mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/11/16 00:30:57
This commit is contained in:
parent
90c99e225c
commit
6ef753f92b
36 changed files with 407 additions and 95 deletions
|
@ -14,10 +14,10 @@
|
|||
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T18:59:28Z",
|
||||
"updated_at": "2024-11-13T18:00:29Z",
|
||||
"updated_at": "2024-11-15T18:13:01Z",
|
||||
"pushed_at": "2021-06-06T09:41:51Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -76,19 +76,19 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2024-11-14T03:21:45Z",
|
||||
"updated_at": "2024-11-15T18:46:57Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 722,
|
||||
"watchers_count": 722,
|
||||
"stargazers_count": 723,
|
||||
"watchers_count": 723,
|
||||
"has_discussions": false,
|
||||
"forks_count": 259,
|
||||
"forks_count": 260,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 259,
|
||||
"watchers": 722,
|
||||
"forks": 260,
|
||||
"watchers": 723,
|
||||
"score": 0,
|
||||
"subscribers_count": 46
|
||||
},
|
||||
|
|
33
2018/CVE-2018-1000531.json
Normal file
33
2018/CVE-2018-1000531.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 889219295,
|
||||
"name": "JWT-Bruteforcer",
|
||||
"full_name": "realbatuhan\/JWT-Bruteforcer",
|
||||
"owner": {
|
||||
"login": "realbatuhan",
|
||||
"id": 68564239,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68564239?v=4",
|
||||
"html_url": "https:\/\/github.com\/realbatuhan",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/realbatuhan\/JWT-Bruteforcer",
|
||||
"description": "Jwt Bruteforcer with CVE-2018-1000531 Test",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-15T21:00:24Z",
|
||||
"updated_at": "2024-11-15T21:05:48Z",
|
||||
"pushed_at": "2024-11-15T21:05:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -45,8 +45,8 @@
|
|||
"description": "A tool for retrieving login credentials from Netwave IP cameras using a memory dump vulnerability (CVE-2018-17240)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-04T21:44:21Z",
|
||||
"updated_at": "2024-11-14T17:14:40Z",
|
||||
"pushed_at": "2024-11-15T09:26:20Z",
|
||||
"updated_at": "2024-11-15T18:18:23Z",
|
||||
"pushed_at": "2024-11-15T18:18:22Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2024-11-13T08:27:26Z",
|
||||
"updated_at": "2024-11-15T22:29:23Z",
|
||||
"pushed_at": "2022-12-11T10:44:39Z",
|
||||
"stargazers_count": 526,
|
||||
"watchers_count": 526,
|
||||
"stargazers_count": 527,
|
||||
"watchers_count": 527,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 526,
|
||||
"watchers": 527,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-05T16:55:40Z",
|
||||
"updated_at": "2024-09-25T13:58:39Z",
|
||||
"updated_at": "2024-11-15T20:45:36Z",
|
||||
"pushed_at": "2024-08-05T18:31:16Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -128,6 +128,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 6,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 4
|
||||
}
|
||||
]
|
|
@ -78,10 +78,10 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2024-11-01T02:37:51Z",
|
||||
"updated_at": "2024-11-15T22:45:21Z",
|
||||
"pushed_at": "2023-07-04T05:16:05Z",
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"has_discussions": false,
|
||||
"forks_count": 86,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 86,
|
||||
"watchers": 320,
|
||||
"watchers": 321,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
@ -584,10 +584,10 @@
|
|||
"description": "Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-04T10:48:40Z",
|
||||
"updated_at": "2024-05-02T10:58:20Z",
|
||||
"updated_at": "2024-11-15T22:39:55Z",
|
||||
"pushed_at": "2021-06-06T16:03:53Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -596,7 +596,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T08:14:03Z",
|
||||
"updated_at": "2024-10-23T08:49:39Z",
|
||||
"updated_at": "2024-11-15T22:58:27Z",
|
||||
"pushed_at": "2021-02-07T09:42:36Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 113,
|
||||
"watchers": 114,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -311,10 +311,10 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2024-11-09T22:43:25Z",
|
||||
"updated_at": "2024-11-16T00:03:54Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 1013,
|
||||
"watchers_count": 1013,
|
||||
"stargazers_count": 1014,
|
||||
"watchers_count": 1014,
|
||||
"has_discussions": false,
|
||||
"forks_count": 230,
|
||||
"allow_forking": true,
|
||||
|
@ -323,7 +323,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 230,
|
||||
"watchers": 1013,
|
||||
"watchers": 1014,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -176,7 +176,7 @@
|
|||
"description": "CVE-2021-21985 vmware 6.7-9.8 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-04T01:15:14Z",
|
||||
"updated_at": "2024-08-12T20:13:36Z",
|
||||
"updated_at": "2024-11-15T19:24:39Z",
|
||||
"pushed_at": "2023-11-27T18:36:50Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -1109,13 +1109,13 @@
|
|||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"forks": 16,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "CVE-2021-30461",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-06T22:50:32Z",
|
||||
"updated_at": "2024-08-12T20:12:46Z",
|
||||
"updated_at": "2024-11-15T19:25:24Z",
|
||||
"pushed_at": "2023-11-27T18:36:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-11-13T15:27:18Z",
|
||||
"updated_at": "2024-11-15T20:43:51Z",
|
||||
"pushed_at": "2024-08-01T15:09:15Z",
|
||||
"stargazers_count": 291,
|
||||
"watchers_count": 291,
|
||||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"has_discussions": true,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 291,
|
||||
"watchers": 292,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
33
2022/CVE-2022-39275.json
Normal file
33
2022/CVE-2022-39275.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 889242972,
|
||||
"name": "CVE-2022-39275",
|
||||
"full_name": "omar2535\/CVE-2022-39275",
|
||||
"owner": {
|
||||
"login": "omar2535",
|
||||
"id": 9442294,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9442294?v=4",
|
||||
"html_url": "https:\/\/github.com\/omar2535",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/omar2535\/CVE-2022-39275",
|
||||
"description": "CVE-2022-39275 Setup and POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-15T22:21:16Z",
|
||||
"updated_at": "2024-11-15T22:24:28Z",
|
||||
"pushed_at": "2024-11-15T22:24:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-30T12:57:48Z",
|
||||
"updated_at": "2024-11-07T03:54:09Z",
|
||||
"updated_at": "2024-11-15T19:21:38Z",
|
||||
"pushed_at": "2023-12-05T12:21:02Z",
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
|
@ -36,7 +36,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 266,
|
||||
"watchers": 267,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -675,10 +675,10 @@
|
|||
"description": "NSE script for checking the presence of CVE-2023-22515",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-26T17:57:33Z",
|
||||
"updated_at": "2024-09-18T19:46:55Z",
|
||||
"updated_at": "2024-11-15T21:14:17Z",
|
||||
"pushed_at": "2024-04-26T17:58:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -687,7 +687,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "POC - CVE-2024–10914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-10T12:01:21Z",
|
||||
"updated_at": "2024-11-15T13:24:02Z",
|
||||
"updated_at": "2024-11-15T21:58:01Z",
|
||||
"pushed_at": "2024-11-10T12:13:16Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -65,7 +65,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-21T10:27:52Z",
|
||||
"updated_at": "2024-11-13T22:55:58Z",
|
||||
"updated_at": "2024-11-15T19:48:46Z",
|
||||
"pushed_at": "2024-10-27T17:49:33Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 867371823,
|
||||
"name": "CVE-2024-26160",
|
||||
"full_name": "0x00Alchemist\/CVE-2024-26160",
|
||||
"full_name": "xsh3llsh0ck\/CVE-2024-26160",
|
||||
"owner": {
|
||||
"login": "0x00Alchemist",
|
||||
"login": "xsh3llsh0ck",
|
||||
"id": 45564102,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45564102?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x00Alchemist",
|
||||
"html_url": "https:\/\/github.com\/xsh3llsh0ck",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x00Alchemist\/CVE-2024-26160",
|
||||
"html_url": "https:\/\/github.com\/xsh3llsh0ck\/CVE-2024-26160",
|
||||
"description": "cldflt.sys information disclosure vulnerability (KB5034765 - KB5035853, Win 11).",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-04T00:04:42Z",
|
||||
|
|
|
@ -122,5 +122,36 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 889247775,
|
||||
"name": "CVE-2024-2876",
|
||||
"full_name": "issamiso\/CVE-2024-2876",
|
||||
"owner": {
|
||||
"login": "issamiso",
|
||||
"id": 101994309,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101994309?v=4",
|
||||
"html_url": "https:\/\/github.com\/issamiso",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/issamiso\/CVE-2024-2876",
|
||||
"description": "WP-SQL-Injection CVE-2024-2876 AND 2024-CVE-2024-3495",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-15T22:39:48Z",
|
||||
"updated_at": "2024-11-15T22:51:46Z",
|
||||
"pushed_at": "2024-11-15T22:50:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "The public reference that contains the minimum require information for the vulnerability covered by CVE-2024-36821",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T15:52:02Z",
|
||||
"updated_at": "2024-07-25T08:18:18Z",
|
||||
"updated_at": "2024-11-15T19:16:54Z",
|
||||
"pushed_at": "2024-06-10T16:07:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -265,10 +265,10 @@
|
|||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T18:25:46Z",
|
||||
"updated_at": "2024-11-11T09:03:33Z",
|
||||
"updated_at": "2024-11-15T22:24:35Z",
|
||||
"pushed_at": "2024-08-27T12:22:39Z",
|
||||
"stargazers_count": 618,
|
||||
"watchers_count": 618,
|
||||
"stargazers_count": 619,
|
||||
"watchers_count": 619,
|
||||
"has_discussions": false,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
|
@ -277,7 +277,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"watchers": 618,
|
||||
"watchers": 619,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -111,10 +111,10 @@
|
|||
"description": "Exploit for the vulnerability CVE-2024-43044 in Jenkins",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-23T20:26:26Z",
|
||||
"updated_at": "2024-11-15T02:10:17Z",
|
||||
"updated_at": "2024-11-16T00:17:15Z",
|
||||
"pushed_at": "2024-10-02T21:58:12Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -123,7 +123,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 165,
|
||||
"watchers": 166,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-14T09:38:04Z",
|
||||
"updated_at": "2024-11-15T06:35:00Z",
|
||||
"updated_at": "2024-11-15T23:07:26Z",
|
||||
"pushed_at": "2024-10-14T09:43:53Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-07T21:03:30Z",
|
||||
"updated_at": "2024-11-15T16:58:09Z",
|
||||
"updated_at": "2024-11-16T00:05:53Z",
|
||||
"pushed_at": "2024-11-14T16:25:52Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 34,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -45,8 +45,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-15T13:19:33Z",
|
||||
"updated_at": "2024-11-15T13:32:45Z",
|
||||
"pushed_at": "2024-11-15T13:22:50Z",
|
||||
"updated_at": "2024-11-15T18:56:04Z",
|
||||
"pushed_at": "2024-11-15T18:56:01Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
|
|
33
2024/CVE-2024-50848.json
Normal file
33
2024/CVE-2024-50848.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 889175343,
|
||||
"name": "CVE-2024-50848",
|
||||
"full_name": "Wh1teSnak3\/CVE-2024-50848",
|
||||
"owner": {
|
||||
"login": "Wh1teSnak3",
|
||||
"id": 188617964,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188617964?v=4",
|
||||
"html_url": "https:\/\/github.com\/Wh1teSnak3",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Wh1teSnak3\/CVE-2024-50848",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-15T18:57:25Z",
|
||||
"updated_at": "2024-11-15T19:29:50Z",
|
||||
"pushed_at": "2024-11-15T19:29:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-50849.json
Normal file
33
2024/CVE-2024-50849.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 889195386,
|
||||
"name": "CVE-2024-50849",
|
||||
"full_name": "Wh1teSnak3\/CVE-2024-50849",
|
||||
"owner": {
|
||||
"login": "Wh1teSnak3",
|
||||
"id": 188617964,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188617964?v=4",
|
||||
"html_url": "https:\/\/github.com\/Wh1teSnak3",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Wh1teSnak3\/CVE-2024-50849",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-15T19:51:18Z",
|
||||
"updated_at": "2024-11-15T21:46:59Z",
|
||||
"pushed_at": "2024-11-15T21:46:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 889180658,
|
||||
"name": "CVE-2024-52301-Research",
|
||||
"full_name": "martinhaunschmid\/CVE-2024-52301-Research",
|
||||
"owner": {
|
||||
"login": "martinhaunschmid",
|
||||
"id": 35374703,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35374703?v=4",
|
||||
"html_url": "https:\/\/github.com\/martinhaunschmid",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/martinhaunschmid\/CVE-2024-52301-Research",
|
||||
"description": "A bit of research around CVE-2024-52301",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-15T19:11:35Z",
|
||||
"updated_at": "2024-11-15T19:42:15Z",
|
||||
"pushed_at": "2024-11-15T19:42:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 889262902,
|
||||
"name": "Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464",
|
||||
"full_name": "p33d\/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464",
|
||||
"owner": {
|
||||
"login": "p33d",
|
||||
"id": 123099747,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123099747?v=4",
|
||||
"html_url": "https:\/\/github.com\/p33d",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/p33d\/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-15T23:46:01Z",
|
||||
"updated_at": "2024-11-15T23:46:01Z",
|
||||
"pushed_at": "2024-11-15T23:46:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -684,10 +684,10 @@
|
|||
"description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T06:53:35Z",
|
||||
"updated_at": "2024-11-11T04:00:50Z",
|
||||
"updated_at": "2024-11-15T21:43:12Z",
|
||||
"pushed_at": "2024-07-04T20:04:30Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -696,7 +696,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -153,5 +153,36 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 889221961,
|
||||
"name": "CVE-2024-7954",
|
||||
"full_name": "issamiso\/CVE-2024-7954",
|
||||
"owner": {
|
||||
"login": "issamiso",
|
||||
"id": 101994309,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101994309?v=4",
|
||||
"html_url": "https:\/\/github.com\/issamiso",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/issamiso\/CVE-2024-7954",
|
||||
"description": "The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-15T21:08:47Z",
|
||||
"updated_at": "2024-11-15T22:51:47Z",
|
||||
"pushed_at": "2024-11-15T21:10:55Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 889251660,
|
||||
"name": "CVE-2024-9796",
|
||||
"full_name": "issamiso\/CVE-2024-9796",
|
||||
"owner": {
|
||||
"login": "issamiso",
|
||||
"id": 101994309,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101994309?v=4",
|
||||
"html_url": "https:\/\/github.com\/issamiso",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/issamiso\/CVE-2024-9796",
|
||||
"description": "WordPress WP-Advanced-Search <= 3.3.9 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-15T22:55:18Z",
|
||||
"updated_at": "2024-11-15T23:05:22Z",
|
||||
"pushed_at": "2024-11-15T23:04:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
27
README.md
27
README.md
|
@ -555,6 +555,7 @@
|
|||
- [Quantum-Hacker/CVE-2024-2876](https://github.com/Quantum-Hacker/CVE-2024-2876)
|
||||
- [0xAgun/CVE-2024-2876](https://github.com/0xAgun/CVE-2024-2876)
|
||||
- [skyrowalker/CVE-2024-2876](https://github.com/skyrowalker/CVE-2024-2876)
|
||||
- [issamiso/CVE-2024-2876](https://github.com/issamiso/CVE-2024-2876)
|
||||
|
||||
### CVE-2024-2879 (2024-04-03)
|
||||
|
||||
|
@ -1212,6 +1213,7 @@
|
|||
</code>
|
||||
|
||||
- [zetraxz/CVE-2024-5910](https://github.com/zetraxz/CVE-2024-5910)
|
||||
- [p33d/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464](https://github.com/p33d/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464)
|
||||
|
||||
### CVE-2024-5932 (2024-08-20)
|
||||
|
||||
|
@ -1597,6 +1599,7 @@
|
|||
- [fa-rrel/CVE-2024-7954-RCE](https://github.com/fa-rrel/CVE-2024-7954-RCE)
|
||||
- [TheCyberguy-17/RCE_CVE-2024-7954](https://github.com/TheCyberguy-17/RCE_CVE-2024-7954)
|
||||
- [MuhammadWaseem29/RCE-CVE-2024-7954](https://github.com/MuhammadWaseem29/RCE-CVE-2024-7954)
|
||||
- [issamiso/CVE-2024-7954](https://github.com/issamiso/CVE-2024-7954)
|
||||
|
||||
### CVE-2024-7965 (2024-08-21)
|
||||
|
||||
|
@ -1836,6 +1839,7 @@
|
|||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-9796](https://github.com/RandomRobbieBF/CVE-2024-9796)
|
||||
- [issamiso/CVE-2024-9796](https://github.com/issamiso/CVE-2024-9796)
|
||||
|
||||
### CVE-2024-9821 (2024-10-12)
|
||||
|
||||
|
@ -3369,7 +3373,7 @@
|
|||
<code>Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
|
||||
</code>
|
||||
|
||||
- [0x00Alchemist/CVE-2024-26160](https://github.com/0x00Alchemist/CVE-2024-26160)
|
||||
- [xsh3llsh0ck/CVE-2024-26160](https://github.com/xsh3llsh0ck/CVE-2024-26160)
|
||||
|
||||
### CVE-2024-26218 (2024-04-09)
|
||||
|
||||
|
@ -6516,6 +6520,12 @@
|
|||
### CVE-2024-50803
|
||||
- [Praison001/CVE-2024-50803-Redaxo](https://github.com/Praison001/CVE-2024-50803-Redaxo)
|
||||
|
||||
### CVE-2024-50848
|
||||
- [Wh1teSnak3/CVE-2024-50848](https://github.com/Wh1teSnak3/CVE-2024-50848)
|
||||
|
||||
### CVE-2024-50849
|
||||
- [Wh1teSnak3/CVE-2024-50849](https://github.com/Wh1teSnak3/CVE-2024-50849)
|
||||
|
||||
### CVE-2024-50961
|
||||
- [fdzdev/CVE-2024-50961](https://github.com/fdzdev/CVE-2024-50961)
|
||||
|
||||
|
@ -6675,6 +6685,7 @@
|
|||
</code>
|
||||
|
||||
- [Nyamort/CVE-2024-52301](https://github.com/Nyamort/CVE-2024-52301)
|
||||
- [martinhaunschmid/CVE-2024-52301-Research](https://github.com/martinhaunschmid/CVE-2024-52301-Research)
|
||||
|
||||
### CVE-2024-52302 (2024-11-14)
|
||||
|
||||
|
@ -20279,6 +20290,13 @@
|
|||
- [ssst0n3/docker-cve-2022-39253-poc](https://github.com/ssst0n3/docker-cve-2022-39253-poc)
|
||||
- [HiImDarwin/NetworkSecurityFinalProject](https://github.com/HiImDarwin/NetworkSecurityFinalProject)
|
||||
|
||||
### CVE-2022-39275 (2022-10-06)
|
||||
|
||||
<code>Saleor is a headless, GraphQL commerce platform. In affected versions some GraphQL mutations were not properly checking the ID type input which allowed to access database objects that the authenticated user may not be allowed to access. This vulnerability can be used to expose the following information: Estimating database row counts from tables with a sequential primary key or Exposing staff user and customer email addresses and full name through the `assignNavigation()` mutation. This issue has been patched in main and backported to multiple releases (3.7.17, 3.6.18, 3.5.23, 3.4.24, 3.3.26, 3.2.14, 3.1.24). Users are advised to upgrade. There are no known workarounds for this issue.
|
||||
</code>
|
||||
|
||||
- [omar2535/CVE-2022-39275](https://github.com/omar2535/CVE-2022-39275)
|
||||
|
||||
### CVE-2022-39299 (2022-10-12)
|
||||
|
||||
<code>Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. The issue was also present in the beta releases of `node-saml` before version 4.0.0-beta.5. If you cannot upgrade, disabling SAML authentication may be done as a workaround.
|
||||
|
@ -41295,6 +41313,13 @@
|
|||
|
||||
- [martinfrancois/CVE-2018-1000529](https://github.com/martinfrancois/CVE-2018-1000529)
|
||||
|
||||
### CVE-2018-1000531 (2018-06-26)
|
||||
|
||||
<code>inversoft prime-jwt version prior to commit abb0d479389a2509f939452a6767dc424bb5e6ba contains a CWE-20 vulnerability in JWTDecoder.decode that can result in an incorrect signature validation of a JWT token. This attack can be exploitable when an attacker crafts a JWT token with a valid header using 'none' as algorithm and a body to requests it be validated. This vulnerability was fixed after commit abb0d479389a2509f939452a6767dc424bb5e6ba.
|
||||
</code>
|
||||
|
||||
- [realbatuhan/JWT-Bruteforcer](https://github.com/realbatuhan/JWT-Bruteforcer)
|
||||
|
||||
### CVE-2018-1000542 (2018-06-26)
|
||||
|
||||
<code>netbeans-mmd-plugin version <= 1.4.3 contains a XML External Entity (XXE) vulnerability in MMD file import that can result in Possible information disclosure, server-side request forgery, or remote code execution. This attack appear to be exploitable via Specially crafted MMD file.
|
||||
|
|
Loading…
Reference in a new issue