mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/04/09 00:28:55
This commit is contained in:
parent
41f6e61ab5
commit
85ea98893b
27 changed files with 230 additions and 98 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-05T10:02:37Z",
|
||||
"updated_at": "2021-01-05T10:03:39Z",
|
||||
"updated_at": "2024-04-08T18:48:05Z",
|
||||
"pushed_at": "2021-01-05T10:03:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -447,10 +447,10 @@
|
|||
"description": "Dirty Cow exploit - CVE-2016-5195",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-25T21:08:01Z",
|
||||
"updated_at": "2024-04-05T21:02:43Z",
|
||||
"updated_at": "2024-04-08T18:26:57Z",
|
||||
"pushed_at": "2021-04-08T11:35:12Z",
|
||||
"stargazers_count": 811,
|
||||
"watchers_count": 811,
|
||||
"stargazers_count": 812,
|
||||
"watchers_count": 812,
|
||||
"has_discussions": false,
|
||||
"forks_count": 427,
|
||||
"allow_forking": true,
|
||||
|
@ -463,7 +463,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 427,
|
||||
"watchers": 811,
|
||||
"watchers": 812,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
39
2020/CVE-2020-12641.json
Normal file
39
2020/CVE-2020-12641.json
Normal file
|
@ -0,0 +1,39 @@
|
|||
[
|
||||
{
|
||||
"id": 783899125,
|
||||
"name": "CVE-2020-12641",
|
||||
"full_name": "mbadanoiu\/CVE-2020-12641",
|
||||
"owner": {
|
||||
"login": "mbadanoiu",
|
||||
"id": 18383407,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18383407?v=4",
|
||||
"html_url": "https:\/\/github.com\/mbadanoiu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2020-12641",
|
||||
"description": "CVE-2020-12641: Command Injection via “_im_convert_path” Parameter in Roundcube Webmail",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-08T19:48:16Z",
|
||||
"updated_at": "2024-04-08T20:00:29Z",
|
||||
"pushed_at": "2024-04-08T19:57:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0-day",
|
||||
"cve",
|
||||
"cve-2020-12641",
|
||||
"cves",
|
||||
"remote-code-execution",
|
||||
"unauthenticated"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -470,10 +470,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2024-04-07T16:06:23Z",
|
||||
"updated_at": "2024-04-08T22:34:29Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 920,
|
||||
"watchers_count": 920,
|
||||
"stargazers_count": 921,
|
||||
"watchers_count": 921,
|
||||
"has_discussions": false,
|
||||
"forks_count": 236,
|
||||
"allow_forking": true,
|
||||
|
@ -482,7 +482,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 236,
|
||||
"watchers": 920,
|
||||
"watchers": 921,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -84,13 +84,13 @@
|
|||
"stargazers_count": 1910,
|
||||
"watchers_count": 1910,
|
||||
"has_discussions": false,
|
||||
"forks_count": 510,
|
||||
"forks_count": 511,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 510,
|
||||
"forks": 511,
|
||||
"watchers": 1910,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
|
@ -263,10 +263,10 @@
|
|||
"description": "PoC for CVE-2021-4034 dubbed pwnkit",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T01:34:44Z",
|
||||
"updated_at": "2024-01-30T07:24:57Z",
|
||||
"updated_at": "2024-04-08T21:13:40Z",
|
||||
"pushed_at": "2022-01-27T15:13:51Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -275,7 +275,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 110,
|
||||
"watchers": 111,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -48,10 +48,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2024-04-08T16:54:19Z",
|
||||
"updated_at": "2024-04-08T18:35:59Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 713,
|
||||
"watchers_count": 713,
|
||||
"stargazers_count": 714,
|
||||
"watchers_count": 714,
|
||||
"has_discussions": false,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
|
@ -60,7 +60,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 713,
|
||||
"watchers": 714,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-04T08:22:41Z",
|
||||
"updated_at": "2024-04-03T08:09:15Z",
|
||||
"updated_at": "2024-04-08T23:42:20Z",
|
||||
"pushed_at": "2022-08-19T09:04:09Z",
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 271,
|
||||
"watchers": 272,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 469,
|
||||
"watchers_count": 469,
|
||||
"has_discussions": false,
|
||||
"forks_count": 162,
|
||||
"forks_count": 163,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 162,
|
||||
"forks": 163,
|
||||
"watchers": 469,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Report and exploit of CVE-2023-36427",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T16:55:18Z",
|
||||
"updated_at": "2024-03-05T13:34:14Z",
|
||||
"updated_at": "2024-04-08T19:53:57Z",
|
||||
"pushed_at": "2023-11-22T15:31:34Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 88,
|
||||
"watchers": 89,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-04-08T16:55:12Z",
|
||||
"updated_at": "2024-04-08T23:28:57Z",
|
||||
"pushed_at": "2024-04-08T13:43:21Z",
|
||||
"stargazers_count": 358,
|
||||
"watchers_count": 358,
|
||||
"stargazers_count": 361,
|
||||
"watchers_count": 361,
|
||||
"has_discussions": false,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 358,
|
||||
"watchers": 361,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Fortinet FortiClient EMS SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-18T20:50:48Z",
|
||||
"updated_at": "2024-04-05T01:02:40Z",
|
||||
"updated_at": "2024-04-08T22:38:46Z",
|
||||
"pushed_at": "2024-03-20T20:42:41Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-04-08T18:20:38Z",
|
||||
"updated_at": "2024-04-08T23:41:35Z",
|
||||
"pushed_at": "2024-04-07T09:34:08Z",
|
||||
"stargazers_count": 1639,
|
||||
"watchers_count": 1639,
|
||||
"stargazers_count": 1655,
|
||||
"watchers_count": 1655,
|
||||
"has_discussions": false,
|
||||
"forks_count": 161,
|
||||
"forks_count": 162,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 161,
|
||||
"watchers": 1639,
|
||||
"forks": 162,
|
||||
"watchers": 1655,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The Poc for CVE-2024-20931",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-02T01:58:49Z",
|
||||
"updated_at": "2024-03-31T14:27:15Z",
|
||||
"updated_at": "2024-04-08T19:12:37Z",
|
||||
"pushed_at": "2024-02-02T02:05:01Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-08T01:15:21Z",
|
||||
"updated_at": "2024-04-08T01:15:22Z",
|
||||
"pushed_at": "2024-04-08T01:27:27Z",
|
||||
"updated_at": "2024-04-08T23:57:28Z",
|
||||
"pushed_at": "2024-04-08T23:59:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Privilege Escalation in Microsoft Exchange 2019",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-08T10:54:08Z",
|
||||
"updated_at": "2024-04-08T10:58:27Z",
|
||||
"updated_at": "2024-04-08T19:31:58Z",
|
||||
"pushed_at": "2024-04-08T10:58:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-08T13:30:53Z",
|
||||
"updated_at": "2024-04-08T13:30:53Z",
|
||||
"updated_at": "2024-04-08T19:31:47Z",
|
||||
"pushed_at": "2024-04-08T13:30:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-08T13:30:55Z",
|
||||
"updated_at": "2024-04-08T13:31:13Z",
|
||||
"updated_at": "2024-04-08T19:23:27Z",
|
||||
"pushed_at": "2024-04-08T13:30:57Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2024-23897",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-26T09:44:32Z",
|
||||
"updated_at": "2024-04-08T18:27:22Z",
|
||||
"updated_at": "2024-04-08T19:25:59Z",
|
||||
"pushed_at": "2024-01-28T06:47:28Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 162,
|
||||
"watchers": 163,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
32
2024/CVE-2024-2879.json
Normal file
32
2024/CVE-2024-2879.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 783878190,
|
||||
"name": "CVE-2024-2879",
|
||||
"full_name": "herculeszxc\/CVE-2024-2879",
|
||||
"owner": {
|
||||
"login": "herculeszxc",
|
||||
"id": 62851950,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62851950?v=4",
|
||||
"html_url": "https:\/\/github.com\/herculeszxc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/herculeszxc\/CVE-2024-2879",
|
||||
"description": "CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-08T18:50:02Z",
|
||||
"updated_at": "2024-04-08T19:16:31Z",
|
||||
"pushed_at": "2024-04-08T19:16:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-29399.json
Normal file
32
2024/CVE-2024-29399.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 783958528,
|
||||
"name": "CVE-2024-29399",
|
||||
"full_name": "ally-petitt\/CVE-2024-29399",
|
||||
"owner": {
|
||||
"login": "ally-petitt",
|
||||
"id": 76501220,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76501220?v=4",
|
||||
"html_url": "https:\/\/github.com\/ally-petitt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ally-petitt\/CVE-2024-29399",
|
||||
"description": "CVE-2024-29399 reference",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-08T23:03:04Z",
|
||||
"updated_at": "2024-04-08T23:04:23Z",
|
||||
"pushed_at": "2024-04-08T23:18:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -493,10 +493,10 @@
|
|||
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-30T22:07:24Z",
|
||||
"updated_at": "2024-04-08T15:35:07Z",
|
||||
"updated_at": "2024-04-08T23:38:04Z",
|
||||
"pushed_at": "2024-04-02T03:38:32Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -510,7 +510,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 113,
|
||||
"watchers": 114,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -1012,19 +1012,19 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-04-08T17:52:00Z",
|
||||
"updated_at": "2024-04-08T22:06:57Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3221,
|
||||
"watchers_count": 3221,
|
||||
"stargazers_count": 3225,
|
||||
"watchers_count": 3225,
|
||||
"has_discussions": false,
|
||||
"forks_count": 213,
|
||||
"forks_count": 214,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 213,
|
||||
"watchers": 3221,
|
||||
"forks": 214,
|
||||
"watchers": 3225,
|
||||
"score": 0,
|
||||
"subscribers_count": 32
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-31286: WordPress WP Photo Album Plus plugin < 8.6.03.005 - Arbitrary File Upload vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-08T10:12:03Z",
|
||||
"updated_at": "2024-04-08T10:58:42Z",
|
||||
"updated_at": "2024-04-08T19:31:54Z",
|
||||
"pushed_at": "2024-04-08T10:15:15Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-31345: WordPress Auto Poster plugin <= 1.2 - Arbitrary File Upload vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-08T08:01:15Z",
|
||||
"updated_at": "2024-04-08T10:58:46Z",
|
||||
"updated_at": "2024-04-08T19:31:50Z",
|
||||
"pushed_at": "2024-04-08T09:13:08Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit for CVE-2024-3273, supports single and multiple hosts",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-07T15:36:18Z",
|
||||
"updated_at": "2024-04-08T10:47:28Z",
|
||||
"updated_at": "2024-04-08T19:00:20Z",
|
||||
"pushed_at": "2024-04-07T15:41:42Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -74,7 +74,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-04-07T21:15:33Z",
|
||||
"updated_at": "2024-04-07T21:40:55Z",
|
||||
"pushed_at": "2024-04-07T22:02:49Z",
|
||||
"pushed_at": "2024-04-08T19:49:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
35
README.md
35
README.md
|
@ -234,6 +234,13 @@
|
|||
|
||||
- [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP)
|
||||
|
||||
### CVE-2024-2879 (2024-04-03)
|
||||
|
||||
<code>The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and 7.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
||||
</code>
|
||||
|
||||
- [herculeszxc/CVE-2024-2879](https://github.com/herculeszxc/CVE-2024-2879)
|
||||
|
||||
### CVE-2024-3094 (2024-03-29)
|
||||
|
||||
<code>Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. \r\nThrough a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
|
||||
|
@ -1151,13 +1158,25 @@
|
|||
|
||||
- [ioprojecton/dir-3040_dos](https://github.com/ioprojecton/dir-3040_dos)
|
||||
|
||||
### CVE-2024-27630
|
||||
### CVE-2024-27630 (2024-04-08)
|
||||
|
||||
<code>Insecure Direct Object Reference (IDOR) in GNU Savane v.3.12 and before allows a remote attacker to delete arbitrary files via crafted input to the trackers_data_delete_file function.
|
||||
</code>
|
||||
|
||||
- [ally-petitt/CVE-2024-27630](https://github.com/ally-petitt/CVE-2024-27630)
|
||||
|
||||
### CVE-2024-27631
|
||||
### CVE-2024-27631 (2024-04-08)
|
||||
|
||||
<code>Cross Site Request Forgery vulnerability in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via siteadmin/usergroup.php
|
||||
</code>
|
||||
|
||||
- [ally-petitt/CVE-2024-27631](https://github.com/ally-petitt/CVE-2024-27631)
|
||||
|
||||
### CVE-2024-27632
|
||||
### CVE-2024-27632 (2024-04-08)
|
||||
|
||||
<code>An issue in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via the form_id in the form_header() function.
|
||||
</code>
|
||||
|
||||
- [ally-petitt/CVE-2024-27632](https://github.com/ally-petitt/CVE-2024-27632)
|
||||
|
||||
### CVE-2024-27665
|
||||
|
@ -1266,6 +1285,9 @@
|
|||
|
||||
- [ismailcemunver/CVE-2024-29375](https://github.com/ismailcemunver/CVE-2024-29375)
|
||||
|
||||
### CVE-2024-29399
|
||||
- [ally-petitt/CVE-2024-29399](https://github.com/ally-petitt/CVE-2024-29399)
|
||||
|
||||
### CVE-2024-30614
|
||||
- [Lucky-lm/CVE-2024-30614](https://github.com/Lucky-lm/CVE-2024-30614)
|
||||
|
||||
|
@ -24604,6 +24626,13 @@
|
|||
|
||||
- [mkelepce/CVE-2020-12629](https://github.com/mkelepce/CVE-2020-12629)
|
||||
|
||||
### CVE-2020-12641 (2020-05-04)
|
||||
|
||||
<code>rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
|
||||
</code>
|
||||
|
||||
- [mbadanoiu/CVE-2020-12641](https://github.com/mbadanoiu/CVE-2020-12641)
|
||||
|
||||
### CVE-2020-12688
|
||||
- [TheCyberGeek/Centreon-20.04](https://github.com/TheCyberGeek/Centreon-20.04)
|
||||
|
||||
|
|
Loading…
Reference in a new issue