mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/12/23 06:31:46
This commit is contained in:
parent
db783d7640
commit
6e889c086a
31 changed files with 111 additions and 151 deletions
|
@ -102,13 +102,13 @@
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 2,
|
"watchers_count": 2,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 3,
|
||||||
"watchers": 2,
|
"watchers": 2,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
|
|
|
@ -46,7 +46,7 @@
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-03-30T06:39:25Z",
|
"created_at": "2023-03-30T06:39:25Z",
|
||||||
"updated_at": "2023-11-15T05:13:25Z",
|
"updated_at": "2023-11-15T05:13:25Z",
|
||||||
"pushed_at": "2024-12-16T04:07:57Z",
|
"pushed_at": "2024-12-23T03:21:47Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境",
|
"description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-02-03T08:14:03Z",
|
"created_at": "2021-02-03T08:14:03Z",
|
||||||
"updated_at": "2024-11-15T22:58:27Z",
|
"updated_at": "2024-12-23T02:06:11Z",
|
||||||
"pushed_at": "2021-02-07T09:42:36Z",
|
"pushed_at": "2021-02-07T09:42:36Z",
|
||||||
"stargazers_count": 114,
|
"stargazers_count": 115,
|
||||||
"watchers_count": 114,
|
"watchers_count": 115,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 14,
|
"forks_count": 14,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 14,
|
"forks": 14,
|
||||||
"watchers": 114,
|
"watchers": 115,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Simple CVE-2021-20294 poc",
|
"description": "Simple CVE-2021-20294 poc",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-01-21T16:15:21Z",
|
"created_at": "2023-01-21T16:15:21Z",
|
||||||
"updated_at": "2024-08-03T22:39:37Z",
|
"updated_at": "2024-12-23T03:49:31Z",
|
||||||
"pushed_at": "2023-01-21T22:37:16Z",
|
"pushed_at": "2023-01-21T22:37:16Z",
|
||||||
"stargazers_count": 11,
|
"stargazers_count": 12,
|
||||||
"watchers_count": 11,
|
"watchers_count": 12,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 5,
|
"forks_count": 5,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 5,
|
"forks": 5,
|
||||||
"watchers": 11,
|
"watchers": 12,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "Laravel debug rce",
|
"description": "Laravel debug rce",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-01-22T05:12:21Z",
|
"created_at": "2021-01-22T05:12:21Z",
|
||||||
"updated_at": "2024-12-04T21:47:14Z",
|
"updated_at": "2024-12-23T06:15:54Z",
|
||||||
"pushed_at": "2021-01-24T05:28:07Z",
|
"pushed_at": "2021-01-24T05:28:07Z",
|
||||||
"stargazers_count": 126,
|
"stargazers_count": 127,
|
||||||
"watchers_count": 126,
|
"watchers_count": 127,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 49,
|
"forks_count": 49,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -57,7 +57,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 49,
|
"forks": 49,
|
||||||
"watchers": 126,
|
"watchers": 127,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.",
|
"description": "vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-05-04T17:15:58Z",
|
"created_at": "2021-05-04T17:15:58Z",
|
||||||
"updated_at": "2024-09-24T07:23:22Z",
|
"updated_at": "2024-12-23T02:02:34Z",
|
||||||
"pushed_at": "2021-05-10T20:42:33Z",
|
"pushed_at": "2021-05-10T20:42:33Z",
|
||||||
"stargazers_count": 89,
|
"stargazers_count": 90,
|
||||||
"watchers_count": 89,
|
"watchers_count": 90,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 24,
|
"forks_count": 24,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -30,7 +30,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 24,
|
"forks": 24,
|
||||||
"watchers": 89,
|
"watchers": 90,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 5
|
"subscribers_count": 5
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,19 +14,19 @@
|
||||||
"description": "PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)",
|
"description": "PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-10-12T19:14:29Z",
|
"created_at": "2021-10-12T19:14:29Z",
|
||||||
"updated_at": "2024-10-15T07:32:20Z",
|
"updated_at": "2024-12-23T05:08:05Z",
|
||||||
"pushed_at": "2021-10-14T19:54:12Z",
|
"pushed_at": "2021-10-14T19:54:12Z",
|
||||||
"stargazers_count": 71,
|
"stargazers_count": 72,
|
||||||
"watchers_count": 71,
|
"watchers_count": 72,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 18,
|
"forks_count": 17,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 18,
|
"forks": 17,
|
||||||
"watchers": 71,
|
"watchers": 72,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
}
|
}
|
||||||
|
|
|
@ -967,12 +967,12 @@
|
||||||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-01-26T14:26:10Z",
|
"created_at": "2022-01-26T14:26:10Z",
|
||||||
"updated_at": "2024-12-20T18:15:39Z",
|
"updated_at": "2024-12-23T05:06:46Z",
|
||||||
"pushed_at": "2022-06-21T14:52:05Z",
|
"pushed_at": "2022-06-21T14:52:05Z",
|
||||||
"stargazers_count": 1092,
|
"stargazers_count": 1093,
|
||||||
"watchers_count": 1092,
|
"watchers_count": 1093,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 190,
|
"forks_count": 191,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
|
@ -980,8 +980,8 @@
|
||||||
"cve-2021-4034"
|
"cve-2021-4034"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 190,
|
"forks": 191,
|
||||||
"watchers": 1092,
|
"watchers": 1093,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 13
|
"subscribers_count": 13
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,12 +14,12 @@
|
||||||
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
|
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-10-16T16:17:44Z",
|
"created_at": "2021-10-16T16:17:44Z",
|
||||||
"updated_at": "2024-11-29T16:51:36Z",
|
"updated_at": "2024-12-23T05:05:29Z",
|
||||||
"pushed_at": "2021-11-11T17:09:56Z",
|
"pushed_at": "2021-11-11T17:09:56Z",
|
||||||
"stargazers_count": 463,
|
"stargazers_count": 464,
|
||||||
"watchers_count": 463,
|
"watchers_count": 464,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 92,
|
"forks_count": 93,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
|
@ -27,8 +27,8 @@
|
||||||
"cve-2021-40449"
|
"cve-2021-40449"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 92,
|
"forks": 93,
|
||||||
"watchers": 463,
|
"watchers": 464,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 13
|
"subscribers_count": 13
|
||||||
},
|
},
|
||||||
|
|
|
@ -528,10 +528,10 @@
|
||||||
"description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).",
|
"description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-11T18:49:30Z",
|
"created_at": "2021-12-11T18:49:30Z",
|
||||||
"updated_at": "2024-10-08T03:02:14Z",
|
"updated_at": "2024-12-23T04:02:44Z",
|
||||||
"pushed_at": "2021-12-11T19:10:03Z",
|
"pushed_at": "2021-12-11T19:10:03Z",
|
||||||
"stargazers_count": 39,
|
"stargazers_count": 40,
|
||||||
"watchers_count": 39,
|
"watchers_count": 40,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 12,
|
"forks_count": 12,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -540,7 +540,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 12,
|
"forks": 12,
|
||||||
"watchers": 39,
|
"watchers": 40,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
|
@ -935,10 +935,10 @@
|
||||||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-10T23:19:28Z",
|
"created_at": "2021-12-10T23:19:28Z",
|
||||||
"updated_at": "2024-12-22T11:26:30Z",
|
"updated_at": "2024-12-23T05:30:44Z",
|
||||||
"pushed_at": "2024-02-12T22:37:25Z",
|
"pushed_at": "2024-02-12T22:37:25Z",
|
||||||
"stargazers_count": 1810,
|
"stargazers_count": 1811,
|
||||||
"watchers_count": 1810,
|
"watchers_count": 1811,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 529,
|
"forks_count": 529,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -952,7 +952,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 529,
|
"forks": 529,
|
||||||
"watchers": 1810,
|
"watchers": 1811,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 26
|
"subscribers_count": 26
|
||||||
},
|
},
|
||||||
|
|
|
@ -107,19 +107,19 @@
|
||||||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-07T18:55:20Z",
|
"created_at": "2022-03-07T18:55:20Z",
|
||||||
"updated_at": "2024-12-12T01:49:21Z",
|
"updated_at": "2024-12-23T05:08:43Z",
|
||||||
"pushed_at": "2022-03-08T06:20:05Z",
|
"pushed_at": "2022-03-08T06:20:05Z",
|
||||||
"stargazers_count": 1094,
|
"stargazers_count": 1095,
|
||||||
"watchers_count": 1094,
|
"watchers_count": 1095,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 218,
|
"forks_count": 219,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 218,
|
"forks": 219,
|
||||||
"watchers": 1094,
|
"watchers": 1095,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 17
|
"subscribers_count": 17
|
||||||
},
|
},
|
||||||
|
|
|
@ -19,7 +19,7 @@
|
||||||
"stargazers_count": 1172,
|
"stargazers_count": 1172,
|
||||||
"watchers_count": 1172,
|
"watchers_count": 1172,
|
||||||
"has_discussions": true,
|
"has_discussions": true,
|
||||||
"forks_count": 190,
|
"forks_count": 188,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
|
@ -45,7 +45,7 @@
|
||||||
"gui"
|
"gui"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 190,
|
"forks": 188,
|
||||||
"watchers": 1172,
|
"watchers": 1172,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 19
|
"subscribers_count": 19
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-09-30T16:43:28Z",
|
"created_at": "2022-09-30T16:43:28Z",
|
||||||
"updated_at": "2024-11-29T18:21:22Z",
|
"updated_at": "2024-12-23T04:53:31Z",
|
||||||
"pushed_at": "2024-01-02T11:55:38Z",
|
"pushed_at": "2024-01-02T11:55:38Z",
|
||||||
"stargazers_count": 46,
|
"stargazers_count": 47,
|
||||||
"watchers_count": 46,
|
"watchers_count": 47,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 12,
|
"forks_count": 12,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 12,
|
"forks": 12,
|
||||||
"watchers": 46,
|
"watchers": 47,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "POC of CVE-2023-35086 only DoS",
|
"description": "POC of CVE-2023-35086 only DoS",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-07-25T01:36:07Z",
|
"created_at": "2023-07-25T01:36:07Z",
|
||||||
"updated_at": "2024-08-03T22:37:08Z",
|
"updated_at": "2024-12-23T03:50:15Z",
|
||||||
"pushed_at": "2023-07-25T01:42:02Z",
|
"pushed_at": "2023-07-25T01:42:02Z",
|
||||||
"stargazers_count": 44,
|
"stargazers_count": 45,
|
||||||
"watchers_count": 44,
|
"watchers_count": 45,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 9,
|
"forks_count": 9,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 9,
|
"forks": 9,
|
||||||
"watchers": 44,
|
"watchers": 45,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-05T20:32:45Z",
|
"created_at": "2024-10-05T20:32:45Z",
|
||||||
"updated_at": "2024-12-21T09:53:25Z",
|
"updated_at": "2024-12-23T02:38:59Z",
|
||||||
"pushed_at": "2024-10-05T20:37:02Z",
|
"pushed_at": "2024-10-05T20:37:02Z",
|
||||||
"stargazers_count": 45,
|
"stargazers_count": 46,
|
||||||
"watchers_count": 45,
|
"watchers_count": 46,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -37,7 +37,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 8,
|
||||||
"watchers": 45,
|
"watchers": 46,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -213,10 +213,10 @@
|
||||||
"description": "CVE-2023-41425 (Wonder CMS XSS to RCE) exploit which serves required scripts locally. Good if you're lost at sea and have found a problem with your bike.",
|
"description": "CVE-2023-41425 (Wonder CMS XSS to RCE) exploit which serves required scripts locally. Good if you're lost at sea and have found a problem with your bike.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-02T14:05:19Z",
|
"created_at": "2024-10-02T14:05:19Z",
|
||||||
"updated_at": "2024-11-18T11:21:43Z",
|
"updated_at": "2024-12-23T04:25:21Z",
|
||||||
"pushed_at": "2024-10-02T14:20:20Z",
|
"pushed_at": "2024-10-02T14:20:20Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 2,
|
"watchers_count": 3,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -225,7 +225,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 2,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
@ -382,6 +382,6 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-01-16T06:52:02Z",
|
"created_at": "2024-01-16T06:52:02Z",
|
||||||
"updated_at": "2024-12-22T18:57:35Z",
|
"updated_at": "2024-12-23T05:56:42Z",
|
||||||
"pushed_at": "2024-08-18T08:26:46Z",
|
"pushed_at": "2024-08-18T08:26:46Z",
|
||||||
"stargazers_count": 1309,
|
"stargazers_count": 1311,
|
||||||
"watchers_count": 1309,
|
"watchers_count": 1311,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 221,
|
"forks_count": 221,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 221,
|
"forks": 221,
|
||||||
"watchers": 1309,
|
"watchers": 1311,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 21
|
"subscribers_count": 21
|
||||||
},
|
},
|
||||||
|
|
|
@ -214,6 +214,6 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -1,33 +0,0 @@
|
||||||
[
|
|
||||||
{
|
|
||||||
"id": 759242372,
|
|
||||||
"name": "CVE-2024-24520",
|
|
||||||
"full_name": "xF-9979\/CVE-2024-24520",
|
|
||||||
"owner": {
|
|
||||||
"login": "xF-9979",
|
|
||||||
"id": 108913864,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108913864?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/xF-9979",
|
|
||||||
"user_view_type": "public"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/xF-9979\/CVE-2024-24520",
|
|
||||||
"description": "Arbitrary code execution vulnerability",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2024-02-18T03:13:53Z",
|
|
||||||
"updated_at": "2024-03-17T07:58:21Z",
|
|
||||||
"pushed_at": "2024-03-17T07:58:39Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"has_discussions": false,
|
|
||||||
"forks_count": 0,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0,
|
|
||||||
"subscribers_count": 1
|
|
||||||
}
|
|
||||||
]
|
|
|
@ -19,13 +19,13 @@
|
||||||
"stargazers_count": 246,
|
"stargazers_count": 246,
|
||||||
"watchers_count": 246,
|
"watchers_count": 246,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 55,
|
"forks_count": 56,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 55,
|
"forks": 56,
|
||||||
"watchers": 246,
|
"watchers": 246,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 6
|
"subscribers_count": 6
|
||||||
|
|
|
@ -265,10 +265,10 @@
|
||||||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-24T18:25:46Z",
|
"created_at": "2024-08-24T18:25:46Z",
|
||||||
"updated_at": "2024-12-21T09:47:59Z",
|
"updated_at": "2024-12-23T05:02:46Z",
|
||||||
"pushed_at": "2024-08-27T12:22:39Z",
|
"pushed_at": "2024-08-27T12:22:39Z",
|
||||||
"stargazers_count": 636,
|
"stargazers_count": 638,
|
||||||
"watchers_count": 636,
|
"watchers_count": 638,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 115,
|
"forks_count": 115,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -277,7 +277,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 115,
|
"forks": 115,
|
||||||
"watchers": 636,
|
"watchers": 638,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
},
|
},
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-05T20:32:45Z",
|
"created_at": "2024-10-05T20:32:45Z",
|
||||||
"updated_at": "2024-12-21T09:53:25Z",
|
"updated_at": "2024-12-23T02:38:59Z",
|
||||||
"pushed_at": "2024-10-05T20:37:02Z",
|
"pushed_at": "2024-10-05T20:37:02Z",
|
||||||
"stargazers_count": 45,
|
"stargazers_count": 46,
|
||||||
"watchers_count": 45,
|
"watchers_count": 46,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -68,7 +68,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 8,
|
||||||
"watchers": 45,
|
"watchers": 46,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-14T09:22:33Z",
|
"created_at": "2024-12-14T09:22:33Z",
|
||||||
"updated_at": "2024-12-22T08:56:45Z",
|
"updated_at": "2024-12-23T02:20:40Z",
|
||||||
"pushed_at": "2024-12-14T10:13:45Z",
|
"pushed_at": "2024-12-14T10:13:45Z",
|
||||||
"stargazers_count": 30,
|
"stargazers_count": 31,
|
||||||
"watchers_count": 30,
|
"watchers_count": 31,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 10,
|
"forks_count": 10,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 10,
|
"forks": 10,
|
||||||
"watchers": 30,
|
"watchers": 31,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "CVE-2024-44258",
|
"description": "CVE-2024-44258",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-29T09:45:03Z",
|
"created_at": "2024-10-29T09:45:03Z",
|
||||||
"updated_at": "2024-12-12T06:52:53Z",
|
"updated_at": "2024-12-23T03:15:29Z",
|
||||||
"pushed_at": "2024-11-02T19:20:44Z",
|
"pushed_at": "2024-11-02T19:20:44Z",
|
||||||
"stargazers_count": 60,
|
"stargazers_count": 61,
|
||||||
"watchers_count": 60,
|
"watchers_count": 61,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 8,
|
||||||
"watchers": 60,
|
"watchers": 61,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -19,13 +19,13 @@
|
||||||
"stargazers_count": 91,
|
"stargazers_count": 91,
|
||||||
"watchers_count": 91,
|
"watchers_count": 91,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 16,
|
"forks_count": 17,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 16,
|
"forks": 17,
|
||||||
"watchers": 91,
|
"watchers": 91,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
|
|
@ -138,19 +138,19 @@
|
||||||
"description": "RCE through a race condition in Apache Tomcat",
|
"description": "RCE through a race condition in Apache Tomcat",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-21T05:54:29Z",
|
"created_at": "2024-12-21T05:54:29Z",
|
||||||
"updated_at": "2024-12-22T19:20:55Z",
|
"updated_at": "2024-12-23T06:06:15Z",
|
||||||
"pushed_at": "2024-12-21T08:56:44Z",
|
"pushed_at": "2024-12-21T08:56:44Z",
|
||||||
"stargazers_count": 4,
|
"stargazers_count": 8,
|
||||||
"watchers_count": 4,
|
"watchers_count": 8,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 1,
|
||||||
"watchers": 4,
|
"watchers": 8,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-13T17:42:55Z",
|
"created_at": "2024-12-13T17:42:55Z",
|
||||||
"updated_at": "2024-12-22T16:31:23Z",
|
"updated_at": "2024-12-23T03:55:08Z",
|
||||||
"pushed_at": "2024-12-20T10:05:15Z",
|
"pushed_at": "2024-12-20T10:05:15Z",
|
||||||
"stargazers_count": 67,
|
"stargazers_count": 68,
|
||||||
"watchers_count": 67,
|
"watchers_count": 68,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 28,
|
"forks_count": 28,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -57,7 +57,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 28,
|
"forks": 28,
|
||||||
"watchers": 67,
|
"watchers": 68,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
|
@ -19,13 +19,13 @@
|
||||||
"stargazers_count": 26,
|
"stargazers_count": 26,
|
||||||
"watchers_count": 26,
|
"watchers_count": 26,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 6,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 6,
|
"forks": 7,
|
||||||
"watchers": 26,
|
"watchers": 26,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
|
|
@ -405,10 +405,10 @@
|
||||||
"description": "OpenSSH CVE-2024-6387 Vulnerability Checker",
|
"description": "OpenSSH CVE-2024-6387 Vulnerability Checker",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-02T01:24:04Z",
|
"created_at": "2024-07-02T01:24:04Z",
|
||||||
"updated_at": "2024-07-02T10:07:48Z",
|
"updated_at": "2024-12-23T02:13:55Z",
|
||||||
"pushed_at": "2024-07-02T01:31:11Z",
|
"pushed_at": "2024-07-02T01:31:11Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 2,
|
"watchers_count": 3,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -417,7 +417,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 2,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -3407,13 +3407,6 @@
|
||||||
|
|
||||||
- [minj-ae/CVE-2024-24488](https://github.com/minj-ae/CVE-2024-24488)
|
- [minj-ae/CVE-2024-24488](https://github.com/minj-ae/CVE-2024-24488)
|
||||||
|
|
||||||
### CVE-2024-24520 (2024-02-29)
|
|
||||||
|
|
||||||
<code>An issue in Lepton CMS v.7.0.0 allows a local attacker to execute arbitrary code via the upgrade.php file in the languages place.
|
|
||||||
</code>
|
|
||||||
|
|
||||||
- [xF-9979/CVE-2024-24520](https://github.com/xF-9979/CVE-2024-24520)
|
|
||||||
|
|
||||||
### CVE-2024-24549 (2024-03-13)
|
### CVE-2024-24549 (2024-03-13)
|
||||||
|
|
||||||
<code>Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.\n\nUsers are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.\n\n
|
<code>Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.\n\nUsers are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.\n\n
|
||||||
|
|
Loading…
Add table
Reference in a new issue