mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/08/02 18:29:09
This commit is contained in:
parent
6f4cf1b4bc
commit
5ba6d6d75e
39 changed files with 306 additions and 135 deletions
|
@ -57,7 +57,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 105
|
||||
"subscribers_count": 108
|
||||
},
|
||||
{
|
||||
"id": 7564614,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 107
|
||||
"subscribers_count": 110
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 106
|
||||
"subscribers_count": 109
|
||||
}
|
||||
]
|
|
@ -417,7 +417,7 @@
|
|||
"forks": 84,
|
||||
"watchers": 158,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
"subscribers_count": 7
|
||||
},
|
||||
{
|
||||
"id": 18613807,
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2024-07-27T20:22:47Z",
|
||||
"updated_at": "2024-08-02T16:23:04Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 720,
|
||||
"watchers_count": 720,
|
||||
"stargazers_count": 722,
|
||||
"watchers_count": 722,
|
||||
"has_discussions": false,
|
||||
"forks_count": 263,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 263,
|
||||
"watchers": 720,
|
||||
"watchers": 722,
|
||||
"score": 0,
|
||||
"subscribers_count": 48
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-12T16:44:12Z",
|
||||
"updated_at": "2024-06-28T07:51:23Z",
|
||||
"updated_at": "2024-08-02T14:13:18Z",
|
||||
"pushed_at": "2022-10-18T08:53:13Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 96,
|
||||
"watchers": 97,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": " double-free bug in WhatsApp exploit poc",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-03T09:26:24Z",
|
||||
"updated_at": "2024-06-07T13:28:46Z",
|
||||
"updated_at": "2024-08-02T18:08:28Z",
|
||||
"pushed_at": "2021-03-19T17:23:25Z",
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"has_discussions": false,
|
||||
"forks_count": 78,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 78,
|
||||
"watchers": 268,
|
||||
"watchers": 269,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2024-07-03T20:15:08Z",
|
||||
"updated_at": "2024-08-02T18:08:30Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"has_discussions": false,
|
||||
"forks_count": 106,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 106,
|
||||
"watchers": 201,
|
||||
"watchers": 202,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2024-08-01T15:44:33Z",
|
||||
"updated_at": "2024-08-02T14:10:44Z",
|
||||
"pushed_at": "2024-06-16T15:35:20Z",
|
||||
"stargazers_count": 943,
|
||||
"watchers_count": 943,
|
||||
"stargazers_count": 944,
|
||||
"watchers_count": 944,
|
||||
"has_discussions": false,
|
||||
"forks_count": 179,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 179,
|
||||
"watchers": 943,
|
||||
"watchers": 944,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2024-06-28T07:58:05Z",
|
||||
"updated_at": "2024-08-02T17:56:40Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 715,
|
||||
"watchers_count": 715,
|
||||
"stargazers_count": 714,
|
||||
"watchers_count": 714,
|
||||
"has_discussions": false,
|
||||
"forks_count": 175,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 175,
|
||||
"watchers": 715,
|
||||
"watchers": 714,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Double-Free BUG in WhatsApp exploit poc.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-10T15:25:59Z",
|
||||
"updated_at": "2024-07-16T13:09:37Z",
|
||||
"updated_at": "2024-08-02T18:08:26Z",
|
||||
"pushed_at": "2020-05-10T15:32:54Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 90,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-10T13:08:21Z",
|
||||
"updated_at": "2024-07-08T15:20:06Z",
|
||||
"updated_at": "2024-08-02T17:56:42Z",
|
||||
"pushed_at": "2021-02-14T15:08:01Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 47,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2024-07-27T01:58:42Z",
|
||||
"updated_at": "2024-08-02T18:15:07Z",
|
||||
"pushed_at": "2023-07-20T10:51:42Z",
|
||||
"stargazers_count": 1713,
|
||||
"watchers_count": 1713,
|
||||
"stargazers_count": 1712,
|
||||
"watchers_count": 1712,
|
||||
"has_discussions": false,
|
||||
"forks_count": 359,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 359,
|
||||
"watchers": 1713,
|
||||
"watchers": 1712,
|
||||
"score": 0,
|
||||
"subscribers_count": 87
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Hacking Artifactory with server side template injection",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T13:56:43Z",
|
||||
"updated_at": "2023-11-13T23:45:39Z",
|
||||
"updated_at": "2024-08-02T13:41:31Z",
|
||||
"pushed_at": "2020-03-12T06:55:39Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"has_discussions": false,
|
||||
"forks_count": 74,
|
||||
"forks_count": 75,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"forks": 75,
|
||||
"watchers": 240,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
|
|
|
@ -315,8 +315,8 @@
|
|||
"description": "Reappear-CVE-2022-21449-TLS-PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-01T03:27:17Z",
|
||||
"updated_at": "2024-08-02T09:06:10Z",
|
||||
"pushed_at": "2024-08-02T09:06:08Z",
|
||||
"updated_at": "2024-08-02T16:45:30Z",
|
||||
"pushed_at": "2024-08-02T16:45:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-09T15:53:48Z",
|
||||
"updated_at": "2024-08-01T15:57:23Z",
|
||||
"updated_at": "2024-08-02T16:54:09Z",
|
||||
"pushed_at": "2023-09-27T06:44:27Z",
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"has_discussions": false,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 285,
|
||||
"watchers": 286,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -616,10 +616,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-03T08:51:44Z",
|
||||
"updated_at": "2024-06-13T21:25:36Z",
|
||||
"updated_at": "2024-08-02T13:01:19Z",
|
||||
"pushed_at": "2022-06-03T08:52:06Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -628,7 +628,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -150,7 +150,7 @@
|
|||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -164,7 +164,7 @@
|
|||
"text4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"forks": 30,
|
||||
"watchers": 76,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
32
2023/CVE-2023-22622.json
Normal file
32
2023/CVE-2023-22622.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 774948865,
|
||||
"name": "CVE-2023-22622",
|
||||
"full_name": "michael-david-fry\/CVE-2023-22622",
|
||||
"owner": {
|
||||
"login": "michael-david-fry",
|
||||
"id": 4213469,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4213469?v=4",
|
||||
"html_url": "https:\/\/github.com\/michael-david-fry"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/michael-david-fry\/CVE-2023-22622",
|
||||
"description": "Python Script that will DoS a WP server that is utilizing WP-CRON",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T13:48:48Z",
|
||||
"updated_at": "2024-08-02T13:26:56Z",
|
||||
"pushed_at": "2024-08-02T13:26:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -74,6 +74,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 661062372,
|
||||
"name": "CVE-2023-27372",
|
||||
"full_name": "Jhonsonwannaa\/CVE-2023-27372",
|
||||
"owner": {
|
||||
"login": "Jhonsonwannaa",
|
||||
"id": 114837630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jhonsonwannaa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jhonsonwannaa\/CVE-2023-27372",
|
||||
"description": "spip",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-01T17:08:36Z",
|
||||
"updated_at": "2024-08-02T12:55:02Z",
|
||||
"pushed_at": "2024-08-02T12:54:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 662629965,
|
||||
"name": "CVE-2023-27372-PoC",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-26T16:18:41Z",
|
||||
"updated_at": "2024-08-02T07:41:45Z",
|
||||
"updated_at": "2024-08-02T14:08:27Z",
|
||||
"pushed_at": "2023-09-26T19:04:21Z",
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 216,
|
||||
"watchers": 217,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -50,10 +50,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-30T23:17:04Z",
|
||||
"updated_at": "2024-06-21T00:11:34Z",
|
||||
"updated_at": "2024-08-02T14:08:31Z",
|
||||
"pushed_at": "2023-10-10T19:00:30Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -62,7 +62,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 837227856,
|
||||
"name": "CVE-2023-50564",
|
||||
"full_name": "ipuig\/CVE-2023-50564",
|
||||
"owner": {
|
||||
"login": "ipuig",
|
||||
"id": 109107529,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109107529?v=4",
|
||||
"html_url": "https:\/\/github.com\/ipuig"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ipuig\/CVE-2023-50564",
|
||||
"description": "CVE-2023-50564 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-02T13:37:39Z",
|
||||
"updated_at": "2024-08-02T14:03:32Z",
|
||||
"pushed_at": "2024-08-02T14:01:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-08-02T08:45:28Z",
|
||||
"updated_at": "2024-08-02T16:35:12Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2199,
|
||||
"watchers_count": 2199,
|
||||
"stargazers_count": 2200,
|
||||
"watchers_count": 2200,
|
||||
"has_discussions": false,
|
||||
"forks_count": 288,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 288,
|
||||
"watchers": 2199,
|
||||
"watchers": 2200,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-21006 exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T06:25:14Z",
|
||||
"updated_at": "2024-08-02T09:31:21Z",
|
||||
"updated_at": "2024-08-02T15:58:57Z",
|
||||
"pushed_at": "2024-07-29T19:39:15Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T05:53:02Z",
|
||||
"updated_at": "2024-07-30T23:08:25Z",
|
||||
"updated_at": "2024-08-02T14:48:29Z",
|
||||
"pushed_at": "2024-04-16T21:00:14Z",
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"has_discussions": false,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"watchers": 248,
|
||||
"watchers": 249,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -163,12 +163,12 @@
|
|||
"description": "Windows AppLocker Driver (appid.sys) LPE",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-29T13:18:06Z",
|
||||
"updated_at": "2024-08-02T11:36:50Z",
|
||||
"updated_at": "2024-08-02T16:38:22Z",
|
||||
"pushed_at": "2024-07-29T13:29:59Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -179,8 +179,8 @@
|
|||
"windowd"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC and Detection for CVE-2024-21626",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-01T15:28:37Z",
|
||||
"updated_at": "2024-07-17T13:46:35Z",
|
||||
"updated_at": "2024-08-02T13:13:35Z",
|
||||
"pushed_at": "2024-02-06T16:09:05Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Example exploitable scenarios for CVE-2024-22243 affecting the Spring framework (open redirect & SSRF).",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-21T12:55:22Z",
|
||||
"updated_at": "2024-05-21T05:07:10Z",
|
||||
"updated_at": "2024-08-02T17:18:27Z",
|
||||
"pushed_at": "2024-05-20T13:15:00Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -37,7 +37,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -108,7 +108,7 @@
|
|||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -120,7 +120,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -605,13 +605,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -1813,10 +1813,10 @@
|
|||
"description": "GNU IFUNC is the real culprit behind CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T18:36:16Z",
|
||||
"updated_at": "2024-08-01T13:16:39Z",
|
||||
"updated_at": "2024-08-02T13:18:24Z",
|
||||
"pushed_at": "2024-07-25T19:17:59Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1840,7 +1840,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Exploit PoC for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T19:33:08Z",
|
||||
"updated_at": "2024-08-01T13:27:05Z",
|
||||
"updated_at": "2024-08-02T15:55:18Z",
|
||||
"pushed_at": "2024-05-19T07:12:00Z",
|
||||
"stargazers_count": 477,
|
||||
"watchers_count": 477,
|
||||
"stargazers_count": 478,
|
||||
"watchers_count": 478,
|
||||
"has_discussions": false,
|
||||
"forks_count": 141,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 141,
|
||||
"watchers": 477,
|
||||
"watchers": 478,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -1741,5 +1741,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 837339196,
|
||||
"name": "CVE-2024-32002",
|
||||
"full_name": "chrisWalker11\/CVE-2024-32002",
|
||||
"owner": {
|
||||
"login": "chrisWalker11",
|
||||
"id": 51098965,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51098965?v=4",
|
||||
"html_url": "https:\/\/github.com\/chrisWalker11"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chrisWalker11\/CVE-2024-32002",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-08-02T18:30:01Z",
|
||||
"updated_at": "2024-08-02T18:33:39Z",
|
||||
"pushed_at": "2024-08-02T18:33:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -673,10 +673,10 @@
|
|||
"description": "Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-18T16:45:51Z",
|
||||
"updated_at": "2024-04-19T12:23:40Z",
|
||||
"updated_at": "2024-08-02T15:51:45Z",
|
||||
"pushed_at": "2024-04-18T18:06:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -693,7 +693,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-34102: Unauthenticated Magento XXE",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-27T18:10:13Z",
|
||||
"updated_at": "2024-07-29T04:29:09Z",
|
||||
"updated_at": "2024-08-02T15:39:05Z",
|
||||
"pushed_at": "2024-07-29T04:29:07Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -230,10 +230,10 @@
|
|||
"description": "GeoServer Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-30T18:43:40Z",
|
||||
"updated_at": "2024-08-02T10:08:34Z",
|
||||
"pushed_at": "2024-08-01T14:50:30Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"updated_at": "2024-08-02T17:05:54Z",
|
||||
"pushed_at": "2024-08-02T14:57:26Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -242,7 +242,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
32
2024/CVE-2024-37085.json
Normal file
32
2024/CVE-2024-37085.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 837225608,
|
||||
"name": "CVE-2024-37085",
|
||||
"full_name": "mahmutaymahmutay\/CVE-2024-37085",
|
||||
"owner": {
|
||||
"login": "mahmutaymahmutay",
|
||||
"id": 171496549,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171496549?v=4",
|
||||
"html_url": "https:\/\/github.com\/mahmutaymahmutay"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mahmutaymahmutay\/CVE-2024-37085",
|
||||
"description": "Vulnerability Scanner for CVE-2024-37085 and Exploits ( For Educational Purpose only)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-02T13:31:59Z",
|
||||
"updated_at": "2024-08-02T13:45:36Z",
|
||||
"pushed_at": "2024-08-02T13:45:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -138,7 +138,7 @@
|
|||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -159,7 +159,7 @@
|
|||
"sftp"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 7,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-12T10:32:37Z",
|
||||
"updated_at": "2024-08-01T01:52:43Z",
|
||||
"updated_at": "2024-08-02T15:39:09Z",
|
||||
"pushed_at": "2024-07-13T10:46:32Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 19,
|
||||
"forks": 7,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-5009 : WhatsUp Gold SetAdminPassword Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-09T16:56:49Z",
|
||||
"updated_at": "2024-07-12T00:51:11Z",
|
||||
"updated_at": "2024-08-02T15:38:52Z",
|
||||
"pushed_at": "2024-07-09T17:14:52Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -260,12 +260,12 @@
|
|||
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T20:33:20Z",
|
||||
"updated_at": "2024-07-31T20:01:07Z",
|
||||
"updated_at": "2024-08-02T17:26:00Z",
|
||||
"pushed_at": "2024-07-14T09:58:48Z",
|
||||
"stargazers_count": 424,
|
||||
"watchers_count": 424,
|
||||
"stargazers_count": 426,
|
||||
"watchers_count": 426,
|
||||
"has_discussions": false,
|
||||
"forks_count": 84,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -277,8 +277,8 @@
|
|||
"redteam"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 84,
|
||||
"watchers": 424,
|
||||
"forks": 85,
|
||||
"watchers": 426,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
17
README.md
17
README.md
|
@ -2944,6 +2944,7 @@
|
|||
- [charlesgargasson/CVE-2024-32002](https://github.com/charlesgargasson/CVE-2024-32002)
|
||||
- [NishanthAnand21/CVE-2024-32002-PoC](https://github.com/NishanthAnand21/CVE-2024-32002-PoC)
|
||||
- [tiyeume25112004/CVE-2024-32002](https://github.com/tiyeume25112004/CVE-2024-32002)
|
||||
- [chrisWalker11/CVE-2024-32002](https://github.com/chrisWalker11/CVE-2024-32002)
|
||||
|
||||
### CVE-2024-32004 (2024-05-14)
|
||||
|
||||
|
@ -3478,6 +3479,13 @@
|
|||
- [CERTologists/-CVE-2024-37081-POC](https://github.com/CERTologists/-CVE-2024-37081-POC)
|
||||
- [CERTologists/Modified-CVE-2024-37081-POC](https://github.com/CERTologists/Modified-CVE-2024-37081-POC)
|
||||
|
||||
### CVE-2024-37085 (2024-06-25)
|
||||
|
||||
<code>VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
|
||||
</code>
|
||||
|
||||
- [mahmutaymahmutay/CVE-2024-37085](https://github.com/mahmutaymahmutay/CVE-2024-37085)
|
||||
|
||||
### CVE-2024-37147 (2024-07-10)
|
||||
|
||||
<code>GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can attach a document to any item, even if the user has no write access on it. Upgrade to 10.0.16.
|
||||
|
@ -5917,6 +5925,13 @@
|
|||
|
||||
- [sofianeelhor/CVE-2023-22621-POC](https://github.com/sofianeelhor/CVE-2023-22621-POC)
|
||||
|
||||
### CVE-2023-22622 (2023-01-05)
|
||||
|
||||
<code>WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits.
|
||||
</code>
|
||||
|
||||
- [michael-david-fry/CVE-2023-22622](https://github.com/michael-david-fry/CVE-2023-22622)
|
||||
|
||||
### CVE-2023-22726 (2023-01-20)
|
||||
|
||||
<code>act is a project which allows for local running of github actions. The artifact server that stores artifacts from Github Action runs does not sanitize path inputs. This allows an attacker to download and overwrite arbitrary files on the host from a Github Action. This issue may lead to privilege escalation. The /upload endpoint is vulnerable to path traversal as filepath is user controlled, and ultimately flows into os.Mkdir and os.Open. The /artifact endpoint is vulnerable to path traversal as the path is variable is user controlled, and the specified file is ultimately returned by the server. This has been addressed in version 0.2.40. Users are advised to upgrade. Users unable to upgrade may, during implementation of Open and OpenAtEnd for FS, ensure to use ValidPath() to check against path traversal or clean the user-provided paths manually.
|
||||
|
@ -6714,6 +6729,7 @@
|
|||
|
||||
- [nuts7/CVE-2023-27372](https://github.com/nuts7/CVE-2023-27372)
|
||||
- [Chocapikk/CVE-2023-27372](https://github.com/Chocapikk/CVE-2023-27372)
|
||||
- [Jhonsonwannaa/CVE-2023-27372](https://github.com/Jhonsonwannaa/CVE-2023-27372)
|
||||
- [0SPwn/CVE-2023-27372-PoC](https://github.com/0SPwn/CVE-2023-27372-PoC)
|
||||
- [izzz0/CVE-2023-27372-POC](https://github.com/izzz0/CVE-2023-27372-POC)
|
||||
- [ThatNotEasy/CVE-2023-27372](https://github.com/ThatNotEasy/CVE-2023-27372)
|
||||
|
@ -11644,6 +11660,7 @@
|
|||
</code>
|
||||
|
||||
- [Rai2en/CVE-2023-50564_Pluck-v4.7.18_PoC](https://github.com/Rai2en/CVE-2023-50564_Pluck-v4.7.18_PoC)
|
||||
- [ipuig/CVE-2023-50564](https://github.com/ipuig/CVE-2023-50564)
|
||||
|
||||
### CVE-2023-50596
|
||||
- [chandraprarikraj/CVE-2023-50596](https://github.com/chandraprarikraj/CVE-2023-50596)
|
||||
|
|
Loading…
Reference in a new issue