mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/01 18:31:35
This commit is contained in:
parent
d0be535bd4
commit
53f1b77c3e
44 changed files with 347 additions and 189 deletions
|
@ -28,7 +28,7 @@
|
|||
"forks": 9,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 62456741,
|
||||
|
|
|
@ -45,12 +45,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-11-28T15:07:29Z",
|
||||
"updated_at": "2024-12-01T15:55:44Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2014,
|
||||
"watchers_count": 2014,
|
||||
"stargazers_count": 2015,
|
||||
"watchers_count": 2015,
|
||||
"has_discussions": true,
|
||||
"forks_count": 339,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -77,8 +77,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 339,
|
||||
"watchers": 2014,
|
||||
"forks": 340,
|
||||
"watchers": 2015,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -14,12 +14,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-11-28T15:07:29Z",
|
||||
"updated_at": "2024-12-01T15:55:44Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2014,
|
||||
"watchers_count": 2014,
|
||||
"stargazers_count": 2015,
|
||||
"watchers_count": 2015,
|
||||
"has_discussions": true,
|
||||
"forks_count": 339,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -46,8 +46,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 339,
|
||||
"watchers": 2014,
|
||||
"forks": 340,
|
||||
"watchers": 2015,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -45,12 +45,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-11-28T15:07:29Z",
|
||||
"updated_at": "2024-12-01T15:55:44Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2014,
|
||||
"watchers_count": 2014,
|
||||
"stargazers_count": 2015,
|
||||
"watchers_count": 2015,
|
||||
"has_discussions": true,
|
||||
"forks_count": 339,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -77,8 +77,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 339,
|
||||
"watchers": 2014,
|
||||
"forks": 340,
|
||||
"watchers": 2015,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-04T01:12:47Z",
|
||||
"updated_at": "2024-11-01T02:37:42Z",
|
||||
"updated_at": "2024-12-01T14:42:55Z",
|
||||
"pushed_at": "2018-11-18T11:14:20Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -173,10 +173,10 @@
|
|||
"description": "Insecure Java Deserialization Lab",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-22T07:48:19Z",
|
||||
"updated_at": "2023-06-22T06:33:22Z",
|
||||
"updated_at": "2024-12-01T14:44:19Z",
|
||||
"pushed_at": "2024-02-05T16:50:30Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -192,7 +192,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -231,10 +231,10 @@
|
|||
"description": "CVE-2017-7529 | nginx on the range 0.5.6 - 1.13.2",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-19T07:12:10Z",
|
||||
"updated_at": "2023-12-26T17:34:28Z",
|
||||
"updated_at": "2024-12-01T16:42:12Z",
|
||||
"pushed_at": "2021-01-19T07:17:52Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -576,12 +576,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-11-28T15:07:29Z",
|
||||
"updated_at": "2024-12-01T15:55:44Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2014,
|
||||
"watchers_count": 2014,
|
||||
"stargazers_count": 2015,
|
||||
"watchers_count": 2015,
|
||||
"has_discussions": true,
|
||||
"forks_count": 339,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -608,8 +608,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 339,
|
||||
"watchers": 2014,
|
||||
"forks": 340,
|
||||
"watchers": 2015,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -1618,19 +1618,19 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2024-11-15T02:04:17Z",
|
||||
"updated_at": "2024-12-01T12:18:09Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 895,
|
||||
"watchers_count": 895,
|
||||
"stargazers_count": 896,
|
||||
"watchers_count": 896,
|
||||
"has_discussions": false,
|
||||
"forks_count": 243,
|
||||
"forks_count": 242,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 243,
|
||||
"watchers": 895,
|
||||
"forks": 242,
|
||||
"watchers": 896,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
@ -1902,10 +1902,10 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2024-10-31T00:43:46Z",
|
||||
"updated_at": "2024-12-01T14:42:56Z",
|
||||
"pushed_at": "2021-12-02T12:00:46Z",
|
||||
"stargazers_count": 1174,
|
||||
"watchers_count": 1174,
|
||||
"stargazers_count": 1175,
|
||||
"watchers_count": 1175,
|
||||
"has_discussions": false,
|
||||
"forks_count": 345,
|
||||
"allow_forking": true,
|
||||
|
@ -1914,7 +1914,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 345,
|
||||
"watchers": 1174,
|
||||
"watchers": 1175,
|
||||
"score": 0,
|
||||
"subscribers_count": 68
|
||||
},
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -50,7 +50,7 @@
|
|||
"stargazers_count": 4135,
|
||||
"watchers_count": 4135,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1100,
|
||||
"forks_count": 1099,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -76,7 +76,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1100,
|
||||
"forks": 1099,
|
||||
"watchers": 4135,
|
||||
"score": 0,
|
||||
"subscribers_count": 149
|
||||
|
|
|
@ -233,10 +233,10 @@
|
|||
"description": "Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-07T15:03:07Z",
|
||||
"updated_at": "2024-11-28T09:07:00Z",
|
||||
"updated_at": "2024-12-01T16:37:55Z",
|
||||
"pushed_at": "2022-09-04T14:16:50Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -250,7 +250,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -200,12 +200,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-11-28T15:07:29Z",
|
||||
"updated_at": "2024-12-01T15:55:44Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2014,
|
||||
"watchers_count": 2014,
|
||||
"stargazers_count": 2015,
|
||||
"watchers_count": 2015,
|
||||
"has_discussions": true,
|
||||
"forks_count": 339,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -232,8 +232,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 339,
|
||||
"watchers": 2014,
|
||||
"forks": 340,
|
||||
"watchers": 2015,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
}
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 4135,
|
||||
"watchers_count": 4135,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1100,
|
||||
"forks_count": 1099,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1100,
|
||||
"forks": 1099,
|
||||
"watchers": 4135,
|
||||
"score": 0,
|
||||
"subscribers_count": 149
|
||||
|
|
|
@ -143,7 +143,7 @@
|
|||
"stargazers_count": 1079,
|
||||
"watchers_count": 1079,
|
||||
"has_discussions": false,
|
||||
"forks_count": 319,
|
||||
"forks_count": 318,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -153,7 +153,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 319,
|
||||
"forks": 318,
|
||||
"watchers": 1079,
|
||||
"score": 0,
|
||||
"subscribers_count": 36
|
||||
|
|
|
@ -14,12 +14,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-11-28T15:07:29Z",
|
||||
"updated_at": "2024-12-01T15:55:44Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2014,
|
||||
"watchers_count": 2014,
|
||||
"stargazers_count": 2015,
|
||||
"watchers_count": 2015,
|
||||
"has_discussions": true,
|
||||
"forks_count": 339,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -46,8 +46,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 339,
|
||||
"watchers": 2014,
|
||||
"forks": 340,
|
||||
"watchers": 2015,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2020-9992 - A design flaw in MobileDevice.framework\/Xcode and iOS\/iPadOS\/tvOS Development Tools allows an attacker in the same network to gain remote code execution on a target device",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T23:35:22Z",
|
||||
"updated_at": "2024-01-04T16:50:21Z",
|
||||
"updated_at": "2024-12-01T14:46:30Z",
|
||||
"pushed_at": "2020-09-23T14:52:06Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -848,10 +848,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-11-29T07:54:41Z",
|
||||
"updated_at": "2024-12-01T12:38:32Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1337,
|
||||
"watchers_count": 1337,
|
||||
"stargazers_count": 1338,
|
||||
"watchers_count": 1338,
|
||||
"has_discussions": false,
|
||||
"forks_count": 165,
|
||||
"allow_forking": true,
|
||||
|
@ -867,7 +867,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 165,
|
||||
"watchers": 1337,
|
||||
"watchers": 1338,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -143,7 +143,7 @@
|
|||
"stargazers_count": 1079,
|
||||
"watchers_count": 1079,
|
||||
"has_discussions": false,
|
||||
"forks_count": 319,
|
||||
"forks_count": 318,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -153,7 +153,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 319,
|
||||
"forks": 318,
|
||||
"watchers": 1079,
|
||||
"score": 0,
|
||||
"subscribers_count": 36
|
||||
|
|
|
@ -486,10 +486,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2024-11-26T09:51:32Z",
|
||||
"updated_at": "2024-12-01T16:04:35Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 960,
|
||||
"watchers_count": 960,
|
||||
"stargazers_count": 961,
|
||||
"watchers_count": 961,
|
||||
"has_discussions": false,
|
||||
"forks_count": 237,
|
||||
"allow_forking": true,
|
||||
|
@ -498,7 +498,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 237,
|
||||
"watchers": 960,
|
||||
"watchers": 961,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -244,10 +244,10 @@
|
|||
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T20:13:49Z",
|
||||
"updated_at": "2024-11-17T00:40:44Z",
|
||||
"updated_at": "2024-12-01T14:07:15Z",
|
||||
"pushed_at": "2024-05-19T16:25:52Z",
|
||||
"stargazers_count": 784,
|
||||
"watchers_count": 784,
|
||||
"stargazers_count": 785,
|
||||
"watchers_count": 785,
|
||||
"has_discussions": false,
|
||||
"forks_count": 121,
|
||||
"allow_forking": true,
|
||||
|
@ -256,7 +256,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 121,
|
||||
"watchers": 784,
|
||||
"watchers": 785,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -49,10 +49,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2024-11-27T09:10:35Z",
|
||||
"updated_at": "2024-12-01T16:43:06Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1968,
|
||||
"watchers_count": 1968,
|
||||
"stargazers_count": 1969,
|
||||
"watchers_count": 1969,
|
||||
"has_discussions": false,
|
||||
"forks_count": 512,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 512,
|
||||
"watchers": 1968,
|
||||
"watchers": 1969,
|
||||
"score": 0,
|
||||
"subscribers_count": 20
|
||||
},
|
||||
|
|
|
@ -1202,10 +1202,10 @@
|
|||
"description": "Grafana Decryptor for CVE-2021-43798",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T08:43:45Z",
|
||||
"updated_at": "2024-07-02T09:00:01Z",
|
||||
"updated_at": "2024-12-01T14:24:31Z",
|
||||
"pushed_at": "2024-07-02T08:45:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1221,7 +1221,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -381,10 +381,10 @@
|
|||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2024-11-29T23:17:46Z",
|
||||
"updated_at": "2024-12-01T17:27:18Z",
|
||||
"pushed_at": "2024-04-26T03:16:26Z",
|
||||
"stargazers_count": 1106,
|
||||
"watchers_count": 1106,
|
||||
"stargazers_count": 1107,
|
||||
"watchers_count": 1107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 536,
|
||||
"allow_forking": true,
|
||||
|
@ -395,7 +395,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 536,
|
||||
"watchers": 1106,
|
||||
"watchers": 1107,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "PoC of CVE-2022-20474",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-14T08:48:59Z",
|
||||
"updated_at": "2024-11-18T08:29:54Z",
|
||||
"pushed_at": "2024-11-16T08:00:49Z",
|
||||
"updated_at": "2024-12-01T14:56:17Z",
|
||||
"pushed_at": "2024-12-01T14:56:14Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -792,10 +792,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-11-29T07:54:41Z",
|
||||
"updated_at": "2024-12-01T12:38:32Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1337,
|
||||
"watchers_count": 1337,
|
||||
"stargazers_count": 1338,
|
||||
"watchers_count": 1338,
|
||||
"has_discussions": false,
|
||||
"forks_count": 165,
|
||||
"allow_forking": true,
|
||||
|
@ -811,7 +811,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 165,
|
||||
"watchers": 1337,
|
||||
"watchers": 1338,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": "exploit by python",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T13:03:38Z",
|
||||
"updated_at": "2024-11-26T13:03:42Z",
|
||||
"pushed_at": "2024-11-26T13:03:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2024-12-01T13:50:51Z",
|
||||
"pushed_at": "2024-12-01T13:50:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-30T18:17:38Z",
|
||||
"updated_at": "2024-12-01T07:51:20Z",
|
||||
"updated_at": "2024-12-01T17:54:04Z",
|
||||
"pushed_at": "2022-06-05T21:06:13Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
39
2023/CVE-2023-28205.json
Normal file
39
2023/CVE-2023-28205.json
Normal file
|
@ -0,0 +1,39 @@
|
|||
[
|
||||
{
|
||||
"id": 896459919,
|
||||
"name": "uaf-2023-28205",
|
||||
"full_name": "ntfargo\/uaf-2023-28205",
|
||||
"owner": {
|
||||
"login": "ntfargo",
|
||||
"id": 32229490,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32229490?v=4",
|
||||
"html_url": "https:\/\/github.com\/ntfargo",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ntfargo\/uaf-2023-28205",
|
||||
"description": "PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-30T12:25:47Z",
|
||||
"updated_at": "2024-12-01T16:18:19Z",
|
||||
"pushed_at": "2024-12-01T16:08:19Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"apple",
|
||||
"poc",
|
||||
"use-after-free",
|
||||
"vulnerability",
|
||||
"webkit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-29T17:08:05Z",
|
||||
"updated_at": "2024-11-15T17:09:30Z",
|
||||
"updated_at": "2024-12-01T16:49:21Z",
|
||||
"pushed_at": "2024-01-30T05:58:08Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -306,10 +306,10 @@
|
|||
"description": "Xss injection, WonderCMS 3.2.0 -3.4.2 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-24T17:39:45Z",
|
||||
"updated_at": "2024-11-25T17:21:22Z",
|
||||
"updated_at": "2024-12-01T17:20:02Z",
|
||||
"pushed_at": "2024-11-24T18:08:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -318,7 +318,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -110,10 +110,10 @@
|
|||
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-12T18:29:27Z",
|
||||
"updated_at": "2024-11-13T18:00:51Z",
|
||||
"updated_at": "2024-12-01T17:17:34Z",
|
||||
"pushed_at": "2024-01-13T13:50:20Z",
|
||||
"stargazers_count": 236,
|
||||
"watchers_count": 236,
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -122,7 +122,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 236,
|
||||
"watchers": 237,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -235,5 +235,36 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 896883913,
|
||||
"name": "CVE-2024-10924-Bypass-MFA-Wordpress-LAB",
|
||||
"full_name": "D1se0\/CVE-2024-10924-Bypass-MFA-Wordpress-LAB",
|
||||
"owner": {
|
||||
"login": "D1se0",
|
||||
"id": 164921056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4",
|
||||
"html_url": "https:\/\/github.com\/D1se0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/D1se0\/CVE-2024-10924-Bypass-MFA-Wordpress-LAB",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-01T14:43:16Z",
|
||||
"updated_at": "2024-12-01T17:52:27Z",
|
||||
"pushed_at": "2024-12-01T17:52:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-11320.json
Normal file
33
2024/CVE-2024-11320.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 896840057,
|
||||
"name": "CVE-2024-11320",
|
||||
"full_name": "mhaskar\/CVE-2024-11320",
|
||||
"owner": {
|
||||
"login": "mhaskar",
|
||||
"id": 6861215,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
|
||||
"html_url": "https:\/\/github.com\/mhaskar",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2024-11320",
|
||||
"description": "Exploit for Pandora FMS Remote Code Execution CVE-2024-11320",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-01T12:39:49Z",
|
||||
"updated_at": "2024-12-01T12:54:15Z",
|
||||
"pushed_at": "2024-12-01T12:48:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,19 +14,19 @@
|
|||
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-29T06:13:36Z",
|
||||
"updated_at": "2024-12-01T08:35:41Z",
|
||||
"updated_at": "2024-12-01T16:44:44Z",
|
||||
"pushed_at": "2024-11-29T21:02:56Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"forks": 6,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -80,10 +80,10 @@
|
|||
"description": "POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE) due to improper input sanitization",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-28T17:47:53Z",
|
||||
"updated_at": "2024-11-29T11:18:46Z",
|
||||
"updated_at": "2024-12-01T14:49:28Z",
|
||||
"pushed_at": "2024-11-28T18:07:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -99,7 +99,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
33
2024/CVE-2024-22734.json
Normal file
33
2024/CVE-2024-22734.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 896950815,
|
||||
"name": "CVE-2024-22734",
|
||||
"full_name": "securekomodo\/CVE-2024-22734",
|
||||
"owner": {
|
||||
"login": "securekomodo",
|
||||
"id": 4809643,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4809643?v=4",
|
||||
"html_url": "https:\/\/github.com\/securekomodo",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/securekomodo\/CVE-2024-22734",
|
||||
"description": "Exploit POC for CVE-2024-22734 affecting AMCS Trux Software",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-01T17:47:16Z",
|
||||
"updated_at": "2024-12-01T17:49:22Z",
|
||||
"pushed_at": "2024-12-01T17:48:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T18:48:41Z",
|
||||
"updated_at": "2024-10-19T08:32:52Z",
|
||||
"updated_at": "2024-12-01T14:52:57Z",
|
||||
"pushed_at": "2024-09-27T10:46:14Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Path traversal in Ollama with rogue registry server",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-26T03:11:29Z",
|
||||
"updated_at": "2024-09-17T07:31:08Z",
|
||||
"updated_at": "2024-12-01T12:59:57Z",
|
||||
"pushed_at": "2024-06-28T03:14:05Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -185,10 +185,10 @@
|
|||
"description": "PDF.js是由Mozilla维护的基于JavaScript的PDF查看器。此漏洞允许攻击者在打开恶意 PDF 文件后立即执行任意 JavaScript 代码。这会影响所有 Firefox 用户 (<126),因为 Firefox 使用 PDF.js 来显示 PDF 文件,但也严重影响了许多基于 Web 和 Electron 的应用程序,这些应用程序(间接)使用 PDF.js 进行预览功能。",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-13T15:14:47Z",
|
||||
"updated_at": "2024-11-04T10:45:50Z",
|
||||
"updated_at": "2024-12-01T16:03:04Z",
|
||||
"pushed_at": "2024-06-13T15:19:57Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -197,7 +197,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Makes IDA (most versions) to crash upon opening it. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-25T12:33:14Z",
|
||||
"updated_at": "2024-11-30T16:47:45Z",
|
||||
"updated_at": "2024-12-01T16:41:12Z",
|
||||
"pushed_at": "2024-08-30T09:58:12Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-48359 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-30T14:52:04Z",
|
||||
"updated_at": "2024-11-12T08:54:14Z",
|
||||
"updated_at": "2024-12-01T16:09:54Z",
|
||||
"pushed_at": "2024-10-30T15:02:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -154,37 +154,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 893500783,
|
||||
"name": "CVE-2024-48990-exploit",
|
||||
"full_name": "r0xdeadbeef\/CVE-2024-48990-exploit",
|
||||
"owner": {
|
||||
"login": "r0xdeadbeef",
|
||||
"id": 65211256,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
|
||||
"html_url": "https:\/\/github.com\/r0xdeadbeef",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r0xdeadbeef\/CVE-2024-48990-exploit",
|
||||
"description": "Needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-24T15:57:45Z",
|
||||
"updated_at": "2024-11-29T05:10:42Z",
|
||||
"pushed_at": "2024-11-24T17:47:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 893561658,
|
||||
"name": "needrestart-vulnerability-poc",
|
||||
|
@ -252,5 +221,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 896921908,
|
||||
"name": "CVE-2024-48990-exploit",
|
||||
"full_name": "r0xdeadbeef\/CVE-2024-48990-exploit",
|
||||
"owner": {
|
||||
"login": "r0xdeadbeef",
|
||||
"id": 65211256,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
|
||||
"html_url": "https:\/\/github.com\/r0xdeadbeef",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r0xdeadbeef\/CVE-2024-48990-exploit",
|
||||
"description": "Needrestart, prior to version 3.8, contains a vulnerability that allows local attackers to execute arbitrary code with root privileges. This is achieved by manipulating the PYTHONPATH environment variable to trick needrestart into running the Python interpreter in an unsafe context.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-01T16:26:44Z",
|
||||
"updated_at": "2024-12-01T16:27:50Z",
|
||||
"pushed_at": "2024-12-01T16:27:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
24
README.md
24
README.md
|
@ -2141,6 +2141,7 @@
|
|||
- [julesbsz/CVE-2024-10924](https://github.com/julesbsz/CVE-2024-10924)
|
||||
- [Trackflaw/CVE-2024-10924-Wordpress-Docker](https://github.com/Trackflaw/CVE-2024-10924-Wordpress-Docker)
|
||||
- [Maalfer/CVE-2024-10924-PoC](https://github.com/Maalfer/CVE-2024-10924-PoC)
|
||||
- [D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB](https://github.com/D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB)
|
||||
|
||||
### CVE-2024-10958 (2024-11-10)
|
||||
|
||||
|
@ -2180,6 +2181,13 @@
|
|||
|
||||
- [xthalach/CVE-2024-11318](https://github.com/xthalach/CVE-2024-11318)
|
||||
|
||||
### CVE-2024-11320 (2024-11-21)
|
||||
|
||||
<code>Arbitrary commands execution on the server by exploiting a command injection vulnerability in the LDAP authentication mechanism. This issue affects Pandora FMS: from 700 through <=777.4
|
||||
</code>
|
||||
|
||||
- [mhaskar/CVE-2024-11320](https://github.com/mhaskar/CVE-2024-11320)
|
||||
|
||||
### CVE-2024-11381 (2024-11-22)
|
||||
|
||||
<code>The Control horas plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ch_registro' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
||||
|
@ -2752,6 +2760,13 @@
|
|||
|
||||
- [zunak/CVE-2024-22641](https://github.com/zunak/CVE-2024-22641)
|
||||
|
||||
### CVE-2024-22734 (2024-04-12)
|
||||
|
||||
<code>An issue was discovered in AMCS Group Trux Waste Management Software before version 7.19.0018.26912, allows local attackers to obtain sensitive information via a static, hard-coded AES Key-IV pair in the TxUtilities.dll and TruxUser.cfg components.
|
||||
</code>
|
||||
|
||||
- [securekomodo/CVE-2024-22734](https://github.com/securekomodo/CVE-2024-22734)
|
||||
|
||||
### CVE-2024-22752 (2024-03-07)
|
||||
|
||||
<code>Insecure permissions issue in EaseUS MobiMover 6.0.5 Build 21620 allows attackers to gain escalated privileges via use of crafted executable launched from the application installation directory.
|
||||
|
@ -6711,9 +6726,9 @@
|
|||
- [felmoltor/CVE-2024-48990](https://github.com/felmoltor/CVE-2024-48990)
|
||||
- [Cyb3rFr0g/CVE-2024-48990-PoC](https://github.com/Cyb3rFr0g/CVE-2024-48990-PoC)
|
||||
- [pentestfunctions/CVE-2024-48990-PoC-Testing](https://github.com/pentestfunctions/CVE-2024-48990-PoC-Testing)
|
||||
- [r0xdeadbeef/CVE-2024-48990-exploit](https://github.com/r0xdeadbeef/CVE-2024-48990-exploit)
|
||||
- [njeru-codes/needrestart-vulnerability-poc](https://github.com/njeru-codes/needrestart-vulnerability-poc)
|
||||
- [ally-petitt/CVE-2024-48990-Exploit](https://github.com/ally-petitt/CVE-2024-48990-Exploit)
|
||||
- [r0xdeadbeef/CVE-2024-48990-exploit](https://github.com/r0xdeadbeef/CVE-2024-48990-exploit)
|
||||
|
||||
### CVE-2024-49039 (2024-11-12)
|
||||
|
||||
|
@ -10389,6 +10404,13 @@
|
|||
|
||||
- [spotlightishere/inputcontrol](https://github.com/spotlightishere/inputcontrol)
|
||||
|
||||
### CVE-2023-28205 (2023-04-10)
|
||||
|
||||
<code>A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
|
||||
</code>
|
||||
|
||||
- [ntfargo/uaf-2023-28205](https://github.com/ntfargo/uaf-2023-28205)
|
||||
|
||||
### CVE-2023-28206 (2023-04-10)
|
||||
|
||||
<code>An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1, iOS 15.7.5 and iPadOS 15.7.5, macOS Big Sur 11.7.6. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.
|
||||
|
|
Loading…
Reference in a new issue