mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/05/21 18:29:07
This commit is contained in:
parent
df0c41a14b
commit
620456ee1d
36 changed files with 405 additions and 166 deletions
|
@ -110,7 +110,7 @@
|
|||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -133,7 +133,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -58,5 +58,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 803901018,
|
||||
"name": "CVE-2013-3900",
|
||||
"full_name": "Securenetology\/CVE-2013-3900",
|
||||
"owner": {
|
||||
"login": "Securenetology",
|
||||
"id": 89155495,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89155495?v=4",
|
||||
"html_url": "https:\/\/github.com\/Securenetology"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Securenetology\/CVE-2013-3900",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-05-21T15:19:49Z",
|
||||
"updated_at": "2024-05-21T15:20:46Z",
|
||||
"pushed_at": "2024-05-21T15:20:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -327,6 +327,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -786,6 +786,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -403,10 +403,10 @@
|
|||
"description": "WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-23T01:42:57Z",
|
||||
"updated_at": "2023-11-17T06:40:57Z",
|
||||
"updated_at": "2024-05-21T13:28:54Z",
|
||||
"pushed_at": "2019-09-26T05:46:14Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -415,7 +415,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -572,6 +572,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2024-05-19T14:54:32Z",
|
||||
"updated_at": "2024-05-21T12:35:07Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1798,
|
||||
"watchers_count": 1798,
|
||||
"stargazers_count": 1799,
|
||||
"watchers_count": 1799,
|
||||
"has_discussions": false,
|
||||
"forks_count": 580,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 580,
|
||||
"watchers": 1798,
|
||||
"watchers": 1799,
|
||||
"score": 0,
|
||||
"subscribers_count": 44
|
||||
},
|
||||
|
|
|
@ -236,10 +236,10 @@
|
|||
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T20:13:49Z",
|
||||
"updated_at": "2024-05-21T07:56:07Z",
|
||||
"updated_at": "2024-05-21T12:47:20Z",
|
||||
"pushed_at": "2024-05-19T16:25:52Z",
|
||||
"stargazers_count": 759,
|
||||
"watchers_count": 759,
|
||||
"stargazers_count": 761,
|
||||
"watchers_count": 761,
|
||||
"has_discussions": false,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
|
@ -248,7 +248,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 759,
|
||||
"watchers": 761,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-27T11:22:21Z",
|
||||
"updated_at": "2022-04-09T18:27:52Z",
|
||||
"updated_at": "2024-05-21T15:43:55Z",
|
||||
"pushed_at": "2022-09-16T17:53:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-20T22:16:49Z",
|
||||
"updated_at": "2024-03-09T22:45:29Z",
|
||||
"updated_at": "2024-05-21T17:02:49Z",
|
||||
"pushed_at": "2022-01-16T02:09:46Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 201,
|
||||
"watchers": 202,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2021-41091",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-02T07:25:13Z",
|
||||
"updated_at": "2024-05-15T15:30:35Z",
|
||||
"updated_at": "2024-05-21T12:36:35Z",
|
||||
"pushed_at": "2023-05-20T09:16:34Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -857,7 +857,7 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2024-05-10T10:43:29Z",
|
||||
"updated_at": "2024-05-21T16:33:08Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 925,
|
||||
"watchers_count": 925,
|
||||
|
@ -1268,10 +1268,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2024-05-21T08:48:28Z",
|
||||
"updated_at": "2024-05-21T14:10:05Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 776,
|
||||
"watchers_count": 776,
|
||||
"stargazers_count": 777,
|
||||
"watchers_count": 777,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
|
@ -1285,7 +1285,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 776,
|
||||
"watchers": 777,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
@ -2655,10 +2655,10 @@
|
|||
"description": "IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T13:17:18Z",
|
||||
"updated_at": "2023-02-26T00:49:44Z",
|
||||
"updated_at": "2024-05-21T18:02:25Z",
|
||||
"pushed_at": "2021-12-19T12:42:02Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -2667,7 +2667,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -11980,7 +11980,7 @@
|
|||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -12000,7 +12000,7 @@
|
|||
"vulnerable"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -1274,7 +1274,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-04-21T08:15:19Z",
|
||||
"updated_at": "2023-05-05T13:36:18Z",
|
||||
"pushed_at": "2024-04-17T18:37:11Z",
|
||||
"pushed_at": "2024-05-21T18:27:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "Vulnerabilities Exploitation On Ubuntu 22.04",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-16T10:26:10Z",
|
||||
"updated_at": "2024-04-19T07:24:04Z",
|
||||
"updated_at": "2024-05-21T15:46:40Z",
|
||||
"pushed_at": "2023-05-16T10:49:19Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -207,7 +207,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -321,10 +321,10 @@
|
|||
"description": "C# \/ .NET version of CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-15T17:42:10Z",
|
||||
"updated_at": "2024-05-20T05:56:30Z",
|
||||
"updated_at": "2024-05-21T15:40:36Z",
|
||||
"pushed_at": "2024-05-18T05:22:16Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -333,7 +333,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
32
2023/CVE-2023-46694.json
Normal file
32
2023/CVE-2023-46694.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 765655083,
|
||||
"name": "CVE-2023-46694",
|
||||
"full_name": "invisiblebyte\/CVE-2023-46694",
|
||||
"owner": {
|
||||
"login": "invisiblebyte",
|
||||
"id": 42798162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42798162?v=4",
|
||||
"html_url": "https:\/\/github.com\/invisiblebyte"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/invisiblebyte\/CVE-2023-46694",
|
||||
"description": "CVE-2023-46694 proof-of-concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-01T11:00:19Z",
|
||||
"updated_at": "2024-05-21T14:33:08Z",
|
||||
"pushed_at": "2024-03-01T11:02:33Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -197,8 +197,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-19T08:11:31Z",
|
||||
"updated_at": "2024-01-19T08:13:06Z",
|
||||
"pushed_at": "2024-01-19T08:38:16Z",
|
||||
"updated_at": "2024-05-21T12:56:29Z",
|
||||
"pushed_at": "2024-05-21T12:56:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-21T05:22:51Z",
|
||||
"updated_at": "2024-05-21T09:05:46Z",
|
||||
"updated_at": "2024-05-21T16:44:01Z",
|
||||
"pushed_at": "2023-12-18T04:25:00Z",
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 302,
|
||||
"watchers": 303,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Cookie Information | Free GDPR Consent Solution <= 2.0.22 - Authenticated (Subscriber+) Arbitrary Options Update",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-30T10:32:54Z",
|
||||
"updated_at": "2024-01-30T20:59:57Z",
|
||||
"pushed_at": "2024-01-30T10:34:57Z",
|
||||
"updated_at": "2024-05-21T13:58:41Z",
|
||||
"pushed_at": "2024-05-21T13:58:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-05-20T15:41:06Z",
|
||||
"updated_at": "2024-05-21T13:56:18Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 1937,
|
||||
"watchers_count": 1937,
|
||||
"stargazers_count": 1938,
|
||||
"watchers_count": 1938,
|
||||
"has_discussions": false,
|
||||
"forks_count": 240,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 240,
|
||||
"watchers": 1937,
|
||||
"watchers": 1938,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC and Detection for CVE-2024-21626",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-01T15:28:37Z",
|
||||
"updated_at": "2024-05-10T07:37:39Z",
|
||||
"updated_at": "2024-05-21T12:53:37Z",
|
||||
"pushed_at": "2024-02-06T16:09:05Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -163,8 +163,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-19T08:11:31Z",
|
||||
"updated_at": "2024-01-19T08:13:06Z",
|
||||
"pushed_at": "2024-01-19T08:38:16Z",
|
||||
"updated_at": "2024-05-21T12:56:29Z",
|
||||
"pushed_at": "2024-05-21T12:56:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Time Based SQL Injection in Zabbix Server Audit Log --> RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T03:29:09Z",
|
||||
"updated_at": "2024-05-21T10:45:01Z",
|
||||
"updated_at": "2024-05-21T17:28:57Z",
|
||||
"pushed_at": "2024-05-21T10:30:49Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -28,8 +28,8 @@
|
|||
"zabbix"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 46,
|
||||
"forks": 12,
|
||||
"watchers": 51,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-27804",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T14:17:06Z",
|
||||
"updated_at": "2024-05-21T11:25:52Z",
|
||||
"updated_at": "2024-05-21T14:31:41Z",
|
||||
"pushed_at": "2024-05-14T14:55:23Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -149,41 +149,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 798253455,
|
||||
"name": "CVE-2024-27956",
|
||||
"full_name": "nancyariah4\/CVE-2024-27956",
|
||||
"owner": {
|
||||
"login": "nancyariah4",
|
||||
"id": 167974334,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167974334?v=4",
|
||||
"html_url": "https:\/\/github.com\/nancyariah4"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nancyariah4\/CVE-2024-27956",
|
||||
"description": "CVE-2024-27956 RCE POC WordPress",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-09T12:07:14Z",
|
||||
"updated_at": "2024-05-13T11:52:50Z",
|
||||
"pushed_at": "2024-05-13T11:52:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2024-27956",
|
||||
"poc",
|
||||
"rce",
|
||||
"wordpress"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 800537570,
|
||||
"name": "WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956",
|
||||
|
@ -198,10 +163,10 @@
|
|||
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T14:21:49Z",
|
||||
"updated_at": "2024-05-21T12:29:01Z",
|
||||
"updated_at": "2024-05-21T14:02:16Z",
|
||||
"pushed_at": "2024-05-18T09:40:01Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -230,7 +195,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -263,5 +228,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 803888648,
|
||||
"name": "CVE-2024-27956",
|
||||
"full_name": "nancyariah4\/CVE-2024-27956",
|
||||
"owner": {
|
||||
"login": "nancyariah4",
|
||||
"id": 167974334,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167974334?v=4",
|
||||
"html_url": "https:\/\/github.com\/nancyariah4"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nancyariah4\/CVE-2024-27956",
|
||||
"description": "CVE-2024-27956-RCE-POC-Wordpress, Wordpress, CVE-2024-27956-PoC, RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-21T14:55:43Z",
|
||||
"updated_at": "2024-05-21T14:56:35Z",
|
||||
"pushed_at": "2024-05-21T14:56:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-15T13:11:45Z",
|
||||
"updated_at": "2024-05-20T09:53:02Z",
|
||||
"updated_at": "2024-05-21T14:32:27Z",
|
||||
"pushed_at": "2024-05-15T21:40:25Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -142,8 +142,8 @@
|
|||
"description": "CVE-2024-29895-CactiRCE-PoC , RCE, POC, CVE-2024-29895",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-21T12:30:59Z",
|
||||
"updated_at": "2024-05-21T12:31:03Z",
|
||||
"pushed_at": "2024-05-21T12:30:59Z",
|
||||
"updated_at": "2024-05-21T12:41:52Z",
|
||||
"pushed_at": "2024-05-21T12:33:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -151,7 +151,12 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve-2024-29895",
|
||||
"cve-2024-29895-cactirce-poc",
|
||||
"poc",
|
||||
"rce-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
|
|
|
@ -1012,10 +1012,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-05-21T07:57:32Z",
|
||||
"updated_at": "2024-05-21T14:53:34Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3466,
|
||||
"watchers_count": 3466,
|
||||
"stargazers_count": 3465,
|
||||
"watchers_count": 3465,
|
||||
"has_discussions": false,
|
||||
"forks_count": 233,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,7 +1024,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 233,
|
||||
"watchers": 3466,
|
||||
"watchers": 3465,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -34,7 +34,7 @@
|
|||
"threat-intel"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -43,12 +43,12 @@
|
|||
"description": "Exploit PoC for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T19:33:08Z",
|
||||
"updated_at": "2024-05-21T12:24:08Z",
|
||||
"updated_at": "2024-05-21T17:03:53Z",
|
||||
"pushed_at": "2024-05-19T07:12:00Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -59,8 +59,8 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 78,
|
||||
"forks": 37,
|
||||
"watchers": 83,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -83,13 +83,13 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -145,10 +145,10 @@
|
|||
"description": "CVE-2024-32002 RCE PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-18T15:05:28Z",
|
||||
"updated_at": "2024-05-21T11:08:26Z",
|
||||
"updated_at": "2024-05-21T16:30:42Z",
|
||||
"pushed_at": "2024-05-18T15:12:59Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -161,7 +161,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 66,
|
||||
"watchers": 68,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -719,8 +719,8 @@
|
|||
"description": "CVE-2024-32002 hook POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-21T12:31:57Z",
|
||||
"updated_at": "2024-05-21T12:31:57Z",
|
||||
"pushed_at": "2024-05-21T12:31:57Z",
|
||||
"updated_at": "2024-05-21T12:36:15Z",
|
||||
"pushed_at": "2024-05-21T12:36:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -734,5 +734,65 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 803835949,
|
||||
"name": "git_rce",
|
||||
"full_name": "Roronoawjd\/git_rce",
|
||||
"owner": {
|
||||
"login": "Roronoawjd",
|
||||
"id": 105417063,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105417063?v=4",
|
||||
"html_url": "https:\/\/github.com\/Roronoawjd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Roronoawjd\/git_rce",
|
||||
"description": "CVE-2024-32002 POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-21T13:19:15Z",
|
||||
"updated_at": "2024-05-21T13:49:15Z",
|
||||
"pushed_at": "2024-05-21T13:49:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 803851228,
|
||||
"name": "CVE-2024-32002-Reverse-Shell",
|
||||
"full_name": "JJoosh\/CVE-2024-32002-Reverse-Shell",
|
||||
"owner": {
|
||||
"login": "JJoosh",
|
||||
"id": 122099216,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122099216?v=4",
|
||||
"html_url": "https:\/\/github.com\/JJoosh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JJoosh\/CVE-2024-32002-Reverse-Shell",
|
||||
"description": "Este script demuestra cómo explotar la vulnerabilidad CVE-2024-32002 para obtener una reverse shell, proporcionando acceso remoto al sistema afectado. Úselo con precaución en entornos controlados y solo con fines educativos o de pruebas de seguridad.",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-21T13:45:58Z",
|
||||
"updated_at": "2024-05-21T15:42:18Z",
|
||||
"pushed_at": "2024-05-21T14:01:26Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -70,5 +70,39 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 803868864,
|
||||
"name": "CVE-2024-32640-MuraCMS",
|
||||
"full_name": "nancyariah4\/CVE-2024-32640-MuraCMS",
|
||||
"owner": {
|
||||
"login": "nancyariah4",
|
||||
"id": 167974334,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167974334?v=4",
|
||||
"html_url": "https:\/\/github.com\/nancyariah4"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nancyariah4\/CVE-2024-32640-MuraCMS",
|
||||
"description": "CVE-2024-32640-SQLI-MuraCMS",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-21T14:19:01Z",
|
||||
"updated_at": "2024-05-21T14:21:47Z",
|
||||
"pushed_at": "2024-05-21T14:19:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2024-32640-muracms",
|
||||
"cve-2024-32640-poc",
|
||||
"cve-2024-32640-sqli-muracms"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,8 +43,8 @@
|
|||
"description": "Patch your D-Link device affected by CVE-2024-3272 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-21T08:40:37Z",
|
||||
"updated_at": "2024-05-21T09:12:24Z",
|
||||
"pushed_at": "2024-05-21T08:41:52Z",
|
||||
"updated_at": "2024-05-21T12:37:15Z",
|
||||
"pushed_at": "2024-05-21T12:37:12Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "(CVE-2024-33559) The XStore theme for WordPress is vulnerable to SQL Injection due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T04:15:34Z",
|
||||
"updated_at": "2024-05-17T04:20:32Z",
|
||||
"updated_at": "2024-05-21T17:18:32Z",
|
||||
"pushed_at": "2024-05-17T04:20:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "This proof-of-concept script demonstrates how to exploit CVE-2024-4323, a memory corruption vulnerability in Fluent Bit, enabling remote code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T15:04:13Z",
|
||||
"updated_at": "2024-05-21T10:58:47Z",
|
||||
"updated_at": "2024-05-21T15:40:47Z",
|
||||
"pushed_at": "2024-05-20T15:28:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -26,12 +26,44 @@
|
|||
"cve-2024-4323",
|
||||
"cve-2024-4323-exploit-poc",
|
||||
"exploit",
|
||||
"exploit-poc"
|
||||
"exploit-poc",
|
||||
"fluent-bit",
|
||||
"rce-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 803825364,
|
||||
"name": "CVE-2024-4323",
|
||||
"full_name": "d0rb\/CVE-2024-4323",
|
||||
"owner": {
|
||||
"login": "d0rb",
|
||||
"id": 10403781,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
|
||||
"html_url": "https:\/\/github.com\/d0rb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/d0rb\/CVE-2024-4323",
|
||||
"description": "Critical heap buffer overflow vulnerability in the handle_trace_request and parse_trace_request functions of the Fluent Bit HTTP server.",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-21T12:59:16Z",
|
||||
"updated_at": "2024-05-21T13:15:40Z",
|
||||
"pushed_at": "2024-05-21T13:15:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T10:02:23Z",
|
||||
"updated_at": "2024-05-21T12:19:39Z",
|
||||
"updated_at": "2024-05-21T12:44:34Z",
|
||||
"pushed_at": "2024-05-20T10:18:42Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-4367 arbitrary js execution in pdf js",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T22:56:10Z",
|
||||
"updated_at": "2024-05-21T11:01:28Z",
|
||||
"updated_at": "2024-05-21T17:54:42Z",
|
||||
"pushed_at": "2024-05-20T23:09:43Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
32
2024/CVE-2024-4875.json
Normal file
32
2024/CVE-2024-4875.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 803866868,
|
||||
"name": "CVE-2024-4875",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-4875",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-4875",
|
||||
"description": "HT Mega – Absolute Addons For Elementor <= 2.5.2 - Missing Authorization to Options Update",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-21T14:15:16Z",
|
||||
"updated_at": "2024-05-21T14:17:24Z",
|
||||
"pushed_at": "2024-05-21T14:17:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
23
README.md
23
README.md
|
@ -517,6 +517,7 @@
|
|||
</code>
|
||||
|
||||
- [skilfoy/CVE-2024-4323-Exploit-POC](https://github.com/skilfoy/CVE-2024-4323-Exploit-POC)
|
||||
- [d0rb/CVE-2024-4323](https://github.com/d0rb/CVE-2024-4323)
|
||||
|
||||
### CVE-2024-4352 (2024-05-16)
|
||||
|
||||
|
@ -556,6 +557,13 @@
|
|||
|
||||
- [michredteam/CVE-2024-4761](https://github.com/michredteam/CVE-2024-4761)
|
||||
|
||||
### CVE-2024-4875 (2024-05-21)
|
||||
|
||||
<code>The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to unauthorized modification of data|loss of data due to a missing capability check on the 'ajax_dismiss' function in versions up to, and including, 2.5.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update options such as users_can_register, which can lead to unauthorized user registration.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-4875](https://github.com/RandomRobbieBF/CVE-2024-4875)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
||||
|
@ -1490,7 +1498,11 @@
|
|||
|
||||
- [MaherAzzouzi/CVE-2024-26817-amdkfd](https://github.com/MaherAzzouzi/CVE-2024-26817-amdkfd)
|
||||
|
||||
### CVE-2024-27130
|
||||
### CVE-2024-27130 (2024-05-21)
|
||||
|
||||
<code>A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute code via a network.\n\nWe have already fixed the vulnerability in the following version:\nQTS 5.1.7.2770 build 20240520 and later\nQuTS hero h5.1.7.2770 build 20240520 and later
|
||||
</code>
|
||||
|
||||
- [watchtowrlabs/CVE-2024-27130](https://github.com/watchtowrlabs/CVE-2024-27130)
|
||||
- [d0rb/CVE-2024-27130](https://github.com/d0rb/CVE-2024-27130)
|
||||
|
||||
|
@ -1608,9 +1620,9 @@
|
|||
- [X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN](https://github.com/X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN)
|
||||
- [FoxyProxys/CVE-2024-27956](https://github.com/FoxyProxys/CVE-2024-27956)
|
||||
- [k3ppf0r/CVE-2024-27956](https://github.com/k3ppf0r/CVE-2024-27956)
|
||||
- [nancyariah4/CVE-2024-27956](https://github.com/nancyariah4/CVE-2024-27956)
|
||||
- [AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956](https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956)
|
||||
- [W3BW/CVE-2024-27956-RCE-File-Package](https://github.com/W3BW/CVE-2024-27956-RCE-File-Package)
|
||||
- [nancyariah4/CVE-2024-27956](https://github.com/nancyariah4/CVE-2024-27956)
|
||||
|
||||
### CVE-2024-27971 (2024-05-17)
|
||||
|
||||
|
@ -1920,6 +1932,8 @@
|
|||
- [jerrydotlam/cve-2024-32002-3](https://github.com/jerrydotlam/cve-2024-32002-3)
|
||||
- [1mxml/CVE-2024-32002-poc](https://github.com/1mxml/CVE-2024-32002-poc)
|
||||
- [Roronoawjd/hook](https://github.com/Roronoawjd/hook)
|
||||
- [Roronoawjd/git_rce](https://github.com/Roronoawjd/git_rce)
|
||||
- [JJoosh/CVE-2024-32002-Reverse-Shell](https://github.com/JJoosh/CVE-2024-32002-Reverse-Shell)
|
||||
|
||||
### CVE-2024-32004 (2024-05-14)
|
||||
|
||||
|
@ -1992,6 +2006,7 @@
|
|||
### CVE-2024-32640
|
||||
- [Stuub/CVE-2024-32640-SQLI-MuraCMS](https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS)
|
||||
- [0x3f3c/CVE-2024-32640-SQLI-MuraCMS](https://github.com/0x3f3c/CVE-2024-32640-SQLI-MuraCMS)
|
||||
- [nancyariah4/CVE-2024-32640-MuraCMS](https://github.com/nancyariah4/CVE-2024-32640-MuraCMS)
|
||||
|
||||
### CVE-2024-32709 (2024-04-24)
|
||||
|
||||
|
@ -8839,6 +8854,9 @@
|
|||
|
||||
- [RandomRobbieBF/CVE-2023-46615](https://github.com/RandomRobbieBF/CVE-2023-46615)
|
||||
|
||||
### CVE-2023-46694
|
||||
- [invisiblebyte/CVE-2023-46694](https://github.com/invisiblebyte/CVE-2023-46694)
|
||||
|
||||
### CVE-2023-46747 (2023-10-26)
|
||||
|
||||
<code>\n\n\nUndisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated\n\n
|
||||
|
@ -41366,6 +41384,7 @@
|
|||
|
||||
- [snoopopsec/vulnerability-CVE-2013-3900](https://github.com/snoopopsec/vulnerability-CVE-2013-3900)
|
||||
- [CyberCondor/Fix-WinVerifyTrustSignatureValidationVuln](https://github.com/CyberCondor/Fix-WinVerifyTrustSignatureValidationVuln)
|
||||
- [Securenetology/CVE-2013-3900](https://github.com/Securenetology/CVE-2013-3900)
|
||||
|
||||
### CVE-2013-4002 (2013-07-23)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue