mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/09/29 06:30:14
This commit is contained in:
parent
59c5ed0408
commit
7d9c0e8d29
35 changed files with 220 additions and 115 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-17T04:39:32Z",
|
||||
"updated_at": "2024-08-12T20:13:04Z",
|
||||
"updated_at": "2024-09-29T00:41:59Z",
|
||||
"pushed_at": "2024-05-27T02:44:38Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -41,7 +41,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -143,13 +143,13 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -347,10 +347,10 @@
|
|||
"description": "Laravel RCE Exploit Script (CVE-2021-3129) (Python)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-16T17:22:55Z",
|
||||
"updated_at": "2024-09-22T13:52:12Z",
|
||||
"updated_at": "2024-09-29T01:38:46Z",
|
||||
"pushed_at": "2024-09-22T13:10:27Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -374,7 +374,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -833,5 +833,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 864762865,
|
||||
"name": "CVE-2021-3129",
|
||||
"full_name": "0x0d3ad\/CVE-2021-3129",
|
||||
"owner": {
|
||||
"login": "0x0d3ad",
|
||||
"id": 18898977,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18898977?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x0d3ad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x0d3ad\/CVE-2021-3129",
|
||||
"description": "CVE-2021-3129 Laravel Ignition RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-29T05:09:41Z",
|
||||
"updated_at": "2024-09-29T05:22:09Z",
|
||||
"pushed_at": "2024-09-29T05:22:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -47,10 +47,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2024-09-27T12:06:49Z",
|
||||
"updated_at": "2024-09-29T04:15:43Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1952,
|
||||
"watchers_count": 1952,
|
||||
"stargazers_count": 1953,
|
||||
"watchers_count": 1953,
|
||||
"has_discussions": false,
|
||||
"forks_count": 510,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 510,
|
||||
"watchers": 1952,
|
||||
"watchers": 1953,
|
||||
"score": 0,
|
||||
"subscribers_count": 20
|
||||
},
|
||||
|
|
|
@ -3049,7 +3049,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-09-15T11:01:45Z",
|
||||
"updated_at": "2022-09-15T11:02:07Z",
|
||||
"pushed_at": "2024-08-16T01:08:22Z",
|
||||
"pushed_at": "2024-09-29T01:26:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -29,36 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 444456600,
|
||||
"name": "CVE-2021-42342",
|
||||
"full_name": "Mr-xn\/CVE-2021-42342",
|
||||
"owner": {
|
||||
"login": "Mr-xn",
|
||||
"id": 18260135,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mr-xn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-42342",
|
||||
"description": "CVE-2021-42342 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-04T14:48:59Z",
|
||||
"updated_at": "2024-08-12T20:19:29Z",
|
||||
"pushed_at": "2022-01-04T14:54:39Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 711394073,
|
||||
"name": "-zeroboo-Gohead-CVE-2021-42342-1",
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 1152,
|
||||
"watchers_count": 1152,
|
||||
"has_discussions": true,
|
||||
"forks_count": 189,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
"gui"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 189,
|
||||
"forks": 190,
|
||||
"watchers": 1152,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-19T19:38:25Z",
|
||||
"updated_at": "2024-08-12T20:22:35Z",
|
||||
"updated_at": "2024-09-29T02:46:52Z",
|
||||
"pushed_at": "2022-08-09T22:48:37Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-04T08:22:41Z",
|
||||
"updated_at": "2024-09-27T03:00:31Z",
|
||||
"updated_at": "2024-09-29T03:11:01Z",
|
||||
"pushed_at": "2022-08-19T09:04:09Z",
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"stargazers_count": 295,
|
||||
"watchers_count": 295,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 294,
|
||||
"watchers": 295,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-21T01:02:01Z",
|
||||
"updated_at": "2024-09-08T05:42:20Z",
|
||||
"updated_at": "2024-09-29T02:19:07Z",
|
||||
"pushed_at": "2024-03-29T00:19:09Z",
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 208,
|
||||
"watchers": 209,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T15:59:26Z",
|
||||
"updated_at": "2024-08-29T08:40:52Z",
|
||||
"updated_at": "2024-09-29T02:19:17Z",
|
||||
"pushed_at": "2023-01-13T09:01:20Z",
|
||||
"stargazers_count": 305,
|
||||
"watchers_count": 305,
|
||||
"stargazers_count": 306,
|
||||
"watchers_count": 306,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 305,
|
||||
"watchers": 306,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -1495,6 +1495,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 864227138,
|
||||
"name": "CVE-2023-38831-Exploit",
|
||||
"full_name": "technicalcorp0\/CVE-2023-38831-Exploit",
|
||||
"owner": {
|
||||
"login": "technicalcorp0",
|
||||
"id": 170502012,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170502012?v=4",
|
||||
"html_url": "https:\/\/github.com\/technicalcorp0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/technicalcorp0\/CVE-2023-38831-Exploit",
|
||||
"description": "This project contains a Python script that exploits **CVE-2023-38831**, a vulnerability in **WinRAR** versions prior to 6.23. The exploit generates a **malicious RAR archive** that triggers the execution of arbitrary code when the victim opens a benign-looking file within the archive (such as a PDF). ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-27T18:23:30Z",
|
||||
"updated_at": "2024-09-27T18:28:09Z",
|
||||
"pushed_at": "2024-09-27T18:28:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 864245047,
|
||||
"name": "CVE-2023-38831-exploit-generator",
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T12:30:53Z",
|
||||
"updated_at": "2024-09-28T17:34:04Z",
|
||||
"updated_at": "2024-09-29T05:22:40Z",
|
||||
"pushed_at": "2024-07-25T18:12:57Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 225,
|
||||
"watchers": 226,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "exploits for CVE-2024-20017",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-30T05:54:36Z",
|
||||
"updated_at": "2024-09-28T20:54:49Z",
|
||||
"updated_at": "2024-09-29T03:16:43Z",
|
||||
"pushed_at": "2024-09-07T10:11:22Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -227,6 +227,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -350,10 +350,10 @@
|
|||
"description": "GeoServer CVE-2024-36401: Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-28T14:55:50Z",
|
||||
"updated_at": "2024-09-28T14:58:48Z",
|
||||
"updated_at": "2024-09-29T01:38:12Z",
|
||||
"pushed_at": "2024-09-28T14:58:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -362,8 +362,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -57,6 +57,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T19:24:55Z",
|
||||
"updated_at": "2024-09-29T00:21:39Z",
|
||||
"updated_at": "2024-09-29T06:14:19Z",
|
||||
"pushed_at": "2024-09-25T21:57:51Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 42,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T10:02:23Z",
|
||||
"updated_at": "2024-09-27T07:11:20Z",
|
||||
"updated_at": "2024-09-29T02:07:17Z",
|
||||
"pushed_at": "2024-06-07T03:28:00Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 115,
|
||||
"watchers": 116,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
32
2024/CVE-2024-43917.json
Normal file
32
2024/CVE-2024-43917.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 864780093,
|
||||
"name": "CVE-2024-43917",
|
||||
"full_name": "p33d\/CVE-2024-43917",
|
||||
"owner": {
|
||||
"login": "p33d",
|
||||
"id": 123099747,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123099747?v=4",
|
||||
"html_url": "https:\/\/github.com\/p33d"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/p33d\/CVE-2024-43917",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-29T06:23:35Z",
|
||||
"updated_at": "2024-09-29T06:28:50Z",
|
||||
"pushed_at": "2024-09-29T06:28:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-28T08:29:06Z",
|
||||
"updated_at": "2024-09-28T21:29:13Z",
|
||||
"updated_at": "2024-09-29T00:59:17Z",
|
||||
"pushed_at": "2024-09-28T08:34:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -55,8 +55,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2024/CVE-2024-45614.json
Normal file
32
2024/CVE-2024-45614.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 864410545,
|
||||
"name": "puma_header_normalization-CVE-2024-45614",
|
||||
"full_name": "ooooooo-q\/puma_header_normalization-CVE-2024-45614",
|
||||
"owner": {
|
||||
"login": "ooooooo-q",
|
||||
"id": 395584,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/395584?v=4",
|
||||
"html_url": "https:\/\/github.com\/ooooooo-q"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ooooooo-q\/puma_header_normalization-CVE-2024-45614",
|
||||
"description": "Puma Header normalization CVE-2024-45614 確認",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-28T06:29:00Z",
|
||||
"updated_at": "2024-09-29T06:04:10Z",
|
||||
"pushed_at": "2024-09-29T06:03:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "POC_CVE-2024-46256",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-19T09:35:12Z",
|
||||
"updated_at": "2024-09-27T02:37:09Z",
|
||||
"updated_at": "2024-09-29T02:14:39Z",
|
||||
"pushed_at": "2024-09-19T09:47:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -117,7 +117,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 864641800,
|
||||
|
@ -147,6 +147,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -260,10 +260,10 @@
|
|||
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T20:33:20Z",
|
||||
"updated_at": "2024-09-27T19:37:12Z",
|
||||
"updated_at": "2024-09-29T05:17:45Z",
|
||||
"pushed_at": "2024-09-24T19:18:56Z",
|
||||
"stargazers_count": 442,
|
||||
"watchers_count": 442,
|
||||
"stargazers_count": 441,
|
||||
"watchers_count": 441,
|
||||
"has_discussions": false,
|
||||
"forks_count": 84,
|
||||
"allow_forking": true,
|
||||
|
@ -278,7 +278,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 84,
|
||||
"watchers": 442,
|
||||
"watchers": 441,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T16:40:49Z",
|
||||
"updated_at": "2024-09-28T20:06:24Z",
|
||||
"updated_at": "2024-09-29T02:28:26Z",
|
||||
"pushed_at": "2024-09-27T20:59:23Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 15,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-9014",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-26T10:34:34Z",
|
||||
"updated_at": "2024-09-27T03:17:01Z",
|
||||
"updated_at": "2024-09-29T00:42:45Z",
|
||||
"pushed_at": "2024-09-26T10:45:34Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
13
README.md
13
README.md
|
@ -5010,6 +5010,13 @@
|
|||
### CVE-2024-43425
|
||||
- [RedTeamPentesting/moodle-rce-calculatedquestions](https://github.com/RedTeamPentesting/moodle-rce-calculatedquestions)
|
||||
|
||||
### CVE-2024-43917 (2024-08-29)
|
||||
|
||||
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TemplateInvaders TI WooCommerce Wishlist allows SQL Injection.This issue affects TI WooCommerce Wishlist: from n/a through 2.8.2.
|
||||
</code>
|
||||
|
||||
- [p33d/CVE-2024-43917](https://github.com/p33d/CVE-2024-43917)
|
||||
|
||||
### CVE-2024-43918 (2024-08-29)
|
||||
|
||||
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WBW WBW Product Table PRO allows SQL Injection.This issue affects WBW Product Table PRO: from n/a through 1.9.4.
|
||||
|
@ -5166,6 +5173,9 @@
|
|||
|
||||
- [BenRogozinski/CVE-2024-45589](https://github.com/BenRogozinski/CVE-2024-45589)
|
||||
|
||||
### CVE-2024-45614
|
||||
- [ooooooo-q/puma_header_normalization-CVE-2024-45614](https://github.com/ooooooo-q/puma_header_normalization-CVE-2024-45614)
|
||||
|
||||
### CVE-2024-46256
|
||||
- [barttran2k/POC_CVE-2024-46256](https://github.com/barttran2k/POC_CVE-2024-46256)
|
||||
|
||||
|
@ -10693,6 +10703,7 @@
|
|||
- [yezzfusl/cve_2023_38831_scanner](https://github.com/yezzfusl/cve_2023_38831_scanner)
|
||||
- [FirFirdaus/CVE-2023-38831](https://github.com/FirFirdaus/CVE-2023-38831)
|
||||
- [ra3edAJ/LAB-DFIR-cve-2023-38831](https://github.com/ra3edAJ/LAB-DFIR-cve-2023-38831)
|
||||
- [technicalcorp0/CVE-2023-38831-Exploit](https://github.com/technicalcorp0/CVE-2023-38831-Exploit)
|
||||
- [technicalcorp2/CVE-2023-38831-exploit-generator](https://github.com/technicalcorp2/CVE-2023-38831-exploit-generator)
|
||||
|
||||
### CVE-2023-38836 (2023-08-21)
|
||||
|
@ -20834,6 +20845,7 @@
|
|||
- [Axianke/CVE-2021-3129](https://github.com/Axianke/CVE-2021-3129)
|
||||
- [cc3305/CVE-2021-3129](https://github.com/cc3305/CVE-2021-3129)
|
||||
- [piperpwn/CVE-2021-3129-](https://github.com/piperpwn/CVE-2021-3129-)
|
||||
- [0x0d3ad/CVE-2021-3129](https://github.com/0x0d3ad/CVE-2021-3129)
|
||||
|
||||
### CVE-2021-3130 (2021-01-20)
|
||||
|
||||
|
@ -25324,7 +25336,6 @@
|
|||
</code>
|
||||
|
||||
- [kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-](https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-)
|
||||
- [Mr-xn/CVE-2021-42342](https://github.com/Mr-xn/CVE-2021-42342)
|
||||
- [ijh4723/-zeroboo-Gohead-CVE-2021-42342-1](https://github.com/ijh4723/-zeroboo-Gohead-CVE-2021-42342-1)
|
||||
|
||||
### CVE-2021-42362 (2021-11-17)
|
||||
|
|
Loading…
Add table
Reference in a new issue