mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/06/09 18:29:02
This commit is contained in:
parent
2eadc954f9
commit
815091dc0a
29 changed files with 245 additions and 144 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-18T04:24:43Z",
|
||||
"updated_at": "2024-05-05T14:22:51Z",
|
||||
"updated_at": "2024-06-09T16:13:01Z",
|
||||
"pushed_at": "2019-09-30T23:38:11Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-26T13:39:03Z",
|
||||
"updated_at": "2024-05-31T12:26:00Z",
|
||||
"updated_at": "2024-06-09T12:42:18Z",
|
||||
"pushed_at": "2023-02-27T06:48:09Z",
|
||||
"stargazers_count": 395,
|
||||
"watchers_count": 395,
|
||||
"stargazers_count": 396,
|
||||
"watchers_count": 396,
|
||||
"has_discussions": false,
|
||||
"forks_count": 150,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 150,
|
||||
"watchers": 395,
|
||||
"watchers": 396,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -142,7 +142,7 @@
|
|||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -151,7 +151,7 @@
|
|||
"cve-2017-9841"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2024-05-31T08:38:26Z",
|
||||
"updated_at": "2024-06-09T17:28:13Z",
|
||||
"pushed_at": "2022-12-11T10:44:39Z",
|
||||
"stargazers_count": 513,
|
||||
"watchers_count": 513,
|
||||
"stargazers_count": 514,
|
||||
"watchers_count": 514,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 513,
|
||||
"watchers": 514,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Chain CVE-2019-11408 – XSS in operator panel and CVE-2019-11409 – Command injection in operator panel.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-25T17:04:39Z",
|
||||
"updated_at": "2023-11-25T17:14:55Z",
|
||||
"pushed_at": "2024-02-06T19:12:16Z",
|
||||
"updated_at": "2024-06-09T16:05:08Z",
|
||||
"pushed_at": "2024-06-09T16:05:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -253,8 +253,8 @@
|
|||
"description": "The exploit is edited to work with different text encodings and Python 3 and is compatible with CMSMS version 2.2.9 and below.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-29T17:59:09Z",
|
||||
"updated_at": "2023-09-13T17:57:14Z",
|
||||
"pushed_at": "2024-06-09T10:32:40Z",
|
||||
"updated_at": "2024-06-09T12:39:51Z",
|
||||
"pushed_at": "2024-06-09T12:39:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -719,10 +719,10 @@
|
|||
"description": "GUI Exploit Tool for CVE-2020-0688(Microsoft Exchange default MachineKeySection deserialize vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-09T12:50:48Z",
|
||||
"updated_at": "2024-06-07T06:10:36Z",
|
||||
"updated_at": "2024-06-09T13:35:52Z",
|
||||
"pushed_at": "2024-05-09T13:51:27Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -738,7 +738,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2024-06-06T08:12:05Z",
|
||||
"updated_at": "2024-06-09T13:14:49Z",
|
||||
"pushed_at": "2023-07-20T10:51:42Z",
|
||||
"stargazers_count": 1698,
|
||||
"watchers_count": 1698,
|
||||
"stargazers_count": 1699,
|
||||
"watchers_count": 1699,
|
||||
"has_discussions": false,
|
||||
"forks_count": 360,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 360,
|
||||
"watchers": 1698,
|
||||
"watchers": 1699,
|
||||
"score": 0,
|
||||
"subscribers_count": 87
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2024-06-08T08:05:24Z",
|
||||
"updated_at": "2024-06-09T14:16:01Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1805,
|
||||
"watchers_count": 1805,
|
||||
"stargazers_count": 1806,
|
||||
"watchers_count": 1806,
|
||||
"has_discussions": false,
|
||||
"forks_count": 583,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 583,
|
||||
"watchers": 1805,
|
||||
"watchers": 1806,
|
||||
"score": 0,
|
||||
"subscribers_count": 44
|
||||
},
|
||||
|
@ -301,10 +301,10 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2024-06-04T22:58:22Z",
|
||||
"updated_at": "2024-06-09T14:16:14Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 976,
|
||||
"watchers_count": 976,
|
||||
"stargazers_count": 977,
|
||||
"watchers_count": 977,
|
||||
"has_discussions": false,
|
||||
"forks_count": 231,
|
||||
"allow_forking": true,
|
||||
|
@ -313,7 +313,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 231,
|
||||
"watchers": 976,
|
||||
"watchers": 977,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T05:07:15Z",
|
||||
"updated_at": "2024-04-10T14:40:33Z",
|
||||
"updated_at": "2024-06-09T13:48:34Z",
|
||||
"pushed_at": "2021-03-08T11:41:19Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-11T22:08:47Z",
|
||||
"updated_at": "2024-06-06T05:15:03Z",
|
||||
"updated_at": "2024-06-09T13:58:42Z",
|
||||
"pushed_at": "2021-10-13T22:32:36Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 104,
|
||||
"watchers": 103,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -618,19 +618,19 @@
|
|||
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-23T20:20:45Z",
|
||||
"updated_at": "2024-04-29T07:55:03Z",
|
||||
"updated_at": "2024-06-09T15:07:09Z",
|
||||
"pushed_at": "2022-12-17T16:10:46Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 98,
|
||||
"forks": 21,
|
||||
"watchers": 99,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -943,7 +943,7 @@
|
|||
"stargazers_count": 1003,
|
||||
"watchers_count": 1003,
|
||||
"has_discussions": false,
|
||||
"forks_count": 179,
|
||||
"forks_count": 178,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -951,7 +951,7 @@
|
|||
"cve-2021-4034"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 179,
|
||||
"forks": 178,
|
||||
"watchers": 1003,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
|
|
|
@ -48,19 +48,19 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2024-06-09T09:20:45Z",
|
||||
"updated_at": "2024-06-09T15:54:23Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 734,
|
||||
"watchers_count": 734,
|
||||
"stargazers_count": 736,
|
||||
"watchers_count": 736,
|
||||
"has_discussions": false,
|
||||
"forks_count": 117,
|
||||
"forks_count": 118,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 734,
|
||||
"forks": 118,
|
||||
"watchers": 736,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Oracle E-Business Suite <=12.2 - Authentication Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T02:59:45Z",
|
||||
"updated_at": "2024-06-09T03:01:11Z",
|
||||
"pushed_at": "2024-06-09T03:01:08Z",
|
||||
"updated_at": "2024-06-09T16:56:47Z",
|
||||
"pushed_at": "2024-06-09T16:56:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-01T16:17:10Z",
|
||||
"updated_at": "2024-06-07T18:34:50Z",
|
||||
"updated_at": "2024-06-09T18:16:06Z",
|
||||
"pushed_at": "2023-09-01T16:21:56Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2024-06-08T10:08:09Z",
|
||||
"updated_at": "2024-06-09T16:18:52Z",
|
||||
"pushed_at": "2023-11-26T06:46:44Z",
|
||||
"stargazers_count": 768,
|
||||
"watchers_count": 768,
|
||||
"stargazers_count": 769,
|
||||
"watchers_count": 769,
|
||||
"has_discussions": false,
|
||||
"forks_count": 139,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 139,
|
||||
"watchers": 768,
|
||||
"watchers": 769,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 704942565,
|
||||
"name": "CVE-2023-45471",
|
||||
"full_name": "itsAptx\/CVE-2023-45471",
|
||||
"full_name": "mehdibelhajamor\/CVE-2023-45471",
|
||||
"owner": {
|
||||
"login": "itsAptx",
|
||||
"login": "mehdibelhajamor",
|
||||
"id": 62826765,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62826765?v=4",
|
||||
"html_url": "https:\/\/github.com\/itsAptx"
|
||||
"html_url": "https:\/\/github.com\/mehdibelhajamor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/itsAptx\/CVE-2023-45471",
|
||||
"html_url": "https:\/\/github.com\/mehdibelhajamor\/CVE-2023-45471",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-14T15:20:37Z",
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 784,
|
||||
"watchers_count": 784,
|
||||
"has_discussions": false,
|
||||
"forks_count": 138,
|
||||
"forks_count": 139,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 138,
|
||||
"forks": 139,
|
||||
"watchers": 784,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
|
|
32
2024/CVE-2024-20404.json
Normal file
32
2024/CVE-2024-20404.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 812737384,
|
||||
"name": "CVE-2024-20404",
|
||||
"full_name": "AbdElRahmanEzzat1995\/CVE-2024-20404",
|
||||
"owner": {
|
||||
"login": "AbdElRahmanEzzat1995",
|
||||
"id": 67908228,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67908228?v=4",
|
||||
"html_url": "https:\/\/github.com\/AbdElRahmanEzzat1995"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AbdElRahmanEzzat1995\/CVE-2024-20404",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T18:27:52Z",
|
||||
"updated_at": "2024-06-09T18:31:09Z",
|
||||
"pushed_at": "2024-06-09T18:29:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1364,10 +1364,10 @@
|
|||
"description": "POC - CVE-2024–24919 - Check Point Security Gateways",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T06:54:51Z",
|
||||
"updated_at": "2024-06-09T08:05:26Z",
|
||||
"updated_at": "2024-06-09T15:55:51Z",
|
||||
"pushed_at": "2024-06-09T08:03:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1376,7 +1376,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-31T20:11:37Z",
|
||||
"updated_at": "2024-06-09T10:37:10Z",
|
||||
"updated_at": "2024-06-09T16:23:12Z",
|
||||
"pushed_at": "2024-06-08T09:12:43Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -50,10 +50,10 @@
|
|||
"description": "Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-03T19:08:24Z",
|
||||
"updated_at": "2024-06-08T22:26:38Z",
|
||||
"updated_at": "2024-06-09T13:11:25Z",
|
||||
"pushed_at": "2024-06-03T19:20:10Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T14:21:49Z",
|
||||
"updated_at": "2024-06-07T01:06:17Z",
|
||||
"updated_at": "2024-06-09T12:35:32Z",
|
||||
"pushed_at": "2024-05-29T03:43:05Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -195,7 +195,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -283,8 +283,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T07:21:44Z",
|
||||
"updated_at": "2024-06-09T07:36:31Z",
|
||||
"pushed_at": "2024-06-09T07:36:27Z",
|
||||
"updated_at": "2024-06-09T16:37:44Z",
|
||||
"pushed_at": "2024-06-09T16:37:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -100,11 +100,11 @@
|
|||
"html_url": "https:\/\/github.com\/Jhonsonwannaa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jhonsonwannaa\/CVE-2024-29269",
|
||||
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-29269",
|
||||
"description": "An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-08T22:06:33Z",
|
||||
"updated_at": "2024-06-09T09:05:54Z",
|
||||
"pushed_at": "2024-06-09T09:05:51Z",
|
||||
"updated_at": "2024-06-09T13:12:11Z",
|
||||
"pushed_at": "2024-06-09T13:12:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -78,7 +78,7 @@
|
|||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -92,7 +92,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Authentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T06:30:06Z",
|
||||
"updated_at": "2024-06-09T08:05:03Z",
|
||||
"updated_at": "2024-06-09T15:55:54Z",
|
||||
"pushed_at": "2024-06-09T06:51:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T05:50:23Z",
|
||||
"updated_at": "2024-06-09T11:26:26Z",
|
||||
"updated_at": "2024-06-09T13:14:46Z",
|
||||
"pushed_at": "2024-06-07T11:49:08Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -133,10 +133,10 @@
|
|||
"description": "POC & $BASH script for CVE-2024-4577",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:51:39Z",
|
||||
"updated_at": "2024-06-09T12:20:59Z",
|
||||
"pushed_at": "2024-06-07T18:37:44Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"updated_at": "2024-06-09T16:54:01Z",
|
||||
"pushed_at": "2024-06-09T16:16:30Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 20,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -163,19 +163,19 @@
|
|||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:52:54Z",
|
||||
"updated_at": "2024-06-09T10:32:21Z",
|
||||
"updated_at": "2024-06-09T16:45:31Z",
|
||||
"pushed_at": "2024-06-07T09:53:15Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 70,
|
||||
"forks": 13,
|
||||
"watchers": 72,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -283,10 +283,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T12:49:20Z",
|
||||
"updated_at": "2024-06-07T17:02:41Z",
|
||||
"updated_at": "2024-06-09T12:50:40Z",
|
||||
"pushed_at": "2024-06-07T14:29:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -295,7 +295,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -348,13 +348,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -433,10 +433,10 @@
|
|||
"description": "Proof Of Concept RCE exploit for critical vulnerability in PHP <8.2.15 (Windows), allowing attackers to execute arbitrary commands.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-08T05:27:44Z",
|
||||
"updated_at": "2024-06-08T10:58:54Z",
|
||||
"updated_at": "2024-06-09T16:48:20Z",
|
||||
"pushed_at": "2024-06-08T05:50:27Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -445,7 +445,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -464,7 +464,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-06-08T06:36:14Z",
|
||||
"updated_at": "2024-06-09T10:50:42Z",
|
||||
"pushed_at": "2024-06-09T11:00:41Z",
|
||||
"pushed_at": "2024-06-09T16:47:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -493,10 +493,10 @@
|
|||
"description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-08T12:23:35Z",
|
||||
"updated_at": "2024-06-08T15:59:30Z",
|
||||
"updated_at": "2024-06-09T17:15:22Z",
|
||||
"pushed_at": "2024-06-08T15:59:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -512,7 +512,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -530,12 +530,12 @@
|
|||
"description": "全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP,共享原创EXP,支持SSRF,支持绕过WAF。The world's first CVE-2024-4577 PHP-CGI RCE exploit utilizing the default PHP environment. Sharing original exploit, supports SSRF, supports WAF bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-08T13:04:45Z",
|
||||
"updated_at": "2024-06-09T12:17:28Z",
|
||||
"pushed_at": "2024-06-09T11:51:52Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"updated_at": "2024-06-09T17:20:23Z",
|
||||
"pushed_at": "2024-06-09T15:45:15Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -549,9 +549,69 @@
|
|||
"xampp"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"forks": 5,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 812648512,
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "dbyMelina\/CVE-2024-4577",
|
||||
"owner": {
|
||||
"login": "dbyMelina",
|
||||
"id": 93864453,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93864453?v=4",
|
||||
"html_url": "https:\/\/github.com\/dbyMelina"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dbyMelina\/CVE-2024-4577",
|
||||
"description": "python poc编写练手,可以对单个目标或批量检测",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T13:46:46Z",
|
||||
"updated_at": "2024-06-09T13:48:02Z",
|
||||
"pushed_at": "2024-06-09T13:47:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 812658588,
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "Chocapikk\/CVE-2024-4577",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-4577",
|
||||
"description": "PHP CGI Argument Injection vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T14:18:21Z",
|
||||
"updated_at": "2024-06-09T17:56:38Z",
|
||||
"pushed_at": "2024-06-09T14:20:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -367,10 +367,10 @@
|
|||
"description": "POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T10:57:29Z",
|
||||
"updated_at": "2024-06-09T10:58:23Z",
|
||||
"pushed_at": "2024-06-09T10:58:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2024-06-09T15:55:45Z",
|
||||
"pushed_at": "2024-06-09T12:53:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -379,7 +379,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
11
README.md
11
README.md
|
@ -639,6 +639,8 @@
|
|||
- [zomasec/CVE-2024-4577](https://github.com/zomasec/CVE-2024-4577)
|
||||
- [ZephrFish/CVE-2024-4577-PHP-RCE](https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE)
|
||||
- [xcanwin/CVE-2024-4577-PHP-RCE](https://github.com/xcanwin/CVE-2024-4577-PHP-RCE)
|
||||
- [dbyMelina/CVE-2024-4577](https://github.com/dbyMelina/CVE-2024-4577)
|
||||
- [Chocapikk/CVE-2024-4577](https://github.com/Chocapikk/CVE-2024-4577)
|
||||
|
||||
### CVE-2024-4701 (2024-05-10)
|
||||
|
||||
|
@ -716,6 +718,13 @@
|
|||
- [nettitude/CVE-2024-20356](https://github.com/nettitude/CVE-2024-20356)
|
||||
- [SherllyNeo/CVE_2024_20356](https://github.com/SherllyNeo/CVE_2024_20356)
|
||||
|
||||
### CVE-2024-20404 (2024-06-05)
|
||||
|
||||
<code>A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct an SSRF attack on an affected system.\r\n\r This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain limited sensitive information for services that are associated to the affected device.
|
||||
</code>
|
||||
|
||||
- [AbdElRahmanEzzat1995/CVE-2024-20404](https://github.com/AbdElRahmanEzzat1995/CVE-2024-20404)
|
||||
|
||||
### CVE-2024-20656 (2024-01-09)
|
||||
|
||||
<code>Visual Studio Elevation of Privilege Vulnerability
|
||||
|
@ -9001,7 +9010,7 @@
|
|||
<code>The QAD Search Server is vulnerable to Stored Cross-Site Scripting (XSS) in versions up to, and including, 1.0.0.315 due to insufficient checks on indexes. This makes it possible for unauthenticated attackers to create a new index and inject a malicious web script into its name, that will execute whenever a user accesses the search page.
|
||||
</code>
|
||||
|
||||
- [itsAptx/CVE-2023-45471](https://github.com/itsAptx/CVE-2023-45471)
|
||||
- [mehdibelhajamor/CVE-2023-45471](https://github.com/mehdibelhajamor/CVE-2023-45471)
|
||||
|
||||
### CVE-2023-45503 (2024-04-15)
|
||||
|
||||
|
|
Loading…
Reference in a new issue