
|
||||||
"updated_at": "2024-12-07T06:02:59Z",
|
"updated_at": "2024-12-14T03:39:21Z",
|
||||||
"pushed_at": "2024-07-02T15:16:04Z",
|
"pushed_at": "2024-07-02T15:16:04Z",
|
||||||
"stargazers_count": 31,
|
"stargazers_count": 32,
|
||||||
"watchers_count": 31,
|
"watchers_count": 32,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -1181,7 +1181,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 8,
|
||||||
"watchers": 31,
|
"watchers": 32,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -823,6 +823,13 @@
|
||||||
|
|
||||||
- [h4x0r-dz/CVE-2024-3656](https://github.com/h4x0r-dz/CVE-2024-3656)
|
- [h4x0r-dz/CVE-2024-3656](https://github.com/h4x0r-dz/CVE-2024-3656)
|
||||||
|
|
||||||
|
### CVE-2024-3690 (2024-04-12)
|
||||||
|
|
||||||
|
<code>In PHPGurukul Small CRM 3.0 wurde eine kritische Schwachstelle entdeckt. Hierbei betrifft es unbekannten Programmcode der Komponente Change Password Handler. Durch Beeinflussen mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
|
||||||
|
</code>
|
||||||
|
|
||||||
|
- [taeseongk/CVE-2024-3690](https://github.com/taeseongk/CVE-2024-3690)
|
||||||
|
|
||||||
### CVE-2024-3806 (2024-05-09)
|
### CVE-2024-3806 (2024-05-09)
|
||||||
|
|
||||||
<code>The Porto theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.1.0 via the 'porto_ajax_posts' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.
|
<code>The Porto theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.1.0 via the 'porto_ajax_posts' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.
|
||||||
|
|
Loading…
Reference in a new issue