mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/10/29 00:31:27
This commit is contained in:
parent
8776966d6e
commit
7578730fb1
41 changed files with 368 additions and 128 deletions
33
2013/CVE-2013-3827.json
Normal file
33
2013/CVE-2013-3827.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 674938712,
|
||||
"name": "CVE-2013-3827",
|
||||
"full_name": "thistehneisen\/CVE-2013-3827",
|
||||
"owner": {
|
||||
"login": "thistehneisen",
|
||||
"id": 6432992,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6432992?v=4",
|
||||
"html_url": "https:\/\/github.com\/thistehneisen",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thistehneisen\/CVE-2013-3827",
|
||||
"description": "Quick PoC checker for common configurations that might be available via directory traversal due to CVE-2013-3827",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-05T08:26:22Z",
|
||||
"updated_at": "2023-08-05T08:29:17Z",
|
||||
"pushed_at": "2023-08-05T08:29:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-10-25T03:27:36Z",
|
||||
"updated_at": "2024-10-28T18:17:56Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2001,
|
||||
"watchers_count": 2001,
|
||||
"stargazers_count": 2002,
|
||||
"watchers_count": 2002,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -78,7 +78,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2001,
|
||||
"watchers": 2002,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-10-25T03:27:36Z",
|
||||
"updated_at": "2024-10-28T18:17:56Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2001,
|
||||
"watchers_count": 2001,
|
||||
"stargazers_count": 2002,
|
||||
"watchers_count": 2002,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -47,7 +47,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2001,
|
||||
"watchers": 2002,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-26T13:39:03Z",
|
||||
"updated_at": "2024-10-20T05:38:19Z",
|
||||
"updated_at": "2024-10-28T18:32:14Z",
|
||||
"pushed_at": "2023-02-27T06:48:09Z",
|
||||
"stargazers_count": 403,
|
||||
"watchers_count": 403,
|
||||
"stargazers_count": 404,
|
||||
"watchers_count": 404,
|
||||
"has_discussions": false,
|
||||
"forks_count": 148,
|
||||
"allow_forking": true,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 148,
|
||||
"watchers": 403,
|
||||
"watchers": 404,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-16T19:44:04Z",
|
||||
"updated_at": "2024-10-18T12:17:05Z",
|
||||
"updated_at": "2024-10-28T18:13:55Z",
|
||||
"pushed_at": "2024-07-31T13:54:45Z",
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"has_discussions": false,
|
||||
"forks_count": 105,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"watchers": 321,
|
||||
"watchers": 322,
|
||||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-10-25T03:27:36Z",
|
||||
"updated_at": "2024-10-28T18:17:56Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2001,
|
||||
"watchers_count": 2001,
|
||||
"stargazers_count": 2002,
|
||||
"watchers_count": 2002,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -78,7 +78,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2001,
|
||||
"watchers": 2002,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-05T16:25:57Z",
|
||||
"updated_at": "2024-08-12T19:30:22Z",
|
||||
"updated_at": "2024-10-28T18:13:54Z",
|
||||
"pushed_at": "2021-03-09T09:12:55Z",
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"has_discussions": false,
|
||||
"forks_count": 80,
|
||||
"allow_forking": true,
|
||||
|
@ -187,7 +187,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"watchers": 255,
|
||||
"watchers": 256,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2018-13382",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-11T11:13:44Z",
|
||||
"updated_at": "2024-08-26T04:25:26Z",
|
||||
"updated_at": "2024-10-28T18:14:11Z",
|
||||
"pushed_at": "2019-08-13T15:06:28Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 145,
|
||||
"watchers": 146,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -576,10 +576,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-10-25T03:27:36Z",
|
||||
"updated_at": "2024-10-28T18:17:56Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2001,
|
||||
"watchers_count": 2001,
|
||||
"stargazers_count": 2002,
|
||||
"watchers_count": 2002,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -609,7 +609,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2001,
|
||||
"watchers": 2002,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -137,5 +137,36 @@
|
|||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 674981101,
|
||||
"name": "CVE-2018-6789-Python3",
|
||||
"full_name": "thistehneisen\/CVE-2018-6789-Python3",
|
||||
"owner": {
|
||||
"login": "thistehneisen",
|
||||
"id": 6432992,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6432992?v=4",
|
||||
"html_url": "https:\/\/github.com\/thistehneisen",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thistehneisen\/CVE-2018-6789-Python3",
|
||||
"description": "Exim < 4.90.1 RCE Vulnerability remake for Python3 with arguments passed from CLI",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-05T11:28:49Z",
|
||||
"updated_at": "2023-08-05T11:29:43Z",
|
||||
"pushed_at": "2023-08-05T11:30:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -83,10 +83,10 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2024-10-01T13:21:08Z",
|
||||
"updated_at": "2024-10-28T18:14:02Z",
|
||||
"pushed_at": "2021-01-08T10:31:22Z",
|
||||
"stargazers_count": 578,
|
||||
"watchers_count": 578,
|
||||
"stargazers_count": 579,
|
||||
"watchers_count": 579,
|
||||
"has_discussions": false,
|
||||
"forks_count": 173,
|
||||
"allow_forking": true,
|
||||
|
@ -105,7 +105,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 173,
|
||||
"watchers": 578,
|
||||
"watchers": 579,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -200,10 +200,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-10-25T03:27:36Z",
|
||||
"updated_at": "2024-10-28T18:17:56Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2001,
|
||||
"watchers_count": 2001,
|
||||
"stargazers_count": 2002,
|
||||
"watchers_count": 2002,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -233,7 +233,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2001,
|
||||
"watchers": 2002,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
}
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-10-25T03:27:36Z",
|
||||
"updated_at": "2024-10-28T18:17:56Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2001,
|
||||
"watchers_count": 2001,
|
||||
"stargazers_count": 2002,
|
||||
"watchers_count": 2002,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -47,7 +47,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2001,
|
||||
"watchers": 2002,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-11T22:08:47Z",
|
||||
"updated_at": "2024-10-26T01:47:24Z",
|
||||
"updated_at": "2024-10-28T21:35:03Z",
|
||||
"pushed_at": "2021-10-13T22:32:36Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 125,
|
||||
"watchers": 126,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -82,10 +82,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T12:10:49Z",
|
||||
"updated_at": "2024-10-28T03:33:04Z",
|
||||
"updated_at": "2024-10-28T20:47:31Z",
|
||||
"pushed_at": "2021-07-02T12:17:50Z",
|
||||
"stargazers_count": 252,
|
||||
"watchers_count": 252,
|
||||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
"has_discussions": false,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
|
@ -94,7 +94,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 252,
|
||||
"watchers": 253,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2024-10-28T18:14:25Z",
|
||||
"updated_at": "2024-10-28T20:58:27Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1333,
|
||||
"watchers_count": 1333,
|
||||
"stargazers_count": 1334,
|
||||
"watchers_count": 1334,
|
||||
"has_discussions": false,
|
||||
"forks_count": 321,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 321,
|
||||
"watchers": 1333,
|
||||
"watchers": 1334,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -76,19 +76,19 @@
|
|||
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T09:02:16Z",
|
||||
"updated_at": "2024-10-15T07:31:22Z",
|
||||
"updated_at": "2024-10-28T23:22:59Z",
|
||||
"pushed_at": "2023-02-14T07:05:22Z",
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"stargazers_count": 353,
|
||||
"watchers_count": 353,
|
||||
"has_discussions": false,
|
||||
"forks_count": 88,
|
||||
"forks_count": 89,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 88,
|
||||
"watchers": 352,
|
||||
"forks": 89,
|
||||
"watchers": 353,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Android kernel exploitation for CVE-2022-20409",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-21T22:42:50Z",
|
||||
"updated_at": "2024-10-25T19:06:16Z",
|
||||
"updated_at": "2024-10-28T20:57:28Z",
|
||||
"pushed_at": "2024-10-17T16:26:39Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 291,
|
||||
"watchers_count": 291,
|
||||
"has_discussions": false,
|
||||
"forks_count": 59,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"windows-boot"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"forks": 60,
|
||||
"watchers": 291,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-28T09:51:41Z",
|
||||
"updated_at": "2024-10-21T10:38:32Z",
|
||||
"updated_at": "2024-10-28T19:00:04Z",
|
||||
"pushed_at": "2022-11-18T15:47:17Z",
|
||||
"stargazers_count": 527,
|
||||
"watchers_count": 527,
|
||||
"stargazers_count": 528,
|
||||
"watchers_count": 528,
|
||||
"has_discussions": false,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"watchers": 527,
|
||||
"watchers": 528,
|
||||
"score": 0,
|
||||
"subscribers_count": 46
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "PoC for CVE-2023-4911",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-04T14:12:16Z",
|
||||
"updated_at": "2024-10-21T10:39:01Z",
|
||||
"updated_at": "2024-10-28T23:01:13Z",
|
||||
"pushed_at": "2023-10-04T14:16:36Z",
|
||||
"stargazers_count": 378,
|
||||
"watchers_count": 378,
|
||||
"stargazers_count": 379,
|
||||
"watchers_count": 379,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 378,
|
||||
"watchers": 379,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -297,10 +297,10 @@
|
|||
"description": "Looney Tunables Local privilege escalation (CVE-2023-4911) workshop",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-25T11:59:34Z",
|
||||
"updated_at": "2024-10-01T08:39:18Z",
|
||||
"updated_at": "2024-10-28T23:06:00Z",
|
||||
"pushed_at": "2024-10-01T08:39:14Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -309,7 +309,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE).",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-13T09:31:36Z",
|
||||
"updated_at": "2024-10-07T09:57:25Z",
|
||||
"updated_at": "2024-10-28T20:44:04Z",
|
||||
"pushed_at": "2024-08-30T06:37:53Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
33
2024/CVE-2024-10448.json
Normal file
33
2024/CVE-2024-10448.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 879406614,
|
||||
"name": "CVE-2024-10448",
|
||||
"full_name": "bevennyamande\/CVE-2024-10448",
|
||||
"owner": {
|
||||
"login": "bevennyamande",
|
||||
"id": 10162710,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10162710?v=4",
|
||||
"html_url": "https:\/\/github.com\/bevennyamande",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bevennyamande\/CVE-2024-10448",
|
||||
"description": "Blood bank CSRF Attack POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T20:18:35Z",
|
||||
"updated_at": "2024-10-28T18:48:37Z",
|
||||
"pushed_at": "2024-10-27T22:12:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -107,10 +107,10 @@
|
|||
"description": "CVE-2024-21413 PoC for THM Lab",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-17T14:52:52Z",
|
||||
"updated_at": "2024-10-26T22:06:05Z",
|
||||
"updated_at": "2024-10-28T22:34:45Z",
|
||||
"pushed_at": "2024-03-13T02:44:28Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Time Based SQL Injection in Zabbix Server Audit Log --> RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T03:29:09Z",
|
||||
"updated_at": "2024-10-11T06:47:13Z",
|
||||
"updated_at": "2024-10-28T22:02:30Z",
|
||||
"pushed_at": "2024-05-21T10:30:49Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -936,6 +936,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 834942808,
|
||||
"name": "CVE-2024-23897",
|
||||
"full_name": "cc3305\/CVE-2024-23897",
|
||||
"owner": {
|
||||
"login": "cc3305",
|
||||
"id": 103961201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103961201?v=4",
|
||||
"html_url": "https:\/\/github.com\/cc3305",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cc3305\/CVE-2024-23897",
|
||||
"description": "CVE-2024-23897 exploit script",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-28T19:16:13Z",
|
||||
"updated_at": "2024-10-28T21:16:23Z",
|
||||
"pushed_at": "2024-10-28T21:15:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 838662184,
|
||||
"name": "CVE-2024-23897",
|
||||
|
|
|
@ -1703,5 +1703,36 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 879969031,
|
||||
"name": "CVE-2024-24919_POC",
|
||||
"full_name": "sar-3mar\/CVE-2024-24919_POC",
|
||||
"owner": {
|
||||
"login": "sar-3mar",
|
||||
"id": 105809777,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105809777?v=4",
|
||||
"html_url": "https:\/\/github.com\/sar-3mar",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sar-3mar\/CVE-2024-24919_POC",
|
||||
"description": "It's Proof of Concept on CVE-2024-24919-POC , i made it after it's discoverd ",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-28T21:54:41Z",
|
||||
"updated_at": "2024-10-28T22:08:32Z",
|
||||
"pushed_at": "2024-10-28T22:08:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Materials for CVE-2024-30052.",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-04T19:09:45Z",
|
||||
"updated_at": "2024-10-27T19:26:57Z",
|
||||
"updated_at": "2024-10-28T19:44:45Z",
|
||||
"pushed_at": "2024-10-04T20:28:39Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-30090 - LPE PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-17T08:38:47Z",
|
||||
"updated_at": "2024-10-28T15:03:53Z",
|
||||
"updated_at": "2024-10-28T22:43:22Z",
|
||||
"pushed_at": "2024-10-17T09:53:33Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -169,10 +169,10 @@
|
|||
"description": "CosmicSting (CVE-2024-34102)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-28T23:33:21Z",
|
||||
"updated_at": "2024-10-04T21:20:04Z",
|
||||
"updated_at": "2024-10-28T21:40:03Z",
|
||||
"pushed_at": "2024-09-05T18:38:46Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "OpenSIS SQLi Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-14T17:24:01Z",
|
||||
"updated_at": "2024-10-28T05:40:36Z",
|
||||
"updated_at": "2024-10-28T19:27:47Z",
|
||||
"pushed_at": "2024-10-14T17:42:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This proof-of-concept script demonstrates how to exploit CVE-2024-4323, a memory corruption vulnerability in Fluent Bit, enabling remote code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T15:04:13Z",
|
||||
"updated_at": "2024-07-01T14:19:02Z",
|
||||
"updated_at": "2024-10-28T19:41:49Z",
|
||||
"pushed_at": "2024-05-20T15:28:07Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1640,5 +1640,36 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 879955320,
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "0xbd2\/CVE-2024-4577",
|
||||
"owner": {
|
||||
"login": "0xbd2",
|
||||
"id": 186146694,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186146694?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xbd2",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xbd2\/CVE-2024-4577",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-28T21:10:12Z",
|
||||
"updated_at": "2024-10-28T21:10:46Z",
|
||||
"pushed_at": "2024-10-28T21:10:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -379,8 +379,8 @@
|
|||
"description": "CVE-2024-4956 Python exploitation utility",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-05T15:37:39Z",
|
||||
"updated_at": "2024-10-25T21:09:05Z",
|
||||
"pushed_at": "2024-10-25T21:09:01Z",
|
||||
"updated_at": "2024-10-28T19:41:35Z",
|
||||
"pushed_at": "2024-10-28T19:41:31Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
|
|
33
2024/CVE-2024-51435.json
Normal file
33
2024/CVE-2024-51435.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 878714460,
|
||||
"name": "CVE-2024-51435",
|
||||
"full_name": "bevennyamande\/CVE-2024-51435",
|
||||
"owner": {
|
||||
"login": "bevennyamande",
|
||||
"id": 10162710,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10162710?v=4",
|
||||
"html_url": "https:\/\/github.com\/bevennyamande",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bevennyamande\/CVE-2024-51435",
|
||||
"description": "bloodbank POCs",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-25T23:28:09Z",
|
||||
"updated_at": "2024-10-28T18:47:29Z",
|
||||
"pushed_at": "2024-10-25T23:50:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -87,10 +87,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-11T08:12:38Z",
|
||||
"updated_at": "2024-10-11T08:32:58Z",
|
||||
"updated_at": "2024-10-28T22:46:12Z",
|
||||
"pushed_at": "2024-10-11T08:32:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -99,7 +99,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -269,10 +269,10 @@
|
|||
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T20:33:20Z",
|
||||
"updated_at": "2024-10-28T13:18:35Z",
|
||||
"updated_at": "2024-10-28T22:01:48Z",
|
||||
"pushed_at": "2024-09-24T19:18:56Z",
|
||||
"stargazers_count": 451,
|
||||
"watchers_count": 451,
|
||||
"stargazers_count": 452,
|
||||
"watchers_count": 452,
|
||||
"has_discussions": false,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
|
@ -287,7 +287,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 451,
|
||||
"watchers": 452,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-10T06:27:59Z",
|
||||
"updated_at": "2024-10-27T12:17:08Z",
|
||||
"updated_at": "2024-10-28T21:00:39Z",
|
||||
"pushed_at": "2024-10-17T05:12:29Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-14T06:27:11Z",
|
||||
"updated_at": "2024-10-23T21:42:39Z",
|
||||
"updated_at": "2024-10-28T19:36:08Z",
|
||||
"pushed_at": "2024-09-15T21:34:35Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
17
README.md
17
README.md
|
@ -990,6 +990,7 @@
|
|||
- [phirojshah/CVE-2024-4577](https://github.com/phirojshah/CVE-2024-4577)
|
||||
- [JeninSutradhar/CVE-2024-4577-checker](https://github.com/JeninSutradhar/CVE-2024-4577-checker)
|
||||
- [longhoangth18/CVE-2024-4577](https://github.com/longhoangth18/CVE-2024-4577)
|
||||
- [0xbd2/CVE-2024-4577](https://github.com/0xbd2/CVE-2024-4577)
|
||||
|
||||
### CVE-2024-4701 (2024-05-10)
|
||||
|
||||
|
@ -1690,6 +1691,9 @@
|
|||
### CVE-2024-10410
|
||||
- [K1nako0/CVE-2024-10410](https://github.com/K1nako0/CVE-2024-10410)
|
||||
|
||||
### CVE-2024-10448
|
||||
- [bevennyamande/CVE-2024-10448](https://github.com/bevennyamande/CVE-2024-10448)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
||||
|
@ -2527,6 +2531,7 @@
|
|||
- [fullaw4ke/CVE-2024-23897-Jenkins-4.441](https://github.com/fullaw4ke/CVE-2024-23897-Jenkins-4.441)
|
||||
- [Maalfer/CVE-2024-23897](https://github.com/Maalfer/CVE-2024-23897)
|
||||
- [Surko888/Surko-Exploit-Jenkins-CVE-2024-23897](https://github.com/Surko888/Surko-Exploit-Jenkins-CVE-2024-23897)
|
||||
- [cc3305/CVE-2024-23897](https://github.com/cc3305/CVE-2024-23897)
|
||||
- [NoSpaceAvailable/CVE-2024-23897](https://github.com/NoSpaceAvailable/CVE-2024-23897)
|
||||
- [BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety](https://github.com/BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety)
|
||||
- [ShieldAuth-PHP/PBL05-CVE-Analsys](https://github.com/ShieldAuth-PHP/PBL05-CVE-Analsys)
|
||||
|
@ -2844,6 +2849,7 @@
|
|||
- [AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-](https://github.com/AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-)
|
||||
- [geniuszlyy/CVE-2024-24919](https://github.com/geniuszlyy/CVE-2024-24919)
|
||||
- [skyrowalker/CVE-2024-24919](https://github.com/skyrowalker/CVE-2024-24919)
|
||||
- [sar-3mar/CVE-2024-24919_POC](https://github.com/sar-3mar/CVE-2024-24919_POC)
|
||||
|
||||
### CVE-2024-25092 (2024-06-09)
|
||||
|
||||
|
@ -5694,6 +5700,9 @@
|
|||
### CVE-2024-49186
|
||||
- [cyb3res3c/CVE-2024-49186](https://github.com/cyb3res3c/CVE-2024-49186)
|
||||
|
||||
### CVE-2024-51435
|
||||
- [bevennyamande/CVE-2024-51435](https://github.com/bevennyamande/CVE-2024-51435)
|
||||
|
||||
### CVE-2024-1642470
|
||||
- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)
|
||||
|
||||
|
@ -37825,6 +37834,7 @@
|
|||
- [beraphin/CVE-2018-6789](https://github.com/beraphin/CVE-2018-6789)
|
||||
- [synacktiv/Exim-CVE-2018-6789](https://github.com/synacktiv/Exim-CVE-2018-6789)
|
||||
- [martinclauss/exim-rce-cve-2018-6789](https://github.com/martinclauss/exim-rce-cve-2018-6789)
|
||||
- [thistehneisen/CVE-2018-6789-Python3](https://github.com/thistehneisen/CVE-2018-6789-Python3)
|
||||
|
||||
### CVE-2018-6791 (2018-02-07)
|
||||
|
||||
|
@ -45943,6 +45953,13 @@
|
|||
- [defrancescojp/CVE-2013-3664_MAC](https://github.com/defrancescojp/CVE-2013-3664_MAC)
|
||||
- [defrancescojp/CVE-2013-3664_BMP](https://github.com/defrancescojp/CVE-2013-3664_BMP)
|
||||
|
||||
### CVE-2013-3827 (2013-10-16)
|
||||
|
||||
<code>Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2; the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.3.0, 11.1.2.4.0, and 12.1.2.0.0; and the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Java Server Faces or Web Container.
|
||||
</code>
|
||||
|
||||
- [thistehneisen/CVE-2013-3827](https://github.com/thistehneisen/CVE-2013-3827)
|
||||
|
||||
### CVE-2013-3900 (2013-12-11)
|
||||
|
||||
<code>The WinVerifyTrust function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly validate PE file digests during Authenticode signature verification, which allows remote attackers to execute arbitrary code via a crafted PE file, aka "WinVerifyTrust Signature Validation Vulnerability."
|
||||
|
|
Loading…
Reference in a new issue