mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/08/24 06:29:21
This commit is contained in:
parent
458b496bcd
commit
5a72a8c837
36 changed files with 211 additions and 114 deletions
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-08-23T21:05:34Z",
|
||||
"updated_at": "2024-08-24T05:54:38Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1970,
|
||||
"watchers_count": 1970,
|
||||
"stargazers_count": 1971,
|
||||
"watchers_count": 1971,
|
||||
"has_discussions": true,
|
||||
"forks_count": 336,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 336,
|
||||
"watchers": 1970,
|
||||
"watchers": 1971,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-08-23T21:05:34Z",
|
||||
"updated_at": "2024-08-24T05:54:38Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1970,
|
||||
"watchers_count": 1970,
|
||||
"stargazers_count": 1971,
|
||||
"watchers_count": 1971,
|
||||
"has_discussions": true,
|
||||
"forks_count": 336,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 336,
|
||||
"watchers": 1970,
|
||||
"watchers": 1971,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Contrail: hard coded credentials (CVE-2017-10616) and XML External Entity (XXE) vulnerability (CVE-2017-10617)",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-11T07:38:18Z",
|
||||
"updated_at": "2024-08-12T19:33:11Z",
|
||||
"updated_at": "2024-08-24T02:02:45Z",
|
||||
"pushed_at": "2019-02-22T06:03:24Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-08-23T21:05:34Z",
|
||||
"updated_at": "2024-08-24T05:54:38Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1970,
|
||||
"watchers_count": 1970,
|
||||
"stargazers_count": 1971,
|
||||
"watchers_count": 1971,
|
||||
"has_discussions": true,
|
||||
"forks_count": 336,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 336,
|
||||
"watchers": 1970,
|
||||
"watchers": 1971,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -557,10 +557,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-08-23T21:05:34Z",
|
||||
"updated_at": "2024-08-24T05:54:38Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1970,
|
||||
"watchers_count": 1970,
|
||||
"stargazers_count": 1971,
|
||||
"watchers_count": 1971,
|
||||
"has_discussions": true,
|
||||
"forks_count": 336,
|
||||
"allow_forking": true,
|
||||
|
@ -590,7 +590,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 336,
|
||||
"watchers": 1970,
|
||||
"watchers": 1971,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Apache Solr远程代码执行漏洞(CVE-2019-0193) Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-12T07:17:21Z",
|
||||
"updated_at": "2024-08-12T19:51:54Z",
|
||||
"updated_at": "2024-08-24T03:19:49Z",
|
||||
"pushed_at": "2020-07-08T06:51:47Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T14:25:39Z",
|
||||
"updated_at": "2024-08-23T04:21:42Z",
|
||||
"updated_at": "2024-08-24T04:48:07Z",
|
||||
"pushed_at": "2019-11-21T15:03:15Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -193,10 +193,10 @@
|
|||
"description": "Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-25T20:09:54Z",
|
||||
"updated_at": "2024-08-12T20:11:33Z",
|
||||
"updated_at": "2024-08-24T04:48:14Z",
|
||||
"pushed_at": "2021-09-04T00:45:00Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -209,7 +209,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Este repositorio contiene el código y las instrucciones para replicar el exploit CVE-2019-19470 descubierto por CODEWHITE. Aquí se encuentran el código fuente de los ejemplos que utilicé en el meetup de HackTheBox para explicar mi proceso de aprendizaje y creación de este exploit. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-23T22:40:58Z",
|
||||
"updated_at": "2024-08-24T00:06:21Z",
|
||||
"pushed_at": "2024-08-24T00:06:18Z",
|
||||
"updated_at": "2024-08-24T00:49:16Z",
|
||||
"pushed_at": "2024-08-24T00:49:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-08-23T21:05:34Z",
|
||||
"updated_at": "2024-08-24T05:54:38Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1970,
|
||||
"watchers_count": 1970,
|
||||
"stargazers_count": 1971,
|
||||
"watchers_count": 1971,
|
||||
"has_discussions": true,
|
||||
"forks_count": 336,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 336,
|
||||
"watchers": 1970,
|
||||
"watchers": 1971,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
}
|
||||
|
|
|
@ -303,10 +303,10 @@
|
|||
"description": "CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-03T10:49:35Z",
|
||||
"updated_at": "2024-08-12T20:07:20Z",
|
||||
"updated_at": "2024-08-24T05:52:05Z",
|
||||
"pushed_at": "2022-03-29T02:08:45Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -315,7 +315,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-08-23T21:05:34Z",
|
||||
"updated_at": "2024-08-24T05:54:38Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1970,
|
||||
"watchers_count": 1970,
|
||||
"stargazers_count": 1971,
|
||||
"watchers_count": 1971,
|
||||
"has_discussions": true,
|
||||
"forks_count": 336,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 336,
|
||||
"watchers": 1970,
|
||||
"watchers": 1971,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
"wordpress-plugin"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 14,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -283,10 +283,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-18T08:18:50Z",
|
||||
"updated_at": "2024-08-12T20:18:59Z",
|
||||
"updated_at": "2024-08-24T02:01:59Z",
|
||||
"pushed_at": "2021-12-22T10:32:37Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
|
@ -295,7 +295,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 184,
|
||||
"watchers": 185,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -347,10 +347,10 @@
|
|||
"description": "Laravel RCE (CVE-2021-3129)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-16T17:22:55Z",
|
||||
"updated_at": "2024-08-20T13:43:27Z",
|
||||
"updated_at": "2024-08-24T01:56:25Z",
|
||||
"pushed_at": "2024-08-10T20:28:48Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -368,7 +368,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -5468,7 +5468,7 @@
|
|||
"stargazers_count": 381,
|
||||
"watchers_count": 381,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -5480,7 +5480,7 @@
|
|||
"vulnerability-scanners"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"forks": 52,
|
||||
"watchers": 381,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "it's a CVE-2023-28229 ( patched ), but feel free to use it for check any outdated software or reseach",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-27T20:57:46Z",
|
||||
"updated_at": "2024-07-29T10:07:11Z",
|
||||
"updated_at": "2024-08-24T04:34:13Z",
|
||||
"pushed_at": "2024-07-08T16:04:59Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-24T22:24:34Z",
|
||||
"updated_at": "2024-08-12T20:32:35Z",
|
||||
"updated_at": "2024-08-24T03:06:18Z",
|
||||
"pushed_at": "2023-08-25T00:30:01Z",
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 192,
|
||||
"watchers": 193,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-07T15:08:30Z",
|
||||
"updated_at": "2024-08-08T16:05:32Z",
|
||||
"updated_at": "2024-08-24T04:42:27Z",
|
||||
"pushed_at": "2024-07-27T00:19:17Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -365,5 +365,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 846844178,
|
||||
"name": "CVE-2023-4220",
|
||||
"full_name": "VanishedPeople\/CVE-2023-4220",
|
||||
"owner": {
|
||||
"login": "VanishedPeople",
|
||||
"id": 155242438,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155242438?v=4",
|
||||
"html_url": "https:\/\/github.com\/VanishedPeople"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/VanishedPeople\/CVE-2023-4220",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T05:32:31Z",
|
||||
"updated_at": "2024-08-24T05:32:34Z",
|
||||
"pushed_at": "2024-08-24T05:32:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "[漏洞复现] 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-17T10:32:31Z",
|
||||
"updated_at": "2024-08-22T15:45:10Z",
|
||||
"updated_at": "2024-08-24T04:06:46Z",
|
||||
"pushed_at": "2023-11-21T10:45:58Z",
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 193,
|
||||
"watchers": 194,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -253,8 +253,8 @@
|
|||
"description": "CVE-2024-0044",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-19T02:51:14Z",
|
||||
"updated_at": "2024-08-20T12:27:41Z",
|
||||
"pushed_at": "2024-08-19T04:40:40Z",
|
||||
"updated_at": "2024-08-24T06:33:01Z",
|
||||
"pushed_at": "2024-08-24T06:32:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-08-23T15:43:15Z",
|
||||
"updated_at": "2024-08-24T03:13:10Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2218,
|
||||
"watchers_count": 2218,
|
||||
"stargazers_count": 2219,
|
||||
"watchers_count": 2219,
|
||||
"has_discussions": false,
|
||||
"forks_count": 289,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 289,
|
||||
"watchers": 2218,
|
||||
"watchers": 2219,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024–21689 RCE Bamboo Data Center and Server Atlassian POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-23T15:32:50Z",
|
||||
"updated_at": "2024-08-23T15:35:04Z",
|
||||
"updated_at": "2024-08-24T06:22:43Z",
|
||||
"pushed_at": "2024-08-23T15:35:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,8 +25,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -36,6 +36,36 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 846839815,
|
||||
"name": "CVE-2024-28000",
|
||||
"full_name": "Alucard0x1\/CVE-2024-28000",
|
||||
"owner": {
|
||||
"login": "Alucard0x1",
|
||||
"id": 3710918,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3710918?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alucard0x1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alucard0x1\/CVE-2024-28000",
|
||||
"description": "LiteSpeed Cache Privilege Escalation PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T05:12:56Z",
|
||||
"updated_at": "2024-08-24T06:30:35Z",
|
||||
"pushed_at": "2024-08-24T06:26:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC for a full exploitation of NextJS SSRF (CVE-2024-34351) ",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-22T18:25:42Z",
|
||||
"updated_at": "2024-08-23T13:52:10Z",
|
||||
"updated_at": "2024-08-24T06:25:34Z",
|
||||
"pushed_at": "2024-08-23T13:52:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -210,6 +210,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -327,6 +327,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -57,6 +57,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -111,10 +111,10 @@
|
|||
"description": "CVE-2024-38856 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-22T04:05:02Z",
|
||||
"updated_at": "2024-08-23T04:55:11Z",
|
||||
"updated_at": "2024-08-24T05:48:21Z",
|
||||
"pushed_at": "2024-08-22T04:19:48Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -123,7 +123,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-40348. Will attempt to read \/etc\/passwd from target",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-21T00:54:55Z",
|
||||
"updated_at": "2024-08-23T04:46:53Z",
|
||||
"updated_at": "2024-08-24T01:06:50Z",
|
||||
"pushed_at": "2024-07-21T09:54:02Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2024/CVE-2024-42834.json
Normal file
32
2024/CVE-2024-42834.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 846804238,
|
||||
"name": "CVE-2024-42834",
|
||||
"full_name": "CyberSec-Supra\/CVE-2024-42834",
|
||||
"owner": {
|
||||
"login": "CyberSec-Supra",
|
||||
"id": 179279546,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179279546?v=4",
|
||||
"html_url": "https:\/\/github.com\/CyberSec-Supra"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CyberSec-Supra\/CVE-2024-42834",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T02:21:33Z",
|
||||
"updated_at": "2024-08-24T02:26:10Z",
|
||||
"pushed_at": "2024-08-24T02:26:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -29,6 +29,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Will attempt to retrieve DB details for FastAdmin instances",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-20T03:09:47Z",
|
||||
"updated_at": "2024-08-23T16:06:26Z",
|
||||
"updated_at": "2024-08-24T01:39:06Z",
|
||||
"pushed_at": "2024-08-20T03:21:56Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2024-7928: FastAdmin < V1.3.4.20220530 Arbitrary File Reading Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-23T15:50:30Z",
|
||||
"updated_at": "2024-08-23T17:00:02Z",
|
||||
"updated_at": "2024-08-24T06:29:01Z",
|
||||
"pushed_at": "2024-08-23T16:59:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -115,8 +115,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -2704,6 +2704,7 @@
|
|||
</code>
|
||||
|
||||
- [realbotnet/CVE-2024-28000](https://github.com/realbotnet/CVE-2024-28000)
|
||||
- [Alucard0x1/CVE-2024-28000](https://github.com/Alucard0x1/CVE-2024-28000)
|
||||
|
||||
### CVE-2024-28085 (2024-03-27)
|
||||
|
||||
|
@ -4334,6 +4335,9 @@
|
|||
|
||||
- [1s1ldur/CVE-2024-42758](https://github.com/1s1ldur/CVE-2024-42758)
|
||||
|
||||
### CVE-2024-42834
|
||||
- [CyberSec-Supra/CVE-2024-42834](https://github.com/CyberSec-Supra/CVE-2024-42834)
|
||||
|
||||
### CVE-2024-42845 (2024-08-23)
|
||||
|
||||
<code>An eval Injection vulnerability in the component invesalius/reader/dicom.py of InVesalius 3.1.99991 through 3.1.99998 allows attackers to execute arbitrary code via loading a crafted DICOM file.
|
||||
|
@ -5212,6 +5216,7 @@
|
|||
- [Al3xGD/CVE-2023-4220-Exploit](https://github.com/Al3xGD/CVE-2023-4220-Exploit)
|
||||
- [charchit-subedi/chamilo-lms-unauthenticated-rce-poc](https://github.com/charchit-subedi/chamilo-lms-unauthenticated-rce-poc)
|
||||
- [LGenAgul/CVE-2023-4220-Proof-of-concept](https://github.com/LGenAgul/CVE-2023-4220-Proof-of-concept)
|
||||
- [VanishedPeople/CVE-2023-4220](https://github.com/VanishedPeople/CVE-2023-4220)
|
||||
|
||||
### CVE-2023-4226 (2023-11-28)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue