mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/10/06 00:29:50
This commit is contained in:
parent
81a26509b9
commit
7c3e5b3149
20 changed files with 224 additions and 91 deletions
32
2010/CVE-2010-1938.json
Normal file
32
2010/CVE-2010-1938.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 868198887,
|
||||
"name": "cve-2010-1938",
|
||||
"full_name": "Nexxus67\/cve-2010-1938",
|
||||
"owner": {
|
||||
"login": "Nexxus67",
|
||||
"id": 58827641,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58827641?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nexxus67"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nexxus67\/cve-2010-1938",
|
||||
"description": "A simple Python script to test an off-by-one vulnerability in the OPIE library (CVE-2010-1938). This vulnerability affects certain FTP servers and may allow for Denial of Service (DoS) or arbitrary code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T18:21:40Z",
|
||||
"updated_at": "2024-10-05T20:15:27Z",
|
||||
"pushed_at": "2024-10-05T18:27:14Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -81,10 +81,10 @@
|
|||
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-14T19:12:01Z",
|
||||
"updated_at": "2024-07-17T09:51:35Z",
|
||||
"updated_at": "2024-10-05T19:47:38Z",
|
||||
"pushed_at": "2022-08-22T12:00:56Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -105,7 +105,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
@ -153,10 +153,10 @@
|
|||
"description": "Vulnearability Report of the New Jersey official site",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-23T08:51:42Z",
|
||||
"updated_at": "2022-05-23T12:12:39Z",
|
||||
"updated_at": "2024-10-05T19:49:08Z",
|
||||
"pushed_at": "2022-05-23T09:07:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -165,7 +165,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-14T19:12:01Z",
|
||||
"updated_at": "2024-07-17T09:51:35Z",
|
||||
"updated_at": "2024-10-05T19:47:38Z",
|
||||
"pushed_at": "2022-08-22T12:00:56Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -37,7 +37,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -170,6 +170,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -299,36 +299,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 444978473,
|
||||
"name": "testanull-CVE-2021-22005.py",
|
||||
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-22005.py",
|
||||
"owner": {
|
||||
"login": "timb-machine-mirrors",
|
||||
"id": 49810875,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
|
||||
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-22005.py",
|
||||
"description": "Clone from gist",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-05T23:22:08Z",
|
||||
"updated_at": "2023-04-08T20:15:10Z",
|
||||
"pushed_at": "2022-01-05T23:22:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 505737586,
|
||||
"name": "cve-2021-22005",
|
||||
|
|
|
@ -228,13 +228,13 @@
|
|||
"stargazers_count": 1581,
|
||||
"watchers_count": 1581,
|
||||
"has_discussions": false,
|
||||
"forks_count": 483,
|
||||
"forks_count": 484,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 483,
|
||||
"forks": 484,
|
||||
"watchers": 1581,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
|
|
|
@ -1276,5 +1276,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 868207969,
|
||||
"name": "Grafana-CVE-2021-43798",
|
||||
"full_name": "sazzad1337\/Grafana-CVE-2021-43798",
|
||||
"owner": {
|
||||
"login": "sazzad1337",
|
||||
"id": 59094087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59094087?v=4",
|
||||
"html_url": "https:\/\/github.com\/sazzad1337"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sazzad1337\/Grafana-CVE-2021-43798",
|
||||
"description": "Python implementation of a tool for decrypting and encrypting sensitive data in Grafana, specifically addressing the vulnerabilities associated with CVE-2021-43798. Grafana encrypts all data source passwords using the AES algorithm with the secret_key found in the defaults.ini configuration file.",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T18:51:12Z",
|
||||
"updated_at": "2024-10-05T19:49:49Z",
|
||||
"pushed_at": "2024-10-05T19:49:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-06T20:29:44Z",
|
||||
"updated_at": "2024-10-03T02:32:41Z",
|
||||
"updated_at": "2024-10-05T21:32:22Z",
|
||||
"pushed_at": "2023-10-06T21:59:30Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
43
2023/CVE-2023-38709.json
Normal file
43
2023/CVE-2023-38709.json
Normal file
|
@ -0,0 +1,43 @@
|
|||
[
|
||||
{
|
||||
"id": 868234685,
|
||||
"name": "apache-vulnerability-testing",
|
||||
"full_name": "mrmtwoj\/apache-vulnerability-testing",
|
||||
"owner": {
|
||||
"login": "mrmtwoj",
|
||||
"id": 22832463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22832463?v=4",
|
||||
"html_url": "https:\/\/github.com\/mrmtwoj"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mrmtwoj\/apache-vulnerability-testing",
|
||||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T20:32:45Z",
|
||||
"updated_at": "2024-10-05T21:45:45Z",
|
||||
"pushed_at": "2024-10-05T20:37:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"apache",
|
||||
"apache2",
|
||||
"cve-2023-3870",
|
||||
"cve-2024-38472",
|
||||
"cve-2024-38473",
|
||||
"cve-2024-38474",
|
||||
"cve-2024-38475",
|
||||
"cve-2024-38476",
|
||||
"cve-2024-38477",
|
||||
"cve-2024-39573"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-10-05T15:59:18Z",
|
||||
"updated_at": "2024-10-05T20:48:56Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1195,
|
||||
"watchers_count": 1195,
|
||||
"stargazers_count": 1197,
|
||||
"watchers_count": 1197,
|
||||
"has_discussions": false,
|
||||
"forks_count": 202,
|
||||
"forks_count": 203,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 202,
|
||||
"watchers": 1195,
|
||||
"forks": 203,
|
||||
"watchers": 1197,
|
||||
"score": 0,
|
||||
"subscribers_count": 20
|
||||
},
|
||||
|
|
|
@ -106,10 +106,10 @@
|
|||
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-12T18:29:27Z",
|
||||
"updated_at": "2024-09-10T15:04:31Z",
|
||||
"updated_at": "2024-10-05T21:24:30Z",
|
||||
"pushed_at": "2024-01-13T13:50:20Z",
|
||||
"stargazers_count": 233,
|
||||
"watchers_count": 233,
|
||||
"stargazers_count": 234,
|
||||
"watchers_count": 234,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
|
@ -118,7 +118,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 233,
|
||||
"watchers": 234,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -138,13 +138,13 @@
|
|||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T19:24:55Z",
|
||||
"updated_at": "2024-10-05T17:27:08Z",
|
||||
"updated_at": "2024-10-05T23:15:15Z",
|
||||
"pushed_at": "2024-10-01T15:38:24Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -28,5 +28,46 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 868234685,
|
||||
"name": "apache-vulnerability-testing",
|
||||
"full_name": "mrmtwoj\/apache-vulnerability-testing",
|
||||
"owner": {
|
||||
"login": "mrmtwoj",
|
||||
"id": 22832463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22832463?v=4",
|
||||
"html_url": "https:\/\/github.com\/mrmtwoj"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mrmtwoj\/apache-vulnerability-testing",
|
||||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T20:32:45Z",
|
||||
"updated_at": "2024-10-05T21:45:45Z",
|
||||
"pushed_at": "2024-10-05T20:37:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"apache",
|
||||
"apache2",
|
||||
"cve-2023-3870",
|
||||
"cve-2024-38472",
|
||||
"cve-2024-38473",
|
||||
"cve-2024-38474",
|
||||
"cve-2024-38475",
|
||||
"cve-2024-38476",
|
||||
"cve-2024-38477",
|
||||
"cve-2024-39573"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-38816 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-25T09:36:59Z",
|
||||
"updated_at": "2024-10-05T13:59:54Z",
|
||||
"updated_at": "2024-10-05T20:36:34Z",
|
||||
"pushed_at": "2024-09-26T09:46:19Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -73,19 +73,19 @@
|
|||
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T00:15:18Z",
|
||||
"updated_at": "2024-10-05T18:27:11Z",
|
||||
"updated_at": "2024-10-05T21:42:54Z",
|
||||
"pushed_at": "2024-10-05T00:18:49Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 23,
|
||||
"forks": 9,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -2290,10 +2290,10 @@
|
|||
"html_url": "https:\/\/github.com\/mrmtwoj"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mrmtwoj\/CVE-2024-6387",
|
||||
"description": null,
|
||||
"description": "regreSSHion is a security tool designed to test for vulnerabilities related to CVE-2024-6387, specifically focusing on SSH and remote access exploitation. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-09T14:06:02Z",
|
||||
"updated_at": "2024-07-09T14:29:34Z",
|
||||
"updated_at": "2024-10-05T21:02:11Z",
|
||||
"pushed_at": "2024-07-09T14:29:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -2302,7 +2302,9 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"regresshion-cve-2024-6387-ssh-security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-29T10:58:15Z",
|
||||
"updated_at": "2024-10-05T17:20:48Z",
|
||||
"updated_at": "2024-10-05T19:24:59Z",
|
||||
"pushed_at": "2024-10-04T09:39:09Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 56,
|
||||
"forks": 12,
|
||||
"watchers": 58,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -133,19 +133,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T07:24:57Z",
|
||||
"updated_at": "2024-10-05T16:03:32Z",
|
||||
"updated_at": "2024-10-05T19:12:48Z",
|
||||
"pushed_at": "2024-10-05T07:55:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
17
README.md
17
README.md
|
@ -4616,6 +4616,7 @@
|
|||
</code>
|
||||
|
||||
- [Abdurahmon3236/CVE-2024-38472](https://github.com/Abdurahmon3236/CVE-2024-38472)
|
||||
- [mrmtwoj/apache-vulnerability-testing](https://github.com/mrmtwoj/apache-vulnerability-testing)
|
||||
|
||||
### CVE-2024-38473 (2024-07-01)
|
||||
|
||||
|
@ -10727,6 +10728,13 @@
|
|||
- [acesoyeo/METABASE-RCE-CVE-2023-38646-](https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646-)
|
||||
- [UserConnecting/Exploit-CVE-2023-38646-Metabase](https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase)
|
||||
|
||||
### CVE-2023-38709 (2024-04-04)
|
||||
|
||||
<code>Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.
|
||||
</code>
|
||||
|
||||
- [mrmtwoj/apache-vulnerability-testing](https://github.com/mrmtwoj/apache-vulnerability-testing)
|
||||
|
||||
### CVE-2023-38743 (2023-09-11)
|
||||
|
||||
<code>Zoho ManageEngine ADManager Plus before Build 7200 allows admin users to execute commands on the host machine.
|
||||
|
@ -21973,7 +21981,6 @@
|
|||
- [tiagob0b/CVE-2021-22005](https://github.com/tiagob0b/CVE-2021-22005)
|
||||
- [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005)
|
||||
- [shmilylty/cve-2021-22005-exp](https://github.com/shmilylty/cve-2021-22005-exp)
|
||||
- [timb-machine-mirrors/testanull-CVE-2021-22005.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py)
|
||||
- [InventorMAO/cve-2021-22005](https://github.com/InventorMAO/cve-2021-22005)
|
||||
|
||||
### CVE-2021-22006 (2021-09-23)
|
||||
|
@ -25891,6 +25898,7 @@
|
|||
- [topyagyuu/CVE-2021-43798](https://github.com/topyagyuu/CVE-2021-43798)
|
||||
- [MalekAlthubiany/CVE-2021-43798](https://github.com/MalekAlthubiany/CVE-2021-43798)
|
||||
- [Sic4rio/Grafana-Decryptor-for-CVE-2021-43798](https://github.com/Sic4rio/Grafana-Decryptor-for-CVE-2021-43798)
|
||||
- [sazzad1337/Grafana-CVE-2021-43798](https://github.com/sazzad1337/Grafana-CVE-2021-43798)
|
||||
|
||||
### CVE-2021-43799 (2022-01-25)
|
||||
|
||||
|
@ -46119,6 +46127,13 @@
|
|||
- [HandsomeCat00/Spring-CVE-2010-1622](https://github.com/HandsomeCat00/Spring-CVE-2010-1622)
|
||||
- [E-bounce/cve-2010-1622_learning_environment](https://github.com/E-bounce/cve-2010-1622_learning_environment)
|
||||
|
||||
### CVE-2010-1938 (2010-05-28)
|
||||
|
||||
<code>Off-by-one error in the __opiereadrec function in readrec.c in libopie in OPIE 2.4.1-test1 and earlier, as used on FreeBSD 6.4 through 8.1-PRERELEASE and other platforms, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long username, as demonstrated by a long USER command to the FreeBSD 8.0 ftpd.
|
||||
</code>
|
||||
|
||||
- [Nexxus67/cve-2010-1938](https://github.com/Nexxus67/cve-2010-1938)
|
||||
|
||||
### CVE-2010-2075 (2010-06-15)
|
||||
|
||||
<code>UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands.
|
||||
|
|
Loading…
Reference in a new issue