mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2025/01/11 18:31:41
This commit is contained in:
parent
3eebab1abf
commit
7eeffd2ec4
23 changed files with 202 additions and 98 deletions
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -2499,7 +2499,7 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -2507,7 +2507,7 @@
|
|||
"cve-2018-6574"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -257,5 +257,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 915363496,
|
||||
"name": "Bludit-3.9.2-Auth-Bruteforce-Bypass-CVE-2019-17240",
|
||||
"full_name": "0xDTC\/Bludit-3.9.2-Auth-Bruteforce-Bypass-CVE-2019-17240",
|
||||
"owner": {
|
||||
"login": "0xDTC",
|
||||
"id": 95960398,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95960398?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xDTC",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xDTC\/Bludit-3.9.2-Auth-Bruteforce-Bypass-CVE-2019-17240",
|
||||
"description": "Bludit 3.9.2 - Auth Bruteforce Bypass CVE:2019-17240 Refurbish In bash",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-11T16:48:45Z",
|
||||
"updated_at": "2025-01-11T18:01:02Z",
|
||||
"pushed_at": "2025-01-11T18:00:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -50,19 +50,19 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2025-01-10T12:02:40Z",
|
||||
"updated_at": "2025-01-11T17:36:36Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 821,
|
||||
"watchers_count": 821,
|
||||
"stargazers_count": 822,
|
||||
"watchers_count": 822,
|
||||
"has_discussions": false,
|
||||
"forks_count": 124,
|
||||
"forks_count": 125,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 124,
|
||||
"watchers": 821,
|
||||
"forks": 125,
|
||||
"watchers": 822,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -381,12 +381,12 @@
|
|||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2024-12-31T02:58:20Z",
|
||||
"updated_at": "2025-01-11T13:37:38Z",
|
||||
"pushed_at": "2024-04-26T03:16:26Z",
|
||||
"stargazers_count": 1110,
|
||||
"watchers_count": 1110,
|
||||
"stargazers_count": 1111,
|
||||
"watchers_count": 1111,
|
||||
"has_discussions": false,
|
||||
"forks_count": 534,
|
||||
"forks_count": 535,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -394,8 +394,8 @@
|
|||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 534,
|
||||
"watchers": 1110,
|
||||
"forks": 535,
|
||||
"watchers": 1111,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -233,8 +233,8 @@
|
|||
"description": "Refurbish",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T20:26:47Z",
|
||||
"updated_at": "2025-01-07T12:53:41Z",
|
||||
"pushed_at": "2025-01-07T12:53:38Z",
|
||||
"updated_at": "2025-01-11T13:26:28Z",
|
||||
"pushed_at": "2025-01-11T13:26:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "lpe poc for cve-2022-21882 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T03:45:36Z",
|
||||
"updated_at": "2024-12-27T14:20:04Z",
|
||||
"updated_at": "2025-01-11T15:17:37Z",
|
||||
"pushed_at": "2022-02-07T03:49:37Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -123,7 +123,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2025-01-06T20:22:58Z",
|
||||
"updated_at": "2025-01-11T15:10:41Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 778,
|
||||
"watchers_count": 778,
|
||||
"stargazers_count": 779,
|
||||
"watchers_count": 779,
|
||||
"has_discussions": false,
|
||||
"forks_count": 160,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 160,
|
||||
"watchers": 778,
|
||||
"watchers": 779,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "pocs & exploit for CVE-2023-24871 (rce + lpe)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-21T15:01:15Z",
|
||||
"updated_at": "2025-01-06T14:33:13Z",
|
||||
"updated_at": "2025-01-11T14:55:08Z",
|
||||
"pushed_at": "2024-07-17T12:34:16Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -60,5 +60,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 915373751,
|
||||
"name": "poc-cve",
|
||||
"full_name": "bluefish3r\/poc-cve",
|
||||
"owner": {
|
||||
"login": "bluefish3r",
|
||||
"id": 194559845,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/194559845?v=4",
|
||||
"html_url": "https:\/\/github.com\/bluefish3r",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bluefish3r\/poc-cve",
|
||||
"description": "poc-cve-2023-3824",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-11T17:19:21Z",
|
||||
"updated_at": "2025-01-11T17:43:19Z",
|
||||
"pushed_at": "2025-01-11T17:42:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 1380,
|
||||
"watchers_count": 1380,
|
||||
"has_discussions": false,
|
||||
"forks_count": 236,
|
||||
"forks_count": 237,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 236,
|
||||
"forks": 237,
|
||||
"watchers": 1380,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-03T22:06:09Z",
|
||||
"updated_at": "2025-01-05T08:55:50Z",
|
||||
"updated_at": "2025-01-11T15:47:48Z",
|
||||
"pushed_at": "2024-01-20T16:59:23Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T12:30:53Z",
|
||||
"updated_at": "2025-01-09T00:32:45Z",
|
||||
"updated_at": "2025-01-11T16:06:28Z",
|
||||
"pushed_at": "2024-12-02T06:29:52Z",
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 275,
|
||||
"watchers": 276,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
33
2024/CVE-2024-12856.json
Normal file
33
2024/CVE-2024-12856.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 915391325,
|
||||
"name": "CVE-2024-12856",
|
||||
"full_name": "nu113d\/CVE-2024-12856",
|
||||
"owner": {
|
||||
"login": "nu113d",
|
||||
"id": 103531438,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103531438?v=4",
|
||||
"html_url": "https:\/\/github.com\/nu113d",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nu113d\/CVE-2024-12856",
|
||||
"description": "An exploit for Four-Faith routers to get a reverse shell",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-11T18:14:03Z",
|
||||
"updated_at": "2025-01-11T18:14:08Z",
|
||||
"pushed_at": "2025-01-11T18:14:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -952,10 +952,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2025-01-10T22:49:48Z",
|
||||
"updated_at": "2025-01-11T16:47:54Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3505,
|
||||
"watchers_count": 3505,
|
||||
"stargazers_count": 3506,
|
||||
"watchers_count": 3506,
|
||||
"has_discussions": false,
|
||||
"forks_count": 240,
|
||||
"allow_forking": true,
|
||||
|
@ -964,7 +964,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 240,
|
||||
"watchers": 3505,
|
||||
"watchers": 3506,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
|
@ -2015,36 +2015,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 915273115,
|
||||
"name": "CVE-2024-32002",
|
||||
"full_name": "Katherine-song\/CVE-2024-32002",
|
||||
"owner": {
|
||||
"login": "Katherine-song",
|
||||
"id": 64319718,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64319718?v=4",
|
||||
"html_url": "https:\/\/github.com\/Katherine-song",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Katherine-song\/CVE-2024-32002",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-11T12:25:07Z",
|
||||
"updated_at": "2025-01-11T12:27:34Z",
|
||||
"pushed_at": "2025-01-11T12:27:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation \/ Arbitrary Code Execution Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T08:51:08Z",
|
||||
"updated_at": "2024-12-25T03:22:50Z",
|
||||
"updated_at": "2025-01-11T16:49:41Z",
|
||||
"pushed_at": "2024-11-05T02:57:25Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 182,
|
||||
"watchers": 183,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-01T15:48:38Z",
|
||||
"updated_at": "2025-01-11T10:39:27Z",
|
||||
"updated_at": "2025-01-11T18:08:53Z",
|
||||
"pushed_at": "2025-01-02T16:07:23Z",
|
||||
"stargazers_count": 426,
|
||||
"watchers_count": 426,
|
||||
"stargazers_count": 428,
|
||||
"watchers_count": 428,
|
||||
"has_discussions": false,
|
||||
"forks_count": 101,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 101,
|
||||
"watchers": 426,
|
||||
"watchers": 428,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 915393828,
|
||||
"name": "CVE-2024-49328-exploit",
|
||||
"full_name": "Nxploited\/CVE-2024-49328-exploit",
|
||||
"owner": {
|
||||
"login": "Nxploited",
|
||||
"id": 188819918,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nxploited",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-49328-exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-11T18:22:25Z",
|
||||
"updated_at": "2025-01-11T18:22:28Z",
|
||||
"pushed_at": "2025-01-11T18:22:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -200,10 +200,10 @@
|
|||
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-23T07:20:47Z",
|
||||
"updated_at": "2025-01-09T10:06:44Z",
|
||||
"updated_at": "2025-01-11T17:38:38Z",
|
||||
"pushed_at": "2024-12-23T07:30:27Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -212,7 +212,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -11,11 +11,11 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nscan9\/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection",
|
||||
"description": null,
|
||||
"description": "CVE-2024-54761 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-15T05:55:29Z",
|
||||
"updated_at": "2025-01-08T05:15:44Z",
|
||||
"pushed_at": "2025-01-08T05:15:40Z",
|
||||
"updated_at": "2025-01-11T15:06:28Z",
|
||||
"pushed_at": "2025-01-11T15:06:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -107,19 +107,19 @@
|
|||
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-11T02:06:51Z",
|
||||
"updated_at": "2025-01-11T12:19:20Z",
|
||||
"pushed_at": "2025-01-11T02:23:27Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"updated_at": "2025-01-11T17:36:23Z",
|
||||
"pushed_at": "2025-01-11T17:36:20Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
11
README.md
11
README.md
|
@ -2568,6 +2568,13 @@
|
|||
- [RandomRobbieBF/CVE-2024-12849](https://github.com/RandomRobbieBF/CVE-2024-12849)
|
||||
- [Nxploited/CVE-2024-12849-Poc](https://github.com/Nxploited/CVE-2024-12849-Poc)
|
||||
|
||||
### CVE-2024-12856 (2024-12-27)
|
||||
|
||||
<code>The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue.
|
||||
</code>
|
||||
|
||||
- [nu113d/CVE-2024-12856](https://github.com/nu113d/CVE-2024-12856)
|
||||
|
||||
### CVE-2024-12883 (2024-12-21)
|
||||
|
||||
<code>In code-projects Job Recruitment 1.0 wurde eine problematische Schwachstelle ausgemacht. Das betrifft eine unbekannte Funktionalität der Datei /_email.php. Mittels Manipulieren des Arguments email mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
|
||||
|
@ -4981,7 +4988,6 @@
|
|||
- [grecosamuel/CVE-2024-32002](https://github.com/grecosamuel/CVE-2024-32002)
|
||||
- [XiaomingX/cve-2024-32002-poc](https://github.com/XiaomingX/cve-2024-32002-poc)
|
||||
- [jolibb55/donald](https://github.com/jolibb55/donald)
|
||||
- [Katherine-song/CVE-2024-32002](https://github.com/Katherine-song/CVE-2024-32002)
|
||||
|
||||
### CVE-2024-32004 (2024-05-14)
|
||||
|
||||
|
@ -7380,6 +7386,7 @@
|
|||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-49328](https://github.com/RandomRobbieBF/CVE-2024-49328)
|
||||
- [Nxploited/CVE-2024-49328-exploit](https://github.com/Nxploited/CVE-2024-49328-exploit)
|
||||
|
||||
### CVE-2024-49368 (2024-10-21)
|
||||
|
||||
|
@ -9032,6 +9039,7 @@
|
|||
|
||||
- [jhonnybonny/CVE-2023-3824](https://github.com/jhonnybonny/CVE-2023-3824)
|
||||
- [fr33c0d3/poc-cve-2023-3824](https://github.com/fr33c0d3/poc-cve-2023-3824)
|
||||
- [bluefish3r/poc-cve](https://github.com/bluefish3r/poc-cve)
|
||||
|
||||
### CVE-2023-3836 (2023-07-22)
|
||||
|
||||
|
@ -39025,6 +39033,7 @@
|
|||
- [brunosergi/bloodit](https://github.com/brunosergi/bloodit)
|
||||
- [spyx/cve-2019-17240](https://github.com/spyx/cve-2019-17240)
|
||||
- [mind2hex/CVE-2019-17240](https://github.com/mind2hex/CVE-2019-17240)
|
||||
- [0xDTC/Bludit-3.9.2-Auth-Bruteforce-Bypass-CVE-2019-17240](https://github.com/0xDTC/Bludit-3.9.2-Auth-Bruteforce-Bypass-CVE-2019-17240)
|
||||
|
||||
### CVE-2019-17382 (2019-10-09)
|
||||
|
||||
|
|
Loading…
Reference in a new issue