mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-04-18 05:05:37 +02:00
Auto Update 2025/03/09 12:31:48
This commit is contained in:
parent
4c61bb8cdb
commit
61578e787d
27 changed files with 184 additions and 112 deletions
|
@ -45,10 +45,10 @@
|
|||
"description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-05T11:55:41Z",
|
||||
"updated_at": "2021-08-02T19:04:31Z",
|
||||
"updated_at": "2025-03-09T08:17:53Z",
|
||||
"pushed_at": "2018-07-11T18:22:51Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -882,8 +882,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-03-08T13:22:26Z",
|
||||
"updated_at": "2025-03-08T14:27:18Z",
|
||||
"pushed_at": "2025-03-08T14:27:14Z",
|
||||
"updated_at": "2025-03-09T06:15:07Z",
|
||||
"pushed_at": "2025-03-09T06:15:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-05T11:55:41Z",
|
||||
"updated_at": "2021-08-02T19:04:31Z",
|
||||
"updated_at": "2025-03-09T08:17:53Z",
|
||||
"pushed_at": "2018-07-11T18:22:51Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -88,10 +88,10 @@
|
|||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/空白密钥\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-03-08T05:31:53Z",
|
||||
"updated_at": "2025-03-09T09:30:37Z",
|
||||
"pushed_at": "2025-03-01T15:46:45Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -100,7 +100,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 165,
|
||||
"watchers": 166,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/空白密钥\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-03-08T05:31:53Z",
|
||||
"updated_at": "2025-03-09T09:30:37Z",
|
||||
"pushed_at": "2025-03-01T15:46:45Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 165,
|
||||
"watchers": 166,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -324,10 +324,10 @@
|
|||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/空白密钥\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-03-08T05:31:53Z",
|
||||
"updated_at": "2025-03-09T09:30:37Z",
|
||||
"pushed_at": "2025-03-01T15:46:45Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -336,7 +336,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 165,
|
||||
"watchers": 166,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -76,7 +76,7 @@
|
|||
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-12T05:48:13Z",
|
||||
"updated_at": "2025-03-06T15:21:03Z",
|
||||
"updated_at": "2025-03-09T07:38:59Z",
|
||||
"pushed_at": "2023-04-09T13:50:29Z",
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2025-02-28T09:31:16Z",
|
||||
"updated_at": "2025-03-09T09:22:24Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1805,
|
||||
"watchers_count": 1805,
|
||||
"stargazers_count": 1806,
|
||||
"watchers_count": 1806,
|
||||
"has_discussions": false,
|
||||
"forks_count": 248,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 248,
|
||||
"watchers": 1805,
|
||||
"watchers": 1806,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2025-03-07T22:12:11Z",
|
||||
"updated_at": "2025-03-09T12:03:17Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4174,
|
||||
"watchers_count": 4174,
|
||||
"stargazers_count": 4175,
|
||||
"watchers_count": 4175,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1102,
|
||||
"allow_forking": true,
|
||||
|
@ -77,7 +77,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1102,
|
||||
"watchers": 4174,
|
||||
"watchers": 4175,
|
||||
"score": 0,
|
||||
"subscribers_count": 148
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2025-03-07T22:12:11Z",
|
||||
"updated_at": "2025-03-09T12:03:17Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4174,
|
||||
"watchers_count": 4174,
|
||||
"stargazers_count": 4175,
|
||||
"watchers_count": 4175,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1102,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1102,
|
||||
"watchers": 4174,
|
||||
"watchers": 4175,
|
||||
"score": 0,
|
||||
"subscribers_count": 148
|
||||
},
|
||||
|
|
|
@ -386,10 +386,10 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2025-03-07T12:21:37Z",
|
||||
"updated_at": "2025-03-09T11:16:43Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 382,
|
||||
"watchers_count": 382,
|
||||
"stargazers_count": 383,
|
||||
"watchers_count": 383,
|
||||
"has_discussions": false,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
|
@ -404,7 +404,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"watchers": 382,
|
||||
"watchers": 383,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/空白密钥\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-03-08T05:31:53Z",
|
||||
"updated_at": "2025-03-09T09:30:37Z",
|
||||
"pushed_at": "2025-03-01T15:46:45Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 165,
|
||||
"watchers": 166,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -972,7 +972,7 @@
|
|||
"stargazers_count": 1124,
|
||||
"watchers_count": 1124,
|
||||
"has_discussions": false,
|
||||
"forks_count": 194,
|
||||
"forks_count": 195,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -980,7 +980,7 @@
|
|||
"cve-2021-4034"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 194,
|
||||
"forks": 195,
|
||||
"watchers": 1124,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
|
|
|
@ -1307,10 +1307,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2025-03-07T10:14:21Z",
|
||||
"updated_at": "2025-03-09T11:13:01Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 819,
|
||||
"watchers_count": 819,
|
||||
"stargazers_count": 820,
|
||||
"watchers_count": 820,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
|
@ -1324,7 +1324,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 819,
|
||||
"watchers": 820,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -2805,6 +2805,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 789035235,
|
||||
"name": "DirtyPipe-Exploit",
|
||||
"full_name": "karanlvm\/DirtyPipe-Exploit",
|
||||
"owner": {
|
||||
"login": "karanlvm",
|
||||
"id": 69917470,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69917470?v=4",
|
||||
"html_url": "https:\/\/github.com\/karanlvm",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/karanlvm\/DirtyPipe-Exploit",
|
||||
"description": "Proof of concept for CVE-2022-0847",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-19T15:21:57Z",
|
||||
"updated_at": "2025-03-09T09:44:29Z",
|
||||
"pushed_at": "2024-06-06T16:21:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 794413658,
|
||||
"name": "CVE-2022-0847",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T20:37:14Z",
|
||||
"updated_at": "2025-03-05T17:55:04Z",
|
||||
"updated_at": "2025-03-09T10:42:25Z",
|
||||
"pushed_at": "2022-08-30T02:11:05Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 152,
|
||||
"watchers": 153,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "检测域内常见一把梭漏洞,包括:NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-17T06:29:44Z",
|
||||
"updated_at": "2025-02-11T02:32:09Z",
|
||||
"updated_at": "2025-03-09T10:19:24Z",
|
||||
"pushed_at": "2023-10-23T04:47:11Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "harbor unauthorized detection",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-21T10:40:19Z",
|
||||
"updated_at": "2025-02-13T02:08:50Z",
|
||||
"updated_at": "2025-03-09T09:36:01Z",
|
||||
"pushed_at": "2024-12-12T07:37:01Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 30,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2025-03-08T16:54:28Z",
|
||||
"updated_at": "2025-03-09T11:18:01Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1470,
|
||||
"watchers_count": 1470,
|
||||
"stargazers_count": 1471,
|
||||
"watchers_count": 1471,
|
||||
"has_discussions": false,
|
||||
"forks_count": 250,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 250,
|
||||
"watchers": 1470,
|
||||
"watchers": 1471,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -485,10 +485,10 @@
|
|||
"description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")",
|
||||
"fork": false,
|
||||
"created_at": "2025-03-05T12:55:58Z",
|
||||
"updated_at": "2025-03-09T01:28:13Z",
|
||||
"updated_at": "2025-03-09T07:57:48Z",
|
||||
"pushed_at": "2025-03-05T12:56:18Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -497,7 +497,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 127,
|
||||
"watchers": 134,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "exploits for CVE-2024-20017",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-30T05:54:36Z",
|
||||
"updated_at": "2025-01-29T11:27:30Z",
|
||||
"updated_at": "2025-03-09T09:51:43Z",
|
||||
"pushed_at": "2024-09-07T10:11:22Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 137,
|
||||
"watchers": 136,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for CVE-2024-27130",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T07:58:01Z",
|
||||
"updated_at": "2025-02-14T17:11:59Z",
|
||||
"updated_at": "2025-03-09T07:38:50Z",
|
||||
"pushed_at": "2024-05-17T10:27:07Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -60,5 +60,36 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 875929293,
|
||||
"name": "CVE-2024-37032_CVE-2024-45436",
|
||||
"full_name": "pankass\/CVE-2024-37032_CVE-2024-45436",
|
||||
"owner": {
|
||||
"login": "pankass",
|
||||
"id": 87853664,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87853664?v=4",
|
||||
"html_url": "https:\/\/github.com\/pankass",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pankass\/CVE-2024-37032_CVE-2024-45436",
|
||||
"description": "CVE-2024-45436",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-21T05:44:49Z",
|
||||
"updated_at": "2025-03-09T11:38:45Z",
|
||||
"pushed_at": "2025-03-09T11:38:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,35 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 875929293,
|
||||
"name": "CVE-2024-45436",
|
||||
"full_name": "pankass\/CVE-2024-45436",
|
||||
"owner": {
|
||||
"login": "pankass",
|
||||
"id": 87853664,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87853664?v=4",
|
||||
"html_url": "https:\/\/github.com\/pankass",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pankass\/CVE-2024-45436",
|
||||
"description": "CVE-2024-45436",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-21T05:44:49Z",
|
||||
"updated_at": "2025-02-11T07:26:20Z",
|
||||
"pushed_at": "2024-10-21T05:47:54Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 891956571,
|
||||
"name": "cve-2024-45436-exp",
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "CVE-2025-0087 EoP full PoC",
|
||||
"fork": false,
|
||||
"created_at": "2025-03-05T13:31:02Z",
|
||||
"updated_at": "2025-03-08T17:16:33Z",
|
||||
"updated_at": "2025-03-09T09:41:55Z",
|
||||
"pushed_at": "2025-03-05T16:51:45Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
33
2025/CVE-2025-1316.json
Normal file
33
2025/CVE-2025-1316.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 945407904,
|
||||
"name": "CVE-2025-1316",
|
||||
"full_name": "Rimasue\/CVE-2025-1316",
|
||||
"owner": {
|
||||
"login": "Rimasue",
|
||||
"id": 195575875,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/195575875?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rimasue",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rimasue\/CVE-2025-1316",
|
||||
"description": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)",
|
||||
"fork": false,
|
||||
"created_at": "2025-03-09T10:57:29Z",
|
||||
"updated_at": "2025-03-09T11:07:06Z",
|
||||
"pushed_at": "2025-03-09T11:06:41Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
10
README.md
10
README.md
|
@ -109,6 +109,13 @@
|
|||
- [McTavishSue/CVE-2025-1307](https://github.com/McTavishSue/CVE-2025-1307)
|
||||
- [Nxploited/CVE-2025-1307](https://github.com/Nxploited/CVE-2025-1307)
|
||||
|
||||
### CVE-2025-1316 (2025-03-04)
|
||||
|
||||
<code>Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device
|
||||
</code>
|
||||
|
||||
- [Rimasue/CVE-2025-1316](https://github.com/Rimasue/CVE-2025-1316)
|
||||
|
||||
### CVE-2025-1716 (2025-02-26)
|
||||
|
||||
<code>picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.
|
||||
|
@ -6518,6 +6525,7 @@
|
|||
|
||||
- [Bi0x/CVE-2024-37032](https://github.com/Bi0x/CVE-2024-37032)
|
||||
- [ahboon/CVE-2024-37032-scanner](https://github.com/ahboon/CVE-2024-37032-scanner)
|
||||
- [pankass/CVE-2024-37032_CVE-2024-45436](https://github.com/pankass/CVE-2024-37032_CVE-2024-45436)
|
||||
|
||||
### CVE-2024-37051 (2024-06-10)
|
||||
|
||||
|
@ -7902,7 +7910,6 @@
|
|||
<code>extractFromZipFile in model.go in Ollama before 0.1.47 can extract members of a ZIP archive outside of the parent directory.
|
||||
</code>
|
||||
|
||||
- [pankass/CVE-2024-45436](https://github.com/pankass/CVE-2024-45436)
|
||||
- [XiaomingX/cve-2024-45436-exp](https://github.com/XiaomingX/cve-2024-45436-exp)
|
||||
|
||||
### CVE-2024-45440 (2024-08-29)
|
||||
|
@ -18673,6 +18680,7 @@
|
|||
- [ayushx007/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/ayushx007/CVE-2022-0847-DirtyPipe-Exploits)
|
||||
- [solomon12354/LockingGirl-----CVE-2022-0847-Dirty_Pipe_virus](https://github.com/solomon12354/LockingGirl-----CVE-2022-0847-Dirty_Pipe_virus)
|
||||
- [letsr00t/CVE-2022-0847](https://github.com/letsr00t/CVE-2022-0847)
|
||||
- [karanlvm/DirtyPipe-Exploit](https://github.com/karanlvm/DirtyPipe-Exploit)
|
||||
- [xsxtw/CVE-2022-0847](https://github.com/xsxtw/CVE-2022-0847)
|
||||
- [muhammad1596/CVE-2022-0847-dirty-pipe-checker](https://github.com/muhammad1596/CVE-2022-0847-dirty-pipe-checker)
|
||||
- [muhammad1596/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/muhammad1596/CVE-2022-0847-DirtyPipe-Exploits)
|
||||
|
|
Loading…
Add table
Reference in a new issue