mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 01:24:10 +01:00
Auto Update 2024/10/08 18:31:24
This commit is contained in:
parent
f69acedba7
commit
693ef75ce4
41 changed files with 209 additions and 178 deletions
2003
2015
2018
2019
2020
2021
CVE-2021-22005.jsonCVE-2021-22911.jsonCVE-2021-33026.jsonCVE-2021-4034.jsonCVE-2021-42321.jsonCVE-2021-44228.json
2022
2023
CVE-2023-21768.jsonCVE-2023-22527.jsonCVE-2023-29489.jsonCVE-2023-33246.jsonCVE-2023-4450.jsonCVE-2023-51385.json
2024
CVE-2024-0044.jsonCVE-2024-32002.jsonCVE-2024-3273.jsonCVE-2024-34102.jsonCVE-2024-38063.jsonCVE-2024-4367.jsonCVE-2024-43918.jsonCVE-2024-44193.jsonCVE-2024-45409.jsonCVE-2024-45519.jsonCVE-2024-4577.jsonCVE-2024-46310.jsonCVE-2024-47176.jsonCVE-2024-6387.jsonCVE-2024-7029.json
README.md
|
@ -13,10 +13,10 @@
|
|||
"description": "This Python script helps to detect the Etherleak (CVE-2003-0001) vulnerability on a target host by analyzing the padding data in network packets. The script uses Scapy to send various types of requests (ICMP, ARP, or TCP) and checks if the responses contain any padding data that could potentially leak sensitive memory contents.",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-01T14:03:30Z",
|
||||
"updated_at": "2024-10-04T06:24:00Z",
|
||||
"updated_at": "2024-10-08T15:25:48Z",
|
||||
"pushed_at": "2024-10-01T14:12:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -78,7 +78,7 @@
|
|||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -91,7 +91,7 @@
|
|||
"vulnerable-container"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"forks": 52,
|
||||
"watchers": 129,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 17,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 739621837,
|
||||
|
|
File diff suppressed because one or more lines are too long
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
"exploitation"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"forks": 65,
|
||||
"watchers": 224,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
|
|
|
@ -1006,10 +1006,10 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2024-10-02T20:22:09Z",
|
||||
"updated_at": "2024-10-08T12:14:06Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1298,
|
||||
"watchers_count": 1298,
|
||||
"stargazers_count": 1297,
|
||||
"watchers_count": 1297,
|
||||
"has_discussions": false,
|
||||
"forks_count": 344,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,7 +1024,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 344,
|
||||
"watchers": 1298,
|
||||
"watchers": 1297,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A proof-of-concept for CVE-2020-12753",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T21:58:42Z",
|
||||
"updated_at": "2024-02-25T10:41:32Z",
|
||||
"updated_at": "2024-10-08T13:52:59Z",
|
||||
"pushed_at": "2020-06-01T22:55:46Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Cockpit CMS 0.11.1 NoSQL Injection to Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-05T18:48:52Z",
|
||||
"updated_at": "2023-07-11T15:19:07Z",
|
||||
"updated_at": "2024-10-08T14:37:47Z",
|
||||
"pushed_at": "2021-08-06T14:00:14Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -299,36 +299,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 444978473,
|
||||
"name": "testanull-CVE-2021-22005.py",
|
||||
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-22005.py",
|
||||
"owner": {
|
||||
"login": "timb-machine-mirrors",
|
||||
"id": 49810875,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
|
||||
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-22005.py",
|
||||
"description": "Clone from gist",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-05T23:22:08Z",
|
||||
"updated_at": "2023-04-08T20:15:10Z",
|
||||
"pushed_at": "2022-01-05T23:22:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 505737586,
|
||||
"name": "cve-2021-22005",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:05:01Z",
|
||||
"updated_at": "2024-08-12T20:13:39Z",
|
||||
"updated_at": "2024-10-08T14:38:28Z",
|
||||
"pushed_at": "2023-06-11T08:47:04Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 869670698,
|
||||
"name": "FlaskCache_CVE-2021-33026_POC",
|
||||
"full_name": "Agilevatester\/FlaskCache_CVE-2021-33026_POC",
|
||||
"owner": {
|
||||
"login": "Agilevatester",
|
||||
"id": 170657414,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170657414?v=4",
|
||||
"html_url": "https:\/\/github.com\/Agilevatester"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Agilevatester\/FlaskCache_CVE-2021-33026_POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-08T17:27:56Z",
|
||||
"updated_at": "2024-10-08T18:00:09Z",
|
||||
"pushed_at": "2024-10-08T18:00:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -296,7 +296,7 @@
|
|||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -309,7 +309,7 @@
|
|||
"pwnkit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -29,36 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 444977303,
|
||||
"name": "testanull-CVE-2021-42321_poc.py",
|
||||
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-42321_poc.py",
|
||||
"owner": {
|
||||
"login": "timb-machine-mirrors",
|
||||
"id": 49810875,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
|
||||
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-42321_poc.py",
|
||||
"description": "Clone from gist",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-05T23:15:55Z",
|
||||
"updated_at": "2023-04-08T20:14:09Z",
|
||||
"pushed_at": "2022-01-05T23:16:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 535520694,
|
||||
"name": "cve-2021-42321",
|
||||
|
|
|
@ -12390,5 +12390,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 869690102,
|
||||
"name": "TPASLog4ShellPoC",
|
||||
"full_name": "Carlos-Mesquita\/TPASLog4ShellPoC",
|
||||
"owner": {
|
||||
"login": "Carlos-Mesquita",
|
||||
"id": 75860783,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75860783?v=4",
|
||||
"html_url": "https:\/\/github.com\/Carlos-Mesquita"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Carlos-Mesquita\/TPASLog4ShellPoC",
|
||||
"description": "Proof of Concept (PoC) for the Log4Shell vulnerability (CVE-2021-44228), developed as part of the coursework for the curricular unit TPAS in the Master's degree in Information Security at FCUP.",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-08T18:07:21Z",
|
||||
"updated_at": "2024-10-08T18:07:26Z",
|
||||
"pushed_at": "2024-10-08T18:07:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "A proof of concept exploit for SQLPad RCE (CVE-2022-0944).",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-08T23:39:24Z",
|
||||
"updated_at": "2024-09-21T23:32:34Z",
|
||||
"updated_at": "2024-10-08T15:51:27Z",
|
||||
"pushed_at": "2024-09-08T23:57:27Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Attacks against QUIC (CVE-2022-30591)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-30T18:25:23Z",
|
||||
"updated_at": "2024-06-12T06:29:42Z",
|
||||
"updated_at": "2024-10-08T17:40:45Z",
|
||||
"pushed_at": "2022-12-31T01:55:15Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"vulnerabilities"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 18,
|
||||
"forks": 6,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Major Security Vulnerability on PrestaShop Websites - CVE-2022-31101",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-24T21:50:13Z",
|
||||
"updated_at": "2024-10-04T20:46:37Z",
|
||||
"updated_at": "2024-10-08T15:47:28Z",
|
||||
"pushed_at": "2022-08-01T09:12:50Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-10-07T17:07:05Z",
|
||||
"updated_at": "2024-10-08T13:31:03Z",
|
||||
"pushed_at": "2024-08-01T15:09:15Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"has_discussions": true,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 265,
|
||||
"watchers": 266,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE exploit for CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T23:00:27Z",
|
||||
"updated_at": "2024-10-03T13:30:00Z",
|
||||
"updated_at": "2024-10-08T17:11:05Z",
|
||||
"pushed_at": "2023-07-10T16:35:49Z",
|
||||
"stargazers_count": 472,
|
||||
"watchers_count": 472,
|
||||
"stargazers_count": 473,
|
||||
"watchers_count": 473,
|
||||
"has_discussions": false,
|
||||
"forks_count": 162,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 162,
|
||||
"watchers": 472,
|
||||
"watchers": 473,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -676,8 +676,8 @@
|
|||
"description": "CVE-2023-22527 | RCE using SSTI in Confluence",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-06T15:16:04Z",
|
||||
"updated_at": "2024-10-06T19:48:58Z",
|
||||
"pushed_at": "2024-10-06T19:48:55Z",
|
||||
"updated_at": "2024-10-08T14:45:52Z",
|
||||
"pushed_at": "2024-10-08T14:45:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "Mass Scaning vulnerability in Cpanel [XSS] ",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-17T20:46:59Z",
|
||||
"updated_at": "2024-09-13T07:21:27Z",
|
||||
"updated_at": "2024-10-08T14:28:45Z",
|
||||
"pushed_at": "2024-08-25T00:34:47Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -258,7 +258,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-09-04T11:18:28Z",
|
||||
"updated_at": "2024-07-27T09:06:16Z",
|
||||
"pushed_at": "2024-10-04T15:40:01Z",
|
||||
"pushed_at": "2024-10-08T15:44:23Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 0,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -168,13 +168,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -287,19 +287,19 @@
|
|||
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-27T09:02:08Z",
|
||||
"updated_at": "2024-10-08T11:37:28Z",
|
||||
"updated_at": "2024-10-08T17:35:31Z",
|
||||
"pushed_at": "2024-09-30T12:48:08Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 46,
|
||||
"forks": 5,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -73,7 +73,7 @@
|
|||
"description": "Exploit PoC for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T19:33:08Z",
|
||||
"updated_at": "2024-10-08T07:04:45Z",
|
||||
"updated_at": "2024-10-08T14:47:27Z",
|
||||
"pushed_at": "2024-05-19T07:12:00Z",
|
||||
"stargazers_count": 486,
|
||||
"watchers_count": 486,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "D-Link NAS CVE-2024-3273 Exploit Tool",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-07T03:09:13Z",
|
||||
"updated_at": "2024-10-05T10:34:02Z",
|
||||
"updated_at": "2024-10-08T14:44:15Z",
|
||||
"pushed_at": "2024-04-07T04:41:26Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -592,5 +592,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 869658204,
|
||||
"name": "magento-cve-2024-34102-exploit-cosmicstring",
|
||||
"full_name": "bka\/magento-cve-2024-34102-exploit-cosmicstring",
|
||||
"owner": {
|
||||
"login": "bka",
|
||||
"id": 584644,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/584644?v=4",
|
||||
"html_url": "https:\/\/github.com\/bka"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bka\/magento-cve-2024-34102-exploit-cosmicstring",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-08T17:02:11Z",
|
||||
"updated_at": "2024-10-08T17:05:44Z",
|
||||
"pushed_at": "2024-10-08T17:05:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -256,10 +256,10 @@
|
|||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T18:25:46Z",
|
||||
"updated_at": "2024-10-06T04:19:08Z",
|
||||
"updated_at": "2024-10-08T18:22:46Z",
|
||||
"pushed_at": "2024-08-27T12:22:39Z",
|
||||
"stargazers_count": 606,
|
||||
"watchers_count": 606,
|
||||
"stargazers_count": 605,
|
||||
"watchers_count": 605,
|
||||
"has_discussions": false,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
|
@ -268,7 +268,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 110,
|
||||
"watchers": 606,
|
||||
"watchers": 605,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T10:02:23Z",
|
||||
"updated_at": "2024-10-07T14:19:14Z",
|
||||
"updated_at": "2024-10-08T14:32:50Z",
|
||||
"pushed_at": "2024-06-07T03:28:00Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WBW Product Table Pro <= 1.9.4 - Unauthenticated Arbitrary SQL Execution to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T05:50:03Z",
|
||||
"updated_at": "2024-09-26T18:48:28Z",
|
||||
"updated_at": "2024-10-08T13:47:15Z",
|
||||
"pushed_at": "2024-09-24T05:52:04Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Hacking Windows through iTunes - Local Privilege Escalation 0-day",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-04T14:20:15Z",
|
||||
"updated_at": "2024-10-08T11:56:57Z",
|
||||
"updated_at": "2024-10-08T16:50:04Z",
|
||||
"pushed_at": "2024-10-04T14:59:50Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 45,
|
||||
"watchers": 51,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Ruby-SAML \/ GitLab Authentication Bypass (CVE-2024-45409) exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-07T09:24:46Z",
|
||||
"updated_at": "2024-10-08T12:13:05Z",
|
||||
"updated_at": "2024-10-08T17:51:39Z",
|
||||
"pushed_at": "2024-10-07T11:50:17Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 32,
|
||||
"forks": 6,
|
||||
"watchers": 37,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -73,19 +73,19 @@
|
|||
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T00:15:18Z",
|
||||
"updated_at": "2024-10-08T10:50:16Z",
|
||||
"updated_at": "2024-10-08T16:23:07Z",
|
||||
"pushed_at": "2024-10-05T00:18:49Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 65,
|
||||
"forks": 15,
|
||||
"watchers": 68,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -493,10 +493,10 @@
|
|||
"description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-08T12:23:35Z",
|
||||
"updated_at": "2024-10-06T08:59:01Z",
|
||||
"updated_at": "2024-10-08T13:16:09Z",
|
||||
"pushed_at": "2024-06-19T16:19:57Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -512,7 +512,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-46310 For FXServer version's v9601 and prior, Incorrect Access Control in FXServer version's v9601 and prior, for CFX.re FiveM, allows unauthenticated users to modify and read userdata via exposed api endpoint",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-28T19:36:52Z",
|
||||
"updated_at": "2024-10-07T13:10:08Z",
|
||||
"updated_at": "2024-10-08T17:08:01Z",
|
||||
"pushed_at": "2024-10-07T13:09:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -297,10 +297,10 @@
|
|||
"description": "A simple scanner for identifying vulnerable cups-browsed instances on your network",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-07T07:25:18Z",
|
||||
"updated_at": "2024-10-08T10:55:53Z",
|
||||
"updated_at": "2024-10-08T16:14:21Z",
|
||||
"pushed_at": "2024-10-07T16:59:47Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -309,7 +309,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -2208,13 +2208,13 @@
|
|||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 12,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -82,10 +82,10 @@
|
|||
"description": " A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-08T10:04:08Z",
|
||||
"updated_at": "2024-10-08T10:08:11Z",
|
||||
"updated_at": "2024-10-08T14:25:34Z",
|
||||
"pushed_at": "2024-10-08T10:08:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -94,7 +94,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -3973,6 +3973,7 @@
|
|||
- [wubinworks/magento2-cosmic-sting-patch](https://github.com/wubinworks/magento2-cosmic-sting-patch)
|
||||
- [EQSTLab/CVE-2024-34102](https://github.com/EQSTLab/CVE-2024-34102)
|
||||
- [Jhonsonwannaa/CVE-2024-34102](https://github.com/Jhonsonwannaa/CVE-2024-34102)
|
||||
- [bka/magento-cve-2024-34102-exploit-cosmicstring](https://github.com/bka/magento-cve-2024-34102-exploit-cosmicstring)
|
||||
|
||||
### CVE-2024-34144 (2024-05-02)
|
||||
|
||||
|
@ -22012,7 +22013,6 @@
|
|||
- [tiagob0b/CVE-2021-22005](https://github.com/tiagob0b/CVE-2021-22005)
|
||||
- [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005)
|
||||
- [shmilylty/cve-2021-22005-exp](https://github.com/shmilylty/cve-2021-22005-exp)
|
||||
- [timb-machine-mirrors/testanull-CVE-2021-22005.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py)
|
||||
- [InventorMAO/cve-2021-22005](https://github.com/InventorMAO/cve-2021-22005)
|
||||
|
||||
### CVE-2021-22006 (2021-09-23)
|
||||
|
@ -23724,6 +23724,7 @@
|
|||
</code>
|
||||
|
||||
- [CarlosG13/CVE-2021-33026](https://github.com/CarlosG13/CVE-2021-33026)
|
||||
- [Agilevatester/FlaskCache_CVE-2021-33026_POC](https://github.com/Agilevatester/FlaskCache_CVE-2021-33026_POC)
|
||||
|
||||
### CVE-2021-33034 (2021-05-14)
|
||||
|
||||
|
@ -25481,7 +25482,6 @@
|
|||
</code>
|
||||
|
||||
- [DarkSprings/CVE-2021-42321](https://github.com/DarkSprings/CVE-2021-42321)
|
||||
- [timb-machine-mirrors/testanull-CVE-2021-42321_poc.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-42321_poc.py)
|
||||
- [xnyuq/cve-2021-42321](https://github.com/xnyuq/cve-2021-42321)
|
||||
- [7BitsTeam/exch_CVE-2021-42321](https://github.com/7BitsTeam/exch_CVE-2021-42321)
|
||||
|
||||
|
@ -26462,6 +26462,7 @@
|
|||
- [asd58584388/CVE-2021-44228](https://github.com/asd58584388/CVE-2021-44228)
|
||||
- [OtisSymbos/CVE-2021-44228-Log4Shell-](https://github.com/OtisSymbos/CVE-2021-44228-Log4Shell-)
|
||||
- [safeer-accuknox/log4j-shell-poc](https://github.com/safeer-accuknox/log4j-shell-poc)
|
||||
- [Carlos-Mesquita/TPASLog4ShellPoC](https://github.com/Carlos-Mesquita/TPASLog4ShellPoC)
|
||||
|
||||
### CVE-2021-44255 (2022-01-31)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue