mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/15 18:31:45
This commit is contained in:
parent
3cdb1a186f
commit
53f1d6f570
23 changed files with 85 additions and 85 deletions
|
@ -19,7 +19,7 @@
|
||||||
"stargazers_count": 187,
|
"stargazers_count": 187,
|
||||||
"watchers_count": 187,
|
"watchers_count": 187,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 27,
|
"forks_count": 26,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
|
@ -46,7 +46,7 @@
|
||||||
"tls"
|
"tls"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 27,
|
"forks": 26,
|
||||||
"watchers": 187,
|
"watchers": 187,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 8
|
"subscribers_count": 8
|
||||||
|
|
|
@ -14,8 +14,8 @@
|
||||||
"description": "Fork of the send module to deal with CVE-2017-20165",
|
"description": "Fork of the send module to deal with CVE-2017-20165",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-01-11T10:20:27Z",
|
"created_at": "2023-01-11T10:20:27Z",
|
||||||
"updated_at": "2024-12-08T16:16:44Z",
|
"updated_at": "2024-12-15T16:51:00Z",
|
||||||
"pushed_at": "2024-12-08T16:16:43Z",
|
"pushed_at": "2024-12-15T16:50:59Z",
|
||||||
"stargazers_count": 13,
|
"stargazers_count": 13,
|
||||||
"watchers_count": 13,
|
"watchers_count": 13,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -92,10 +92,10 @@
|
||||||
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
|
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-08-21T00:09:56Z",
|
"created_at": "2018-08-21T00:09:56Z",
|
||||||
"updated_at": "2024-12-10T19:31:33Z",
|
"updated_at": "2024-12-15T16:48:36Z",
|
||||||
"pushed_at": "2024-07-12T08:47:49Z",
|
"pushed_at": "2024-07-12T08:47:49Z",
|
||||||
"stargazers_count": 520,
|
"stargazers_count": 521,
|
||||||
"watchers_count": 520,
|
"watchers_count": 521,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 183,
|
"forks_count": 183,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -104,7 +104,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 183,
|
"forks": 183,
|
||||||
"watchers": 520,
|
"watchers": 521,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 21
|
"subscribers_count": 21
|
||||||
},
|
},
|
||||||
|
|
|
@ -92,7 +92,7 @@
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"id": 121002284,
|
"id": 121002284,
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-09-03T15:08:49Z",
|
"created_at": "2019-09-03T15:08:49Z",
|
||||||
"updated_at": "2024-12-10T06:49:39Z",
|
"updated_at": "2024-12-15T12:35:15Z",
|
||||||
"pushed_at": "2019-09-08T06:09:11Z",
|
"pushed_at": "2019-09-08T06:09:11Z",
|
||||||
"stargazers_count": 799,
|
"stargazers_count": 800,
|
||||||
"watchers_count": 799,
|
"watchers_count": 800,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 69,
|
"forks_count": 69,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -32,7 +32,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 69,
|
"forks": 69,
|
||||||
"watchers": 799,
|
"watchers": 800,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 34
|
"subscribers_count": 34
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "USB device fuzzing on Android Phone",
|
"description": "USB device fuzzing on Android Phone",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-05T05:45:29Z",
|
"created_at": "2020-04-05T05:45:29Z",
|
||||||
"updated_at": "2024-12-12T14:13:19Z",
|
"updated_at": "2024-12-15T14:44:37Z",
|
||||||
"pushed_at": "2021-10-16T15:23:41Z",
|
"pushed_at": "2021-10-16T15:23:41Z",
|
||||||
"stargazers_count": 30,
|
"stargazers_count": 31,
|
||||||
"watchers_count": 30,
|
"watchers_count": 31,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 6,
|
"forks_count": 6,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 6,
|
"forks": 6,
|
||||||
"watchers": 30,
|
"watchers": 31,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
}
|
}
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2024-12-14T21:15:38Z",
|
"updated_at": "2024-12-15T14:24:45Z",
|
||||||
"pushed_at": "2021-04-04T09:13:57Z",
|
"pushed_at": "2021-04-04T09:13:57Z",
|
||||||
"stargazers_count": 4142,
|
"stargazers_count": 4143,
|
||||||
"watchers_count": 4142,
|
"watchers_count": 4143,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1100,
|
"forks_count": 1100,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -77,7 +77,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1100,
|
"forks": 1100,
|
||||||
"watchers": 4142,
|
"watchers": 4143,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 149
|
"subscribers_count": 149
|
||||||
},
|
},
|
||||||
|
|
|
@ -50,13 +50,13 @@
|
||||||
"stargazers_count": 642,
|
"stargazers_count": 642,
|
||||||
"watchers_count": 642,
|
"watchers_count": 642,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 163,
|
"forks_count": 164,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 163,
|
"forks": 164,
|
||||||
"watchers": 642,
|
"watchers": 642,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 13
|
"subscribers_count": 13
|
||||||
|
|
|
@ -275,10 +275,10 @@
|
||||||
"description": "CVE-2020-11651&&CVE-2020-11652 EXP",
|
"description": "CVE-2020-11651&&CVE-2020-11652 EXP",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-05-07T09:17:39Z",
|
"created_at": "2020-05-07T09:17:39Z",
|
||||||
"updated_at": "2024-10-07T03:30:01Z",
|
"updated_at": "2024-12-15T15:30:53Z",
|
||||||
"pushed_at": "2023-03-21T10:02:22Z",
|
"pushed_at": "2023-03-21T10:02:22Z",
|
||||||
"stargazers_count": 23,
|
"stargazers_count": 24,
|
||||||
"watchers_count": 23,
|
"watchers_count": 24,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 15,
|
"forks_count": 15,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -287,7 +287,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 15,
|
"forks": 15,
|
||||||
"watchers": 23,
|
"watchers": 24,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2024-12-14T21:15:38Z",
|
"updated_at": "2024-12-15T14:24:45Z",
|
||||||
"pushed_at": "2021-04-04T09:13:57Z",
|
"pushed_at": "2021-04-04T09:13:57Z",
|
||||||
"stargazers_count": 4142,
|
"stargazers_count": 4143,
|
||||||
"watchers_count": 4142,
|
"watchers_count": 4143,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1100,
|
"forks_count": 1100,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -46,7 +46,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1100,
|
"forks": 1100,
|
||||||
"watchers": 4142,
|
"watchers": 4143,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 149
|
"subscribers_count": 149
|
||||||
},
|
},
|
||||||
|
|
|
@ -386,10 +386,10 @@
|
||||||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-22T16:16:20Z",
|
"created_at": "2020-02-22T16:16:20Z",
|
||||||
"updated_at": "2024-12-13T20:29:20Z",
|
"updated_at": "2024-12-15T13:01:38Z",
|
||||||
"pushed_at": "2020-03-09T14:51:43Z",
|
"pushed_at": "2020-03-09T14:51:43Z",
|
||||||
"stargazers_count": 368,
|
"stargazers_count": 369,
|
||||||
"watchers_count": 368,
|
"watchers_count": 369,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 111,
|
"forks_count": 111,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -404,7 +404,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 111,
|
"forks": 111,
|
||||||
"watchers": 368,
|
"watchers": 369,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 5
|
"subscribers_count": 5
|
||||||
},
|
},
|
||||||
|
|
|
@ -1271,10 +1271,10 @@
|
||||||
"description": "Automated Exploit Tool for Grafana CVE-2021-43798: Scanning common files that contain juicy informations and extracting SSH keys from compromised users.",
|
"description": "Automated Exploit Tool for Grafana CVE-2021-43798: Scanning common files that contain juicy informations and extracting SSH keys from compromised users.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-14T14:06:59Z",
|
"created_at": "2024-12-14T14:06:59Z",
|
||||||
"updated_at": "2024-12-14T17:30:16Z",
|
"updated_at": "2024-12-15T14:00:48Z",
|
||||||
"pushed_at": "2024-12-14T17:30:12Z",
|
"pushed_at": "2024-12-14T17:30:12Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 0,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -1283,7 +1283,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 0,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-05-31T07:44:01Z",
|
"created_at": "2022-05-31T07:44:01Z",
|
||||||
"updated_at": "2024-12-13T06:37:28Z",
|
"updated_at": "2024-12-15T14:16:32Z",
|
||||||
"pushed_at": "2023-02-26T14:06:05Z",
|
"pushed_at": "2023-02-26T14:06:05Z",
|
||||||
"stargazers_count": 1171,
|
"stargazers_count": 1172,
|
||||||
"watchers_count": 1171,
|
"watchers_count": 1172,
|
||||||
"has_discussions": true,
|
"has_discussions": true,
|
||||||
"forks_count": 190,
|
"forks_count": 190,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -46,7 +46,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 190,
|
"forks": 190,
|
||||||
"watchers": 1171,
|
"watchers": 1172,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 19
|
"subscribers_count": 19
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-05T20:32:45Z",
|
"created_at": "2024-10-05T20:32:45Z",
|
||||||
"updated_at": "2024-12-15T12:18:17Z",
|
"updated_at": "2024-12-15T13:55:19Z",
|
||||||
"pushed_at": "2024-10-05T20:37:02Z",
|
"pushed_at": "2024-10-05T20:37:02Z",
|
||||||
"stargazers_count": 25,
|
"stargazers_count": 26,
|
||||||
"watchers_count": 25,
|
"watchers_count": 26,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 6,
|
"forks_count": 6,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -37,7 +37,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 6,
|
"forks": 6,
|
||||||
"watchers": 25,
|
"watchers": 26,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,19 +14,19 @@
|
||||||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-01-16T06:52:02Z",
|
"created_at": "2024-01-16T06:52:02Z",
|
||||||
"updated_at": "2024-12-15T03:37:39Z",
|
"updated_at": "2024-12-15T18:10:45Z",
|
||||||
"pushed_at": "2024-08-18T08:26:46Z",
|
"pushed_at": "2024-08-18T08:26:46Z",
|
||||||
"stargazers_count": 1291,
|
"stargazers_count": 1293,
|
||||||
"watchers_count": 1291,
|
"watchers_count": 1293,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 220,
|
"forks_count": 221,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 220,
|
"forks": 221,
|
||||||
"watchers": 1291,
|
"watchers": 1293,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 21
|
"subscribers_count": 21
|
||||||
},
|
},
|
||||||
|
|
|
@ -146,8 +146,8 @@
|
||||||
"description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.",
|
"description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-11-16T16:32:05Z",
|
"created_at": "2024-11-16T16:32:05Z",
|
||||||
"updated_at": "2024-12-15T12:30:32Z",
|
"updated_at": "2024-12-15T15:57:26Z",
|
||||||
"pushed_at": "2024-12-15T12:30:28Z",
|
"pushed_at": "2024-12-15T15:57:22Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -19,13 +19,13 @@
|
||||||
"stargazers_count": 16,
|
"stargazers_count": 16,
|
||||||
"watchers_count": 16,
|
"watchers_count": 16,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 7,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 8,
|
||||||
"watchers": 16,
|
"watchers": 16,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
|
|
@ -355,10 +355,10 @@
|
||||||
"description": "CVE-2024-38077: Remote Code Execution Vulnerability in Windows Remote Desktop Licensing Service",
|
"description": "CVE-2024-38077: Remote Code Execution Vulnerability in Windows Remote Desktop Licensing Service",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-09T06:39:21Z",
|
"created_at": "2024-10-09T06:39:21Z",
|
||||||
"updated_at": "2024-11-21T09:33:12Z",
|
"updated_at": "2024-12-15T14:51:21Z",
|
||||||
"pushed_at": "2024-10-09T06:42:25Z",
|
"pushed_at": "2024-10-09T06:42:25Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 7,
|
||||||
"watchers_count": 6,
|
"watchers_count": 7,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -378,7 +378,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 6,
|
"watchers": 7,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-03T08:56:59Z",
|
"created_at": "2024-12-03T08:56:59Z",
|
||||||
"updated_at": "2024-12-13T15:07:54Z",
|
"updated_at": "2024-12-15T14:33:25Z",
|
||||||
"pushed_at": "2024-11-18T23:48:31Z",
|
"pushed_at": "2024-11-18T23:48:31Z",
|
||||||
"stargazers_count": 37,
|
"stargazers_count": 38,
|
||||||
"watchers_count": 37,
|
"watchers_count": 38,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 24,
|
"forks_count": 24,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 24,
|
"forks": 24,
|
||||||
"watchers": 37,
|
"watchers": 38,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-05T20:32:45Z",
|
"created_at": "2024-10-05T20:32:45Z",
|
||||||
"updated_at": "2024-12-15T12:18:17Z",
|
"updated_at": "2024-12-15T13:55:19Z",
|
||||||
"pushed_at": "2024-10-05T20:37:02Z",
|
"pushed_at": "2024-10-05T20:37:02Z",
|
||||||
"stargazers_count": 25,
|
"stargazers_count": 26,
|
||||||
"watchers_count": 25,
|
"watchers_count": 26,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 6,
|
"forks_count": 6,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -68,7 +68,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 6,
|
"forks": 6,
|
||||||
"watchers": 25,
|
"watchers": 26,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-14T09:22:33Z",
|
"created_at": "2024-12-14T09:22:33Z",
|
||||||
"updated_at": "2024-12-15T07:46:38Z",
|
"updated_at": "2024-12-15T16:33:04Z",
|
||||||
"pushed_at": "2024-12-14T10:13:45Z",
|
"pushed_at": "2024-12-14T10:13:45Z",
|
||||||
"stargazers_count": 4,
|
"stargazers_count": 9,
|
||||||
"watchers_count": 4,
|
"watchers_count": 9,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 2,
|
||||||
"watchers": 4,
|
"watchers": 9,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "s2-067(CVE-2024-53677)",
|
"description": "s2-067(CVE-2024-53677)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-12T08:30:14Z",
|
"created_at": "2024-12-12T08:30:14Z",
|
||||||
"updated_at": "2024-12-13T09:18:45Z",
|
"updated_at": "2024-12-15T14:21:42Z",
|
||||||
"pushed_at": "2024-12-12T08:33:19Z",
|
"pushed_at": "2024-12-12T08:33:19Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 2,
|
"watchers_count": 3,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 2,
|
||||||
"watchers": 2,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
@ -45,10 +45,10 @@
|
||||||
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-13T17:42:55Z",
|
"created_at": "2024-12-13T17:42:55Z",
|
||||||
"updated_at": "2024-12-15T11:08:19Z",
|
"updated_at": "2024-12-15T14:22:43Z",
|
||||||
"pushed_at": "2024-12-15T05:12:21Z",
|
"pushed_at": "2024-12-15T05:12:21Z",
|
||||||
"stargazers_count": 4,
|
"stargazers_count": 5,
|
||||||
"watchers_count": 4,
|
"watchers_count": 5,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -57,7 +57,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 4,
|
"watchers": 5,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-10T06:59:00Z",
|
"created_at": "2024-12-10T06:59:00Z",
|
||||||
"updated_at": "2024-12-11T13:28:38Z",
|
"updated_at": "2024-12-15T16:54:02Z",
|
||||||
"pushed_at": "2024-12-10T07:05:27Z",
|
"pushed_at": "2024-12-10T07:05:27Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 0,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 0,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue