mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/04/23 00:33:33
This commit is contained in:
parent
05f1729264
commit
85624e1867
26 changed files with 236 additions and 78 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-05T23:41:52Z",
|
||||
"updated_at": "2024-04-21T13:36:38Z",
|
||||
"updated_at": "2024-04-22T18:17:08Z",
|
||||
"pushed_at": "2017-10-11T07:43:50Z",
|
||||
"stargazers_count": 380,
|
||||
"watchers_count": 380,
|
||||
"stargazers_count": 381,
|
||||
"watchers_count": 381,
|
||||
"has_discussions": false,
|
||||
"forks_count": 125,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 125,
|
||||
"watchers": 380,
|
||||
"watchers": 381,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -303,5 +303,35 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 790447827,
|
||||
"name": "CVE-2018-14847-EXPLOIT",
|
||||
"full_name": "K3ysTr0K3R\/CVE-2018-14847-EXPLOIT",
|
||||
"owner": {
|
||||
"login": "K3ysTr0K3R",
|
||||
"id": 70909693,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
|
||||
"html_url": "https:\/\/github.com\/K3ysTr0K3R"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2018-14847-EXPLOIT",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-22T22:33:25Z",
|
||||
"updated_at": "2024-04-22T22:38:31Z",
|
||||
"pushed_at": "2024-04-22T22:38:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2024-04-12T09:09:52Z",
|
||||
"updated_at": "2024-04-22T19:54:38Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 637,
|
||||
"watchers_count": 637,
|
||||
"stargazers_count": 638,
|
||||
"watchers_count": 638,
|
||||
"has_discussions": false,
|
||||
"forks_count": 130,
|
||||
"allow_forking": true,
|
||||
|
@ -68,7 +68,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 130,
|
||||
"watchers": 637,
|
||||
"watchers": 638,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2024-04-09T11:48:33Z",
|
||||
"updated_at": "2024-04-22T21:24:31Z",
|
||||
"pushed_at": "2022-12-11T10:44:39Z",
|
||||
"stargazers_count": 514,
|
||||
"watchers_count": 514,
|
||||
|
|
|
@ -3121,7 +3121,7 @@
|
|||
"forks": 20,
|
||||
"watchers": 119,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 247883778,
|
||||
|
|
|
@ -57,6 +57,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -79,10 +79,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2024-04-22T02:34:46Z",
|
||||
"updated_at": "2024-04-22T19:04:59Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1914,
|
||||
"watchers_count": 1914,
|
||||
"stargazers_count": 1913,
|
||||
"watchers_count": 1913,
|
||||
"has_discussions": false,
|
||||
"forks_count": 509,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 509,
|
||||
"watchers": 1914,
|
||||
"watchers": 1913,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
@ -943,7 +943,7 @@
|
|||
"stargazers_count": 982,
|
||||
"watchers_count": 982,
|
||||
"has_discussions": false,
|
||||
"forks_count": 181,
|
||||
"forks_count": 180,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -951,7 +951,7 @@
|
|||
"cve-2021-4034"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 181,
|
||||
"forks": 180,
|
||||
"watchers": 982,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
|
@ -1305,10 +1305,10 @@
|
|||
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T17:53:16Z",
|
||||
"updated_at": "2024-04-21T19:35:44Z",
|
||||
"updated_at": "2024-04-22T18:58:47Z",
|
||||
"pushed_at": "2022-01-28T00:29:15Z",
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -1317,7 +1317,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 134,
|
||||
"watchers": 135,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -168,13 +168,13 @@
|
|||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -10625,6 +10625,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 446218653,
|
||||
"name": "log4jhound",
|
||||
"full_name": "mebibite\/log4jhound",
|
||||
"owner": {
|
||||
"login": "mebibite",
|
||||
"id": 54244269,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54244269?v=4",
|
||||
"html_url": "https:\/\/github.com\/mebibite"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mebibite\/log4jhound",
|
||||
"description": "Created after the disclosure of CVE-2021-44228. Bash script that detects Log4j occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyses their Manifest files.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-09T22:34:49Z",
|
||||
"updated_at": "2024-04-22T19:41:40Z",
|
||||
"pushed_at": "2022-04-01T00:43:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 447404470,
|
||||
"name": "log4shell",
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"forks": 32,
|
||||
"watchers": 152,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
|
|
|
@ -496,10 +496,10 @@
|
|||
"html_url": "https:\/\/github.com\/mebibite"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mebibite\/springhound",
|
||||
"description": "Created after the release of CVE-2022-22965 and CVE-2022-22963. Bash script that detects Spring Framework occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyzes their Manifest files.",
|
||||
"description": "Created after the disclosure of CVE-2022-22965 and CVE-2022-22963. Bash script that detects Spring Framework occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyses their Manifest files.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-01T00:34:29Z",
|
||||
"updated_at": "2022-04-01T00:47:30Z",
|
||||
"updated_at": "2024-04-22T19:41:50Z",
|
||||
"pushed_at": "2022-04-01T00:42:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "exploit for f5-big-ip RCE cve-2023-46747",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-01T09:31:05Z",
|
||||
"updated_at": "2024-04-22T01:14:46Z",
|
||||
"updated_at": "2024-04-22T23:01:04Z",
|
||||
"pushed_at": "2024-03-26T03:01:04Z",
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 180,
|
||||
"watchers": 181,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -77,10 +77,10 @@
|
|||
"description": "An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T19:40:59Z",
|
||||
"updated_at": "2024-04-12T04:31:49Z",
|
||||
"updated_at": "2024-04-22T19:58:10Z",
|
||||
"pushed_at": "2024-01-17T19:14:09Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -89,7 +89,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-04-22T14:44:53Z",
|
||||
"updated_at": "2024-04-22T18:39:04Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 1872,
|
||||
"watchers_count": 1872,
|
||||
"stargazers_count": 1873,
|
||||
"watchers_count": 1873,
|
||||
"has_discussions": false,
|
||||
"forks_count": 232,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 232,
|
||||
"watchers": 1872,
|
||||
"watchers": 1873,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-12T15:07:42Z",
|
||||
"updated_at": "2024-04-22T15:49:15Z",
|
||||
"updated_at": "2024-04-22T19:15:35Z",
|
||||
"pushed_at": "2024-04-18T14:31:34Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 24,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-22T07:05:04Z",
|
||||
"updated_at": "2024-04-22T18:27:28Z",
|
||||
"updated_at": "2024-04-23T00:19:14Z",
|
||||
"pushed_at": "2024-04-22T10:08:45Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 33,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T05:53:02Z",
|
||||
"updated_at": "2024-04-22T15:26:07Z",
|
||||
"updated_at": "2024-04-23T00:34:31Z",
|
||||
"pushed_at": "2024-04-16T21:00:14Z",
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 194,
|
||||
"watchers": 195,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC and Detection for CVE-2024-21626",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-01T15:28:37Z",
|
||||
"updated_at": "2024-04-22T14:03:20Z",
|
||||
"updated_at": "2024-04-22T20:22:26Z",
|
||||
"pushed_at": "2024-02-06T16:09:05Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-13T09:17:28Z",
|
||||
"updated_at": "2024-04-22T16:58:41Z",
|
||||
"updated_at": "2024-04-22T21:26:46Z",
|
||||
"pushed_at": "2024-03-16T00:35:12Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 90,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T19:40:59Z",
|
||||
"updated_at": "2024-04-12T04:31:49Z",
|
||||
"updated_at": "2024-04-22T19:58:10Z",
|
||||
"pushed_at": "2024-01-17T19:14:09Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
42
2024/CVE-2024-27199.json
Normal file
42
2024/CVE-2024-27199.json
Normal file
|
@ -0,0 +1,42 @@
|
|||
[
|
||||
{
|
||||
"id": 790442683,
|
||||
"name": "RCity-CVE-2024-27199",
|
||||
"full_name": "Stuub\/RCity-CVE-2024-27199",
|
||||
"owner": {
|
||||
"login": "Stuub",
|
||||
"id": 60468836,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4",
|
||||
"html_url": "https:\/\/github.com\/Stuub"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Stuub\/RCity-CVE-2024-27199",
|
||||
"description": "CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-22T22:14:24Z",
|
||||
"updated_at": "2024-04-22T23:21:25Z",
|
||||
"pushed_at": "2024-04-22T23:21:21Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"code-injection",
|
||||
"cve",
|
||||
"cve-2024-27199",
|
||||
"jetbrains",
|
||||
"owasp",
|
||||
"python",
|
||||
"python3",
|
||||
"rce",
|
||||
"teamcity"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-09T08:08:07Z",
|
||||
"updated_at": "2024-04-19T06:14:22Z",
|
||||
"updated_at": "2024-04-22T22:47:15Z",
|
||||
"pushed_at": "2024-04-13T09:02:39Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -1012,10 +1012,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-04-22T18:31:15Z",
|
||||
"updated_at": "2024-04-22T21:45:38Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3412,
|
||||
"watchers_count": 3412,
|
||||
"stargazers_count": 3414,
|
||||
"watchers_count": 3414,
|
||||
"has_discussions": false,
|
||||
"forks_count": 228,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,7 +1024,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 228,
|
||||
"watchers": 3412,
|
||||
"watchers": 3414,
|
||||
"score": 0,
|
||||
"subscribers_count": 36
|
||||
},
|
||||
|
|
|
@ -283,7 +283,7 @@
|
|||
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T14:18:08Z",
|
||||
"updated_at": "2024-04-22T16:55:16Z",
|
||||
"updated_at": "2024-04-22T21:37:50Z",
|
||||
"pushed_at": "2024-04-16T22:35:43Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
|
@ -313,10 +313,10 @@
|
|||
"description": "CVE-2024-3400-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T16:18:56Z",
|
||||
"updated_at": "2024-04-22T14:53:06Z",
|
||||
"updated_at": "2024-04-22T20:43:30Z",
|
||||
"pushed_at": "2024-04-22T08:50:27Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -325,7 +325,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 23,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
32
2024/CVE-2024-4040.json
Normal file
32
2024/CVE-2024-4040.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 790463482,
|
||||
"name": "CVE-2024-4040",
|
||||
"full_name": "qt2a23\/CVE-2024-4040",
|
||||
"owner": {
|
||||
"login": "qt2a23",
|
||||
"id": 153017777,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153017777?v=4",
|
||||
"html_url": "https:\/\/github.com\/qt2a23"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/qt2a23\/CVE-2024-4040",
|
||||
"description": "Exploit Tool to CrushFTP",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-22T23:30:28Z",
|
||||
"updated_at": "2024-04-22T23:40:28Z",
|
||||
"pushed_at": "2024-04-22T23:40:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
28
README.md
28
README.md
|
@ -411,6 +411,13 @@
|
|||
- [stronglier/CVE-2024-3400](https://github.com/stronglier/CVE-2024-3400)
|
||||
- [Kr0ff/cve-2024-3400](https://github.com/Kr0ff/cve-2024-3400)
|
||||
|
||||
### CVE-2024-4040 (2024-04-22)
|
||||
|
||||
<code>VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.\n
|
||||
</code>
|
||||
|
||||
- [qt2a23/CVE-2024-4040](https://github.com/qt2a23/CVE-2024-4040)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
||||
|
@ -1276,6 +1283,13 @@
|
|||
- [K3ysTr0K3R/CVE-2024-27198-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-27198-EXPLOIT)
|
||||
- [Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-](https://github.com/Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-)
|
||||
|
||||
### CVE-2024-27199 (2024-03-04)
|
||||
|
||||
<code>In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
|
||||
</code>
|
||||
|
||||
- [Stuub/RCity-CVE-2024-27199](https://github.com/Stuub/RCity-CVE-2024-27199)
|
||||
|
||||
### CVE-2024-27316 (2024-04-04)
|
||||
|
||||
<code>HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
|
||||
|
@ -1544,14 +1558,22 @@
|
|||
### CVE-2024-32205
|
||||
- [Lucky-lm/CVE-2024-32205](https://github.com/Lucky-lm/CVE-2024-32205)
|
||||
|
||||
### CVE-2024-32238
|
||||
### CVE-2024-32238 (2024-04-22)
|
||||
|
||||
<code>H3C ER8300G2-X is vulnerable to Incorrect Access Control. The password for the router's management system can be accessed via the management system page login interface.
|
||||
</code>
|
||||
|
||||
- [asdfjkl11/CVE-2024-32238](https://github.com/asdfjkl11/CVE-2024-32238)
|
||||
- [FuBoLuSec/CVE-2024-32238](https://github.com/FuBoLuSec/CVE-2024-32238)
|
||||
|
||||
### CVE-2024-32258
|
||||
- [liyansong2018/CVE-2024-32258](https://github.com/liyansong2018/CVE-2024-32258)
|
||||
|
||||
### CVE-2024-32399
|
||||
### CVE-2024-32399 (2024-04-22)
|
||||
|
||||
<code>Directory Traversal vulnerability in RaidenMAILD Mail Server v.4.9.4 and before allows a remote attacker to obtain sensitive information via the /webeditor/ component.
|
||||
</code>
|
||||
|
||||
- [NN0b0dy/CVE-2024-32399](https://github.com/NN0b0dy/CVE-2024-32399)
|
||||
|
||||
### CVE-2024-65230
|
||||
|
@ -21580,6 +21602,7 @@
|
|||
- [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer)
|
||||
- [nix-xin/vuln4japi](https://github.com/nix-xin/vuln4japi)
|
||||
- [maximofernandezriera/CVE-2021-44228](https://github.com/maximofernandezriera/CVE-2021-44228)
|
||||
- [mebibite/log4jhound](https://github.com/mebibite/log4jhound)
|
||||
- [jxerome/log4shell](https://github.com/jxerome/log4shell)
|
||||
- [solitarysp/Log4j-CVE-2021-44228](https://github.com/solitarysp/Log4j-CVE-2021-44228)
|
||||
- [atlassion/log4j-exploit-builder](https://github.com/atlassion/log4j-exploit-builder)
|
||||
|
@ -33735,6 +33758,7 @@
|
|||
- [yukar1z0e/CVE-2018-14847](https://github.com/yukar1z0e/CVE-2018-14847)
|
||||
- [hacker30468/Mikrotik-router-hack](https://github.com/hacker30468/Mikrotik-router-hack)
|
||||
- [babyshen/routeros-CVE-2018-14847-bytheway](https://github.com/babyshen/routeros-CVE-2018-14847-bytheway)
|
||||
- [K3ysTr0K3R/CVE-2018-14847-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2018-14847-EXPLOIT)
|
||||
|
||||
### CVE-2018-14879 (2019-10-03)
|
||||
|
||||
|
|
Loading…
Reference in a new issue