mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2025/01/14 00:32:31
This commit is contained in:
parent
8411bc01c9
commit
7dc8a3fde9
23 changed files with 75 additions and 71 deletions
|
@ -182,7 +182,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-11-14T04:35:59Z",
|
||||
"updated_at": "2025-01-05T15:26:10Z",
|
||||
"pushed_at": "2025-01-13T17:07:41Z",
|
||||
"pushed_at": "2025-01-13T19:05:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "💀 Linux local root exploit for CVE-2018-18955",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-19T14:47:47Z",
|
||||
"updated_at": "2024-10-19T10:10:39Z",
|
||||
"updated_at": "2025-01-13T23:18:29Z",
|
||||
"pushed_at": "2022-01-20T21:05:38Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2025-01-11T08:24:05Z",
|
||||
"updated_at": "2025-01-13T20:12:17Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4154,
|
||||
"watchers_count": 4154,
|
||||
"stargazers_count": 4153,
|
||||
"watchers_count": 4153,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1101,
|
||||
"allow_forking": true,
|
||||
|
@ -77,7 +77,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1101,
|
||||
"watchers": 4154,
|
||||
"watchers": 4153,
|
||||
"score": 0,
|
||||
"subscribers_count": 149
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2025-01-11T08:24:05Z",
|
||||
"updated_at": "2025-01-13T20:12:17Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4154,
|
||||
"watchers_count": 4154,
|
||||
"stargazers_count": 4153,
|
||||
"watchers_count": 4153,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1101,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1101,
|
||||
"watchers": 4154,
|
||||
"watchers": 4153,
|
||||
"score": 0,
|
||||
"subscribers_count": 149
|
||||
},
|
||||
|
|
|
@ -848,10 +848,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2025-01-13T02:23:25Z",
|
||||
"updated_at": "2025-01-13T20:12:48Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1365,
|
||||
"watchers_count": 1365,
|
||||
"stargazers_count": 1364,
|
||||
"watchers_count": 1364,
|
||||
"has_discussions": false,
|
||||
"forks_count": 167,
|
||||
"allow_forking": true,
|
||||
|
@ -867,7 +867,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 167,
|
||||
"watchers": 1365,
|
||||
"watchers": 1364,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -218,6 +218,6 @@
|
|||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -972,7 +972,7 @@
|
|||
"stargazers_count": 1105,
|
||||
"watchers_count": 1105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 193,
|
||||
"forks_count": 194,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -980,7 +980,7 @@
|
|||
"cve-2021-4034"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 193,
|
||||
"forks": 194,
|
||||
"watchers": 1105,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
|
|
|
@ -792,10 +792,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2025-01-13T02:23:25Z",
|
||||
"updated_at": "2025-01-13T20:12:48Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1365,
|
||||
"watchers_count": 1365,
|
||||
"stargazers_count": 1364,
|
||||
"watchers_count": 1364,
|
||||
"has_discussions": false,
|
||||
"forks_count": 167,
|
||||
"allow_forking": true,
|
||||
|
@ -811,7 +811,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 167,
|
||||
"watchers": 1365,
|
||||
"watchers": 1364,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T15:59:26Z",
|
||||
"updated_at": "2024-12-31T20:57:04Z",
|
||||
"updated_at": "2025-01-13T21:46:03Z",
|
||||
"pushed_at": "2023-01-13T09:01:20Z",
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"stargazers_count": 309,
|
||||
"watchers_count": 309,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 308,
|
||||
"watchers": 309,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -49,10 +49,10 @@
|
|||
"description": "Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler \/ Citrix ADC to CVE-2023-3519",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-20T16:05:07Z",
|
||||
"updated_at": "2024-11-15T16:32:41Z",
|
||||
"updated_at": "2025-01-13T21:11:50Z",
|
||||
"pushed_at": "2023-07-23T03:54:44Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -66,7 +66,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 81,
|
||||
"watchers": 82,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -703,7 +703,7 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -712,7 +712,7 @@
|
|||
"go-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -11,11 +11,11 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/osmancanvural\/CVE-2024-12970",
|
||||
"description": null,
|
||||
"description": "Pardus My Computer Os Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-03T10:23:44Z",
|
||||
"updated_at": "2025-01-03T10:23:47Z",
|
||||
"pushed_at": "2025-01-03T10:23:44Z",
|
||||
"updated_at": "2025-01-13T22:41:32Z",
|
||||
"pushed_at": "2025-01-13T22:27:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T04:11:06Z",
|
||||
"updated_at": "2024-12-06T09:40:39Z",
|
||||
"updated_at": "2025-01-13T22:58:50Z",
|
||||
"pushed_at": "2024-03-29T04:31:31Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 9,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T15:17:59Z",
|
||||
"updated_at": "2025-01-08T16:57:04Z",
|
||||
"updated_at": "2025-01-13T20:14:32Z",
|
||||
"pushed_at": "2024-02-19T20:00:35Z",
|
||||
"stargazers_count": 709,
|
||||
"watchers_count": 709,
|
||||
"stargazers_count": 708,
|
||||
"watchers_count": 708,
|
||||
"has_discussions": false,
|
||||
"forks_count": 155,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 155,
|
||||
"watchers": 709,
|
||||
"watchers": 708,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -200,10 +200,10 @@
|
|||
"description": "exploit for ivanti",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-20T19:15:23Z",
|
||||
"updated_at": "2024-07-05T09:57:14Z",
|
||||
"updated_at": "2025-01-13T20:01:27Z",
|
||||
"pushed_at": "2024-01-20T19:20:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -212,7 +212,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -76,12 +76,12 @@
|
|||
"description": "Exploit PoC for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T19:33:08Z",
|
||||
"updated_at": "2025-01-09T05:59:41Z",
|
||||
"updated_at": "2025-01-13T20:13:25Z",
|
||||
"pushed_at": "2024-05-19T07:12:00Z",
|
||||
"stargazers_count": 522,
|
||||
"watchers_count": 522,
|
||||
"stargazers_count": 520,
|
||||
"watchers_count": 520,
|
||||
"has_discussions": false,
|
||||
"forks_count": 145,
|
||||
"forks_count": 146,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -92,8 +92,8 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 145,
|
||||
"watchers": 522,
|
||||
"forks": 146,
|
||||
"watchers": 520,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -111,8 +111,8 @@
|
|||
"description": "CVE-2024-35250 PoC - Optimized & Condensed Form of Varwara's PoC",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-13T18:24:48Z",
|
||||
"updated_at": "2025-01-13T18:25:14Z",
|
||||
"pushed_at": "2025-01-13T18:25:10Z",
|
||||
"updated_at": "2025-01-13T18:37:11Z",
|
||||
"pushed_at": "2025-01-13T18:38:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T19:24:55Z",
|
||||
"updated_at": "2025-01-12T18:24:25Z",
|
||||
"pushed_at": "2024-12-09T22:58:22Z",
|
||||
"updated_at": "2025-01-13T21:21:33Z",
|
||||
"pushed_at": "2025-01-13T21:21:30Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "POC for CVE-2024-46310 For FXServer version's v9601 and prior, Incorrect Access Control in FXServer version's v9601 and prior, for CFX.re FiveM, allows unauthenticated users to modify and read userdata via exposed api endpoint",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-28T19:36:52Z",
|
||||
"updated_at": "2025-01-01T22:30:32Z",
|
||||
"updated_at": "2025-01-13T21:52:23Z",
|
||||
"pushed_at": "2024-10-07T13:09:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Escape macOS Sandbox using sharedfilelistd exploit",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-08T09:55:44Z",
|
||||
"updated_at": "2025-01-13T18:15:27Z",
|
||||
"updated_at": "2025-01-13T23:31:23Z",
|
||||
"pushed_at": "2025-01-09T06:34:50Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 31,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Safely detect if an Ivanti server is vulnerable to CVE-2025-0282",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-09T18:43:08Z",
|
||||
"updated_at": "2025-01-13T13:21:23Z",
|
||||
"updated_at": "2025-01-13T22:15:51Z",
|
||||
"pushed_at": "2025-01-10T21:27:47Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -7045,7 +7045,11 @@
|
|||
|
||||
- [ayato-shitomi/CVE-2024-46278-teedy_1.11_account-takeover](https://github.com/ayato-shitomi/CVE-2024-46278-teedy_1.11_account-takeover)
|
||||
|
||||
### CVE-2024-46310
|
||||
### CVE-2024-46310 (2025-01-13)
|
||||
|
||||
<code>Incorrect Access Control in Cfx.re FXServer v9601 and earlier allows unauthenticated users to modify and read arbitrary user data via exposed API endpoint
|
||||
</code>
|
||||
|
||||
- [PRX5Y/CVE-2024-46310](https://github.com/PRX5Y/CVE-2024-46310)
|
||||
|
||||
### CVE-2024-46377 (2024-09-18)
|
||||
|
|
Loading…
Reference in a new issue