mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/04/19 00:31:05
This commit is contained in:
parent
adfff7edae
commit
64c968ab0b
19 changed files with 195 additions and 176 deletions
|
@ -88,5 +88,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 788614854,
|
||||
"name": "UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
|
||||
"full_name": "JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
|
||||
"owner": {
|
||||
"login": "JoseLRC97",
|
||||
"id": 56311988,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56311988?v=4",
|
||||
"html_url": "https:\/\/github.com\/JoseLRC97"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
|
||||
"description": "Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-18T18:55:27Z",
|
||||
"updated_at": "2024-04-18T18:58:51Z",
|
||||
"pushed_at": "2024-04-18T18:59:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -347,11 +347,11 @@
|
|||
"html_url": "https:\/\/github.com\/JoseLRC97"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JoseLRC97\/ProFTPd-1.3.5-mod_copy-Remote-Command-Execution",
|
||||
"description": "Script that exploits the vulnerability of the ProFTP 1.3.5 service with CVE-2015-3306",
|
||||
"description": "Script that exploits the vulnerability of the ProFTPd 1.3.5 service with CVE-2015-3306",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-18T18:05:06Z",
|
||||
"updated_at": "2024-04-18T18:05:07Z",
|
||||
"pushed_at": "2024-04-18T18:08:32Z",
|
||||
"updated_at": "2024-04-18T18:13:27Z",
|
||||
"pushed_at": "2024-04-18T18:37:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -311,5 +311,35 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 788610920,
|
||||
"name": "Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution",
|
||||
"full_name": "JoseLRC97\/Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution",
|
||||
"owner": {
|
||||
"login": "JoseLRC97",
|
||||
"id": 56311988,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56311988?v=4",
|
||||
"html_url": "https:\/\/github.com\/JoseLRC97"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JoseLRC97\/Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution",
|
||||
"description": "Script that exploits the vulnerability that allows remote code execution in Ruby 2.3.8 with CVE-2016-2098",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-18T18:45:28Z",
|
||||
"updated_at": "2024-04-18T18:48:28Z",
|
||||
"pushed_at": "2024-04-18T18:48:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -119,10 +119,10 @@
|
|||
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-03T10:18:04Z",
|
||||
"updated_at": "2024-04-04T08:30:54Z",
|
||||
"updated_at": "2024-04-18T19:17:35Z",
|
||||
"pushed_at": "2019-03-24T11:20:27Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -131,7 +131,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 787709839,
|
||||
"name": "CVE-2021-23337-template",
|
||||
"full_name": "ebickle\/CVE-2021-23337-template",
|
||||
"owner": {
|
||||
"login": "ebickle",
|
||||
"id": 2086875,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2086875?v=4",
|
||||
"html_url": "https:\/\/github.com\/ebickle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ebickle\/CVE-2021-23337-template",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-17T03:09:52Z",
|
||||
"updated_at": "2024-04-17T03:16:23Z",
|
||||
"pushed_at": "2024-04-17T03:37:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1115,35 +1115,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 788551005,
|
||||
"name": "CVE-2021-26084_Confluence_RCE",
|
||||
"full_name": "Marshall-Hallenbeck\/CVE-2021-26084_Confluence_RCE",
|
||||
"owner": {
|
||||
"login": "Marshall-Hallenbeck",
|
||||
"id": 1518719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1518719?v=4",
|
||||
"html_url": "https:\/\/github.com\/Marshall-Hallenbeck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Marshall-Hallenbeck\/CVE-2021-26084_Confluence_RCE",
|
||||
"description": "Python3 RCE PoC for CVE-2021-26084",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-18T16:28:15Z",
|
||||
"updated_at": "2024-04-18T16:28:16Z",
|
||||
"pushed_at": "2024-04-18T16:28:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Gerapy prior to version 0.9.8 is vulnerable to remote code execution. This issue is patched in version 0.9.8.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-03T16:47:42Z",
|
||||
"updated_at": "2023-11-08T16:17:57Z",
|
||||
"updated_at": "2024-04-18T18:30:48Z",
|
||||
"pushed_at": "2022-01-03T16:53:04Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-04-18T13:45:27Z",
|
||||
"updated_at": "2024-04-18T23:45:37Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1748,
|
||||
"watchers_count": 1748,
|
||||
"stargazers_count": 1749,
|
||||
"watchers_count": 1749,
|
||||
"has_discussions": false,
|
||||
"forks_count": 513,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 513,
|
||||
"watchers": 1748,
|
||||
"watchers": 1749,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -1064,7 +1064,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-02-19T19:49:41Z",
|
||||
"updated_at": "2023-03-26T07:35:15Z",
|
||||
"pushed_at": "2024-04-17T00:18:11Z",
|
||||
"pushed_at": "2024-04-18T18:27:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -1424,7 +1424,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-09-22T17:17:26Z",
|
||||
"updated_at": "2023-09-22T17:17:44Z",
|
||||
"pushed_at": "2024-03-22T06:11:09Z",
|
||||
"pushed_at": "2024-04-18T18:54:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T17:29:10Z",
|
||||
"updated_at": "2024-01-24T11:22:26Z",
|
||||
"updated_at": "2024-04-18T21:49:00Z",
|
||||
"pushed_at": "2023-01-05T17:40:18Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 103,
|
||||
"watchers": 102,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-12-04T15:55:22Z",
|
||||
"updated_at": "2024-04-02T23:46:40Z",
|
||||
"pushed_at": "2024-04-09T09:00:15Z",
|
||||
"pushed_at": "2024-04-18T22:00:21Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 603535681,
|
||||
"name": "CVE-2023-27053_XSS",
|
||||
"full_name": "d3fudd\/CVE-2023-27053_XSS",
|
||||
"owner": {
|
||||
"login": "d3fudd",
|
||||
"id": 76706456,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76706456?v=4",
|
||||
"html_url": "https:\/\/github.com\/d3fudd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/d3fudd\/CVE-2023-27053_XSS",
|
||||
"description": "CVE-2023-27053 - The cross-site scripting (XSS) vulnerability in the macFiltering and portIpFiltering endpoints allows attackers to insert javascript code through the macAddress and ipAddress parameters. The vulnerability affects the HUMAX DO BRASIL INDÚSTRIA ELETRÔNICA LTDA Model HGJ310 (CLARO) BRGCAI 1.0.69 router",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-18T20:05:47Z",
|
||||
"updated_at": "2024-01-23T23:50:53Z",
|
||||
"pushed_at": "2023-05-17T00:51:37Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -174,10 +174,10 @@
|
|||
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-28T04:56:10Z",
|
||||
"updated_at": "2024-04-11T16:55:02Z",
|
||||
"updated_at": "2024-04-18T19:36:09Z",
|
||||
"pushed_at": "2023-08-28T20:41:57Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -186,7 +186,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -264,10 +264,10 @@
|
|||
"description": "CVE-2023-38831 WinRAR",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-28T14:48:35Z",
|
||||
"updated_at": "2024-03-09T09:05:49Z",
|
||||
"updated_at": "2024-04-18T19:39:48Z",
|
||||
"pushed_at": "2023-08-28T15:35:43Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -276,7 +276,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T05:53:02Z",
|
||||
"updated_at": "2024-04-18T17:12:36Z",
|
||||
"updated_at": "2024-04-18T20:16:20Z",
|
||||
"pushed_at": "2024-04-16T21:00:14Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "aiohttp LFI (CVE-2024-23334)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-19T16:28:56Z",
|
||||
"updated_at": "2024-04-08T11:56:50Z",
|
||||
"updated_at": "2024-04-19T00:27:32Z",
|
||||
"pushed_at": "2024-03-19T17:06:26Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-14T17:48:49Z",
|
||||
"updated_at": "2024-04-17T12:54:11Z",
|
||||
"updated_at": "2024-04-18T21:33:45Z",
|
||||
"pushed_at": "2024-03-14T17:49:48Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -498,7 +498,7 @@
|
|||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -509,7 +509,7 @@
|
|||
"xz"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"forks": 22,
|
||||
"watchers": 130,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
@ -1012,7 +1012,7 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-04-18T18:21:33Z",
|
||||
"updated_at": "2024-04-18T20:26:16Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3386,
|
||||
"watchers_count": 3386,
|
||||
|
@ -1102,10 +1102,10 @@
|
|||
"description": "XZ Backdoor Extract(Test on Ubuntu 23.10)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T16:08:50Z",
|
||||
"updated_at": "2024-04-15T16:23:36Z",
|
||||
"updated_at": "2024-04-18T22:54:23Z",
|
||||
"pushed_at": "2024-04-02T07:12:53Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -1119,7 +1119,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -283,10 +283,10 @@
|
|||
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T14:18:08Z",
|
||||
"updated_at": "2024-04-18T17:12:56Z",
|
||||
"updated_at": "2024-04-18T23:26:52Z",
|
||||
"pushed_at": "2024-04-16T22:35:43Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -295,7 +295,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 74,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -313,10 +313,10 @@
|
|||
"description": "CVE-2024-3400-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T16:18:56Z",
|
||||
"updated_at": "2024-04-18T15:50:02Z",
|
||||
"updated_at": "2024-04-18T20:47:11Z",
|
||||
"pushed_at": "2024-04-17T01:11:01Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -325,7 +325,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -373,10 +373,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T21:21:41Z",
|
||||
"updated_at": "2024-04-18T10:12:34Z",
|
||||
"updated_at": "2024-04-18T23:17:15Z",
|
||||
"pushed_at": "2024-04-17T21:04:22Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -385,7 +385,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -558,13 +558,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -613,10 +613,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-18T10:16:22Z",
|
||||
"updated_at": "2024-04-18T10:25:23Z",
|
||||
"pushed_at": "2024-04-18T14:41:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2024-04-18T19:39:44Z",
|
||||
"pushed_at": "2024-04-18T19:23:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -625,7 +625,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -670,10 +670,10 @@
|
|||
"html_url": "https:\/\/github.com\/codeblueprint"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeblueprint\/CVE-2024-3400",
|
||||
"description": "Simple Python code to check for arbitrary uploading",
|
||||
"description": "Simple Python code to check for arbitrary uploading for PaloAlto CVE-2024-3400",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-18T16:35:29Z",
|
||||
"updated_at": "2024-04-18T17:01:39Z",
|
||||
"updated_at": "2024-04-18T20:15:20Z",
|
||||
"pushed_at": "2024-04-18T17:31:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -718,5 +718,65 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 788665827,
|
||||
"name": "CVE-2024-3400-Check",
|
||||
"full_name": "sxyrxyy\/CVE-2024-3400-Check",
|
||||
"owner": {
|
||||
"login": "sxyrxyy",
|
||||
"id": 125439203,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125439203?v=4",
|
||||
"html_url": "https:\/\/github.com\/sxyrxyy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sxyrxyy\/CVE-2024-3400-Check",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-18T21:12:49Z",
|
||||
"updated_at": "2024-04-18T21:13:17Z",
|
||||
"pushed_at": "2024-04-18T22:56:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 788666276,
|
||||
"name": "CVE-2024-3400",
|
||||
"full_name": "Ravaan21\/CVE-2024-3400",
|
||||
"owner": {
|
||||
"login": "Ravaan21",
|
||||
"id": 48627542,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48627542?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ravaan21"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ravaan21\/CVE-2024-3400",
|
||||
"description": "CVE-2024-3400 POC written in Rust and Python",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-18T21:14:15Z",
|
||||
"updated_at": "2024-04-18T21:16:31Z",
|
||||
"pushed_at": "2024-04-18T21:21:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
17
README.md
17
README.md
|
@ -377,7 +377,7 @@
|
|||
|
||||
### CVE-2024-3400 (2024-04-12)
|
||||
|
||||
<code>A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.\n\nCloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
|
||||
<code>A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.\n\nCloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
|
||||
</code>
|
||||
|
||||
- [Yuvvi01/CVE-2024-3400](https://github.com/Yuvvi01/CVE-2024-3400)
|
||||
|
@ -404,6 +404,8 @@
|
|||
- [hahasagined/CVE-2024-3400](https://github.com/hahasagined/CVE-2024-3400)
|
||||
- [codeblueprint/CVE-2024-3400](https://github.com/codeblueprint/CVE-2024-3400)
|
||||
- [swaybs/CVE-2024-3400](https://github.com/swaybs/CVE-2024-3400)
|
||||
- [sxyrxyy/CVE-2024-3400-Check](https://github.com/sxyrxyy/CVE-2024-3400-Check)
|
||||
- [Ravaan21/CVE-2024-3400](https://github.com/Ravaan21/CVE-2024-3400)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
@ -4090,9 +4092,6 @@
|
|||
|
||||
- [fivex3/CVE-2023-27035](https://github.com/fivex3/CVE-2023-27035)
|
||||
|
||||
### CVE-2023-27053
|
||||
- [d3fudd/CVE-2023-27053_XSS](https://github.com/d3fudd/CVE-2023-27053_XSS)
|
||||
|
||||
### CVE-2023-27100 (2023-03-22)
|
||||
|
||||
<code>Improper restriction of excessive authentication attempts in the SSHGuard component of Netgate pfSense Plus software v22.05.1 and pfSense CE software v2.6.0 allows attackers to bypass brute force protection mechanisms via crafted web requests.
|
||||
|
@ -17488,13 +17487,6 @@
|
|||
|
||||
- [HoangKien1020/CVE-2021-23132](https://github.com/HoangKien1020/CVE-2021-23132)
|
||||
|
||||
### CVE-2021-23337 (2021-02-15)
|
||||
|
||||
<code>Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
|
||||
</code>
|
||||
|
||||
- [ebickle/CVE-2021-23337-template](https://github.com/ebickle/CVE-2021-23337-template)
|
||||
|
||||
### CVE-2021-23358 (2021-03-29)
|
||||
|
||||
<code>The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
|
||||
|
@ -17887,7 +17879,6 @@
|
|||
- [30579096/Confluence-CVE-2021-26084](https://github.com/30579096/Confluence-CVE-2021-26084)
|
||||
- [antx-code/CVE-2021-26084](https://github.com/antx-code/CVE-2021-26084)
|
||||
- [vpxuser/CVE-2021-26084-EXP](https://github.com/vpxuser/CVE-2021-26084-EXP)
|
||||
- [Marshall-Hallenbeck/CVE-2021-26084_Confluence_RCE](https://github.com/Marshall-Hallenbeck/CVE-2021-26084_Confluence_RCE)
|
||||
|
||||
### CVE-2021-26085 (2021-07-29)
|
||||
|
||||
|
@ -37377,6 +37368,7 @@
|
|||
- [Debalinax64/CVE-2016-2098](https://github.com/Debalinax64/CVE-2016-2098)
|
||||
- [j4k0m/CVE-2016-2098](https://github.com/j4k0m/CVE-2016-2098)
|
||||
- [Shakun8/CVE-2016-2098](https://github.com/Shakun8/CVE-2016-2098)
|
||||
- [JoseLRC97/Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution](https://github.com/JoseLRC97/Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution)
|
||||
|
||||
### CVE-2016-2107 (2016-05-05)
|
||||
|
||||
|
@ -41054,6 +41046,7 @@
|
|||
- [MFernstrom/OffensivePascal-CVE-2010-2075](https://github.com/MFernstrom/OffensivePascal-CVE-2010-2075)
|
||||
- [chancej715/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution](https://github.com/chancej715/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution)
|
||||
- [FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1](https://github.com/FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1)
|
||||
- [JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution](https://github.com/JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution)
|
||||
|
||||
### CVE-2010-2387 (2012-12-21)
|
||||
|
||||
|
|
Loading…
Reference in a new issue