mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-03-25 00:18:48 +01:00
Auto Update 2025/01/29 18:33:18
This commit is contained in:
parent
7b6d54869c
commit
55247ad430
32 changed files with 209 additions and 141 deletions
2002
2007
2015
2016
2018
2020
2021
2023
CVE-2023-27532.jsonCVE-2023-33733.jsonCVE-2023-3519.jsonCVE-2023-40028.jsonCVE-2023-45866.jsonCVE-2023-46604.json
2024
CVE-2024-1086.jsonCVE-2024-2961.jsonCVE-2024-3094.jsonCVE-2024-38819.jsonCVE-2024-40725.jsonCVE-2024-46982.jsonCVE-2024-47176.jsonCVE-2024-49112.jsonCVE-2024-49138.jsonCVE-2024-53615.jsonCVE-2024-55591.jsonCVE-2024-7595.json
2025
README.md
|
@ -14,10 +14,10 @@
|
|||
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T09:51:12Z",
|
||||
"updated_at": "2025-01-27T07:59:56Z",
|
||||
"updated_at": "2025-01-29T13:42:42Z",
|
||||
"pushed_at": "2024-05-03T22:24:07Z",
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -47,7 +47,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 187,
|
||||
"watchers": 188,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
}
|
||||
|
|
|
@ -28,7 +28,7 @@
|
|||
"forks": 14,
|
||||
"watchers": 84,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
"subscribers_count": 8
|
||||
},
|
||||
{
|
||||
"id": 555215011,
|
||||
|
|
|
@ -88,10 +88,10 @@
|
|||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-01-29T10:53:14Z",
|
||||
"updated_at": "2025-01-29T12:46:32Z",
|
||||
"pushed_at": "2025-01-28T13:28:46Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -100,7 +100,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-01-29T10:53:14Z",
|
||||
"updated_at": "2025-01-29T12:46:32Z",
|
||||
"pushed_at": "2025-01-28T13:28:46Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -324,10 +324,10 @@
|
|||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-01-29T10:53:14Z",
|
||||
"updated_at": "2025-01-29T12:46:32Z",
|
||||
"pushed_at": "2025-01-28T13:28:46Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -336,7 +336,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -111,10 +111,10 @@
|
|||
"description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-07T08:30:07Z",
|
||||
"updated_at": "2024-08-12T19:39:09Z",
|
||||
"updated_at": "2025-01-29T16:50:39Z",
|
||||
"pushed_at": "2018-08-08T05:48:24Z",
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"has_discussions": false,
|
||||
"forks_count": 125,
|
||||
"allow_forking": true,
|
||||
|
@ -123,7 +123,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 125,
|
||||
"watchers": 293,
|
||||
"watchers": 294,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -61,8 +61,8 @@
|
|||
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-23T20:21:00Z",
|
||||
"updated_at": "2025-01-29T11:59:27Z",
|
||||
"pushed_at": "2025-01-29T11:59:24Z",
|
||||
"updated_at": "2025-01-29T18:11:51Z",
|
||||
"pushed_at": "2025-01-29T18:11:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-01-29T10:53:14Z",
|
||||
"updated_at": "2025-01-29T12:46:32Z",
|
||||
"pushed_at": "2025-01-28T13:28:46Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-13T14:40:34Z",
|
||||
"updated_at": "2023-11-15T21:37:34Z",
|
||||
"updated_at": "2025-01-29T15:47:25Z",
|
||||
"pushed_at": "2020-07-13T14:47:02Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -491,13 +491,13 @@
|
|||
"stargazers_count": 963,
|
||||
"watchers_count": 963,
|
||||
"has_discussions": false,
|
||||
"forks_count": 237,
|
||||
"forks_count": 236,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 237,
|
||||
"forks": 236,
|
||||
"watchers": 963,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"forks": 22,
|
||||
"watchers": 105,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2023-33733 reportlab RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-30T22:22:50Z",
|
||||
"updated_at": "2024-11-12T05:29:20Z",
|
||||
"updated_at": "2025-01-29T14:15:39Z",
|
||||
"pushed_at": "2023-09-05T15:49:14Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 113,
|
||||
"watchers": 114,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -54,7 +54,7 @@
|
|||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -65,7 +65,7 @@
|
|||
"vulnerability-scanners"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 14,
|
||||
"watchers": 82,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-23T15:25:49Z",
|
||||
"updated_at": "2024-12-28T21:20:25Z",
|
||||
"updated_at": "2025-01-29T17:52:08Z",
|
||||
"pushed_at": "2024-03-23T18:59:30Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2025-01-29T11:27:26Z",
|
||||
"updated_at": "2025-01-29T13:46:26Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1399,
|
||||
"watchers_count": 1399,
|
||||
"stargazers_count": 1400,
|
||||
"watchers_count": 1400,
|
||||
"has_discussions": false,
|
||||
"forks_count": 244,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 244,
|
||||
"watchers": 1399,
|
||||
"watchers": 1400,
|
||||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-27T05:57:21Z",
|
||||
"updated_at": "2025-01-20T11:02:55Z",
|
||||
"updated_at": "2025-01-29T13:18:10Z",
|
||||
"pushed_at": "2024-01-29T02:28:11Z",
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 237,
|
||||
"watchers": 238,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2025-01-26T19:37:35Z",
|
||||
"updated_at": "2025-01-29T18:03:43Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2330,
|
||||
"watchers_count": 2330,
|
||||
"stargazers_count": 2331,
|
||||
"watchers_count": 2331,
|
||||
"has_discussions": false,
|
||||
"forks_count": 303,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 303,
|
||||
"watchers": 2330,
|
||||
"watchers": 2331,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -256,5 +256,36 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 924126046,
|
||||
"name": "CVE-2024-2961",
|
||||
"full_name": "4wayhandshake\/CVE-2024-2961",
|
||||
"owner": {
|
||||
"login": "4wayhandshake",
|
||||
"id": 122475838,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122475838?v=4",
|
||||
"html_url": "https:\/\/github.com\/4wayhandshake",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/4wayhandshake\/CVE-2024-2961",
|
||||
"description": "Uses CVE-2024-2961 to perform an arbitrary file read",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-29T13:15:11Z",
|
||||
"updated_at": "2025-01-29T14:13:44Z",
|
||||
"pushed_at": "2025-01-29T14:13:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -400,10 +400,10 @@
|
|||
"description": "Shell scripts to identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6) or upgrading to latest version. Added Ansible Playbook",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-30T19:23:30Z",
|
||||
"updated_at": "2025-01-19T05:21:56Z",
|
||||
"updated_at": "2025-01-29T17:29:59Z",
|
||||
"pushed_at": "2024-04-07T07:40:48Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -428,7 +428,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 70,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -45,8 +45,8 @@
|
|||
"description": "POC CVE-2024-46982",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-23T03:38:22Z",
|
||||
"updated_at": "2025-01-23T04:06:26Z",
|
||||
"pushed_at": "2025-01-23T04:06:23Z",
|
||||
"updated_at": "2025-01-29T15:17:42Z",
|
||||
"pushed_at": "2025-01-29T15:17:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -237,10 +237,10 @@
|
|||
"description": "Unauthenticated RCE on cups-browsed (exploit and nuclei template)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-03T15:53:04Z",
|
||||
"updated_at": "2025-01-22T08:02:25Z",
|
||||
"updated_at": "2025-01-29T18:18:24Z",
|
||||
"pushed_at": "2024-10-03T17:11:17Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -257,7 +257,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-08T01:56:41Z",
|
||||
"updated_at": "2025-01-28T17:29:03Z",
|
||||
"updated_at": "2025-01-29T14:36:52Z",
|
||||
"pushed_at": "2025-01-14T21:22:05Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "POC exploit for CVE-2024-49138",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-15T00:43:37Z",
|
||||
"updated_at": "2025-01-27T12:30:58Z",
|
||||
"updated_at": "2025-01-29T17:27:07Z",
|
||||
"pushed_at": "2025-01-23T14:59:40Z",
|
||||
"stargazers_count": 218,
|
||||
"watchers_count": 218,
|
||||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 218,
|
||||
"watchers": 221,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
33
2024/CVE-2024-53615.json
Normal file
33
2024/CVE-2024-53615.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 883310235,
|
||||
"name": "CVE-2024-53615",
|
||||
"full_name": "beune\/CVE-2024-53615",
|
||||
"owner": {
|
||||
"login": "beune",
|
||||
"id": 47817451,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47817451?v=4",
|
||||
"html_url": "https:\/\/github.com\/beune",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/beune\/CVE-2024-53615",
|
||||
"description": "CVE-2024-53615",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-04T18:34:58Z",
|
||||
"updated_at": "2025-01-29T13:08:30Z",
|
||||
"pushed_at": "2024-12-18T09:21:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -138,8 +138,8 @@
|
|||
"description": "An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy may allow a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-24T20:29:56Z",
|
||||
"updated_at": "2025-01-28T12:51:41Z",
|
||||
"pushed_at": "2025-01-28T12:21:43Z",
|
||||
"updated_at": "2025-01-29T14:35:55Z",
|
||||
"pushed_at": "2025-01-29T14:35:52Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
@ -200,20 +200,59 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T06:25:53Z",
|
||||
"updated_at": "2025-01-29T09:43:13Z",
|
||||
"updated_at": "2025-01-29T17:24:27Z",
|
||||
"pushed_at": "2025-01-27T19:11:46Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 26,
|
||||
"forks": 7,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 924176696,
|
||||
"name": "CVE-2024-55591-POC",
|
||||
"full_name": "exfil0\/CVE-2024-55591-POC",
|
||||
"owner": {
|
||||
"login": "exfil0",
|
||||
"id": 84948741,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84948741?v=4",
|
||||
"html_url": "https:\/\/github.com\/exfil0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/exfil0\/CVE-2024-55591-POC",
|
||||
"description": "A comprehensive all-in-one Python-based Proof of Concept script to discover and exploit a critical authentication bypass vulnerability (CVE-2024-55591) in certain Fortinet devices.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-29T14:54:40Z",
|
||||
"updated_at": "2025-01-29T16:32:09Z",
|
||||
"pushed_at": "2025-01-29T16:32:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"attack-surface",
|
||||
"automated",
|
||||
"cve-2024-55591",
|
||||
"firewall",
|
||||
"fortinet",
|
||||
"poc",
|
||||
"wizard"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -61,8 +61,8 @@
|
|||
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-23T20:21:00Z",
|
||||
"updated_at": "2025-01-29T12:20:28Z",
|
||||
"pushed_at": "2025-01-29T12:20:25Z",
|
||||
"updated_at": "2025-01-29T18:11:51Z",
|
||||
"pushed_at": "2025-01-29T18:11:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,12 +14,12 @@
|
|||
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-22T14:40:34Z",
|
||||
"updated_at": "2025-01-29T12:19:01Z",
|
||||
"updated_at": "2025-01-29T16:53:44Z",
|
||||
"pushed_at": "2025-01-22T15:08:56Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -32,8 +32,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 78,
|
||||
"forks": 19,
|
||||
"watchers": 80,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -52,8 +52,8 @@
|
|||
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-25T18:07:12Z",
|
||||
"updated_at": "2025-01-29T12:21:15Z",
|
||||
"pushed_at": "2025-01-29T12:21:11Z",
|
||||
"updated_at": "2025-01-29T18:12:37Z",
|
||||
"pushed_at": "2025-01-29T18:12:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof of concept & details for CVE-2025-21298",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-20T18:16:51Z",
|
||||
"updated_at": "2025-01-29T03:30:15Z",
|
||||
"updated_at": "2025-01-29T17:12:05Z",
|
||||
"pushed_at": "2025-01-20T18:22:01Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 60,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -1,33 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 923546795,
|
||||
"name": "CVE-2025-24085",
|
||||
"full_name": "clidanc\/CVE-2025-24085",
|
||||
"owner": {
|
||||
"login": "clidanc",
|
||||
"id": 196788491,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/196788491?v=4",
|
||||
"html_url": "https:\/\/github.com\/clidanc",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/clidanc\/CVE-2025-24085",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-28T12:53:54Z",
|
||||
"updated_at": "2025-01-28T14:04:01Z",
|
||||
"pushed_at": "2025-01-28T14:03:49Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
12
README.md
12
README.md
|
@ -86,13 +86,6 @@
|
|||
|
||||
- [CRUNZEX/CVE-2025-22968](https://github.com/CRUNZEX/CVE-2025-22968)
|
||||
|
||||
### CVE-2025-24085 (2025-01-27)
|
||||
|
||||
<code>A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.
|
||||
</code>
|
||||
|
||||
- [clidanc/CVE-2025-24085](https://github.com/clidanc/CVE-2025-24085)
|
||||
|
||||
|
||||
## 2024
|
||||
### CVE-2024-0012 (2024-11-18)
|
||||
|
@ -723,6 +716,7 @@
|
|||
- [tnishiox/cve-2024-2961](https://github.com/tnishiox/cve-2024-2961)
|
||||
- [kjdfklha/CVE-2024-2961_poc](https://github.com/kjdfklha/CVE-2024-2961_poc)
|
||||
- [kyotozx/CVE-2024-2961-Remote-File-Read](https://github.com/kyotozx/CVE-2024-2961-Remote-File-Read)
|
||||
- [4wayhandshake/CVE-2024-2961](https://github.com/4wayhandshake/CVE-2024-2961)
|
||||
|
||||
### CVE-2024-2997 (2024-03-27)
|
||||
|
||||
|
@ -8296,6 +8290,9 @@
|
|||
|
||||
- [Safecloudth/CVE-2024-53522](https://github.com/Safecloudth/CVE-2024-53522)
|
||||
|
||||
### CVE-2024-53615
|
||||
- [beune/CVE-2024-53615](https://github.com/beune/CVE-2024-53615)
|
||||
|
||||
### CVE-2024-53617 (2024-12-02)
|
||||
|
||||
<code>A Cross Site Scripting vulnerability in LibrePhotos before commit 32237 allows attackers to takeover any account via uploading an HTML file on behalf of the admin user using IDOR in file upload.
|
||||
|
@ -8535,6 +8532,7 @@
|
|||
- [virus-or-not/CVE-2024-55591](https://github.com/virus-or-not/CVE-2024-55591)
|
||||
- [robomusk52/exp-cmd-add-admin-vpn-CVE-2024-55591](https://github.com/robomusk52/exp-cmd-add-admin-vpn-CVE-2024-55591)
|
||||
- [watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591](https://github.com/watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591)
|
||||
- [exfil0/CVE-2024-55591-POC](https://github.com/exfil0/CVE-2024-55591-POC)
|
||||
|
||||
### CVE-2024-55875 (2024-12-12)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue