mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/06/11 06:29:25
This commit is contained in:
parent
bef6bc6d0a
commit
535bdeae03
37 changed files with 291 additions and 256 deletions
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2016-5636",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-28T18:47:03Z",
|
||||
"updated_at": "2021-02-22T10:07:02Z",
|
||||
"updated_at": "2024-06-11T00:58:25Z",
|
||||
"pushed_at": "2020-08-10T07:27:53Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-14T18:51:50Z",
|
||||
"updated_at": "2024-04-12T13:19:09Z",
|
||||
"updated_at": "2024-06-11T05:24:45Z",
|
||||
"pushed_at": "2024-03-10T19:29:16Z",
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 248,
|
||||
"watchers": 249,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -843,7 +843,7 @@
|
|||
"description": "school project",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-15T08:13:46Z",
|
||||
"updated_at": "2023-05-15T08:27:15Z",
|
||||
"updated_at": "2024-06-11T02:40:07Z",
|
||||
"pushed_at": "2023-10-26T14:04:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -150,34 +150,34 @@
|
|||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 362129366,
|
||||
"id": 364464831,
|
||||
"name": "CVE-2019-18634",
|
||||
"full_name": "Y3A\/CVE-2019-18634",
|
||||
"full_name": "paras1te-x\/CVE-2019-18634",
|
||||
"owner": {
|
||||
"login": "Y3A",
|
||||
"id": 62646606,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62646606?v=4",
|
||||
"html_url": "https:\/\/github.com\/Y3A"
|
||||
"login": "paras1te-x",
|
||||
"id": 78490741,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78490741?v=4",
|
||||
"html_url": "https:\/\/github.com\/paras1te-x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Y3A\/CVE-2019-18634",
|
||||
"html_url": "https:\/\/github.com\/paras1te-x\/CVE-2019-18634",
|
||||
"description": "exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-27T13:50:24Z",
|
||||
"updated_at": "2021-06-11T07:30:23Z",
|
||||
"pushed_at": "2021-06-11T07:30:20Z",
|
||||
"created_at": "2021-05-05T04:53:05Z",
|
||||
"updated_at": "2021-05-05T04:53:06Z",
|
||||
"pushed_at": "2021-05-05T04:53:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 391601106,
|
||||
|
|
|
@ -445,10 +445,10 @@
|
|||
"description": "Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-05T14:32:11Z",
|
||||
"updated_at": "2024-04-04T12:28:11Z",
|
||||
"updated_at": "2024-06-11T03:46:51Z",
|
||||
"pushed_at": "2023-12-21T06:18:47Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -457,7 +457,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 1699,
|
||||
"watchers_count": 1699,
|
||||
"has_discussions": false,
|
||||
"forks_count": 360,
|
||||
"forks_count": 359,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 360,
|
||||
"forks": 359,
|
||||
"watchers": 1699,
|
||||
"score": 0,
|
||||
"subscribers_count": 87
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T08:14:03Z",
|
||||
"updated_at": "2024-03-31T14:24:41Z",
|
||||
"updated_at": "2024-06-11T02:41:48Z",
|
||||
"pushed_at": "2021-02-07T09:42:36Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -35,7 +35,7 @@
|
|||
"totvs"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -410,10 +410,10 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2024-06-02T17:32:12Z",
|
||||
"updated_at": "2024-06-11T00:50:47Z",
|
||||
"pushed_at": "2022-04-14T11:51:18Z",
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"stargazers_count": 430,
|
||||
"watchers_count": 430,
|
||||
"has_discussions": false,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
|
@ -422,7 +422,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"watchers": 429,
|
||||
"watchers": 430,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -1420,36 +1420,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 403515290,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "Y3A\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "Y3A",
|
||||
"id": 62646606,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62646606?v=4",
|
||||
"html_url": "https:\/\/github.com\/Y3A"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Y3A\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-06T06:48:08Z",
|
||||
"updated_at": "2021-09-07T03:36:33Z",
|
||||
"pushed_at": "2021-09-07T03:36:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 410319200,
|
||||
"name": "sudo-exploit",
|
||||
|
@ -2054,6 +2024,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 690307610,
|
||||
"name": "Y3A-CVE-2021-3156",
|
||||
"full_name": "EthicalSecurity-Agency\/Y3A-CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "EthicalSecurity-Agency",
|
||||
"id": 128076110,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128076110?v=4",
|
||||
"html_url": "https:\/\/github.com\/EthicalSecurity-Agency"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EthicalSecurity-Agency\/Y3A-CVE-2021-3156",
|
||||
"description": "Y3A \/ CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-12T00:23:42Z",
|
||||
"updated_at": "2023-09-12T00:23:42Z",
|
||||
"pushed_at": "2021-09-07T03:36:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 736124550,
|
||||
"name": "CVE-2021-3156",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-4154 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-11T05:46:27Z",
|
||||
"updated_at": "2024-01-03T06:23:30Z",
|
||||
"updated_at": "2024-06-11T03:07:02Z",
|
||||
"pushed_at": "2022-10-07T04:56:36Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-06-06T10:42:16Z",
|
||||
"updated_at": "2024-06-11T03:46:08Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1760,
|
||||
"watchers_count": 1760,
|
||||
"stargazers_count": 1761,
|
||||
"watchers_count": 1761,
|
||||
"has_discussions": false,
|
||||
"forks_count": 519,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 519,
|
||||
"watchers": 1760,
|
||||
"watchers": 1761,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T23:26:47Z",
|
||||
"updated_at": "2024-06-04T16:23:30Z",
|
||||
"updated_at": "2024-06-11T01:00:39Z",
|
||||
"pushed_at": "2022-11-20T03:03:53Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 207,
|
||||
"watchers": 208,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -147,6 +147,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -66,5 +66,35 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 813427958,
|
||||
"name": "CVE-2022-36446",
|
||||
"full_name": "Kang3639\/CVE-2022-36446",
|
||||
"owner": {
|
||||
"login": "Kang3639",
|
||||
"id": 118144091,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118144091?v=4",
|
||||
"html_url": "https:\/\/github.com\/Kang3639"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Kang3639\/CVE-2022-36446",
|
||||
"description": "CVE-2022-36446 POC 실습",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-11T04:21:28Z",
|
||||
"updated_at": "2024-06-11T05:01:36Z",
|
||||
"pushed_at": "2024-06-11T05:01:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-13T13:17:20Z",
|
||||
"updated_at": "2024-06-04T07:48:58Z",
|
||||
"updated_at": "2024-06-11T01:32:55Z",
|
||||
"pushed_at": "2024-02-11T03:01:51Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 86,
|
||||
"watchers": 85,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "A collection of resources and information about CVE-2023-2033",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-26T15:24:02Z",
|
||||
"updated_at": "2024-05-10T05:30:03Z",
|
||||
"updated_at": "2024-06-11T01:30:27Z",
|
||||
"pushed_at": "2023-08-13T21:53:14Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -60,7 +60,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 19,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -202,10 +202,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-07-10T06:38:14Z",
|
||||
"updated_at": "2023-07-14T00:58:10Z",
|
||||
"updated_at": "2024-06-11T03:20:39Z",
|
||||
"pushed_at": "2023-07-13T06:20:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -214,7 +214,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-02T14:15:27Z",
|
||||
"updated_at": "2024-06-08T22:33:50Z",
|
||||
"updated_at": "2024-06-11T04:33:15Z",
|
||||
"pushed_at": "2024-06-03T05:03:46Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 45,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
32
2024/CVE-2024-0195.json
Normal file
32
2024/CVE-2024-0195.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 813399149,
|
||||
"name": "CVE-2024-0195",
|
||||
"full_name": "Cappricio-Securities\/CVE-2024-0195",
|
||||
"owner": {
|
||||
"login": "Cappricio-Securities",
|
||||
"id": 102907425,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
|
||||
"html_url": "https:\/\/github.com\/Cappricio-Securities"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2024-0195",
|
||||
"description": "SpiderFlow Crawler Platform - Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-11T02:34:34Z",
|
||||
"updated_at": "2024-06-11T02:35:35Z",
|
||||
"pushed_at": "2024-06-11T02:35:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-06-10T22:33:04Z",
|
||||
"updated_at": "2024-06-11T03:12:23Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2094,
|
||||
"watchers_count": 2094,
|
||||
"stargazers_count": 2095,
|
||||
"watchers_count": 2095,
|
||||
"has_discussions": false,
|
||||
"forks_count": 268,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 268,
|
||||
"watchers": 2094,
|
||||
"watchers": 2095,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
},
|
||||
|
@ -153,6 +153,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T18:55:03Z",
|
||||
"updated_at": "2024-06-09T18:55:47Z",
|
||||
"updated_at": "2024-06-11T01:50:57Z",
|
||||
"pushed_at": "2024-06-09T18:55:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The Poc for CVE-2024-20931",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-02T01:58:49Z",
|
||||
"updated_at": "2024-05-10T03:53:53Z",
|
||||
"updated_at": "2024-06-11T00:36:00Z",
|
||||
"pushed_at": "2024-02-02T02:05:01Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 70,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T15:17:59Z",
|
||||
"updated_at": "2024-06-10T19:08:59Z",
|
||||
"updated_at": "2024-06-11T02:35:32Z",
|
||||
"pushed_at": "2024-02-19T20:00:35Z",
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"stargazers_count": 630,
|
||||
"watchers_count": 630,
|
||||
"has_discussions": false,
|
||||
"forks_count": 140,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 140,
|
||||
"watchers": 629,
|
||||
"watchers": 630,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -1416,6 +1416,36 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 813414695,
|
||||
"name": "CVE-2024-24919",
|
||||
"full_name": "SalehLardhi\/CVE-2024-24919",
|
||||
"owner": {
|
||||
"login": "SalehLardhi",
|
||||
"id": 77610128,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77610128?v=4",
|
||||
"html_url": "https:\/\/github.com\/SalehLardhi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SalehLardhi\/CVE-2024-24919",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-11T03:33:30Z",
|
||||
"updated_at": "2024-06-11T03:43:24Z",
|
||||
"pushed_at": "2024-06-11T03:37:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,20 +13,20 @@
|
|||
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T17:02:03Z",
|
||||
"updated_at": "2024-06-11T00:07:25Z",
|
||||
"updated_at": "2024-06-11T06:28:09Z",
|
||||
"pushed_at": "2024-06-10T17:17:44Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"forks": 7,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 775805293,
|
||||
"name": "CVE-2024-28397",
|
||||
"full_name": "Marven11\/CVE-2024-28397",
|
||||
"owner": {
|
||||
"login": "Marven11",
|
||||
"id": 110723864,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110723864?v=4",
|
||||
"html_url": "https:\/\/github.com\/Marven11"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Marven11\/CVE-2024-28397",
|
||||
"description": "to be released",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-22T04:29:34Z",
|
||||
"updated_at": "2024-03-22T08:57:56Z",
|
||||
"pushed_at": "2024-03-22T04:29:35Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T06:12:20Z",
|
||||
"updated_at": "2024-06-11T00:06:34Z",
|
||||
"updated_at": "2024-06-11T02:48:58Z",
|
||||
"pushed_at": "2024-06-10T07:53:44Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,8 +25,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 35,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-06T18:31:57Z",
|
||||
"updated_at": "2024-06-10T11:06:40Z",
|
||||
"updated_at": "2024-06-11T02:39:17Z",
|
||||
"pushed_at": "2024-06-06T18:38:06Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 22,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -394,13 +394,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -424,13 +424,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -1464,35 +1464,5 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 811571305,
|
||||
"name": "CVE-2024-32002-linux-smash",
|
||||
"full_name": "alimuhammedkose\/CVE-2024-32002-linux-smash",
|
||||
"owner": {
|
||||
"login": "alimuhammedkose",
|
||||
"id": 117280381,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117280381?v=4",
|
||||
"html_url": "https:\/\/github.com\/alimuhammedkose"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alimuhammedkose\/CVE-2024-32002-linux-smash",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-06T21:26:03Z",
|
||||
"updated_at": "2024-06-06T21:26:19Z",
|
||||
"pushed_at": "2024-06-06T21:26:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T10:02:23Z",
|
||||
"updated_at": "2024-06-08T16:09:28Z",
|
||||
"updated_at": "2024-06-11T06:24:48Z",
|
||||
"pushed_at": "2024-06-07T03:28:00Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-4367 arbitrary js execution in pdf js",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T22:56:10Z",
|
||||
"updated_at": "2024-06-07T14:59:25Z",
|
||||
"updated_at": "2024-06-11T01:33:46Z",
|
||||
"pushed_at": "2024-05-20T23:09:43Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T05:50:23Z",
|
||||
"updated_at": "2024-06-11T00:15:09Z",
|
||||
"pushed_at": "2024-06-07T11:49:08Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"updated_at": "2024-06-11T04:46:45Z",
|
||||
"pushed_at": "2024-06-11T04:46:42Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -133,10 +133,10 @@
|
|||
"description": "POC & $BASH script for CVE-2024-4577",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:51:39Z",
|
||||
"updated_at": "2024-06-10T09:24:14Z",
|
||||
"updated_at": "2024-06-11T04:42:50Z",
|
||||
"pushed_at": "2024-06-09T16:16:30Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -163,21 +163,21 @@
|
|||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:52:54Z",
|
||||
"updated_at": "2024-06-10T20:10:39Z",
|
||||
"updated_at": "2024-06-11T04:18:57Z",
|
||||
"pushed_at": "2024-06-07T09:53:15Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 87,
|
||||
"forks": 21,
|
||||
"watchers": 92,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 811787647,
|
||||
|
@ -223,19 +223,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T10:40:37Z",
|
||||
"updated_at": "2024-06-08T22:33:25Z",
|
||||
"updated_at": "2024-06-11T03:58:28Z",
|
||||
"pushed_at": "2024-06-07T15:06:52Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -530,12 +530,12 @@
|
|||
"description": "[漏洞复现] 全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP,共享原创EXP,支持SSRF,支持绕过WAF。The world's first CVE-2024-4577 PHP-CGI RCE exploit utilizing the default PHP environment. Sharing original exploit, supports SSRF, supports WAF bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-08T13:04:45Z",
|
||||
"updated_at": "2024-06-11T00:12:13Z",
|
||||
"updated_at": "2024-06-11T06:07:30Z",
|
||||
"pushed_at": "2024-06-10T18:46:40Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -549,8 +549,8 @@
|
|||
"xampp"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 44,
|
||||
"forks": 15,
|
||||
"watchers": 75,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -598,10 +598,10 @@
|
|||
"description": "PHP CGI Argument Injection vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T14:18:21Z",
|
||||
"updated_at": "2024-06-10T09:45:44Z",
|
||||
"updated_at": "2024-06-11T02:34:39Z",
|
||||
"pushed_at": "2024-06-09T14:20:36Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -610,7 +610,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -628,10 +628,10 @@
|
|||
"description": "A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T23:32:11Z",
|
||||
"updated_at": "2024-06-10T14:28:31Z",
|
||||
"updated_at": "2024-06-11T02:14:06Z",
|
||||
"pushed_at": "2024-06-10T11:12:44Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -654,7 +654,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -686,6 +686,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -367,10 +367,10 @@
|
|||
"description": "CVE-2024-4956 Python exploitation utility",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-05T15:37:39Z",
|
||||
"updated_at": "2024-06-08T16:13:06Z",
|
||||
"updated_at": "2024-06-11T03:34:36Z",
|
||||
"pushed_at": "2024-06-08T16:13:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -379,7 +379,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -397,10 +397,10 @@
|
|||
"description": "POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T10:57:29Z",
|
||||
"updated_at": "2024-06-09T15:55:45Z",
|
||||
"updated_at": "2024-06-11T02:16:32Z",
|
||||
"pushed_at": "2024-06-09T12:53:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -409,7 +409,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
17
README.md
17
README.md
|
@ -15,6 +15,13 @@
|
|||
|
||||
- [41yn14/CVE-2024-0039-Exploit](https://github.com/41yn14/CVE-2024-0039-Exploit)
|
||||
|
||||
### CVE-2024-0195 (2024-01-02)
|
||||
|
||||
<code>Es wurde eine Schwachstelle in spider-flow 0.4.3 gefunden. Sie wurde als kritisch eingestuft. Es betrifft die Funktion FunctionService.saveFunction der Datei src/main/java/org/spiderflow/controller/FunctionController.java. Durch Manipulieren mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
|
||||
</code>
|
||||
|
||||
- [Cappricio-Securities/CVE-2024-0195](https://github.com/Cappricio-Securities/CVE-2024-0195)
|
||||
|
||||
### CVE-2024-0197 (2024-02-27)
|
||||
|
||||
<code>A flaw in the installer for Thales SafeNet Sentinel HASP LDK prior to 9.16 on Windows allows an attacker to escalate their privilege level via local access.\n\n
|
||||
|
@ -1535,6 +1542,7 @@
|
|||
- [satchhacker/cve-2024-24919](https://github.com/satchhacker/cve-2024-24919)
|
||||
- [verylazytech/CVE-2024-24919](https://github.com/verylazytech/CVE-2024-24919)
|
||||
- [protonnegativo/CVE-2024-24919](https://github.com/protonnegativo/CVE-2024-24919)
|
||||
- [SalehLardhi/CVE-2024-24919](https://github.com/SalehLardhi/CVE-2024-24919)
|
||||
|
||||
### CVE-2024-25092 (2024-06-09)
|
||||
|
||||
|
@ -1940,9 +1948,6 @@
|
|||
|
||||
- [YongYe-Security/CVE-2024-28255](https://github.com/YongYe-Security/CVE-2024-28255)
|
||||
|
||||
### CVE-2024-28397
|
||||
- [Marven11/CVE-2024-28397](https://github.com/Marven11/CVE-2024-28397)
|
||||
|
||||
### CVE-2024-28515 (2024-04-03)
|
||||
|
||||
<code>Buffer Overflow vulnerability in CSAPP_Lab CSAPP Lab3 15-213 Fall 20xx allows a remote attacker to execute arbitrary code via the lab3 of csapp,lab3/buflab-update.pl component.
|
||||
|
@ -2252,7 +2257,6 @@
|
|||
- [AD-Appledog/wakuwaku](https://github.com/AD-Appledog/wakuwaku)
|
||||
- [tobelight/cve_2024_32002](https://github.com/tobelight/cve_2024_32002)
|
||||
- [Basyaact/CVE-2024-32002-PoC_Chinese](https://github.com/Basyaact/CVE-2024-32002-PoC_Chinese)
|
||||
- [alimuhammedkose/CVE-2024-32002-linux-smash](https://github.com/alimuhammedkose/CVE-2024-32002-linux-smash)
|
||||
|
||||
### CVE-2024-32004 (2024-05-14)
|
||||
|
||||
|
@ -15137,6 +15141,7 @@
|
|||
|
||||
- [p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE](https://github.com/p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE)
|
||||
- [emirpolatt/CVE-2022-36446](https://github.com/emirpolatt/CVE-2022-36446)
|
||||
- [Kang3639/CVE-2022-36446](https://github.com/Kang3639/CVE-2022-36446)
|
||||
|
||||
### CVE-2022-36532 (2022-09-16)
|
||||
|
||||
|
@ -17798,7 +17803,6 @@
|
|||
- [Exodusro/CVE-2021-3156](https://github.com/Exodusro/CVE-2021-3156)
|
||||
- [CyberCommands/CVE-2021-3156](https://github.com/CyberCommands/CVE-2021-3156)
|
||||
- [0x7183/CVE-2021-3156](https://github.com/0x7183/CVE-2021-3156)
|
||||
- [Y3A/CVE-2021-3156](https://github.com/Y3A/CVE-2021-3156)
|
||||
- [redhawkeye/sudo-exploit](https://github.com/redhawkeye/sudo-exploit)
|
||||
- [d3c3ptic0n/CVE-2021-3156](https://github.com/d3c3ptic0n/CVE-2021-3156)
|
||||
- [musergi/CVE-2021-3156](https://github.com/musergi/CVE-2021-3156)
|
||||
|
@ -17819,6 +17823,7 @@
|
|||
- [mutur4/CVE-2021-3156](https://github.com/mutur4/CVE-2021-3156)
|
||||
- [PurpleOzone/PE_CVE-CVE-2021-3156](https://github.com/PurpleOzone/PE_CVE-CVE-2021-3156)
|
||||
- [asepsaepdin/CVE-2021-3156](https://github.com/asepsaepdin/CVE-2021-3156)
|
||||
- [EthicalSecurity-Agency/Y3A-CVE-2021-3156](https://github.com/EthicalSecurity-Agency/Y3A-CVE-2021-3156)
|
||||
- [DDayLuong/CVE-2021-3156](https://github.com/DDayLuong/CVE-2021-3156)
|
||||
- [wurwur/CVE-2021-3156](https://github.com/wurwur/CVE-2021-3156)
|
||||
- [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156)
|
||||
|
@ -32473,7 +32478,7 @@
|
|||
- [N1et/CVE-2019-18634](https://github.com/N1et/CVE-2019-18634)
|
||||
- [ptef/CVE-2019-18634](https://github.com/ptef/CVE-2019-18634)
|
||||
- [edsonjt81/sudo-cve-2019-18634](https://github.com/edsonjt81/sudo-cve-2019-18634)
|
||||
- [Y3A/CVE-2019-18634](https://github.com/Y3A/CVE-2019-18634)
|
||||
- [paras1te-x/CVE-2019-18634](https://github.com/paras1te-x/CVE-2019-18634)
|
||||
- [aesophor/CVE-2019-18634](https://github.com/aesophor/CVE-2019-18634)
|
||||
- [TheJoyOfHacking/saleemrashid-sudo-cve-2019-18634](https://github.com/TheJoyOfHacking/saleemrashid-sudo-cve-2019-18634)
|
||||
- [DDayLuong/CVE-2019-18634](https://github.com/DDayLuong/CVE-2019-18634)
|
||||
|
|
Loading…
Reference in a new issue