mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/07/09 00:28:57
This commit is contained in:
parent
52f4576634
commit
6e3a313b0a
36 changed files with 209 additions and 174 deletions
|
@ -868,5 +868,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 825943567,
|
||||
"name": "CVE-2007-2447-Exploit",
|
||||
"full_name": "IamLucif3r\/CVE-2007-2447-Exploit",
|
||||
"owner": {
|
||||
"login": "IamLucif3r",
|
||||
"id": 53969258,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53969258?v=4",
|
||||
"html_url": "https:\/\/github.com\/IamLucif3r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/IamLucif3r\/CVE-2007-2447-Exploit",
|
||||
"description": "This is a exploit for CVE-2007-2447; Vulnerable SMB ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T20:03:32Z",
|
||||
"updated_at": "2024-07-08T20:10:28Z",
|
||||
"pushed_at": "2024-07-08T20:10:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2014-2630 exploit for xglance-bin ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-04T16:47:44Z",
|
||||
"updated_at": "2024-04-02T22:15:37Z",
|
||||
"updated_at": "2024-07-08T23:56:11Z",
|
||||
"pushed_at": "2020-02-10T21:16:02Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T15:22:41Z",
|
||||
"updated_at": "2024-07-03T21:22:12Z",
|
||||
"updated_at": "2024-07-08T19:43:18Z",
|
||||
"pushed_at": "2017-12-06T12:47:31Z",
|
||||
"stargazers_count": 325,
|
||||
"watchers_count": 325,
|
||||
"stargazers_count": 326,
|
||||
"watchers_count": 326,
|
||||
"has_discussions": false,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 95,
|
||||
"watchers": 325,
|
||||
"watchers": 326,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -258,10 +258,10 @@
|
|||
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T16:42:31Z",
|
||||
"updated_at": "2024-06-13T10:12:40Z",
|
||||
"updated_at": "2024-07-08T18:22:46Z",
|
||||
"pushed_at": "2021-04-21T16:46:37Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -270,7 +270,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -2902,13 +2902,13 @@
|
|||
"stargazers_count": 234,
|
||||
"watchers_count": 234,
|
||||
"has_discussions": false,
|
||||
"forks_count": 75,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 75,
|
||||
"forks": 76,
|
||||
"watchers": 234,
|
||||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-11881: unauthenticated remote DoS for MikroTik SMB service.",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-17T12:15:56Z",
|
||||
"updated_at": "2022-03-20T03:25:00Z",
|
||||
"updated_at": "2024-07-08T19:26:59Z",
|
||||
"pushed_at": "2020-09-26T13:33:27Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2024-07-04T15:04:40Z",
|
||||
"updated_at": "2024-07-08T21:32:56Z",
|
||||
"pushed_at": "2022-07-10T22:23:13Z",
|
||||
"stargazers_count": 966,
|
||||
"watchers_count": 966,
|
||||
"stargazers_count": 967,
|
||||
"watchers_count": 967,
|
||||
"has_discussions": false,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 190,
|
||||
"watchers": 966,
|
||||
"watchers": 967,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-0185",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-19T06:19:38Z",
|
||||
"updated_at": "2024-07-07T05:17:58Z",
|
||||
"updated_at": "2024-07-08T20:49:22Z",
|
||||
"pushed_at": "2022-04-25T04:11:33Z",
|
||||
"stargazers_count": 365,
|
||||
"watchers_count": 365,
|
||||
"stargazers_count": 366,
|
||||
"watchers_count": 366,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 365,
|
||||
"watchers": 366,
|
||||
"score": 0,
|
||||
"subscribers_count": 39
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T16:24:51Z",
|
||||
"updated_at": "2024-07-07T23:51:05Z",
|
||||
"updated_at": "2024-07-08T20:23:44Z",
|
||||
"pushed_at": "2023-04-12T17:28:49Z",
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 268,
|
||||
"watchers": 267,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": "Zimbra CVE-2022-27925 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-20T15:58:29Z",
|
||||
"updated_at": "2024-06-06T08:46:22Z",
|
||||
"updated_at": "2024-07-08T20:23:41Z",
|
||||
"pushed_at": "2022-08-27T20:30:21Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -156,7 +156,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 44,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-07-01T09:10:08Z",
|
||||
"updated_at": "2024-07-08T22:13:14Z",
|
||||
"pushed_at": "2024-04-05T06:46:47Z",
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"stargazers_count": 236,
|
||||
"watchers_count": 236,
|
||||
"has_discussions": true,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 235,
|
||||
"watchers": 236,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Bitrix Vulnerability CVE-2022-43959",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-28T08:52:17Z",
|
||||
"updated_at": "2024-02-28T08:22:02Z",
|
||||
"updated_at": "2024-07-08T21:00:34Z",
|
||||
"pushed_at": "2023-03-18T10:34:26Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T00:08:55Z",
|
||||
"updated_at": "2024-06-07T00:32:50Z",
|
||||
"updated_at": "2024-07-08T20:43:26Z",
|
||||
"pushed_at": "2023-10-10T16:53:48Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 116,
|
||||
"watchers": 117,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"forks": 33,
|
||||
"watchers": 191,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
|
|
|
@ -56,7 +56,7 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -68,7 +68,7 @@
|
|||
"hackthebox"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-07-08T14:15:46Z",
|
||||
"updated_at": "2024-07-09T00:16:03Z",
|
||||
"pushed_at": "2024-07-05T12:35:27Z",
|
||||
"stargazers_count": 959,
|
||||
"watchers_count": 959,
|
||||
"stargazers_count": 961,
|
||||
"watchers_count": 961,
|
||||
"has_discussions": false,
|
||||
"forks_count": 162,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 162,
|
||||
"watchers": 959,
|
||||
"watchers": 961,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T09:22:59Z",
|
||||
"updated_at": "2024-07-07T04:49:30Z",
|
||||
"updated_at": "2024-07-08T22:49:10Z",
|
||||
"pushed_at": "2024-06-18T09:35:44Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 39,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-07-08T16:03:47Z",
|
||||
"updated_at": "2024-07-08T20:23:49Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2174,
|
||||
"watchers_count": 2174,
|
||||
"stargazers_count": 2173,
|
||||
"watchers_count": 2173,
|
||||
"has_discussions": false,
|
||||
"forks_count": 283,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 283,
|
||||
"watchers": 2174,
|
||||
"watchers": 2173,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T05:53:02Z",
|
||||
"updated_at": "2024-07-08T04:00:47Z",
|
||||
"updated_at": "2024-07-08T20:23:50Z",
|
||||
"pushed_at": "2024-04-16T21:00:14Z",
|
||||
"stargazers_count": 245,
|
||||
"watchers_count": 245,
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"has_discussions": false,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"watchers": 245,
|
||||
"watchers": 244,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-28T21:16:10Z",
|
||||
"updated_at": "2024-06-29T01:59:53Z",
|
||||
"updated_at": "2024-07-08T22:34:58Z",
|
||||
"pushed_at": "2024-07-05T09:37:05Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-06T17:55:25Z",
|
||||
"updated_at": "2024-07-08T11:26:00Z",
|
||||
"updated_at": "2024-07-09T00:10:06Z",
|
||||
"pushed_at": "2024-07-06T18:10:20Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -223,10 +223,10 @@
|
|||
"description": "CVE-2024-28955 Exploitation PoC ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T11:49:51Z",
|
||||
"updated_at": "2024-07-06T07:24:46Z",
|
||||
"updated_at": "2024-07-08T19:15:04Z",
|
||||
"pushed_at": "2024-07-01T12:53:21Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -244,7 +244,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Jasmin ransomware web panel path traversal PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-04T22:59:55Z",
|
||||
"updated_at": "2024-05-22T21:42:43Z",
|
||||
"updated_at": "2024-07-08T20:23:49Z",
|
||||
"pushed_at": "2024-04-09T03:40:52Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 23,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -1012,10 +1012,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-07-08T08:13:44Z",
|
||||
"updated_at": "2024-07-08T20:23:49Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3470,
|
||||
"watchers_count": 3470,
|
||||
"stargazers_count": 3469,
|
||||
"watchers_count": 3469,
|
||||
"has_discussions": false,
|
||||
"forks_count": 235,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,7 +1024,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 235,
|
||||
"watchers": 3470,
|
||||
"watchers": 3469,
|
||||
"score": 0,
|
||||
"subscribers_count": 39
|
||||
},
|
||||
|
|
|
@ -288,13 +288,13 @@
|
|||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"forks": 24,
|
||||
"watchers": 141,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -283,10 +283,10 @@
|
|||
"description": "CosmicSting: critical unauthenticated XXE vulnerability in Adobe Commerce and Magento (CVE-2024-34102)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T08:19:28Z",
|
||||
"updated_at": "2024-07-05T09:26:05Z",
|
||||
"updated_at": "2024-07-08T22:50:07Z",
|
||||
"pushed_at": "2024-07-05T09:26:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -295,7 +295,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T03:02:30Z",
|
||||
"updated_at": "2024-07-05T10:11:45Z",
|
||||
"updated_at": "2024-07-08T18:50:33Z",
|
||||
"pushed_at": "2024-07-05T03:05:39Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-06T00:49:40Z",
|
||||
"updated_at": "2024-07-08T17:58:24Z",
|
||||
"updated_at": "2024-07-08T21:10:29Z",
|
||||
"pushed_at": "2024-07-08T12:45:40Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 69,
|
||||
"forks": 12,
|
||||
"watchers": 73,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-06T18:29:13Z",
|
||||
"updated_at": "2024-07-08T03:12:39Z",
|
||||
"updated_at": "2024-07-09T00:11:41Z",
|
||||
"pushed_at": "2024-07-06T18:38:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-03T07:26:07Z",
|
||||
"updated_at": "2024-07-08T09:05:48Z",
|
||||
"updated_at": "2024-07-08T20:33:52Z",
|
||||
"pushed_at": "2024-07-04T04:23:40Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
32
2024/CVE-2024-39031.json
Normal file
32
2024/CVE-2024-39031.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 826000412,
|
||||
"name": "CVE-2024-39031",
|
||||
"full_name": "toneemarqus\/CVE-2024-39031",
|
||||
"owner": {
|
||||
"login": "toneemarqus",
|
||||
"id": 85018947,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85018947?v=4",
|
||||
"html_url": "https:\/\/github.com\/toneemarqus"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/toneemarqus\/CVE-2024-39031",
|
||||
"description": "Stored Cross-Side Scripting (XSS) leads to privilege escalation in SilverPeas social-networking portal",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T23:21:52Z",
|
||||
"updated_at": "2024-07-08T23:40:32Z",
|
||||
"pushed_at": "2024-07-08T23:40:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2024-4883",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T12:14:01Z",
|
||||
"updated_at": "2024-07-08T12:54:43Z",
|
||||
"updated_at": "2024-07-09T00:27:44Z",
|
||||
"pushed_at": "2024-07-08T12:14:18Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2024-4885",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T12:14:42Z",
|
||||
"updated_at": "2024-07-08T13:00:38Z",
|
||||
"updated_at": "2024-07-09T00:31:11Z",
|
||||
"pushed_at": "2024-07-08T12:15:00Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2024-5009",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T12:15:29Z",
|
||||
"updated_at": "2024-07-08T13:50:41Z",
|
||||
"updated_at": "2024-07-09T00:00:02Z",
|
||||
"pushed_at": "2024-07-08T12:15:41Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -56,10 +56,10 @@
|
|||
"description": "a signal handler race condition in OpenSSH's server (sshd)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T10:55:29Z",
|
||||
"updated_at": "2024-07-08T11:15:21Z",
|
||||
"updated_at": "2024-07-08T21:27:30Z",
|
||||
"pushed_at": "2024-07-01T10:54:02Z",
|
||||
"stargazers_count": 414,
|
||||
"watchers_count": 414,
|
||||
"stargazers_count": 415,
|
||||
"watchers_count": 415,
|
||||
"has_discussions": false,
|
||||
"forks_count": 179,
|
||||
"allow_forking": true,
|
||||
|
@ -68,7 +68,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 179,
|
||||
"watchers": 414,
|
||||
"watchers": 415,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -86,10 +86,10 @@
|
|||
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T12:16:21Z",
|
||||
"updated_at": "2024-07-08T03:28:13Z",
|
||||
"updated_at": "2024-07-08T21:10:06Z",
|
||||
"pushed_at": "2024-07-01T12:25:01Z",
|
||||
"stargazers_count": 367,
|
||||
"watchers_count": 367,
|
||||
"stargazers_count": 368,
|
||||
"watchers_count": 368,
|
||||
"has_discussions": false,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
|
@ -98,7 +98,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 367,
|
||||
"watchers": 368,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
@ -303,10 +303,10 @@
|
|||
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T20:33:20Z",
|
||||
"updated_at": "2024-07-08T18:11:48Z",
|
||||
"updated_at": "2024-07-08T18:59:12Z",
|
||||
"pushed_at": "2024-07-08T18:11:44Z",
|
||||
"stargazers_count": 370,
|
||||
"watchers_count": 370,
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"has_discussions": false,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
|
@ -321,7 +321,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"watchers": 370,
|
||||
"watchers": 371,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -1135,8 +1135,8 @@
|
|||
"description": "CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T11:55:39Z",
|
||||
"updated_at": "2024-07-08T14:55:03Z",
|
||||
"pushed_at": "2024-07-02T23:32:12Z",
|
||||
"updated_at": "2024-07-08T20:39:05Z",
|
||||
"pushed_at": "2024-07-08T20:39:03Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
|
@ -1659,51 +1659,21 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 823339380,
|
||||
"name": "CVE-2024-6387-regreSSHion-Checker",
|
||||
"full_name": "EkaterinaMarchetti\/CVE-2024-6387-regreSSHion-Checker",
|
||||
"owner": {
|
||||
"login": "EkaterinaMarchetti",
|
||||
"id": 166263130,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166263130?v=4",
|
||||
"html_url": "https:\/\/github.com\/EkaterinaMarchetti"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EkaterinaMarchetti\/CVE-2024-6387-regreSSHion-Checker",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T21:13:45Z",
|
||||
"updated_at": "2024-07-02T21:13:46Z",
|
||||
"pushed_at": "2024-07-02T21:13:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 823340268,
|
||||
"name": "CVE-2024-6387-Tester",
|
||||
"full_name": "grupooruss\/CVE-2024-6387-Tester",
|
||||
"name": "CVE-2024-6387",
|
||||
"full_name": "grupooruss\/CVE-2024-6387",
|
||||
"owner": {
|
||||
"login": "grupooruss",
|
||||
"id": 43943489,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43943489?v=4",
|
||||
"html_url": "https:\/\/github.com\/grupooruss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/grupooruss\/CVE-2024-6387-Tester",
|
||||
"html_url": "https:\/\/github.com\/grupooruss\/CVE-2024-6387",
|
||||
"description": "regreSSHion vulnerability in OpenSSH CVE-2024-6387 Testing Script",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T21:16:45Z",
|
||||
"updated_at": "2024-07-06T19:00:14Z",
|
||||
"updated_at": "2024-07-08T23:58:50Z",
|
||||
"pushed_at": "2024-07-02T21:30:12Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
@ -2366,8 +2336,8 @@
|
|||
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T11:27:49Z",
|
||||
"updated_at": "2024-07-08T18:16:44Z",
|
||||
"pushed_at": "2024-07-08T18:16:41Z",
|
||||
"updated_at": "2024-07-08T20:03:38Z",
|
||||
"pushed_at": "2024-07-08T20:03:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -956,8 +956,7 @@
|
|||
- [xonoxitron/regreSSHion-checker](https://github.com/xonoxitron/regreSSHion-checker)
|
||||
- [BrandonLynch2402/cve-2024-6387-nuclei-template](https://github.com/BrandonLynch2402/cve-2024-6387-nuclei-template)
|
||||
- [edsonjt81/CVE-2024-6387_Check](https://github.com/edsonjt81/CVE-2024-6387_Check)
|
||||
- [EkaterinaMarchetti/CVE-2024-6387-regreSSHion-Checker](https://github.com/EkaterinaMarchetti/CVE-2024-6387-regreSSHion-Checker)
|
||||
- [grupooruss/CVE-2024-6387-Tester](https://github.com/grupooruss/CVE-2024-6387-Tester)
|
||||
- [grupooruss/CVE-2024-6387](https://github.com/grupooruss/CVE-2024-6387)
|
||||
- [CognisysGroup/CVE-2024-6387-Checker](https://github.com/CognisysGroup/CVE-2024-6387-Checker)
|
||||
- [sxlmnwb/CVE-2024-6387](https://github.com/sxlmnwb/CVE-2024-6387)
|
||||
- [Symbolexe/CVE-2024-6387](https://github.com/Symbolexe/CVE-2024-6387)
|
||||
|
@ -3373,6 +3372,9 @@
|
|||
|
||||
- [Havoc10-sw/Detect_polyfill_CVE-2024-38537-](https://github.com/Havoc10-sw/Detect_polyfill_CVE-2024-38537-)
|
||||
|
||||
### CVE-2024-39031
|
||||
- [toneemarqus/CVE-2024-39031](https://github.com/toneemarqus/CVE-2024-39031)
|
||||
|
||||
### CVE-2024-39203 (2024-07-08)
|
||||
|
||||
<code>A cross-site scripting (XSS) vulnerability in the Backend Theme Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
|
||||
|
@ -44391,6 +44393,7 @@
|
|||
- [0xTabun/CVE-2007-2447](https://github.com/0xTabun/CVE-2007-2447)
|
||||
- [ShivamDey/Samba-CVE-2007-2447-Exploit](https://github.com/ShivamDey/Samba-CVE-2007-2447-Exploit)
|
||||
- [Juantos/cve-2007-2447](https://github.com/Juantos/cve-2007-2447)
|
||||
- [IamLucif3r/CVE-2007-2447-Exploit](https://github.com/IamLucif3r/CVE-2007-2447-Exploit)
|
||||
|
||||
### CVE-2007-3830 (2007-07-17)
|
||||
|
||||
|
|
Loading…
Reference in a new issue