mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/03/06 18:27:11
This commit is contained in:
parent
33990f8d1a
commit
78e10c838c
32 changed files with 360 additions and 110 deletions
|
@ -36,7 +36,7 @@
|
|||
"forks": 159,
|
||||
"watchers": 393,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
"subscribers_count": 26
|
||||
},
|
||||
{
|
||||
"id": 77596573,
|
||||
|
|
|
@ -281,7 +281,7 @@
|
|||
"forks": 125,
|
||||
"watchers": 303,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
"subscribers_count": 15
|
||||
},
|
||||
{
|
||||
"id": 71787126,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Hikvision camera CVE-2017-7921-EXP",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-27T11:49:40Z",
|
||||
"updated_at": "2024-02-02T01:33:36Z",
|
||||
"updated_at": "2024-03-06T17:18:31Z",
|
||||
"pushed_at": "2023-12-04T15:47:16Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 76,
|
||||
"watchers": 74,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -103,10 +103,10 @@
|
|||
"description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-29T16:08:35Z",
|
||||
"updated_at": "2024-02-22T17:01:56Z",
|
||||
"updated_at": "2024-03-06T17:18:33Z",
|
||||
"pushed_at": "2021-01-29T16:22:39Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 83,
|
||||
"watchers": 82,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -119,10 +119,10 @@
|
|||
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-03T10:18:04Z",
|
||||
"updated_at": "2024-03-05T12:18:34Z",
|
||||
"updated_at": "2024-03-06T15:16:38Z",
|
||||
"pushed_at": "2019-03-24T11:20:27Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -131,7 +131,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 89,
|
||||
"watchers": 90,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -80,10 +80,10 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2024-02-05T05:24:36Z",
|
||||
"updated_at": "2024-03-06T17:18:29Z",
|
||||
"pushed_at": "2021-01-08T10:31:22Z",
|
||||
"stargazers_count": 561,
|
||||
"watchers_count": 561,
|
||||
"stargazers_count": 560,
|
||||
"watchers_count": 560,
|
||||
"has_discussions": false,
|
||||
"forks_count": 185,
|
||||
"allow_forking": true,
|
||||
|
@ -102,7 +102,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 185,
|
||||
"watchers": 561,
|
||||
"watchers": 560,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -1305,10 +1305,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-12T20:54:51Z",
|
||||
"updated_at": "2024-02-12T20:55:03Z",
|
||||
"updated_at": "2024-03-06T16:11:54Z",
|
||||
"pushed_at": "2024-02-12T20:54:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1317,7 +1317,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -108,13 +108,13 @@
|
|||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"forks": 46,
|
||||
"watchers": 255,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
|
|
@ -588,10 +588,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-24T13:25:25Z",
|
||||
"updated_at": "2022-06-24T13:25:39Z",
|
||||
"updated_at": "2024-03-06T16:11:56Z",
|
||||
"pushed_at": "2022-06-24T13:25:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -600,7 +600,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -618,10 +618,10 @@
|
|||
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-23T20:20:45Z",
|
||||
"updated_at": "2024-02-21T19:01:07Z",
|
||||
"updated_at": "2024-03-06T16:11:58Z",
|
||||
"pushed_at": "2022-12-17T16:10:46Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -630,7 +630,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 88,
|
||||
"watchers": 89,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "海康威视RCE漏洞 批量检测和利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-03T17:27:59Z",
|
||||
"updated_at": "2024-01-30T07:00:34Z",
|
||||
"updated_at": "2024-03-06T17:18:36Z",
|
||||
"pushed_at": "2022-08-05T19:57:30Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -148,7 +148,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 119,
|
||||
"watchers": 118,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -223,10 +223,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2024-03-06T02:14:56Z",
|
||||
"updated_at": "2024-03-06T14:33:20Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1525,
|
||||
"watchers_count": 1525,
|
||||
"stargazers_count": 1526,
|
||||
"watchers_count": 1526,
|
||||
"has_discussions": false,
|
||||
"forks_count": 479,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 479,
|
||||
"watchers": 1525,
|
||||
"watchers": 1526,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
@ -493,10 +493,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2024-03-06T02:17:24Z",
|
||||
"updated_at": "2024-03-06T14:33:41Z",
|
||||
"pushed_at": "2023-10-11T18:44:51Z",
|
||||
"stargazers_count": 779,
|
||||
"watchers_count": 779,
|
||||
"stargazers_count": 780,
|
||||
"watchers_count": 780,
|
||||
"has_discussions": false,
|
||||
"forks_count": 174,
|
||||
"allow_forking": true,
|
||||
|
@ -512,7 +512,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 174,
|
||||
"watchers": 779,
|
||||
"watchers": 780,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-14T13:42:54Z",
|
||||
"updated_at": "2024-02-28T08:50:33Z",
|
||||
"updated_at": "2024-03-06T15:58:54Z",
|
||||
"pushed_at": "2022-08-30T16:02:36Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
|
|
|
@ -1268,10 +1268,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2024-03-06T03:24:13Z",
|
||||
"updated_at": "2024-03-06T17:18:35Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 765,
|
||||
"watchers_count": 765,
|
||||
"stargazers_count": 764,
|
||||
"watchers_count": 764,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
|
@ -1285,7 +1285,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 765,
|
||||
"watchers": 764,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-19T08:10:46Z",
|
||||
"updated_at": "2024-02-21T03:26:19Z",
|
||||
"updated_at": "2024-03-06T12:24:00Z",
|
||||
"pushed_at": "2022-09-04T17:28:56Z",
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -41,7 +41,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 321,
|
||||
"watchers": 322,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-25T10:47:04Z",
|
||||
"updated_at": "2024-01-19T10:18:02Z",
|
||||
"updated_at": "2024-03-06T15:48:50Z",
|
||||
"pushed_at": "2022-05-25T13:43:16Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain joined passwords",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-15T14:23:41Z",
|
||||
"updated_at": "2023-12-10T14:44:59Z",
|
||||
"updated_at": "2024-03-06T13:19:17Z",
|
||||
"pushed_at": "2023-03-15T14:33:48Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 1104,
|
||||
"watchers_count": 1104,
|
||||
"has_discussions": true,
|
||||
"forks_count": 186,
|
||||
"forks_count": 184,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
"gui"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 186,
|
||||
"forks": 184,
|
||||
"watchers": 1104,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "H3C_SSL_VPN_XSS(Reflected XSS) CVE-2022-35416",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-12T04:35:49Z",
|
||||
"updated_at": "2024-01-23T02:56:46Z",
|
||||
"updated_at": "2024-03-06T12:47:23Z",
|
||||
"pushed_at": "2022-07-12T04:38:50Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-1671-POC, based on dnslog platform",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-24T15:53:42Z",
|
||||
"updated_at": "2023-11-28T07:20:02Z",
|
||||
"updated_at": "2024-03-06T16:03:18Z",
|
||||
"pushed_at": "2023-04-26T02:40:41Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "GameOver(lay) Ubuntu Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T22:02:42Z",
|
||||
"updated_at": "2024-03-04T19:21:07Z",
|
||||
"updated_at": "2024-03-06T15:15:05Z",
|
||||
"pushed_at": "2023-10-09T22:44:21Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 85,
|
||||
"watchers": 86,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -62,14 +62,14 @@
|
|||
{
|
||||
"id": 726414774,
|
||||
"name": "CVE-2023-36664",
|
||||
"full_name": "JeanChpt\/CVE-2023-36664",
|
||||
"full_name": "jeanchpt\/CVE-2023-36664",
|
||||
"owner": {
|
||||
"login": "JeanChpt",
|
||||
"login": "jeanchpt",
|
||||
"id": 57096518,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57096518?v=4",
|
||||
"html_url": "https:\/\/github.com\/JeanChpt"
|
||||
"html_url": "https:\/\/github.com\/jeanchpt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JeanChpt\/CVE-2023-36664",
|
||||
"html_url": "https:\/\/github.com\/jeanchpt\/CVE-2023-36664",
|
||||
"description": "Proof of concept developed for the CVE-2023-36664",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-02T10:28:10Z",
|
||||
|
|
|
@ -1,19 +1,19 @@
|
|||
[
|
||||
{
|
||||
"id": 768047429,
|
||||
"name": "CVE-2023-51448-cacti-command-injection-poc",
|
||||
"full_name": "jakabakos\/CVE-2023-51448-cacti-command-injection-poc",
|
||||
"name": "CVE-2023-51448-cacti-sqli-poc",
|
||||
"full_name": "jakabakos\/CVE-2023-51448-cacti-sqli-poc",
|
||||
"owner": {
|
||||
"login": "jakabakos",
|
||||
"id": 42498816,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
|
||||
"html_url": "https:\/\/github.com\/jakabakos"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-51448-cacti-command-injection-poc",
|
||||
"html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-51448-cacti-sqli-poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-06T11:23:11Z",
|
||||
"updated_at": "2024-03-06T11:23:11Z",
|
||||
"updated_at": "2024-03-06T12:30:05Z",
|
||||
"pushed_at": "2024-03-06T11:23:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
32
2023/CVE-2023-6246.json
Normal file
32
2023/CVE-2023-6246.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 766195734,
|
||||
"name": "CVE-2023-6246",
|
||||
"full_name": "elpe-pinillo\/CVE-2023-6246",
|
||||
"owner": {
|
||||
"login": "elpe-pinillo",
|
||||
"id": 30589235,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30589235?v=4",
|
||||
"html_url": "https:\/\/github.com\/elpe-pinillo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/elpe-pinillo\/CVE-2023-6246",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-02T15:45:52Z",
|
||||
"updated_at": "2024-03-06T17:10:15Z",
|
||||
"pushed_at": "2024-03-06T17:10:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-1301.json
Normal file
32
2024/CVE-2024-1301.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 754535047,
|
||||
"name": "CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection",
|
||||
"full_name": "guillermogm4\/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection",
|
||||
"owner": {
|
||||
"login": "guillermogm4",
|
||||
"id": 26895345,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26895345?v=4",
|
||||
"html_url": "https:\/\/github.com\/guillermogm4"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/guillermogm4\/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection",
|
||||
"description": "POC Badgermeter moni tool - CVE-2024-1301",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-08T09:08:05Z",
|
||||
"updated_at": "2024-03-06T17:58:31Z",
|
||||
"pushed_at": "2024-02-08T09:50:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-1302.json
Normal file
32
2024/CVE-2024-1302.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 754542610,
|
||||
"name": "CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure",
|
||||
"full_name": "guillermogm4\/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure",
|
||||
"owner": {
|
||||
"login": "guillermogm4",
|
||||
"id": 26895345,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26895345?v=4",
|
||||
"html_url": "https:\/\/github.com\/guillermogm4"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/guillermogm4\/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure",
|
||||
"description": "POC Badgermeter moni tool - CVE-2024-1302",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-08T09:27:53Z",
|
||||
"updated_at": "2024-03-06T17:58:22Z",
|
||||
"pushed_at": "2024-02-08T09:55:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-1303.json
Normal file
32
2024/CVE-2024-1303.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 754543116,
|
||||
"name": "CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal",
|
||||
"full_name": "guillermogm4\/CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal",
|
||||
"owner": {
|
||||
"login": "guillermogm4",
|
||||
"id": 26895345,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26895345?v=4",
|
||||
"html_url": "https:\/\/github.com\/guillermogm4"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/guillermogm4\/CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal",
|
||||
"description": "POC Badgermeter moni tool - CVE-2024-1303",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-08T09:29:14Z",
|
||||
"updated_at": "2024-03-06T17:58:14Z",
|
||||
"pushed_at": "2024-02-08T10:00:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-1304.json
Normal file
32
2024/CVE-2024-1304.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 754543376,
|
||||
"name": "CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS",
|
||||
"full_name": "guillermogm4\/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS",
|
||||
"owner": {
|
||||
"login": "guillermogm4",
|
||||
"id": 26895345,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26895345?v=4",
|
||||
"html_url": "https:\/\/github.com\/guillermogm4"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/guillermogm4\/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS",
|
||||
"description": "POC Badgermeter moni tool - CVE-2024-1304",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-08T09:29:54Z",
|
||||
"updated_at": "2024-03-06T17:56:15Z",
|
||||
"pushed_at": "2024-02-08T10:03:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-1403.json
Normal file
32
2024/CVE-2024-1403.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 768162174,
|
||||
"name": "CVE-2024-1403",
|
||||
"full_name": "horizon3ai\/CVE-2024-1403",
|
||||
"owner": {
|
||||
"login": "horizon3ai",
|
||||
"id": 79593994,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
|
||||
"html_url": "https:\/\/github.com\/horizon3ai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/horizon3ai\/CVE-2024-1403",
|
||||
"description": "Progress OpenEdge Authentication Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-06T15:27:18Z",
|
||||
"updated_at": "2024-03-06T16:57:44Z",
|
||||
"pushed_at": "2024-03-06T15:31:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-21338 Windows Kernel Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-05T18:29:55Z",
|
||||
"updated_at": "2024-03-06T05:15:35Z",
|
||||
"updated_at": "2024-03-06T18:22:20Z",
|
||||
"pushed_at": "2024-03-05T19:46:48Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-28T21:16:10Z",
|
||||
"updated_at": "2024-03-06T06:55:27Z",
|
||||
"updated_at": "2024-03-06T16:55:45Z",
|
||||
"pushed_at": "2024-03-01T20:02:52Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"forks": 22,
|
||||
"watchers": 99,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit for CVE-2024-27198 - TeamCity Server",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-05T05:43:06Z",
|
||||
"updated_at": "2024-03-06T03:15:58Z",
|
||||
"updated_at": "2024-03-06T17:50:30Z",
|
||||
"pushed_at": "2024-03-05T06:20:55Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -103,12 +103,12 @@
|
|||
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-06T03:15:03Z",
|
||||
"updated_at": "2024-03-06T10:50:17Z",
|
||||
"updated_at": "2024-03-06T17:12:36Z",
|
||||
"pushed_at": "2024-03-06T05:08:41Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -120,8 +120,8 @@
|
|||
"teamcity"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
78
README.md
78
README.md
|
@ -92,6 +92,18 @@
|
|||
|
||||
- [sajaljat/CVE-2024-1269](https://github.com/sajaljat/CVE-2024-1269)
|
||||
|
||||
### CVE-2024-1301
|
||||
- [guillermogm4/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection](https://github.com/guillermogm4/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection)
|
||||
|
||||
### CVE-2024-1302
|
||||
- [guillermogm4/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure](https://github.com/guillermogm4/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure)
|
||||
|
||||
### CVE-2024-1303
|
||||
- [guillermogm4/CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal](https://github.com/guillermogm4/CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal)
|
||||
|
||||
### CVE-2024-1304
|
||||
- [guillermogm4/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS](https://github.com/guillermogm4/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS)
|
||||
|
||||
### CVE-2024-1346 (2024-02-19)
|
||||
|
||||
<code>Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.
|
||||
|
@ -99,6 +111,13 @@
|
|||
|
||||
- [PeterGabaldon/CVE-2024-1346](https://github.com/PeterGabaldon/CVE-2024-1346)
|
||||
|
||||
### CVE-2024-1403 (-)
|
||||
|
||||
<code>In OpenEdge Authentication Gateway and AdminServer prior to 11.7.19, 12.2.14, 12.8.1 on all platforms supported by the OpenEdge product, an authentication bypass vulnerability has been identified. The\nvulnerability is a bypass to authentication based on a failure to properly\nhandle username and password. Certain unexpected\ncontent passed into the credentials can lead to unauthorized access without proper\nauthentication. \n\n\n\n\n\n\n
|
||||
</code>
|
||||
|
||||
- [horizon3ai/CVE-2024-1403](https://github.com/horizon3ai/CVE-2024-1403)
|
||||
|
||||
### CVE-2024-1512 (2024-02-17)
|
||||
|
||||
<code>The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to union based SQL Injection via the 'user' parameter of the /lms/stm-lms/order/items REST route in all versions up to, and including, 3.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
||||
|
@ -1954,6 +1973,13 @@
|
|||
- [hackersroot/CVE-2023-6063-PoC](https://github.com/hackersroot/CVE-2023-6063-PoC)
|
||||
- [thesafdari/CVE-2023-6063](https://github.com/thesafdari/CVE-2023-6063)
|
||||
|
||||
### CVE-2023-6246 (2024-01-31)
|
||||
|
||||
<code>A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.
|
||||
</code>
|
||||
|
||||
- [elpe-pinillo/CVE-2023-6246](https://github.com/elpe-pinillo/CVE-2023-6246)
|
||||
|
||||
### CVE-2023-6289 (2023-12-18)
|
||||
|
||||
<code>The Swift Performance Lite WordPress plugin before 2.3.6.15 does not prevent users from exporting the plugin's settings, which may include sensitive information such as Cloudflare API tokens.
|
||||
|
@ -5213,7 +5239,7 @@
|
|||
|
||||
- [jakabakos/CVE-2023-36664-Ghostscript-command-injection](https://github.com/jakabakos/CVE-2023-36664-Ghostscript-command-injection)
|
||||
- [winkler-winsen/Scan_GhostScript](https://github.com/winkler-winsen/Scan_GhostScript)
|
||||
- [JeanChpt/CVE-2023-36664](https://github.com/JeanChpt/CVE-2023-36664)
|
||||
- [jeanchpt/CVE-2023-36664](https://github.com/jeanchpt/CVE-2023-36664)
|
||||
|
||||
### CVE-2023-36723 (2023-10-10)
|
||||
|
||||
|
@ -7695,28 +7721,60 @@
|
|||
|
||||
- [geraldoalcantara/CVE-2023-49977](https://github.com/geraldoalcantara/CVE-2023-49977)
|
||||
|
||||
### CVE-2023-49978
|
||||
### CVE-2023-49978 (-)
|
||||
|
||||
<code>Incorrect access control in Customer Support System v1 allows non-administrator users to access administrative pages and execute actions reserved for administrators.
|
||||
</code>
|
||||
|
||||
- [geraldoalcantara/CVE-2023-49978](https://github.com/geraldoalcantara/CVE-2023-49978)
|
||||
|
||||
### CVE-2023-49979
|
||||
### CVE-2023-49979 (-)
|
||||
|
||||
<code>A directory listing vulnerability in Customer Support System v1 allows attackers to list directories and sensitive files within the application without requiring authorization.
|
||||
</code>
|
||||
|
||||
- [geraldoalcantara/CVE-2023-49979](https://github.com/geraldoalcantara/CVE-2023-49979)
|
||||
|
||||
### CVE-2023-49980
|
||||
### CVE-2023-49980 (-)
|
||||
|
||||
<code>A directory listing vulnerability in Best Student Result Management System v1.0 allows attackers to list directories and sensitive files within the application without requiring authorization.
|
||||
</code>
|
||||
|
||||
- [geraldoalcantara/CVE-2023-49980](https://github.com/geraldoalcantara/CVE-2023-49980)
|
||||
|
||||
### CVE-2023-49981
|
||||
### CVE-2023-49981 (-)
|
||||
|
||||
<code>A directory listing vulnerability in School Fees Management System v1.0 allows attackers to list directories and sensitive files within the application without requiring authorization.
|
||||
</code>
|
||||
|
||||
- [geraldoalcantara/CVE-2023-49981](https://github.com/geraldoalcantara/CVE-2023-49981)
|
||||
|
||||
### CVE-2023-49982
|
||||
### CVE-2023-49982 (-)
|
||||
|
||||
<code>Broken access control in the component /admin/management/users of School Fees Management System v1.0 allows attackers to escalate privileges and perform Administrative actions, including adding and deleting user accounts.
|
||||
</code>
|
||||
|
||||
- [geraldoalcantara/CVE-2023-49982](https://github.com/geraldoalcantara/CVE-2023-49982)
|
||||
|
||||
### CVE-2023-49983
|
||||
### CVE-2023-49983 (-)
|
||||
|
||||
<code>A cross-site scripting (XSS) vulnerability in the component /management/class of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
|
||||
</code>
|
||||
|
||||
- [geraldoalcantara/CVE-2023-49983](https://github.com/geraldoalcantara/CVE-2023-49983)
|
||||
|
||||
### CVE-2023-49984
|
||||
### CVE-2023-49984 (-)
|
||||
|
||||
<code>A cross-site scripting (XSS) vulnerability in the component /management/settings of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
|
||||
</code>
|
||||
|
||||
- [geraldoalcantara/CVE-2023-49984](https://github.com/geraldoalcantara/CVE-2023-49984)
|
||||
|
||||
### CVE-2023-49985
|
||||
### CVE-2023-49985 (-)
|
||||
|
||||
<code>A cross-site scripting (XSS) vulnerability in the component /management/class of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cname parameter.
|
||||
</code>
|
||||
|
||||
- [geraldoalcantara/CVE-2023-49985](https://github.com/geraldoalcantara/CVE-2023-49985)
|
||||
|
||||
### CVE-2023-49986
|
||||
|
@ -7946,7 +8004,7 @@
|
|||
<code>Cacti provides an operational monitoring and fault management framework. Version 1.2.25 has a Blind SQL Injection (SQLi) vulnerability within the SNMP Notification Receivers feature in the file `‘managers.php’`. An authenticated attacker with the “Settings/Utilities” permission can send a crafted HTTP GET request to the endpoint `‘/cacti/managers.php’` with an SQLi payload in the `‘selected_graphs_array’` HTTP GET parameter. As of time of publication, no patched versions exist.
|
||||
</code>
|
||||
|
||||
- [jakabakos/CVE-2023-51448-cacti-command-injection-poc](https://github.com/jakabakos/CVE-2023-51448-cacti-command-injection-poc)
|
||||
- [jakabakos/CVE-2023-51448-cacti-sqli-poc](https://github.com/jakabakos/CVE-2023-51448-cacti-sqli-poc)
|
||||
|
||||
### CVE-2023-51467 (2023-12-26)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue