mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/12 00:31:58
This commit is contained in:
parent
bde9c6452d
commit
5c545dcd89
28 changed files with 105 additions and 209 deletions
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"forks": 40,
|
||||
"watchers": 74,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
|
@ -1,33 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 116948258,
|
||||
"name": "Firefox-35-37-Exploit",
|
||||
"full_name": "Afudadi\/Firefox-35-37-Exploit",
|
||||
"owner": {
|
||||
"login": "Afudadi",
|
||||
"id": 20081823,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20081823?v=4",
|
||||
"html_url": "https:\/\/github.com\/Afudadi",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Afudadi\/Firefox-35-37-Exploit",
|
||||
"description": "CVE-2015-0816 + CVE-2015-0802",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-10T11:21:36Z",
|
||||
"updated_at": "2018-06-03T05:44:57Z",
|
||||
"pushed_at": "2017-12-01T01:23:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -1,33 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 121688406,
|
||||
"name": "CVE-2016-0034-Decompile",
|
||||
"full_name": "hybridious\/CVE-2016-0034-Decompile",
|
||||
"owner": {
|
||||
"login": "hybridious",
|
||||
"id": 26754785,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26754785?v=4",
|
||||
"html_url": "https:\/\/github.com\/hybridious",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hybridious\/CVE-2016-0034-Decompile",
|
||||
"description": "CVE-2016-0034 Decompile",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-15T22:05:01Z",
|
||||
"updated_at": "2022-01-19T08:26:38Z",
|
||||
"pushed_at": "2017-12-01T01:30:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -29,36 +29,5 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 121688426,
|
||||
"name": "CVE-2016-4117",
|
||||
"full_name": "hybridious\/CVE-2016-4117",
|
||||
"owner": {
|
||||
"login": "hybridious",
|
||||
"id": 26754785,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26754785?v=4",
|
||||
"html_url": "https:\/\/github.com\/hybridious",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hybridious\/CVE-2016-4117",
|
||||
"description": "CVE-2016-4117",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-15T22:05:08Z",
|
||||
"updated_at": "2023-11-18T03:10:27Z",
|
||||
"pushed_at": "2017-12-01T01:21:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -462,10 +462,10 @@
|
|||
"description": "Dirty Cow exploit - CVE-2016-5195",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-25T21:08:01Z",
|
||||
"updated_at": "2024-12-07T09:43:35Z",
|
||||
"updated_at": "2024-12-11T20:44:31Z",
|
||||
"pushed_at": "2021-04-08T11:35:12Z",
|
||||
"stargazers_count": 864,
|
||||
"watchers_count": 864,
|
||||
"stargazers_count": 865,
|
||||
"watchers_count": 865,
|
||||
"has_discussions": false,
|
||||
"forks_count": 426,
|
||||
"allow_forking": true,
|
||||
|
@ -478,7 +478,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 426,
|
||||
"watchers": 864,
|
||||
"watchers": 865,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -1644,13 +1644,13 @@
|
|||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 161,
|
||||
"forks_count": 160,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 161,
|
||||
"forks": 160,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -200,10 +200,10 @@
|
|||
"description": "Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-25T20:09:54Z",
|
||||
"updated_at": "2024-08-24T04:48:14Z",
|
||||
"updated_at": "2024-12-11T20:21:18Z",
|
||||
"pushed_at": "2021-09-04T00:45:00Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -216,7 +216,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -1095,7 +1095,7 @@
|
|||
"forks": 86,
|
||||
"watchers": 240,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
"subscribers_count": 12
|
||||
},
|
||||
{
|
||||
"id": 251510910,
|
||||
|
@ -1418,7 +1418,7 @@
|
|||
"forks": 170,
|
||||
"watchers": 540,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
"subscribers_count": 25
|
||||
},
|
||||
{
|
||||
"id": 257849182,
|
||||
|
@ -1764,7 +1764,7 @@
|
|||
"forks": 16,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
"subscribers_count": 8
|
||||
},
|
||||
{
|
||||
"id": 296190446,
|
||||
|
|
|
@ -32,7 +32,7 @@
|
|||
"forks": 45,
|
||||
"watchers": 145,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
"subscribers_count": 15
|
||||
},
|
||||
{
|
||||
"id": 277048370,
|
||||
|
|
|
@ -28,7 +28,7 @@
|
|||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 36
|
||||
"subscribers_count": 37
|
||||
},
|
||||
{
|
||||
"id": 320642790,
|
||||
|
|
|
@ -2383,10 +2383,10 @@
|
|||
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T21:24:55Z",
|
||||
"updated_at": "2024-12-04T06:22:14Z",
|
||||
"updated_at": "2024-12-11T18:43:30Z",
|
||||
"pushed_at": "2022-03-12T21:30:58Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -2404,7 +2404,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -935,10 +935,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-12-11T02:31:33Z",
|
||||
"updated_at": "2024-12-11T22:08:09Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1812,
|
||||
"watchers_count": 1812,
|
||||
"stargazers_count": 1810,
|
||||
"watchers_count": 1810,
|
||||
"has_discussions": false,
|
||||
"forks_count": 529,
|
||||
"allow_forking": true,
|
||||
|
@ -952,7 +952,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 529,
|
||||
"watchers": 1812,
|
||||
"watchers": 1810,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
@ -3749,7 +3749,7 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2024-12-11T02:31:56Z",
|
||||
"updated_at": "2024-12-11T22:08:09Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3405,
|
||||
"watchers_count": 3405,
|
||||
|
@ -5635,7 +5635,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-14T06:37:59Z",
|
||||
"updated_at": "2024-11-16T19:51:31Z",
|
||||
"pushed_at": "2024-04-24T05:35:26Z",
|
||||
"pushed_at": "2024-12-11T23:04:50Z",
|
||||
"stargazers_count": 386,
|
||||
"watchers_count": 386,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2024-11-16T06:35:35Z",
|
||||
"updated_at": "2024-12-11T23:56:20Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 1092,
|
||||
"watchers_count": 1092,
|
||||
"stargazers_count": 1093,
|
||||
"watchers_count": 1093,
|
||||
"has_discussions": false,
|
||||
"forks_count": 218,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 218,
|
||||
"watchers": 1092,
|
||||
"watchers": 1093,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
@ -1163,10 +1163,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2024-12-10T01:23:32Z",
|
||||
"updated_at": "2024-12-11T19:59:24Z",
|
||||
"pushed_at": "2023-05-20T05:55:45Z",
|
||||
"stargazers_count": 557,
|
||||
"watchers_count": 557,
|
||||
"stargazers_count": 558,
|
||||
"watchers_count": 558,
|
||||
"has_discussions": false,
|
||||
"forks_count": 142,
|
||||
"allow_forking": true,
|
||||
|
@ -1175,7 +1175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 142,
|
||||
"watchers": 557,
|
||||
"watchers": 558,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -112,7 +112,7 @@
|
|||
"description": "Dockerized POC for CVE-2022-42889 Text4Shell",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-18T09:58:00Z",
|
||||
"updated_at": "2024-11-04T12:12:36Z",
|
||||
"updated_at": "2024-12-11T23:18:37Z",
|
||||
"pushed_at": "2022-11-14T17:12:41Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
|
@ -151,10 +151,10 @@
|
|||
"description": "cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text version 1.10. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-18T13:53:55Z",
|
||||
"updated_at": "2024-08-12T20:27:52Z",
|
||||
"updated_at": "2024-12-11T23:18:39Z",
|
||||
"pushed_at": "2022-10-18T14:10:07Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -163,7 +163,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -325,10 +325,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding text4shell RCE CVE-2022-42889",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-19T20:14:22Z",
|
||||
"updated_at": "2024-08-12T20:27:54Z",
|
||||
"updated_at": "2024-12-11T23:46:43Z",
|
||||
"pushed_at": "2022-10-20T12:51:08Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -337,7 +337,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -267,10 +267,10 @@
|
|||
"description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-11T18:13:32Z",
|
||||
"updated_at": "2024-12-11T18:13:36Z",
|
||||
"pushed_at": "2024-12-11T18:13:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2024-12-11T19:30:50Z",
|
||||
"pushed_at": "2024-12-11T19:22:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -279,7 +279,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-29T06:13:36Z",
|
||||
"updated_at": "2024-12-11T18:20:01Z",
|
||||
"updated_at": "2024-12-11T22:04:10Z",
|
||||
"pushed_at": "2024-12-04T01:01:28Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 37,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T18:42:43Z",
|
||||
"updated_at": "2024-12-10T05:27:17Z",
|
||||
"pushed_at": "2024-12-04T19:25:34Z",
|
||||
"updated_at": "2024-12-11T23:45:35Z",
|
||||
"pushed_at": "2024-12-11T23:45:31Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This repository automates the process of exploiting CVE-2024-25641 on Cacti 1.2.26",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-26T13:34:35Z",
|
||||
"updated_at": "2024-09-12T10:30:25Z",
|
||||
"updated_at": "2024-12-11T23:38:31Z",
|
||||
"pushed_at": "2024-09-05T11:52:22Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T17:02:03Z",
|
||||
"updated_at": "2024-12-11T09:24:17Z",
|
||||
"updated_at": "2024-12-11T21:04:57Z",
|
||||
"pushed_at": "2024-07-04T10:39:15Z",
|
||||
"stargazers_count": 324,
|
||||
"watchers_count": 324,
|
||||
"stargazers_count": 325,
|
||||
"watchers_count": 325,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 324,
|
||||
"watchers": 325,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-31317",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-05T01:36:59Z",
|
||||
"updated_at": "2024-12-06T13:11:25Z",
|
||||
"updated_at": "2024-12-11T19:49:37Z",
|
||||
"pushed_at": "2024-12-05T01:52:45Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -417,10 +417,10 @@
|
|||
"description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T21:24:15Z",
|
||||
"updated_at": "2024-12-10T20:24:07Z",
|
||||
"updated_at": "2024-12-11T19:07:34Z",
|
||||
"pushed_at": "2024-04-17T11:03:32Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -429,7 +429,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -11,10 +11,10 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/passtheticket\/CVE-2024-38200",
|
||||
"description": "Microsoft Office NTLMv2 Disclosure Vulnerability - Not Fixed For Capturing Over HTTP",
|
||||
"description": "CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T19:24:55Z",
|
||||
"updated_at": "2024-12-09T22:58:27Z",
|
||||
"updated_at": "2024-12-11T21:46:18Z",
|
||||
"pushed_at": "2024-12-09T22:58:22Z",
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-40711-exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-16T05:02:27Z",
|
||||
"updated_at": "2024-12-11T13:20:45Z",
|
||||
"updated_at": "2024-12-11T22:25:02Z",
|
||||
"pushed_at": "2024-10-17T01:06:42Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 28,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Exploit for CVE-2024-48990 (Local Privilege Escalation in needrestart < 3.8)",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-21T23:59:49Z",
|
||||
"updated_at": "2024-12-02T13:30:46Z",
|
||||
"updated_at": "2024-12-11T19:06:31Z",
|
||||
"pushed_at": "2024-11-22T01:17:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-11T14:19:55Z",
|
||||
"updated_at": "2024-12-11T16:28:00Z",
|
||||
"updated_at": "2024-12-11T19:45:47Z",
|
||||
"pushed_at": "2024-12-11T14:23:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection ",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-21T09:51:21Z",
|
||||
"updated_at": "2024-11-20T16:31:02Z",
|
||||
"updated_at": "2024-12-11T23:50:45Z",
|
||||
"pushed_at": "2024-08-22T15:20:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "a signal handler race condition in OpenSSH's server (sshd)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T10:55:29Z",
|
||||
"updated_at": "2024-12-11T11:28:05Z",
|
||||
"updated_at": "2024-12-11T20:03:37Z",
|
||||
"pushed_at": "2024-07-01T10:54:02Z",
|
||||
"stargazers_count": 467,
|
||||
"watchers_count": 467,
|
||||
"stargazers_count": 468,
|
||||
"watchers_count": 468,
|
||||
"has_discussions": false,
|
||||
"forks_count": 181,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 181,
|
||||
"watchers": 467,
|
||||
"watchers": 468,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
27
README.md
27
README.md
|
@ -6146,7 +6146,11 @@
|
|||
|
||||
- [partywavesec/CVE-2024-42346](https://github.com/partywavesec/CVE-2024-42346)
|
||||
|
||||
### CVE-2024-42448
|
||||
### CVE-2024-42448 (2024-12-11)
|
||||
|
||||
<code>From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.
|
||||
</code>
|
||||
|
||||
- [h3lye/CVE-2024-42448-RCE](https://github.com/h3lye/CVE-2024-42448-RCE)
|
||||
|
||||
### CVE-2024-42461 (2024-08-02)
|
||||
|
@ -7398,7 +7402,11 @@
|
|||
### CVE-2024-55557
|
||||
- [partywavesec/CVE-2024-55557](https://github.com/partywavesec/CVE-2024-55557)
|
||||
|
||||
### CVE-2024-55587
|
||||
### CVE-2024-55587 (2024-12-11)
|
||||
|
||||
<code>python-libarchive through 4.2.1 allows directory traversal (to create files) in extract in zip.py for ZipFile.extractall and ZipFile.extract.
|
||||
</code>
|
||||
|
||||
- [CSIRTTrizna/CVE-2024-55587](https://github.com/CSIRTTrizna/CVE-2024-55587)
|
||||
|
||||
### CVE-2024-1642470
|
||||
|
@ -44610,13 +44618,6 @@
|
|||
|
||||
|
||||
## 2016
|
||||
### CVE-2016-0034 (2016-01-13)
|
||||
|
||||
<code>Microsoft Silverlight 5 before 5.1.41212.0 mishandles negative offsets during decoding, which allows remote attackers to execute arbitrary code or cause a denial of service (object-header corruption) via a crafted web site, aka "Silverlight Runtime Remote Code Execution Vulnerability."
|
||||
</code>
|
||||
|
||||
- [hybridious/CVE-2016-0034-Decompile](https://github.com/hybridious/CVE-2016-0034-Decompile)
|
||||
|
||||
### CVE-2016-0040 (2016-02-10)
|
||||
|
||||
<code>The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability."
|
||||
|
@ -45163,7 +45164,6 @@
|
|||
</code>
|
||||
|
||||
- [amit-raut/CVE-2016-4117-Report](https://github.com/amit-raut/CVE-2016-4117-Report)
|
||||
- [hybridious/CVE-2016-4117](https://github.com/hybridious/CVE-2016-4117)
|
||||
|
||||
### CVE-2016-4437 (2016-06-07)
|
||||
|
||||
|
@ -45975,13 +45975,6 @@
|
|||
|
||||
- [betalphafai/CVE-2015-0568](https://github.com/betalphafai/CVE-2015-0568)
|
||||
|
||||
### CVE-2015-0816 (2015-04-01)
|
||||
|
||||
<code>Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.
|
||||
</code>
|
||||
|
||||
- [Afudadi/Firefox-35-37-Exploit](https://github.com/Afudadi/Firefox-35-37-Exploit)
|
||||
|
||||
### CVE-2015-1130 (2015-04-10)
|
||||
|
||||
<code>The XPC implementation in Admin Framework in Apple OS X before 10.10.3 allows local users to bypass authentication and obtain admin privileges via unspecified vectors.
|
||||
|
|
Loading…
Reference in a new issue