mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/08/05 06:29:19
This commit is contained in:
parent
4ae689db99
commit
86a2ca259e
38 changed files with 206 additions and 334 deletions
|
@ -263,10 +263,10 @@
|
|||
"description": "A CVE-2016-5195 exploit example.",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-23T00:16:33Z",
|
||||
"updated_at": "2024-07-24T02:21:49Z",
|
||||
"updated_at": "2024-08-05T04:13:50Z",
|
||||
"pushed_at": "2017-03-21T16:46:38Z",
|
||||
"stargazers_count": 311,
|
||||
"watchers_count": 311,
|
||||
"stargazers_count": 312,
|
||||
"watchers_count": 312,
|
||||
"has_discussions": false,
|
||||
"forks_count": 120,
|
||||
"allow_forking": true,
|
||||
|
@ -279,7 +279,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 120,
|
||||
"watchers": 311,
|
||||
"watchers": 312,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-08-03T05:09:05Z",
|
||||
"updated_at": "2024-08-05T04:20:27Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4074,
|
||||
"watchers_count": 4074,
|
||||
"stargazers_count": 4075,
|
||||
"watchers_count": 4075,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1087,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1087,
|
||||
"watchers": 4074,
|
||||
"watchers": 4075,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -818,10 +818,10 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T15:20:25Z",
|
||||
"updated_at": "2023-07-25T14:32:15Z",
|
||||
"updated_at": "2024-08-05T03:06:48Z",
|
||||
"pushed_at": "2020-03-25T05:07:43Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -830,7 +830,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-08-03T05:09:05Z",
|
||||
"updated_at": "2024-08-05T04:20:27Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4074,
|
||||
"watchers_count": 4074,
|
||||
"stargazers_count": 4075,
|
||||
"watchers_count": 4075,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1087,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1087,
|
||||
"watchers": 4074,
|
||||
"watchers": 4075,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 16,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
32
2020/CVE-2020-29661.json
Normal file
32
2020/CVE-2020-29661.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 838190475,
|
||||
"name": "arm-CVE-2020-29661",
|
||||
"full_name": "wojkos9\/arm-CVE-2020-29661",
|
||||
"owner": {
|
||||
"login": "wojkos9",
|
||||
"id": 38809282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38809282?v=4",
|
||||
"html_url": "https:\/\/github.com\/wojkos9"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wojkos9\/arm-CVE-2020-29661",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-08-05T06:15:26Z",
|
||||
"updated_at": "2024-08-05T06:18:53Z",
|
||||
"pushed_at": "2024-08-05T06:18:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-24917 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-20T06:36:13Z",
|
||||
"updated_at": "2024-06-02T20:57:45Z",
|
||||
"updated_at": "2024-08-05T00:43:07Z",
|
||||
"pushed_at": "2024-01-20T06:37:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "海康威视RCE漏洞 批量检测和利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-03T17:27:59Z",
|
||||
"updated_at": "2024-07-29T10:57:10Z",
|
||||
"updated_at": "2024-08-05T05:51:11Z",
|
||||
"pushed_at": "2022-08-05T19:57:30Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -148,7 +148,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 133,
|
||||
"watchers": 134,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -2076,10 +2076,10 @@
|
|||
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T01:24:51Z",
|
||||
"updated_at": "2024-08-03T01:09:33Z",
|
||||
"updated_at": "2024-08-05T02:48:58Z",
|
||||
"pushed_at": "2022-10-24T02:25:53Z",
|
||||
"stargazers_count": 496,
|
||||
"watchers_count": 496,
|
||||
"stargazers_count": 495,
|
||||
"watchers_count": 495,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -2088,7 +2088,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 496,
|
||||
"watchers": 495,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
@ -3068,7 +3068,7 @@
|
|||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -3078,7 +3078,7 @@
|
|||
"spring-boot-log4j"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"forks": 20,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
@ -3606,10 +3606,10 @@
|
|||
"description": "OpenIOC rules to facilitate hunting for indicators of compromise",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:55:32Z",
|
||||
"updated_at": "2022-07-22T10:52:24Z",
|
||||
"updated_at": "2024-08-05T03:09:51Z",
|
||||
"pushed_at": "2022-01-07T14:25:33Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -3618,7 +3618,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2022-0492 EXP and Analysis write up",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-11T08:02:46Z",
|
||||
"updated_at": "2024-05-23T02:59:35Z",
|
||||
"updated_at": "2024-08-05T06:20:36Z",
|
||||
"pushed_at": "2022-03-11T09:33:24Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "cve-2022-23131 exp",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-18T08:38:53Z",
|
||||
"updated_at": "2024-05-31T12:26:12Z",
|
||||
"updated_at": "2024-08-05T02:01:50Z",
|
||||
"pushed_at": "2022-02-21T04:27:48Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -135,10 +135,10 @@
|
|||
"description": "This repository contains a PoC for remote code execution CVE-2022-26809",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T20:54:26Z",
|
||||
"updated_at": "2023-12-12T15:50:11Z",
|
||||
"updated_at": "2024-08-05T04:35:37Z",
|
||||
"pushed_at": "2022-04-25T20:38:57Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -147,7 +147,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Zimbra <9.0.0.p27 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-11T20:58:08Z",
|
||||
"updated_at": "2024-07-08T09:31:38Z",
|
||||
"updated_at": "2024-08-05T01:23:08Z",
|
||||
"pushed_at": "2022-11-24T14:59:35Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -62,7 +62,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 102,
|
||||
"watchers": 103,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -586,10 +586,10 @@
|
|||
"description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-26T02:34:44Z",
|
||||
"updated_at": "2024-06-07T14:56:33Z",
|
||||
"updated_at": "2024-08-05T01:10:21Z",
|
||||
"pushed_at": "2024-04-24T02:34:16Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -598,7 +598,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -57,6 +57,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -172,10 +172,10 @@
|
|||
"description": "RCE exploit for CVE-2023-3519",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-21T20:17:43Z",
|
||||
"updated_at": "2024-08-04T18:39:53Z",
|
||||
"updated_at": "2024-08-05T03:42:33Z",
|
||||
"pushed_at": "2023-08-23T16:27:28Z",
|
||||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -184,7 +184,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 215,
|
||||
"watchers": 216,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-29T17:08:05Z",
|
||||
"updated_at": "2024-04-27T08:41:16Z",
|
||||
"updated_at": "2024-08-05T05:38:22Z",
|
||||
"pushed_at": "2024-01-30T05:58:08Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -174,10 +174,10 @@
|
|||
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-28T04:56:10Z",
|
||||
"updated_at": "2024-08-04T01:00:38Z",
|
||||
"updated_at": "2024-08-05T01:55:07Z",
|
||||
"pushed_at": "2024-08-04T01:00:35Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -186,7 +186,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-08-04T05:26:07Z",
|
||||
"updated_at": "2024-08-05T06:03:05Z",
|
||||
"pushed_at": "2024-07-24T13:17:05Z",
|
||||
"stargazers_count": 1038,
|
||||
"watchers_count": 1038,
|
||||
"stargazers_count": 1039,
|
||||
"watchers_count": 1039,
|
||||
"has_discussions": false,
|
||||
"forks_count": 176,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 176,
|
||||
"watchers": 1038,
|
||||
"watchers": 1039,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T22:04:23Z",
|
||||
"updated_at": "2024-07-22T08:16:36Z",
|
||||
"updated_at": "2024-08-05T02:49:57Z",
|
||||
"pushed_at": "2023-10-15T19:37:06Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 742312591,
|
||||
"name": "CVE-2023-7028",
|
||||
"full_name": "V1lu0\/CVE-2023-7028",
|
||||
"owner": {
|
||||
"login": "V1lu0",
|
||||
"id": 33352530,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33352530?v=4",
|
||||
"html_url": "https:\/\/github.com\/V1lu0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/V1lu0\/CVE-2023-7028",
|
||||
"description": "CVE-2023-7028 poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-12T07:42:02Z",
|
||||
"updated_at": "2024-05-29T08:10:49Z",
|
||||
"pushed_at": "2024-05-03T06:05:46Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 742381856,
|
||||
"name": "CVE-2023-7028",
|
||||
|
@ -62,6 +32,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 742443954,
|
||||
"name": "CVE-2023-7028",
|
||||
"full_name": "googlei1996\/CVE-2023-7028",
|
||||
"owner": {
|
||||
"login": "googlei1996",
|
||||
"id": 101400530,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101400530?v=4",
|
||||
"html_url": "https:\/\/github.com\/googlei1996"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/googlei1996\/CVE-2023-7028",
|
||||
"description": "CVE-2023-7028 poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-12T13:47:37Z",
|
||||
"updated_at": "2024-01-12T13:47:37Z",
|
||||
"pushed_at": "2024-01-12T08:58:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 742480461,
|
||||
"name": "CVE-2023-7028",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "a demo poc for CVE-2024-0015",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-19T10:00:21Z",
|
||||
"updated_at": "2024-06-25T06:22:28Z",
|
||||
"updated_at": "2024-08-05T05:51:58Z",
|
||||
"pushed_at": "2024-03-19T10:05:07Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T12:30:53Z",
|
||||
"updated_at": "2024-08-04T12:32:27Z",
|
||||
"updated_at": "2024-08-05T03:07:12Z",
|
||||
"pushed_at": "2024-07-25T18:12:57Z",
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 175,
|
||||
"watchers": 177,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -207,6 +207,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-21006 exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T06:25:14Z",
|
||||
"updated_at": "2024-08-04T03:28:26Z",
|
||||
"updated_at": "2024-08-05T05:25:08Z",
|
||||
"pushed_at": "2024-07-29T19:39:15Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -163,12 +163,12 @@
|
|||
"description": "Windows AppLocker Driver (appid.sys) LPE",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-29T13:18:06Z",
|
||||
"updated_at": "2024-08-04T02:34:37Z",
|
||||
"updated_at": "2024-08-05T02:58:42Z",
|
||||
"pushed_at": "2024-07-29T13:29:59Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -179,8 +179,8 @@
|
|||
"windowd"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-13T09:17:28Z",
|
||||
"updated_at": "2024-07-29T03:59:00Z",
|
||||
"updated_at": "2024-08-05T06:04:28Z",
|
||||
"pushed_at": "2024-03-16T00:35:12Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -875,35 +875,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 833465280,
|
||||
"name": "CVE-2024-23897",
|
||||
"full_name": "AnastasiaStill\/CVE-2024-23897",
|
||||
"owner": {
|
||||
"login": "AnastasiaStill",
|
||||
"id": 176557424,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176557424?v=4",
|
||||
"html_url": "https:\/\/github.com\/AnastasiaStill"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AnastasiaStill\/CVE-2024-23897",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-25T05:42:11Z",
|
||||
"updated_at": "2024-07-25T05:52:15Z",
|
||||
"pushed_at": "2024-07-25T05:52:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T17:02:03Z",
|
||||
"updated_at": "2024-08-05T00:05:18Z",
|
||||
"updated_at": "2024-08-05T01:39:17Z",
|
||||
"pushed_at": "2024-07-04T10:39:15Z",
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"stargazers_count": 288,
|
||||
"watchers_count": 288,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 287,
|
||||
"watchers": 288,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -133,20 +133,20 @@
|
|||
"description": "A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a privileged user",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-04T17:40:51Z",
|
||||
"updated_at": "2024-08-04T21:04:58Z",
|
||||
"updated_at": "2024-08-05T06:25:02Z",
|
||||
"pushed_at": "2024-08-04T21:04:55Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-27804",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T14:17:06Z",
|
||||
"updated_at": "2024-07-14T06:02:41Z",
|
||||
"updated_at": "2024-08-05T00:45:36Z",
|
||||
"pushed_at": "2024-05-14T14:55:23Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 125,
|
||||
"watchers": 126,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-11T10:14:39Z",
|
||||
"updated_at": "2024-07-27T13:29:46Z",
|
||||
"updated_at": "2024-08-05T01:18:59Z",
|
||||
"pushed_at": "2024-03-25T12:56:16Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Exploit PoC for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T19:33:08Z",
|
||||
"updated_at": "2024-08-04T00:57:16Z",
|
||||
"updated_at": "2024-08-05T03:41:15Z",
|
||||
"pushed_at": "2024-05-19T07:12:00Z",
|
||||
"stargazers_count": 481,
|
||||
"watchers_count": 481,
|
||||
"stargazers_count": 483,
|
||||
"watchers_count": 483,
|
||||
"has_discussions": false,
|
||||
"forks_count": 141,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 141,
|
||||
"watchers": 481,
|
||||
"watchers": 483,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-3495 Country State City Dropdown CF7 <= 2.7.2 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-23T02:41:15Z",
|
||||
"updated_at": "2024-06-26T12:03:33Z",
|
||||
"updated_at": "2024-08-05T05:08:13Z",
|
||||
"pushed_at": "2024-05-24T15:27:43Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1,62 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 837993502,
|
||||
"name": "CVE-2024-4514",
|
||||
"full_name": "W1hithat\/CVE-2024-4514",
|
||||
"owner": {
|
||||
"login": "W1hithat",
|
||||
"id": 175875975,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175875975?v=4",
|
||||
"html_url": "https:\/\/github.com\/W1hithat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/W1hithat\/CVE-2024-4514",
|
||||
"description": "WordPress Core <= 6.6.1 - Authenticated Arbitrary File Upload (CVE-2024-4514) - Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-04T16:29:04Z",
|
||||
"updated_at": "2024-08-04T16:29:05Z",
|
||||
"pushed_at": "2024-08-04T16:29:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 837999388,
|
||||
"name": "-CVE-2024-4514-",
|
||||
"full_name": "AnastasiaStill\/-CVE-2024-4514-",
|
||||
"owner": {
|
||||
"login": "AnastasiaStill",
|
||||
"id": 176557424,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176557424?v=4",
|
||||
"html_url": "https:\/\/github.com\/AnastasiaStill"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AnastasiaStill\/-CVE-2024-4514-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-08-04T16:48:33Z",
|
||||
"updated_at": "2024-08-04T16:49:00Z",
|
||||
"pushed_at": "2024-08-04T16:48:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -754,10 +754,10 @@
|
|||
"description": "CVE-2024-4577",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-12T04:50:25Z",
|
||||
"updated_at": "2024-06-13T19:21:47Z",
|
||||
"updated_at": "2024-08-05T02:28:28Z",
|
||||
"pushed_at": "2024-06-12T10:30:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -766,7 +766,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "a signal handler race condition in OpenSSH's server (sshd)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T10:55:29Z",
|
||||
"updated_at": "2024-08-04T19:08:31Z",
|
||||
"updated_at": "2024-08-05T04:01:03Z",
|
||||
"pushed_at": "2024-07-01T10:54:02Z",
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"has_discussions": false,
|
||||
"forks_count": 181,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 181,
|
||||
"watchers": 443,
|
||||
"watchers": 444,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -2639,36 +2639,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 830187084,
|
||||
"name": "CVE-2024-6387",
|
||||
"full_name": "W1hithat\/CVE-2024-6387",
|
||||
"owner": {
|
||||
"login": "W1hithat",
|
||||
"id": 175875975,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175875975?v=4",
|
||||
"html_url": "https:\/\/github.com\/W1hithat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/W1hithat\/CVE-2024-6387",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-17T19:14:11Z",
|
||||
"updated_at": "2024-07-29T20:18:53Z",
|
||||
"pushed_at": "2024-07-17T19:14:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 833415966,
|
||||
"name": "CVE-2024-6387",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 835079866,
|
||||
"name": "CVE-2024-81757-Apache-web-server-2.4.61",
|
||||
"full_name": "AnastasiaStill\/CVE-2024-81757-Apache-web-server-2.4.61",
|
||||
"owner": {
|
||||
"login": "AnastasiaStill",
|
||||
"id": 176557424,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176557424?v=4",
|
||||
"html_url": "https:\/\/github.com\/AnastasiaStill"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AnastasiaStill\/CVE-2024-81757-Apache-web-server-2.4.61",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-29T05:54:39Z",
|
||||
"updated_at": "2024-07-31T07:03:50Z",
|
||||
"pushed_at": "2024-07-29T06:05:22Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
22
README.md
22
README.md
|
@ -747,14 +747,6 @@
|
|||
|
||||
- [Abo5/CVE-2024-4484](https://github.com/Abo5/CVE-2024-4484)
|
||||
|
||||
### CVE-2024-4514 (2024-05-06)
|
||||
|
||||
<code>Es wurde eine Schwachstelle in Campcodes Complete Web-Based School Management System 1.0 gefunden. Sie wurde als problematisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei /view/timetable_insert_form.php. Durch das Beeinflussen des Arguments grade mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
|
||||
</code>
|
||||
|
||||
- [W1hithat/CVE-2024-4514](https://github.com/W1hithat/CVE-2024-4514)
|
||||
- [AnastasiaStill/-CVE-2024-4514-](https://github.com/AnastasiaStill/-CVE-2024-4514-)
|
||||
|
||||
### CVE-2024-4577 (2024-06-09)
|
||||
|
||||
<code>In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
|
||||
|
@ -1095,7 +1087,6 @@
|
|||
- [k4t3pr0/CVE-2024-6387-Check](https://github.com/k4t3pr0/CVE-2024-6387-Check)
|
||||
- [Jhonsonwannaa/CVE-2024-6387](https://github.com/Jhonsonwannaa/CVE-2024-6387)
|
||||
- [ThatNotEasy/CVE-2024-6387](https://github.com/ThatNotEasy/CVE-2024-6387)
|
||||
- [W1hithat/CVE-2024-6387](https://github.com/W1hithat/CVE-2024-6387)
|
||||
- [prelearn-code/CVE-2024-6387](https://github.com/prelearn-code/CVE-2024-6387)
|
||||
- [l-urk/CVE-2024-6387-L](https://github.com/l-urk/CVE-2024-6387-L)
|
||||
- [alex14324/ssh_poc2024](https://github.com/alex14324/ssh_poc2024)
|
||||
|
@ -1828,7 +1819,6 @@
|
|||
- [mil4ne/CVE-2024-23897-Jenkins-4.441](https://github.com/mil4ne/CVE-2024-23897-Jenkins-4.441)
|
||||
- [Maalfer/CVE-2024-23897](https://github.com/Maalfer/CVE-2024-23897)
|
||||
- [Surko888/Surko-Exploit-Jenkins-CVE-2024-23897](https://github.com/Surko888/Surko-Exploit-Jenkins-CVE-2024-23897)
|
||||
- [AnastasiaStill/CVE-2024-23897](https://github.com/AnastasiaStill/CVE-2024-23897)
|
||||
|
||||
### CVE-2024-24034 (2024-02-08)
|
||||
|
||||
|
@ -3945,9 +3935,6 @@
|
|||
### CVE-2024-65230
|
||||
- [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230)
|
||||
|
||||
### CVE-2024-81757
|
||||
- [AnastasiaStill/CVE-2024-81757-Apache-web-server-2.4.61](https://github.com/AnastasiaStill/CVE-2024-81757-Apache-web-server-2.4.61)
|
||||
|
||||
### CVE-2024-206565
|
||||
- [sanderswannalive/sumkaluissessss](https://github.com/sanderswannalive/sumkaluissessss)
|
||||
|
||||
|
@ -5366,8 +5353,8 @@
|
|||
<code>An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
|
||||
</code>
|
||||
|
||||
- [V1lu0/CVE-2023-7028](https://github.com/V1lu0/CVE-2023-7028)
|
||||
- [RandomRobbieBF/CVE-2023-7028](https://github.com/RandomRobbieBF/CVE-2023-7028)
|
||||
- [googlei1996/CVE-2023-7028](https://github.com/googlei1996/CVE-2023-7028)
|
||||
- [duy-31/CVE-2023-7028](https://github.com/duy-31/CVE-2023-7028)
|
||||
- [Vozec/CVE-2023-7028](https://github.com/Vozec/CVE-2023-7028)
|
||||
- [yoryio/CVE-2023-7028](https://github.com/yoryio/CVE-2023-7028)
|
||||
|
@ -30441,6 +30428,13 @@
|
|||
- [0xAbbarhSF/CVE-2020-29607](https://github.com/0xAbbarhSF/CVE-2020-29607)
|
||||
- [0xN7y/CVE-2020-29607](https://github.com/0xN7y/CVE-2020-29607)
|
||||
|
||||
### CVE-2020-29661 (2020-12-09)
|
||||
|
||||
<code>A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
|
||||
</code>
|
||||
|
||||
- [wojkos9/arm-CVE-2020-29661](https://github.com/wojkos9/arm-CVE-2020-29661)
|
||||
|
||||
### CVE-2020-29666 (2020-12-10)
|
||||
|
||||
<code>In Lan ATMService M3 ATM Monitoring System 6.1.0, due to a directory-listing vulnerability, a remote attacker can view log files, located in /websocket/logs/, that contain a user's cookie values and the predefined developer's cookie value.
|
||||
|
|
Loading…
Reference in a new issue