mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/09/13 06:30:06
This commit is contained in:
parent
031c02ff2f
commit
57d5e2d8b3
42 changed files with 201 additions and 139 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
|
||||
"fork": false,
|
||||
"created_at": "2015-03-28T10:28:16Z",
|
||||
"updated_at": "2024-08-12T19:16:51Z",
|
||||
"updated_at": "2024-09-13T04:32:23Z",
|
||||
"pushed_at": "2019-01-30T21:36:22Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2016-1000027",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-01T19:46:51Z",
|
||||
"updated_at": "2024-07-30T08:47:51Z",
|
||||
"updated_at": "2024-09-13T03:50:46Z",
|
||||
"pushed_at": "2021-03-05T21:52:06Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -36,7 +36,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -403,10 +403,10 @@
|
|||
"description": "最新tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2024-09-12T02:43:30Z",
|
||||
"updated_at": "2024-09-13T00:36:57Z",
|
||||
"pushed_at": "2024-09-09T07:42:24Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -423,7 +423,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-01-11T10:20:27Z",
|
||||
"updated_at": "2024-08-01T05:44:39Z",
|
||||
"pushed_at": "2024-08-01T05:44:43Z",
|
||||
"pushed_at": "2024-09-13T05:41:46Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -80,10 +80,10 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2024-09-05T05:42:59Z",
|
||||
"updated_at": "2024-09-13T03:02:00Z",
|
||||
"pushed_at": "2021-01-08T10:31:22Z",
|
||||
"stargazers_count": 574,
|
||||
"watchers_count": 574,
|
||||
"stargazers_count": 575,
|
||||
"watchers_count": 575,
|
||||
"has_discussions": false,
|
||||
"forks_count": 174,
|
||||
"allow_forking": true,
|
||||
|
@ -102,7 +102,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 174,
|
||||
"watchers": 574,
|
||||
"watchers": 575,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -919,10 +919,10 @@
|
|||
"description": "最新tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2024-09-12T02:43:30Z",
|
||||
"updated_at": "2024-09-13T00:36:57Z",
|
||||
"pushed_at": "2024-09-09T07:42:24Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -939,7 +939,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-09-12T08:43:29Z",
|
||||
"updated_at": "2024-09-13T02:34:20Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1306,
|
||||
"watchers_count": 1306,
|
||||
"stargazers_count": 1307,
|
||||
"watchers_count": 1307,
|
||||
"has_discussions": false,
|
||||
"forks_count": 165,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 165,
|
||||
"watchers": 1306,
|
||||
"watchers": 1307,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -2211,5 +2211,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 856715099,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "acidburn2049\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "acidburn2049",
|
||||
"id": 181438567,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181438567?v=4",
|
||||
"html_url": "https:\/\/github.com\/acidburn2049"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/acidburn2049\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-13T04:20:36Z",
|
||||
"updated_at": "2024-09-13T04:20:37Z",
|
||||
"pushed_at": "2024-09-13T04:20:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 444140549,
|
||||
"name": "cve-2021-43858",
|
||||
"full_name": "0rx1\/cve-2021-43858",
|
||||
"owner": {
|
||||
"login": "0rx1",
|
||||
"id": 12779060,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12779060?v=4",
|
||||
"html_url": "https:\/\/github.com\/0rx1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0rx1\/cve-2021-43858",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-03T17:11:54Z",
|
||||
"updated_at": "2023-11-18T03:11:06Z",
|
||||
"pushed_at": "2022-01-03T14:15:40Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 626802613,
|
||||
"name": "CVE-2021-43858-MinIO",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache Log4j 远程代码执行",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-09T15:27:38Z",
|
||||
"updated_at": "2024-08-24T16:05:18Z",
|
||||
"updated_at": "2024-09-13T03:18:29Z",
|
||||
"pushed_at": "2023-05-14T04:54:32Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 70,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -2020,6 +2020,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2024-09-10T12:29:40Z",
|
||||
"updated_at": "2024-09-13T04:28:04Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 756,
|
||||
"watchers_count": 756,
|
||||
"stargazers_count": 757,
|
||||
"watchers_count": 757,
|
||||
"has_discussions": false,
|
||||
"forks_count": 157,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 157,
|
||||
"watchers": 756,
|
||||
"watchers": 757,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
}
|
||||
|
|
|
@ -1314,10 +1314,10 @@
|
|||
"description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947) 注入哥斯拉内存马",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-16T15:27:41Z",
|
||||
"updated_at": "2024-08-23T00:20:16Z",
|
||||
"updated_at": "2024-09-13T02:59:32Z",
|
||||
"pushed_at": "2022-05-16T15:33:37Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -1326,7 +1326,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -766,10 +766,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-09-12T08:43:29Z",
|
||||
"updated_at": "2024-09-13T02:34:20Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1306,
|
||||
"watchers_count": 1306,
|
||||
"stargazers_count": 1307,
|
||||
"watchers_count": 1307,
|
||||
"has_discussions": false,
|
||||
"forks_count": 165,
|
||||
"allow_forking": true,
|
||||
|
@ -785,7 +785,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 165,
|
||||
"watchers": 1306,
|
||||
"watchers": 1307,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "PoC Script for CVE-2022-36267: Exploits an unauthenticated remote command injection vulnerability in Airspan AirSpot 5410 antenna.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-08T22:23:57Z",
|
||||
"updated_at": "2024-02-03T23:46:44Z",
|
||||
"updated_at": "2024-09-13T01:20:33Z",
|
||||
"pushed_at": "2024-01-08T22:37:55Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"forks": 34,
|
||||
"watchers": 87,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -69,6 +69,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"forks": 36,
|
||||
"watchers": 147,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-16T23:41:27Z",
|
||||
"updated_at": "2024-09-02T09:37:59Z",
|
||||
"updated_at": "2024-09-13T02:33:35Z",
|
||||
"pushed_at": "2023-11-23T18:37:18Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 86,
|
||||
"watchers": 87,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -184,6 +184,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -10,10 +10,10 @@
|
|||
"html_url": "https:\/\/github.com\/vpxuser"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vpxuser\/CVE-2023-3710-POC",
|
||||
"description": null,
|
||||
"description": "Honeywell PM43工控打印机管理后台username参数RCE漏洞证明POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-03T01:14:02Z",
|
||||
"updated_at": "2024-08-12T09:51:53Z",
|
||||
"updated_at": "2024-09-13T00:33:35Z",
|
||||
"pushed_at": "2023-09-27T01:11:00Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
|
@ -10,10 +10,10 @@
|
|||
"html_url": "https:\/\/github.com\/vpxuser"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vpxuser\/CVE-2023-3711-POC",
|
||||
"description": null,
|
||||
"description": "Honeywell PM43工控打印机管理后台XSS漏洞证明POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-03T02:10:42Z",
|
||||
"updated_at": "2023-10-13T05:59:27Z",
|
||||
"updated_at": "2024-09-13T00:32:54Z",
|
||||
"pushed_at": "2023-09-27T01:09:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -10,10 +10,10 @@
|
|||
"html_url": "https:\/\/github.com\/vpxuser"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vpxuser\/CVE-2023-3712-POC",
|
||||
"description": null,
|
||||
"description": "Honeywell PM43工控打印机管理后台userpassword参数RCE漏洞证明POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-03T01:51:11Z",
|
||||
"updated_at": "2024-01-26T19:00:11Z",
|
||||
"updated_at": "2024-09-13T00:33:59Z",
|
||||
"pushed_at": "2023-09-27T01:11:18Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -141,10 +141,10 @@
|
|||
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-13T23:55:32Z",
|
||||
"updated_at": "2024-09-10T07:45:49Z",
|
||||
"updated_at": "2024-09-13T01:52:08Z",
|
||||
"pushed_at": "2023-10-30T20:22:37Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -153,7 +153,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -645,8 +645,8 @@
|
|||
"description": "ActiveMQ RCE (CVE-2023-46604) 回显利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-05T07:09:21Z",
|
||||
"updated_at": "2024-08-13T15:41:00Z",
|
||||
"pushed_at": "2024-03-05T09:16:50Z",
|
||||
"updated_at": "2024-09-13T05:35:28Z",
|
||||
"pushed_at": "2024-09-13T05:35:25Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -223,10 +223,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-12-18T23:12:25Z",
|
||||
"updated_at": "2024-08-27T22:26:30Z",
|
||||
"updated_at": "2024-09-13T04:48:20Z",
|
||||
"pushed_at": "2024-05-13T17:40:58Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -156,6 +156,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC and Detection for CVE-2024-21626",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-01T15:28:37Z",
|
||||
"updated_at": "2024-08-20T08:38:22Z",
|
||||
"updated_at": "2024-09-13T05:50:44Z",
|
||||
"pushed_at": "2024-02-06T16:09:05Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2024-09-11T15:30:00Z",
|
||||
"updated_at": "2024-09-13T05:11:52Z",
|
||||
"pushed_at": "2024-09-11T15:29:33Z",
|
||||
"stargazers_count": 364,
|
||||
"watchers_count": 364,
|
||||
"stargazers_count": 365,
|
||||
"watchers_count": 365,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 364,
|
||||
"watchers": 365,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-15T08:07:05Z",
|
||||
"updated_at": "2024-09-12T21:35:31Z",
|
||||
"updated_at": "2024-09-13T04:19:13Z",
|
||||
"pushed_at": "2024-09-08T21:23:34Z",
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"stargazers_count": 353,
|
||||
"watchers_count": 353,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 352,
|
||||
"watchers": 353,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Spring Cloud Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-11T14:09:50Z",
|
||||
"updated_at": "2024-09-11T14:15:01Z",
|
||||
"updated_at": "2024-09-13T03:21:50Z",
|
||||
"pushed_at": "2024-09-11T14:12:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,19 +43,19 @@
|
|||
"description": "RDL的堆溢出导致的RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-09T05:00:44Z",
|
||||
"updated_at": "2024-09-12T09:04:33Z",
|
||||
"updated_at": "2024-09-13T02:06:05Z",
|
||||
"pushed_at": "2024-08-14T04:43:05Z",
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"has_discussions": false,
|
||||
"forks_count": 82,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 194,
|
||||
"forks": 83,
|
||||
"watchers": 195,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -1527,7 +1527,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 856557928,
|
||||
|
@ -1557,6 +1557,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -268,5 +268,35 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 856665318,
|
||||
"name": "CVE-2024-4879",
|
||||
"full_name": "0xWhoami35\/CVE-2024-4879",
|
||||
"owner": {
|
||||
"login": "0xWhoami35",
|
||||
"id": 107396843,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107396843?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xWhoami35"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xWhoami35\/CVE-2024-4879",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-13T01:20:34Z",
|
||||
"updated_at": "2024-09-13T01:33:09Z",
|
||||
"pushed_at": "2024-09-13T01:33:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 845461331,
|
||||
"name": "CVE-2024-5932-PoC",
|
||||
"full_name": "0xb0mb3r\/CVE-2024-5932-PoC",
|
||||
"owner": {
|
||||
"login": "0xb0mb3r",
|
||||
"id": 177725137,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177725137?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xb0mb3r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xb0mb3r\/CVE-2024-5932-PoC",
|
||||
"description": "Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection ",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-21T09:51:21Z",
|
||||
"updated_at": "2024-09-13T01:58:46Z",
|
||||
"pushed_at": "2024-08-22T15:20:46Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 847287273,
|
||||
"name": "CVE-2024-5932",
|
||||
|
|
|
@ -1403,10 +1403,10 @@
|
|||
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T18:32:46Z",
|
||||
"updated_at": "2024-09-12T16:00:31Z",
|
||||
"updated_at": "2024-09-13T03:47:57Z",
|
||||
"pushed_at": "2024-07-05T15:19:28Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -1424,7 +1424,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 51,
|
||||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-08-30T07:58:27Z",
|
||||
"updated_at": "2024-09-12T11:00:00Z",
|
||||
"updated_at": "2024-09-13T05:13:04Z",
|
||||
"pushed_at": "2024-08-29T17:41:35Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -33,6 +33,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -973,6 +973,7 @@
|
|||
- [NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning](https://github.com/NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning)
|
||||
- [jdusane/CVE-2024-4879](https://github.com/jdusane/CVE-2024-4879)
|
||||
- [fa-rrel/CVE-2024-4879](https://github.com/fa-rrel/CVE-2024-4879)
|
||||
- [0xWhoami35/CVE-2024-4879](https://github.com/0xWhoami35/CVE-2024-4879)
|
||||
|
||||
### CVE-2024-4883 (2024-06-25)
|
||||
|
||||
|
@ -1118,6 +1119,7 @@
|
|||
<code>The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files.
|
||||
</code>
|
||||
|
||||
- [0xb0mb3r/CVE-2024-5932-PoC](https://github.com/0xb0mb3r/CVE-2024-5932-PoC)
|
||||
- [EQSTLab/CVE-2024-5932](https://github.com/EQSTLab/CVE-2024-5932)
|
||||
|
||||
### CVE-2024-5947 (2024-06-13)
|
||||
|
@ -20567,6 +20569,7 @@
|
|||
- [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156)
|
||||
- [lypd0/CVE-2021-3156-checker](https://github.com/lypd0/CVE-2021-3156-checker)
|
||||
- [Typical0day/CVE-2021-3156](https://github.com/Typical0day/CVE-2021-3156)
|
||||
- [acidburn2049/CVE-2021-3156](https://github.com/acidburn2049/CVE-2021-3156)
|
||||
|
||||
### CVE-2021-3157
|
||||
- [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)
|
||||
|
@ -25402,7 +25405,6 @@
|
|||
<code>MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.
|
||||
</code>
|
||||
|
||||
- [0rx1/cve-2021-43858](https://github.com/0rx1/cve-2021-43858)
|
||||
- [khuntor/CVE-2021-43858-MinIO](https://github.com/khuntor/CVE-2021-43858-MinIO)
|
||||
|
||||
### CVE-2021-43883 (2021-12-15)
|
||||
|
|
Loading…
Reference in a new issue