mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/09/15 06:29:37
This commit is contained in:
parent
d165721c19
commit
5ecd0cd44f
28 changed files with 143 additions and 139 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-04T22:43:21Z",
|
||||
"updated_at": "2024-03-20T10:19:12Z",
|
||||
"updated_at": "2024-09-15T04:09:28Z",
|
||||
"pushed_at": "2022-02-04T22:54:33Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T10:12:44Z",
|
||||
"updated_at": "2024-09-12T13:25:21Z",
|
||||
"updated_at": "2024-09-15T03:06:04Z",
|
||||
"pushed_at": "2019-02-08T12:38:05Z",
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 224,
|
||||
"watchers": 223,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -225,10 +225,10 @@
|
|||
"description": "Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-07T15:03:07Z",
|
||||
"updated_at": "2024-07-01T01:28:31Z",
|
||||
"updated_at": "2024-09-15T04:49:47Z",
|
||||
"pushed_at": "2022-09-04T14:16:50Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -242,7 +242,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -535,10 +535,10 @@
|
|||
"description": "Unlock your Huawei device with ADB (CVE-2019-2215)",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T10:58:53Z",
|
||||
"updated_at": "2024-07-22T14:09:28Z",
|
||||
"updated_at": "2024-09-15T04:02:01Z",
|
||||
"pushed_at": "2024-05-20T11:00:13Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -547,7 +547,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Root your MediaTek device with CVE-2020-0069",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-06T12:12:48Z",
|
||||
"updated_at": "2024-08-26T16:15:21Z",
|
||||
"updated_at": "2024-09-15T03:47:41Z",
|
||||
"pushed_at": "2023-02-06T19:18:56Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 144,
|
||||
"watchers": 145,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
@ -142,10 +142,10 @@
|
|||
"description": "CVE-2020-0069",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-04T17:52:04Z",
|
||||
"updated_at": "2024-07-17T02:41:50Z",
|
||||
"updated_at": "2024-09-15T04:16:11Z",
|
||||
"pushed_at": "2023-09-04T17:53:01Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -154,7 +154,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T16:30:02Z",
|
||||
"updated_at": "2024-09-14T19:08:38Z",
|
||||
"updated_at": "2024-09-15T03:40:09Z",
|
||||
"pushed_at": "2021-03-29T12:33:38Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"has_discussions": true,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 133,
|
||||
"watchers": 134,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
}
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 444335154,
|
||||
"name": "CVE-2021-28750-site",
|
||||
"full_name": "PfalzPrince\/CVE-2021-28750-site",
|
||||
"owner": {
|
||||
"login": "PfalzPrince",
|
||||
"id": 96906354,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96906354?v=4",
|
||||
"html_url": "https:\/\/github.com\/PfalzPrince"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PfalzPrince\/CVE-2021-28750-site",
|
||||
"description": "PoC Site for tsunami-security-scanner-plugins. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-04T08:05:03Z",
|
||||
"updated_at": "2022-01-04T09:01:44Z",
|
||||
"pushed_at": "2022-01-04T09:02:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-04T15:34:03Z",
|
||||
"updated_at": "2024-08-12T20:16:09Z",
|
||||
"updated_at": "2024-09-15T00:28:50Z",
|
||||
"pushed_at": "2023-08-25T22:42:24Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
32
2021/CVE-2021-38304.json
Normal file
32
2021/CVE-2021-38304.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 857572831,
|
||||
"name": "CVE-2021-38304-PoC",
|
||||
"full_name": "philsajdak\/CVE-2021-38304-PoC",
|
||||
"owner": {
|
||||
"login": "philsajdak",
|
||||
"id": 144462254,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144462254?v=4",
|
||||
"html_url": "https:\/\/github.com\/philsajdak"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/philsajdak\/CVE-2021-38304-PoC",
|
||||
"description": "CVE-2021-38304 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-15T02:33:25Z",
|
||||
"updated_at": "2024-09-15T02:40:24Z",
|
||||
"pushed_at": "2024-09-15T02:40:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T10:25:59Z",
|
||||
"updated_at": "2024-08-12T20:30:27Z",
|
||||
"updated_at": "2024-09-15T04:46:46Z",
|
||||
"pushed_at": "2023-05-27T15:39:41Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 225,
|
||||
"watchers": 226,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) feature",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-03T17:54:34Z",
|
||||
"updated_at": "2024-08-12T20:30:05Z",
|
||||
"updated_at": "2024-09-15T04:50:07Z",
|
||||
"pushed_at": "2023-03-03T18:11:07Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -253,10 +253,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-24T11:34:27Z",
|
||||
"updated_at": "2024-07-09T18:28:39Z",
|
||||
"updated_at": "2024-09-15T03:17:48Z",
|
||||
"pushed_at": "2022-02-24T11:59:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -265,7 +265,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 22,
|
||||
"watchers": 88,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 580378653,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"forks": 28,
|
||||
"watchers": 85,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 586887875,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Let's control Secure Boot Chain ourselves.",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-01T07:32:18Z",
|
||||
"updated_at": "2024-09-10T11:59:33Z",
|
||||
"updated_at": "2024-09-15T04:28:41Z",
|
||||
"pushed_at": "2024-02-20T09:05:59Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 31,
|
||||
"watchers": 33,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-09-09T15:45:12Z",
|
||||
"updated_at": "2024-09-15T04:39:00Z",
|
||||
"pushed_at": "2024-08-01T15:09:15Z",
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"has_discussions": true,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 255,
|
||||
"watchers": 257,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -223,10 +223,10 @@
|
|||
"description": "CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T21:50:25Z",
|
||||
"updated_at": "2024-09-12T08:58:51Z",
|
||||
"updated_at": "2024-09-15T04:17:08Z",
|
||||
"pushed_at": "2023-06-13T08:55:50Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -237,7 +237,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 143,
|
||||
"watchers": 142,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-20963 PoC (Android WorkSource parcel\/unparcel logic mismatch)",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-12T10:44:59Z",
|
||||
"updated_at": "2024-09-12T19:45:56Z",
|
||||
"updated_at": "2024-09-15T04:14:56Z",
|
||||
"pushed_at": "2024-04-27T20:15:24Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-29T14:21:08Z",
|
||||
"updated_at": "2024-08-12T20:31:56Z",
|
||||
"updated_at": "2024-09-15T01:39:59Z",
|
||||
"pushed_at": "2023-07-06T08:14:17Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 81,
|
||||
"watchers": 80,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-Concept for CVE-2023-38146 (\"ThemeBleed\")",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-13T04:00:14Z",
|
||||
"updated_at": "2024-09-08T07:38:15Z",
|
||||
"updated_at": "2024-09-15T02:29:50Z",
|
||||
"pushed_at": "2023-09-13T04:50:29Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 184,
|
||||
"watchers": 185,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-20T07:14:06Z",
|
||||
"updated_at": "2024-09-03T10:39:32Z",
|
||||
"updated_at": "2024-09-15T04:10:42Z",
|
||||
"pushed_at": "2024-01-21T05:04:01Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 672,
|
||||
"watchers_count": 672,
|
||||
"has_discussions": false,
|
||||
"forks_count": 148,
|
||||
"forks_count": 149,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 148,
|
||||
"forks": 149,
|
||||
"watchers": 672,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Ivanti EPM AgentPortal RCE Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-13T14:02:04Z",
|
||||
"updated_at": "2024-09-14T12:22:48Z",
|
||||
"updated_at": "2024-09-15T04:14:57Z",
|
||||
"pushed_at": "2024-09-13T14:02:30Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-15T08:07:05Z",
|
||||
"updated_at": "2024-09-14T06:40:21Z",
|
||||
"updated_at": "2024-09-15T06:31:33Z",
|
||||
"pushed_at": "2024-09-08T21:23:34Z",
|
||||
"stargazers_count": 353,
|
||||
"watchers_count": 353,
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 353,
|
||||
"watchers": 354,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -256,10 +256,10 @@
|
|||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T18:25:46Z",
|
||||
"updated_at": "2024-09-14T23:02:57Z",
|
||||
"updated_at": "2024-09-15T01:21:55Z",
|
||||
"pushed_at": "2024-08-27T12:22:39Z",
|
||||
"stargazers_count": 568,
|
||||
"watchers_count": 568,
|
||||
"stargazers_count": 569,
|
||||
"watchers_count": 569,
|
||||
"has_discussions": false,
|
||||
"forks_count": 103,
|
||||
"allow_forking": true,
|
||||
|
@ -268,7 +268,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"watchers": 568,
|
||||
"watchers": 569,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "poc code for CVE-2024-38080",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-01T11:25:22Z",
|
||||
"updated_at": "2024-09-03T09:07:47Z",
|
||||
"updated_at": "2024-09-15T03:07:39Z",
|
||||
"pushed_at": "2024-09-01T11:35:25Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Makes IDA (most versions) to crash upon opening it. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-25T12:33:14Z",
|
||||
"updated_at": "2024-09-06T15:43:37Z",
|
||||
"updated_at": "2024-09-15T04:29:46Z",
|
||||
"pushed_at": "2024-08-30T09:58:12Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1543,10 +1543,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-12T19:27:52Z",
|
||||
"updated_at": "2024-09-12T19:28:57Z",
|
||||
"updated_at": "2024-09-15T04:01:56Z",
|
||||
"pushed_at": "2024-09-12T19:28:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -1555,7 +1555,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-14T06:27:11Z",
|
||||
"updated_at": "2024-09-14T14:29:48Z",
|
||||
"updated_at": "2024-09-15T04:48:54Z",
|
||||
"pushed_at": "2024-09-14T06:32:51Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
10
README.md
10
README.md
|
@ -22648,9 +22648,6 @@
|
|||
|
||||
- [lntrx/CVE-2021-28663](https://github.com/lntrx/CVE-2021-28663)
|
||||
|
||||
### CVE-2021-28750
|
||||
- [PfalzPrince/CVE-2021-28750-site](https://github.com/PfalzPrince/CVE-2021-28750-site)
|
||||
|
||||
### CVE-2021-29002 (2021-03-24)
|
||||
|
||||
<code>A stored cross-site scripting (XSS) vulnerability in Plone CMS 5.2.3 exists in site-controlpanel via the "form.widgets.site_title" parameter.
|
||||
|
@ -23925,6 +23922,13 @@
|
|||
- [gkrishnan724/CVE-2021-38297](https://github.com/gkrishnan724/CVE-2021-38297)
|
||||
- [paras98/CVE-2021-38297-Go-wasm-Replication](https://github.com/paras98/CVE-2021-38297-Go-wasm-Replication)
|
||||
|
||||
### CVE-2021-38304 (2021-09-17)
|
||||
|
||||
<code>Improper input validation in the National Instruments NI-PAL driver in versions 20.0.0 and prior may allow a privileged user to potentially enable escalation of privilege via local access.
|
||||
</code>
|
||||
|
||||
- [philsajdak/CVE-2021-38304-PoC](https://github.com/philsajdak/CVE-2021-38304-PoC)
|
||||
|
||||
### CVE-2021-38314 (2021-09-01)
|
||||
|
||||
<code>The Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of site’s `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`.
|
||||
|
|
Loading…
Add table
Reference in a new issue