mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/11/26 00:31:42
This commit is contained in:
parent
5334f00c3d
commit
52e8fdcc1c
27 changed files with 206 additions and 84 deletions
|
@ -596,10 +596,10 @@
|
|||
"description": "OpenSSH 2.3 < 7.7 - Username Enumeration",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-29T17:36:11Z",
|
||||
"updated_at": "2024-08-29T10:14:51Z",
|
||||
"updated_at": "2024-11-25T22:20:11Z",
|
||||
"pushed_at": "2023-09-04T20:57:42Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -608,7 +608,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -500,6 +500,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -90,6 +90,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,7 +28,7 @@
|
|||
"forks": 16,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 341906843,
|
||||
|
|
|
@ -1130,7 +1130,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 278562778,
|
||||
|
@ -1192,7 +1192,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 278670349,
|
||||
|
|
|
@ -2171,7 +2171,7 @@
|
|||
"description": "An All-In-One Pure Python PoC for CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T02:57:49Z",
|
||||
"updated_at": "2024-10-15T07:28:52Z",
|
||||
"updated_at": "2024-11-25T23:28:13Z",
|
||||
"pushed_at": "2021-12-16T18:34:46Z",
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
|
|
|
@ -1194,10 +1194,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2024-11-25T10:16:30Z",
|
||||
"updated_at": "2024-11-25T23:10:09Z",
|
||||
"pushed_at": "2023-05-20T05:55:45Z",
|
||||
"stargazers_count": 553,
|
||||
"watchers_count": 553,
|
||||
"stargazers_count": 554,
|
||||
"watchers_count": 554,
|
||||
"has_discussions": false,
|
||||
"forks_count": 140,
|
||||
"allow_forking": true,
|
||||
|
@ -1206,7 +1206,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 140,
|
||||
"watchers": 553,
|
||||
"watchers": 554,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-23T18:33:41Z",
|
||||
"updated_at": "2024-10-22T20:23:28Z",
|
||||
"updated_at": "2024-11-25T21:57:30Z",
|
||||
"pushed_at": "2023-10-26T11:44:46Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 110,
|
||||
"watchers": 111,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 1274,
|
||||
"watchers_count": 1274,
|
||||
"has_discussions": false,
|
||||
"forks_count": 217,
|
||||
"forks_count": 218,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 217,
|
||||
"forks": 218,
|
||||
"watchers": 1274,
|
||||
"score": 0,
|
||||
"subscribers_count": 20
|
||||
|
|
|
@ -423,19 +423,19 @@
|
|||
"description": "Vulnerable docker container for Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 – 9.1.1.1 – Authentication Bypass CVE-2023-50164",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-20T16:50:24Z",
|
||||
"updated_at": "2024-11-22T09:28:11Z",
|
||||
"updated_at": "2024-11-25T19:41:23Z",
|
||||
"pushed_at": "2024-11-22T09:28:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "WARNING: This is a vulnerable application to test the exploit for the Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924). Run it at your own risk!",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-18T20:37:07Z",
|
||||
"updated_at": "2024-11-20T08:51:12Z",
|
||||
"updated_at": "2024-11-25T19:14:25Z",
|
||||
"pushed_at": "2024-11-19T12:19:36Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -63,7 +63,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -113,10 +113,10 @@
|
|||
"description": "Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924).",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T10:07:28Z",
|
||||
"updated_at": "2024-11-25T03:44:56Z",
|
||||
"updated_at": "2024-11-25T19:14:18Z",
|
||||
"pushed_at": "2024-11-19T12:20:16Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -134,7 +134,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -189,19 +189,19 @@
|
|||
"description": "Vulnerable docker container for Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 – 9.1.1.1 – Authentication Bypass CVE-2023-50164",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-20T16:50:24Z",
|
||||
"updated_at": "2024-11-22T09:28:11Z",
|
||||
"updated_at": "2024-11-25T19:41:23Z",
|
||||
"pushed_at": "2024-11-22T09:28:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T15:17:59Z",
|
||||
"updated_at": "2024-11-25T17:27:56Z",
|
||||
"updated_at": "2024-11-25T23:19:00Z",
|
||||
"pushed_at": "2024-02-19T20:00:35Z",
|
||||
"stargazers_count": 700,
|
||||
"watchers_count": 700,
|
||||
"stargazers_count": 701,
|
||||
"watchers_count": 701,
|
||||
"has_discussions": false,
|
||||
"forks_count": 153,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 153,
|
||||
"watchers": 700,
|
||||
"watchers": 701,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Proof-of-concept (PoC) exploit for JSONPath-plus vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-13T07:56:10Z",
|
||||
"updated_at": "2024-11-13T09:25:02Z",
|
||||
"pushed_at": "2024-11-13T09:24:58Z",
|
||||
"updated_at": "2024-11-25T23:56:28Z",
|
||||
"pushed_at": "2024-11-25T23:56:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Example exploitable scenarios for CVE-2024-22243 affecting the Spring framework (open redirect & SSRF).",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-21T12:55:22Z",
|
||||
"updated_at": "2024-11-13T15:22:43Z",
|
||||
"updated_at": "2024-11-25T20:55:53Z",
|
||||
"pushed_at": "2024-10-22T16:37:42Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -38,7 +38,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -112,13 +112,13 @@
|
|||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"forks": 22,
|
||||
"watchers": 70,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -265,10 +265,10 @@
|
|||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T18:25:46Z",
|
||||
"updated_at": "2024-11-25T13:13:25Z",
|
||||
"updated_at": "2024-11-26T00:08:32Z",
|
||||
"pushed_at": "2024-08-27T12:22:39Z",
|
||||
"stargazers_count": 626,
|
||||
"watchers_count": 626,
|
||||
"stargazers_count": 627,
|
||||
"watchers_count": 627,
|
||||
"has_discussions": false,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
|
@ -277,7 +277,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 626,
|
||||
"watchers": 627,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
"poc-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -553,13 +553,13 @@
|
|||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"forks": 31,
|
||||
"watchers": 120,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-07T21:03:30Z",
|
||||
"updated_at": "2024-11-25T07:58:44Z",
|
||||
"updated_at": "2024-11-25T22:06:53Z",
|
||||
"pushed_at": "2024-11-14T16:25:52Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 65,
|
||||
"watchers": 67,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "PoC for CVE-2024-48990",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-20T18:41:25Z",
|
||||
"updated_at": "2024-11-25T15:38:22Z",
|
||||
"updated_at": "2024-11-25T22:44:40Z",
|
||||
"pushed_at": "2024-11-20T18:49:33Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 67,
|
||||
"forks": 12,
|
||||
"watchers": 69,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -138,10 +138,10 @@
|
|||
"description": "Testing POC for use cases",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-24T07:33:06Z",
|
||||
"updated_at": "2024-11-25T18:16:23Z",
|
||||
"updated_at": "2024-11-25T22:06:08Z",
|
||||
"pushed_at": "2024-11-24T07:56:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T08:57:18Z",
|
||||
"updated_at": "2024-11-25T14:32:52Z",
|
||||
"updated_at": "2024-11-25T21:48:33Z",
|
||||
"pushed_at": "2024-11-19T09:15:26Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-25T06:06:25Z",
|
||||
"updated_at": "2024-11-25T07:15:58Z",
|
||||
"updated_at": "2024-11-25T22:48:49Z",
|
||||
"pushed_at": "2024-11-25T06:11:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
39
2024/CVE-2024-5057.json
Normal file
39
2024/CVE-2024-5057.json
Normal file
|
@ -0,0 +1,39 @@
|
|||
[
|
||||
{
|
||||
"id": 894190256,
|
||||
"name": "poc-CVE-2024-5057",
|
||||
"full_name": "g1thubb004\/poc-CVE-2024-5057",
|
||||
"owner": {
|
||||
"login": "g1thubb004",
|
||||
"id": 189642750,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/189642750?v=4",
|
||||
"html_url": "https:\/\/github.com\/g1thubb004",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/g1thubb004\/poc-CVE-2024-5057",
|
||||
"description": "poc-CVE-2024-5057",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-25T23:10:28Z",
|
||||
"updated_at": "2024-11-25T23:11:49Z",
|
||||
"pushed_at": "2024-11-25T23:11:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2024-5057",
|
||||
"exploit",
|
||||
"poc",
|
||||
"poc-cve-2024-5057"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-53375.json
Normal file
33
2024/CVE-2024-53375.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 867639922,
|
||||
"name": "CVE-2024-53375",
|
||||
"full_name": "ThottySploity\/CVE-2024-53375",
|
||||
"owner": {
|
||||
"login": "ThottySploity",
|
||||
"id": 119318084,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119318084?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThottySploity",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThottySploity\/CVE-2024-53375",
|
||||
"description": "TP-Link Archer AXE75 Authenticated Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-04T12:49:19Z",
|
||||
"updated_at": "2024-11-25T19:36:35Z",
|
||||
"pushed_at": "2024-11-23T00:33:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1391,7 +1391,7 @@
|
|||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1406,7 +1406,7 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"forks": 27,
|
||||
"watchers": 64,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
33
2024/CVE-2024-9659.json
Normal file
33
2024/CVE-2024-9659.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 894111154,
|
||||
"name": "CVE-2024-9659",
|
||||
"full_name": "zetraxz\/CVE-2024-9659",
|
||||
"owner": {
|
||||
"login": "zetraxz",
|
||||
"id": 186395163,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186395163?v=4",
|
||||
"html_url": "https:\/\/github.com\/zetraxz",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zetraxz\/CVE-2024-9659",
|
||||
"description": "CVE-2024-9659: Unrestricted Upload of File with Dangerous Type (CWE-434)",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-25T19:16:58Z",
|
||||
"updated_at": "2024-11-25T19:36:11Z",
|
||||
"pushed_at": "2024-11-25T19:35:06Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
17
README.md
17
README.md
|
@ -1115,6 +1115,13 @@
|
|||
- [sinsinology/CVE-2024-5009](https://github.com/sinsinology/CVE-2024-5009)
|
||||
- [th3gokul/CVE-2024-5009](https://github.com/th3gokul/CVE-2024-5009)
|
||||
|
||||
### CVE-2024-5057 (2024-08-29)
|
||||
|
||||
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Easy Digital Downloads allows SQL Injection.This issue affects Easy Digital Downloads: from n/a through 3.2.12.
|
||||
</code>
|
||||
|
||||
- [g1thubb004/poc-CVE-2024-5057](https://github.com/g1thubb004/poc-CVE-2024-5057)
|
||||
|
||||
### CVE-2024-5084 (2024-05-23)
|
||||
|
||||
<code>The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
|
||||
|
@ -1876,6 +1883,13 @@
|
|||
- [RandomRobbieBF/CVE-2024-9593](https://github.com/RandomRobbieBF/CVE-2024-9593)
|
||||
- [0x4f5da2-venom/CVE-2024-9593-EXP](https://github.com/0x4f5da2-venom/CVE-2024-9593-EXP)
|
||||
|
||||
### CVE-2024-9659 (2024-11-23)
|
||||
|
||||
<code>The School Management System for Wordpress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the mj_smgt_user_avatar_image_upload() function in all versions up to, and including, 91.5.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
|
||||
</code>
|
||||
|
||||
- [zetraxz/CVE-2024-9659](https://github.com/zetraxz/CVE-2024-9659)
|
||||
|
||||
### CVE-2024-9680 (2024-10-09)
|
||||
|
||||
<code>An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0.
|
||||
|
@ -7090,6 +7104,9 @@
|
|||
|
||||
- [ebrasha/abdal-anydesk-remote-ip-detector](https://github.com/ebrasha/abdal-anydesk-remote-ip-detector)
|
||||
|
||||
### CVE-2024-53375
|
||||
- [ThottySploity/CVE-2024-53375](https://github.com/ThottySploity/CVE-2024-53375)
|
||||
|
||||
### CVE-2024-1642470
|
||||
- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue