mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/30 18:32:01
This commit is contained in:
parent
0602e9d56c
commit
62b032a115
28 changed files with 207 additions and 103 deletions
|
@ -45,10 +45,10 @@
|
|||
"description": "Exploit for CVE-2014-160 (heartbleed) with required patch for libopenssl",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-09T23:33:33Z",
|
||||
"updated_at": "2021-06-28T15:54:58Z",
|
||||
"updated_at": "2024-12-30T14:43:49Z",
|
||||
"pushed_at": "2014-04-09T23:39:03Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -246,5 +246,36 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 910092930,
|
||||
"name": "autoblue",
|
||||
"full_name": "AtithKhawas\/autoblue",
|
||||
"owner": {
|
||||
"login": "AtithKhawas",
|
||||
"id": 132275205,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132275205?v=4",
|
||||
"html_url": "https:\/\/github.com\/AtithKhawas",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AtithKhawas\/autoblue",
|
||||
"description": "AutoBlue - Automated EternalBlue (CVE-2017-0144 \/ MS17-010) exploitation tool leveraging Nmap and Metasploit for ethical hacking, penetration testing, and CTF challenges. Strictly for authorized and educational use only!",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-30T13:28:29Z",
|
||||
"updated_at": "2024-12-30T13:28:33Z",
|
||||
"pushed_at": "2024-12-30T13:28:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -355,10 +355,10 @@
|
|||
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-13T11:01:41Z",
|
||||
"updated_at": "2024-12-19T07:25:22Z",
|
||||
"updated_at": "2024-12-30T17:26:17Z",
|
||||
"pushed_at": "2022-11-15T09:05:50Z",
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -367,7 +367,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 208,
|
||||
"watchers": 209,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -675,6 +675,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 85664016,
|
||||
"name": "st2-046-poc",
|
||||
"full_name": "jas502n\/st2-046-poc",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/st2-046-poc",
|
||||
"description": "st2-046-poc CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-21T05:47:49Z",
|
||||
"updated_at": "2024-12-30T18:01:01Z",
|
||||
"pushed_at": "2018-08-17T05:15:41Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 85733752,
|
||||
"name": "S2-046_S2-045_POC",
|
||||
|
|
|
@ -174,10 +174,10 @@
|
|||
"description": "fixed msf module for cve-2017-7269",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-30T22:20:36Z",
|
||||
"updated_at": "2024-11-13T06:36:25Z",
|
||||
"updated_at": "2024-12-30T18:01:01Z",
|
||||
"pushed_at": "2017-03-30T22:20:51Z",
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
|
@ -186,7 +186,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 135,
|
||||
"watchers": 134,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -329,10 +329,10 @@
|
|||
"description": "A PoC exploit for CVE-2018-14847 - MikroTik WinBox File Read",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-22T22:33:25Z",
|
||||
"updated_at": "2024-12-03T08:06:15Z",
|
||||
"updated_at": "2024-12-30T16:19:41Z",
|
||||
"pushed_at": "2024-05-02T23:52:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -356,7 +356,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T04:09:29Z",
|
||||
"updated_at": "2024-09-25T09:59:05Z",
|
||||
"updated_at": "2024-12-30T14:35:51Z",
|
||||
"pushed_at": "2020-02-26T09:24:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -461,10 +461,10 @@
|
|||
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T18:34:40Z",
|
||||
"updated_at": "2024-12-24T07:46:46Z",
|
||||
"updated_at": "2024-12-30T16:43:45Z",
|
||||
"pushed_at": "2023-02-26T07:01:03Z",
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"stargazers_count": 323,
|
||||
"watchers_count": 323,
|
||||
"has_discussions": false,
|
||||
"forks_count": 121,
|
||||
"allow_forking": true,
|
||||
|
@ -478,7 +478,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 121,
|
||||
"watchers": 322,
|
||||
"watchers": 323,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -176,10 +176,10 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2024-12-30T05:52:23Z",
|
||||
"updated_at": "2024-12-30T15:43:36Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 641,
|
||||
"watchers_count": 641,
|
||||
"stargazers_count": 642,
|
||||
"watchers_count": 642,
|
||||
"has_discussions": false,
|
||||
"forks_count": 147,
|
||||
"allow_forking": true,
|
||||
|
@ -188,7 +188,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 147,
|
||||
"watchers": 641,
|
||||
"watchers": 642,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -888,10 +888,10 @@
|
|||
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-13T11:01:41Z",
|
||||
"updated_at": "2024-12-19T07:25:22Z",
|
||||
"updated_at": "2024-12-30T17:26:17Z",
|
||||
"pushed_at": "2022-11-15T09:05:50Z",
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -900,7 +900,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 208,
|
||||
"watchers": 209,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -981,10 +981,10 @@
|
|||
"description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2024-12-26T03:38:47Z",
|
||||
"updated_at": "2024-12-30T18:13:09Z",
|
||||
"pushed_at": "2024-11-13T03:12:58Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -1001,7 +1001,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 165,
|
||||
"watchers": 166,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -45,8 +45,8 @@
|
|||
"description": "A Bash script for Kali Linux that exploits an iOS WebKit vulnerability (CVE-2020-27950) using Metasploit and ngrok. Automates payload delivery with a public URL via ngrok, checks for required tools, handles errors, and provides an easy way to crash browsers for educational purposes only.",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-15T16:54:03Z",
|
||||
"updated_at": "2024-11-25T03:48:38Z",
|
||||
"pushed_at": "2024-11-15T03:41:34Z",
|
||||
"updated_at": "2024-12-30T14:48:33Z",
|
||||
"pushed_at": "2024-12-30T14:48:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -231,10 +231,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2024-12-26T12:47:14Z",
|
||||
"updated_at": "2024-12-30T13:32:31Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1605,
|
||||
"watchers_count": 1605,
|
||||
"stargazers_count": 1606,
|
||||
"watchers_count": 1606,
|
||||
"has_discussions": false,
|
||||
"forks_count": 483,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 483,
|
||||
"watchers": 1605,
|
||||
"watchers": 1606,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -745,10 +745,10 @@
|
|||
"description": "Script to demonstrate the Grafana directory traversal exploit (CVE-2021-43798).",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-25T09:26:40Z",
|
||||
"updated_at": "2022-09-27T15:55:16Z",
|
||||
"updated_at": "2024-12-30T14:23:05Z",
|
||||
"pushed_at": "2022-09-13T14:20:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -757,7 +757,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -381,10 +381,10 @@
|
|||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2024-12-26T19:43:07Z",
|
||||
"updated_at": "2024-12-30T13:34:08Z",
|
||||
"pushed_at": "2024-04-26T03:16:26Z",
|
||||
"stargazers_count": 1110,
|
||||
"watchers_count": 1110,
|
||||
"stargazers_count": 1111,
|
||||
"watchers_count": 1111,
|
||||
"has_discussions": false,
|
||||
"forks_count": 534,
|
||||
"allow_forking": true,
|
||||
|
@ -395,7 +395,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 534,
|
||||
"watchers": 1110,
|
||||
"watchers": 1111,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-10T10:26:57Z",
|
||||
"updated_at": "2024-12-21T17:27:17Z",
|
||||
"updated_at": "2024-12-30T13:27:34Z",
|
||||
"pushed_at": "2024-09-10T16:18:40Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof-of-Concept for CVE-2023-38146 (\"ThemeBleed\")",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-13T04:00:14Z",
|
||||
"updated_at": "2024-12-14T12:57:58Z",
|
||||
"updated_at": "2024-12-30T13:28:54Z",
|
||||
"pushed_at": "2023-09-13T04:50:29Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 190,
|
||||
"watchers": 191,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
33
2023/CVE-2023-4147.json
Normal file
33
2023/CVE-2023-4147.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 910222440,
|
||||
"name": "Exploit-en-Python-para-CVE-2023-4147",
|
||||
"full_name": "murdok1982\/Exploit-en-Python-para-CVE-2023-4147",
|
||||
"owner": {
|
||||
"login": "murdok1982",
|
||||
"id": 14059710,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14059710?v=4",
|
||||
"html_url": "https:\/\/github.com\/murdok1982",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/murdok1982\/Exploit-en-Python-para-CVE-2023-4147",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-30T18:08:46Z",
|
||||
"updated_at": "2024-12-30T18:10:25Z",
|
||||
"pushed_at": "2024-12-30T18:10:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 1313,
|
||||
"watchers_count": 1313,
|
||||
"has_discussions": false,
|
||||
"forks_count": 223,
|
||||
"forks_count": 224,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 223,
|
||||
"forks": 224,
|
||||
"watchers": 1313,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "LPE exploit for CVE-2024-0582 (io_uring)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T14:45:22Z",
|
||||
"updated_at": "2024-12-06T09:40:39Z",
|
||||
"updated_at": "2024-12-30T16:35:20Z",
|
||||
"pushed_at": "2024-03-29T16:05:31Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -107,10 +107,10 @@
|
|||
"description": "is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-03T07:56:36Z",
|
||||
"updated_at": "2024-10-21T08:15:18Z",
|
||||
"updated_at": "2024-12-30T14:40:46Z",
|
||||
"pushed_at": "2024-10-03T07:58:47Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -133,7 +133,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "Unauthenticated Command Injection In Progress Kemp LoadMaster",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-19T22:23:18Z",
|
||||
"updated_at": "2024-12-30T09:47:07Z",
|
||||
"updated_at": "2024-12-30T13:06:11Z",
|
||||
"pushed_at": "2024-03-19T22:25:21Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 16,
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "PoC for CVE-2024-21182",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-29T15:48:03Z",
|
||||
"updated_at": "2024-12-30T10:26:15Z",
|
||||
"updated_at": "2024-12-30T15:47:02Z",
|
||||
"pushed_at": "2024-12-29T15:56:14Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 15,
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-21345",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-26T16:38:17Z",
|
||||
"updated_at": "2024-11-20T16:30:45Z",
|
||||
"updated_at": "2024-12-30T13:28:54Z",
|
||||
"pushed_at": "2024-04-26T16:39:48Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -169,10 +169,10 @@
|
|||
"description": "RCE through a race condition in Apache Tomcat",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-21T05:54:29Z",
|
||||
"updated_at": "2024-12-30T11:54:02Z",
|
||||
"updated_at": "2024-12-30T15:45:48Z",
|
||||
"pushed_at": "2024-12-21T08:56:44Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 42,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -200,10 +200,10 @@
|
|||
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-23T07:20:47Z",
|
||||
"updated_at": "2024-12-29T06:40:38Z",
|
||||
"updated_at": "2024-12-30T18:18:04Z",
|
||||
"pushed_at": "2024-12-23T07:30:27Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -212,7 +212,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T11:58:25Z",
|
||||
"updated_at": "2024-12-25T13:17:00Z",
|
||||
"updated_at": "2024-12-30T14:07:15Z",
|
||||
"pushed_at": "2024-08-30T01:15:43Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PAN-OS auth bypass + RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T17:26:27Z",
|
||||
"updated_at": "2024-12-27T06:56:19Z",
|
||||
"updated_at": "2024-12-30T13:13:09Z",
|
||||
"pushed_at": "2024-11-19T17:38:29Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -8607,6 +8607,13 @@
|
|||
- [miguelc49/CVE-2023-4145-1](https://github.com/miguelc49/CVE-2023-4145-1)
|
||||
- [miguelc49/CVE-2023-4145-3](https://github.com/miguelc49/CVE-2023-4145-3)
|
||||
|
||||
### CVE-2023-4147 (2023-08-07)
|
||||
|
||||
<code>A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
|
||||
</code>
|
||||
|
||||
- [murdok1982/Exploit-en-Python-para-CVE-2023-4147](https://github.com/murdok1982/Exploit-en-Python-para-CVE-2023-4147)
|
||||
|
||||
### CVE-2023-4165 (2023-08-05)
|
||||
|
||||
<code>Es wurde eine kritische Schwachstelle in Tongda OA gefunden. Hiervon betroffen ist ein unbekannter Codeblock der Datei general/system/seal_manage/iweboffice/delete_seal.php. Dank der Manipulation des Arguments DELETE_STR mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 11.10 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.
|
||||
|
@ -42716,6 +42723,7 @@
|
|||
- [AnugiArrawwala/CVE-Research](https://github.com/AnugiArrawwala/CVE-Research)
|
||||
- [DenuwanJayasekara/CVE-Exploitation-Reports](https://github.com/DenuwanJayasekara/CVE-Exploitation-Reports)
|
||||
- [sethwhy/BlueDoor](https://github.com/sethwhy/BlueDoor)
|
||||
- [AtithKhawas/autoblue](https://github.com/AtithKhawas/autoblue)
|
||||
|
||||
### CVE-2017-0145 (2017-03-17)
|
||||
|
||||
|
@ -43204,6 +43212,7 @@
|
|||
- [opt9/Strutshock](https://github.com/opt9/Strutshock)
|
||||
- [falcon-lnhg/StrutsShell](https://github.com/falcon-lnhg/StrutsShell)
|
||||
- [bhagdave/CVE-2017-5638](https://github.com/bhagdave/CVE-2017-5638)
|
||||
- [jas502n/st2-046-poc](https://github.com/jas502n/st2-046-poc)
|
||||
- [KarzsGHR/S2-046_S2-045_POC](https://github.com/KarzsGHR/S2-046_S2-045_POC)
|
||||
- [gsfish/S2-Reaper](https://github.com/gsfish/S2-Reaper)
|
||||
- [mcassano/cve-2017-5638](https://github.com/mcassano/cve-2017-5638)
|
||||
|
|
Loading…
Reference in a new issue