mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/05 00:32:14
This commit is contained in:
parent
a81adc1cfe
commit
7009f19e56
26 changed files with 174 additions and 138 deletions
|
@ -2176,10 +2176,10 @@
|
|||
"description": "This project demonstrates a Web Application Firewall (WAF) simulation using Flask and a vulnerability checker for CVE-2017-5638. The WAF middleware blocks HTTP requests containing specific patterns, and the vulnerability checker tests for and exploits the Apache Struts 2 vulnerability (CVE-2017-5638).",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-11T15:16:56Z",
|
||||
"updated_at": "2024-07-11T15:19:54Z",
|
||||
"updated_at": "2024-12-04T20:21:40Z",
|
||||
"pushed_at": "2024-07-11T15:19:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -2188,7 +2188,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -169,10 +169,10 @@
|
|||
"description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-23T20:58:40Z",
|
||||
"updated_at": "2024-09-29T20:16:07Z",
|
||||
"updated_at": "2024-12-04T18:15:20Z",
|
||||
"pushed_at": "2018-10-11T16:54:31Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-10T17:50:01Z",
|
||||
"updated_at": "2024-10-01T05:06:09Z",
|
||||
"updated_at": "2024-12-04T19:59:04Z",
|
||||
"pushed_at": "2020-10-12T09:57:28Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -102,13 +102,13 @@
|
|||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"forks": 45,
|
||||
"watchers": 211,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:27:41Z",
|
||||
"updated_at": "2024-08-12T19:58:00Z",
|
||||
"updated_at": "2024-12-04T19:11:57Z",
|
||||
"pushed_at": "2020-02-22T16:33:31Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
File diff suppressed because one or more lines are too long
|
@ -45,10 +45,10 @@
|
|||
"description": "Laravel debug rce",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:12:21Z",
|
||||
"updated_at": "2024-11-17T07:18:34Z",
|
||||
"updated_at": "2024-12-04T21:47:14Z",
|
||||
"pushed_at": "2021-01-24T05:28:07Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 125,
|
||||
"watchers": 126,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -938,8 +938,8 @@
|
|||
"description": "Modified version of laravel ignition RCE (CVE-2021-3129) exploit script for Hour of Hack Session-4",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T17:04:03Z",
|
||||
"updated_at": "2024-12-04T18:08:39Z",
|
||||
"pushed_at": "2024-12-04T18:08:34Z",
|
||||
"updated_at": "2024-12-04T19:32:49Z",
|
||||
"pushed_at": "2024-12-04T19:32:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -231,10 +231,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2024-12-04T10:06:55Z",
|
||||
"updated_at": "2024-12-04T22:45:31Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1601,
|
||||
"watchers_count": 1601,
|
||||
"stargazers_count": 1602,
|
||||
"watchers_count": 1602,
|
||||
"has_discussions": false,
|
||||
"forks_count": 482,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 482,
|
||||
"watchers": 1601,
|
||||
"watchers": 1602,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -50,10 +50,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2024-12-04T13:16:44Z",
|
||||
"updated_at": "2024-12-04T19:54:55Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 813,
|
||||
"watchers_count": 813,
|
||||
"stargazers_count": 814,
|
||||
"watchers_count": 814,
|
||||
"has_discussions": false,
|
||||
"forks_count": 124,
|
||||
"allow_forking": true,
|
||||
|
@ -62,7 +62,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 124,
|
||||
"watchers": 813,
|
||||
"watchers": 814,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-12T19:22:44Z",
|
||||
"updated_at": "2024-11-21T05:23:30Z",
|
||||
"updated_at": "2024-12-04T22:50:12Z",
|
||||
"pushed_at": "2022-09-19T19:41:34Z",
|
||||
"stargazers_count": 300,
|
||||
"watchers_count": 300,
|
||||
"stargazers_count": 299,
|
||||
"watchers_count": 299,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 300,
|
||||
"watchers": 299,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -595,10 +595,10 @@
|
|||
"description": "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T20:00:23Z",
|
||||
"updated_at": "2024-09-09T23:16:52Z",
|
||||
"updated_at": "2024-12-04T19:11:59Z",
|
||||
"pushed_at": "2023-09-11T17:56:27Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -607,7 +607,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A script to automate privilege escalation with CVE-2023-22809 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-21T15:19:23Z",
|
||||
"updated_at": "2024-11-10T14:49:25Z",
|
||||
"updated_at": "2024-12-04T23:26:48Z",
|
||||
"pushed_at": "2023-02-15T18:10:53Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 148,
|
||||
"watchers": 149,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-30T12:25:47Z",
|
||||
"updated_at": "2024-12-03T23:39:02Z",
|
||||
"updated_at": "2024-12-04T22:34:18Z",
|
||||
"pushed_at": "2024-12-01T16:08:19Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -655,5 +655,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 898709513,
|
||||
"name": "CVE-2023-4220",
|
||||
"full_name": "MikeyPPPPPPPP\/CVE-2023-4220",
|
||||
"owner": {
|
||||
"login": "MikeyPPPPPPPP",
|
||||
"id": 50926811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50926811?v=4",
|
||||
"html_url": "https:\/\/github.com\/MikeyPPPPPPPP",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MikeyPPPPPPPP\/CVE-2023-4220",
|
||||
"description": "Remote command execution exploit made for redteamers.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T22:16:12Z",
|
||||
"updated_at": "2024-12-05T00:00:21Z",
|
||||
"pushed_at": "2024-12-05T00:00:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-12-03T21:28:40Z",
|
||||
"updated_at": "2024-12-04T23:00:01Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1284,
|
||||
"watchers_count": 1284,
|
||||
"stargazers_count": 1285,
|
||||
"watchers_count": 1285,
|
||||
"has_discussions": false,
|
||||
"forks_count": 218,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 218,
|
||||
"watchers": 1284,
|
||||
"watchers": 1285,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
33
2024/CVE-2024-11680.json
Normal file
33
2024/CVE-2024-11680.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 898635585,
|
||||
"name": "CVE-2024-11680_PoC_Exploit",
|
||||
"full_name": "D3N14LD15K\/CVE-2024-11680_PoC_Exploit",
|
||||
"owner": {
|
||||
"login": "D3N14LD15K",
|
||||
"id": 155617205,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155617205?v=4",
|
||||
"html_url": "https:\/\/github.com\/D3N14LD15K",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/D3N14LD15K\/CVE-2024-11680_PoC_Exploit",
|
||||
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T18:42:43Z",
|
||||
"updated_at": "2024-12-05T00:24:01Z",
|
||||
"pushed_at": "2024-12-04T19:25:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1,33 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 890642037,
|
||||
"name": "CVE-2024-38193",
|
||||
"full_name": "Nephster\/CVE-2024-38193",
|
||||
"id": 897795595,
|
||||
"name": "CVE-2024-38193-Nephster",
|
||||
"full_name": "killvxk\/CVE-2024-38193-Nephster",
|
||||
"owner": {
|
||||
"login": "Nephster",
|
||||
"id": 7522000,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7522000?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nephster",
|
||||
"login": "killvxk",
|
||||
"id": 309424,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/309424?v=4",
|
||||
"html_url": "https:\/\/github.com\/killvxk",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nephster\/CVE-2024-38193",
|
||||
"html_url": "https:\/\/github.com\/killvxk\/CVE-2024-38193-Nephster",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-18T23:34:34Z",
|
||||
"updated_at": "2024-12-04T15:35:36Z",
|
||||
"created_at": "2024-12-03T08:56:59Z",
|
||||
"updated_at": "2024-12-03T09:05:33Z",
|
||||
"pushed_at": "2024-11-18T23:48:31Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 30,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "cve-2024-42327 ZBX-25623",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-01T00:15:27Z",
|
||||
"updated_at": "2024-12-04T18:29:22Z",
|
||||
"updated_at": "2024-12-04T22:18:19Z",
|
||||
"pushed_at": "2024-12-01T01:18:36Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 15,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -45,10 +45,10 @@
|
|||
"description": "PoC for CVE-2024-42327 \/ ZBX-25623",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-03T12:44:07Z",
|
||||
"updated_at": "2024-12-04T14:31:56Z",
|
||||
"updated_at": "2024-12-04T23:45:49Z",
|
||||
"pushed_at": "2024-12-03T12:56:52Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-02T04:09:04Z",
|
||||
"updated_at": "2024-12-03T03:57:36Z",
|
||||
"updated_at": "2024-12-05T00:10:27Z",
|
||||
"pushed_at": "2024-12-02T04:16:09Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Pre-Authentication Heap Overflow in Xlight SFTP server <= 3.9.4.2",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-18T11:46:14Z",
|
||||
"updated_at": "2024-11-14T08:20:38Z",
|
||||
"updated_at": "2024-12-04T22:39:12Z",
|
||||
"pushed_at": "2024-10-18T12:29:36Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-07T21:03:30Z",
|
||||
"updated_at": "2024-11-29T01:40:56Z",
|
||||
"updated_at": "2024-12-04T22:33:44Z",
|
||||
"pushed_at": "2024-11-14T16:25:52Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 70,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T08:57:18Z",
|
||||
"updated_at": "2024-12-04T18:26:55Z",
|
||||
"updated_at": "2024-12-04T23:54:55Z",
|
||||
"pushed_at": "2024-11-19T09:15:26Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1,33 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 897723885,
|
||||
"name": "CVE-2024-52680",
|
||||
"full_name": "cyb3res3c\/CVE-2024-52680",
|
||||
"owner": {
|
||||
"login": "cyb3res3c",
|
||||
"id": 109259351,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109259351?v=4",
|
||||
"html_url": "https:\/\/github.com\/cyb3res3c",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cyb3res3c\/CVE-2024-52680",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-03T05:58:44Z",
|
||||
"updated_at": "2024-12-03T06:16:05Z",
|
||||
"pushed_at": "2024-12-03T06:16:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-19T13:50:52Z",
|
||||
"updated_at": "2024-11-24T11:10:43Z",
|
||||
"updated_at": "2024-12-04T22:45:28Z",
|
||||
"pushed_at": "2024-11-21T17:43:56Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -38,7 +38,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PAN-OS auth bypass + RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T17:26:27Z",
|
||||
"updated_at": "2024-12-03T05:18:54Z",
|
||||
"updated_at": "2024-12-04T20:47:07Z",
|
||||
"pushed_at": "2024-11-19T17:38:29Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
13
README.md
13
README.md
|
@ -2250,6 +2250,13 @@
|
|||
|
||||
- [TheN00bBuilder/cve-2024-11477-writeup](https://github.com/TheN00bBuilder/cve-2024-11477-writeup)
|
||||
|
||||
### CVE-2024-11680 (2024-11-26)
|
||||
|
||||
<code>ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
|
||||
</code>
|
||||
|
||||
- [D3N14LD15K/CVE-2024-11680_PoC_Exploit](https://github.com/D3N14LD15K/CVE-2024-11680_PoC_Exploit)
|
||||
|
||||
### CVE-2024-12345
|
||||
- [RoyaRadin/CVE-2024-12345-POC](https://github.com/RoyaRadin/CVE-2024-12345-POC)
|
||||
|
||||
|
@ -5526,7 +5533,7 @@
|
|||
<code>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [Nephster/CVE-2024-38193](https://github.com/Nephster/CVE-2024-38193)
|
||||
- [killvxk/CVE-2024-38193-Nephster](https://github.com/killvxk/CVE-2024-38193-Nephster)
|
||||
|
||||
### CVE-2024-38200 (2024-08-08)
|
||||
|
||||
|
@ -7204,9 +7211,6 @@
|
|||
|
||||
- [ubaii/CVE-2024-52475](https://github.com/ubaii/CVE-2024-52475)
|
||||
|
||||
### CVE-2024-52680
|
||||
- [cyb3res3c/CVE-2024-52680](https://github.com/cyb3res3c/CVE-2024-52680)
|
||||
|
||||
### CVE-2024-52711 (2024-11-19)
|
||||
|
||||
<code>DI-8100 v16.07.26A1 is vulnerable to Buffer Overflow In the ip_position_asp function via the ip parameter.
|
||||
|
@ -8146,6 +8150,7 @@
|
|||
- [H4cking4All/CVE-2023-4220](https://github.com/H4cking4All/CVE-2023-4220)
|
||||
- [oxapavan/CVE-2023-4220-HTB-PermX](https://github.com/oxapavan/CVE-2023-4220-HTB-PermX)
|
||||
- [numaan911098/CVE-2023-4220](https://github.com/numaan911098/CVE-2023-4220)
|
||||
- [MikeyPPPPPPPP/CVE-2023-4220](https://github.com/MikeyPPPPPPPP/CVE-2023-4220)
|
||||
|
||||
### CVE-2023-4226 (2023-11-28)
|
||||
|
||||
|
|
Loading…
Reference in a new issue