mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/11/21 00:31:25
This commit is contained in:
parent
2ec3f6652f
commit
8bdc3b8f5d
31 changed files with 183 additions and 98 deletions
|
@ -14,10 +14,10 @@
|
|||
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T18:59:28Z",
|
||||
"updated_at": "2024-11-15T18:13:01Z",
|
||||
"updated_at": "2024-11-20T23:14:34Z",
|
||||
"pushed_at": "2021-06-06T09:41:51Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -45,7 +45,7 @@
|
|||
"description": "CVE-2015-1805 root tool",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-01T12:10:14Z",
|
||||
"updated_at": "2024-11-09T15:25:05Z",
|
||||
"updated_at": "2024-11-20T19:18:22Z",
|
||||
"pushed_at": "2017-11-23T20:55:03Z",
|
||||
"stargazers_count": 270,
|
||||
"watchers_count": 270,
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
"forks": 24,
|
||||
"watchers": 193,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 176323109,
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "proof of Concept (PoC) exploit for CVE-2021-31630, targeting the OpenPLC service running on the WifineticTwo box on the Hack The Box platform.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T22:02:53Z",
|
||||
"updated_at": "2024-07-21T09:16:48Z",
|
||||
"updated_at": "2024-11-20T19:01:18Z",
|
||||
"pushed_at": "2024-03-21T15:50:45Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -983,7 +983,7 @@
|
|||
"forks": 189,
|
||||
"watchers": 1085,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
"subscribers_count": 13
|
||||
},
|
||||
{
|
||||
"id": 452311547,
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T21:36:09Z",
|
||||
"updated_at": "2024-11-20T16:53:56Z",
|
||||
"pushed_at": "2024-11-20T16:53:53Z",
|
||||
"updated_at": "2024-11-20T21:59:11Z",
|
||||
"pushed_at": "2024-11-20T21:59:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -355,10 +355,10 @@
|
|||
"description": "Bulk scanner + get config from CVE-2023-23752",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-09T07:42:03Z",
|
||||
"updated_at": "2024-10-29T17:33:43Z",
|
||||
"updated_at": "2024-11-20T20:36:15Z",
|
||||
"pushed_at": "2023-03-14T06:39:36Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -371,7 +371,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -77,7 +77,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-04-17T13:36:34Z",
|
||||
"updated_at": "2024-10-30T14:55:15Z",
|
||||
"pushed_at": "2024-11-19T22:32:11Z",
|
||||
"pushed_at": "2024-11-20T22:21:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -15,7 +15,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-09-16T09:11:21Z",
|
||||
"updated_at": "2024-11-16T19:51:18Z",
|
||||
"pushed_at": "2024-10-30T16:03:04Z",
|
||||
"pushed_at": "2024-11-20T18:53:14Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-16T17:41:59Z",
|
||||
"updated_at": "2024-05-29T16:36:38Z",
|
||||
"updated_at": "2024-11-20T21:28:27Z",
|
||||
"pushed_at": "2023-11-16T17:44:39Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T08:29:32Z",
|
||||
"updated_at": "2024-11-20T13:34:00Z",
|
||||
"updated_at": "2024-11-20T22:26:03Z",
|
||||
"pushed_at": "2024-11-19T09:28:42Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-11-19T06:53:09Z",
|
||||
"updated_at": "2024-11-20T19:32:20Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2281,
|
||||
"watchers_count": 2281,
|
||||
"stargazers_count": 2282,
|
||||
"watchers_count": 2282,
|
||||
"has_discussions": false,
|
||||
"forks_count": 298,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 298,
|
||||
"watchers": 2281,
|
||||
"watchers": 2282,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -181,10 +181,10 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/julesbsz\/CVE-2024-10924",
|
||||
"description": null,
|
||||
"description": "POC for CVE-2024-10924 written in Python",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-20T13:13:15Z",
|
||||
"updated_at": "2024-11-20T14:00:15Z",
|
||||
"updated_at": "2024-11-20T19:40:44Z",
|
||||
"pushed_at": "2024-11-20T14:00:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -193,7 +193,12 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve-2024-10924",
|
||||
"python",
|
||||
"really-simple-security",
|
||||
"wordpress"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T05:53:02Z",
|
||||
"updated_at": "2024-11-11T07:17:27Z",
|
||||
"updated_at": "2024-11-20T18:54:05Z",
|
||||
"pushed_at": "2024-04-16T21:00:14Z",
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"stargazers_count": 284,
|
||||
"watchers_count": 284,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 283,
|
||||
"watchers": 284,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -517,10 +517,10 @@
|
|||
"description": "Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-04T20:56:42Z",
|
||||
"updated_at": "2024-10-29T18:35:47Z",
|
||||
"updated_at": "2024-11-20T20:01:17Z",
|
||||
"pushed_at": "2024-02-05T14:10:26Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": true,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -529,7 +529,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 20,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "macOS\/ XNU kernel buffer overflow. Introduced in macOS 14.0 (xnu-10002.1.13), fixed in macOS 14.5 (xnu-10063.121.3)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-19T22:03:02Z",
|
||||
"updated_at": "2024-10-16T12:56:44Z",
|
||||
"updated_at": "2024-11-21T00:13:10Z",
|
||||
"pushed_at": "2024-06-20T17:23:22Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 30,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-22T16:50:40Z",
|
||||
"updated_at": "2024-09-08T14:08:09Z",
|
||||
"pushed_at": "2024-04-05T12:58:26Z",
|
||||
"updated_at": "2024-11-20T23:58:06Z",
|
||||
"pushed_at": "2024-11-20T23:58:03Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -45,12 +45,12 @@
|
|||
"description": "Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。) ",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-15T07:23:47Z",
|
||||
"updated_at": "2024-11-20T16:31:07Z",
|
||||
"updated_at": "2024-11-20T19:21:13Z",
|
||||
"pushed_at": "2024-11-19T05:55:15Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -60,7 +60,7 @@
|
|||
"lpe"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -420,10 +420,10 @@
|
|||
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-31T13:56:26Z",
|
||||
"updated_at": "2024-11-07T07:03:40Z",
|
||||
"updated_at": "2024-11-20T19:42:32Z",
|
||||
"pushed_at": "2024-11-02T09:01:42Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -432,7 +432,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "poc code for CVE-2024-38080",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-01T11:25:22Z",
|
||||
"updated_at": "2024-11-20T16:31:03Z",
|
||||
"updated_at": "2024-11-20T18:43:04Z",
|
||||
"pushed_at": "2024-09-01T11:35:25Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Nuclei template to detect Apache servers vulnerable to CVE-2024-38473",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-23T14:39:31Z",
|
||||
"updated_at": "2024-11-20T08:05:33Z",
|
||||
"updated_at": "2024-11-20T22:45:58Z",
|
||||
"pushed_at": "2024-08-24T22:42:42Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -50,8 +50,8 @@
|
|||
"description": "Unauthenticated Remote Code Execution via Angular-Base64-Upload Library (npm:bower)",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T23:54:30Z",
|
||||
"updated_at": "2024-11-20T11:09:57Z",
|
||||
"pushed_at": "2024-11-19T23:58:17Z",
|
||||
"updated_at": "2024-11-20T22:15:15Z",
|
||||
"pushed_at": "2024-11-20T22:15:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-44258",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-29T09:45:03Z",
|
||||
"updated_at": "2024-11-20T14:39:02Z",
|
||||
"updated_at": "2024-11-20T23:55:41Z",
|
||||
"pushed_at": "2024-11-02T19:20:44Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 51,
|
||||
"watchers": 53,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439) in WordPress Core versions up to 6.5.1.",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-06T09:07:36Z",
|
||||
"updated_at": "2024-11-08T04:04:22Z",
|
||||
"updated_at": "2024-11-20T23:45:41Z",
|
||||
"pushed_at": "2024-05-06T09:09:18Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
33
2024/CVE-2024-48990.json
Normal file
33
2024/CVE-2024-48990.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 891671184,
|
||||
"name": "CVE-2024-48990-PoC",
|
||||
"full_name": "makuga01\/CVE-2024-48990-PoC",
|
||||
"owner": {
|
||||
"login": "makuga01",
|
||||
"id": 20490978,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20490978?v=4",
|
||||
"html_url": "https:\/\/github.com\/makuga01",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/makuga01\/CVE-2024-48990-PoC",
|
||||
"description": "PoC for CVE-2024-48990",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-20T18:41:25Z",
|
||||
"updated_at": "2024-11-20T18:49:37Z",
|
||||
"pushed_at": "2024-11-20T18:49:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-08T12:42:59Z",
|
||||
"updated_at": "2024-11-20T13:54:20Z",
|
||||
"updated_at": "2024-11-20T21:49:50Z",
|
||||
"pushed_at": "2024-10-16T12:45:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -11,15 +11,15 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ebrasha\/abdal-anydesk-remote-ip-detector",
|
||||
"description": "CVE-2024-52940 - A critical zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.",
|
||||
"description": "CVE-2024-52940 - A zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T15:29:56Z",
|
||||
"updated_at": "2024-11-20T16:19:21Z",
|
||||
"updated_at": "2024-11-21T00:17:23Z",
|
||||
"pushed_at": "2024-11-18T15:09:32Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -37,8 +37,8 @@
|
|||
"zero-day-vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 5,
|
||||
"forks": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "A PoC tool for exploiting CVE-2024-7029 in AvTech devices, enabling RCE, vulnerability scanning, and an interactive shell.",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-02T10:16:49Z",
|
||||
"updated_at": "2024-09-11T10:45:21Z",
|
||||
"updated_at": "2024-11-20T19:07:31Z",
|
||||
"pushed_at": "2024-09-02T11:43:07Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": true,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -66,7 +66,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "PAN-OS auth bypass + RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T17:26:27Z",
|
||||
"updated_at": "2024-11-20T16:39:47Z",
|
||||
"updated_at": "2024-11-20T22:42:11Z",
|
||||
"pushed_at": "2024-11-19T17:38:29Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 10,
|
||||
"forks": 12,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -60,5 +60,36 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 891754275,
|
||||
"name": "CVE-2024-9474",
|
||||
"full_name": "deathvu\/CVE-2024-9474",
|
||||
"owner": {
|
||||
"login": "deathvu",
|
||||
"id": 47398055,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47398055?v=4",
|
||||
"html_url": "https:\/\/github.com\/deathvu",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/deathvu\/CVE-2024-9474",
|
||||
"description": "PoC for PAN-OS Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-20T22:31:50Z",
|
||||
"updated_at": "2024-11-20T22:35:13Z",
|
||||
"pushed_at": "2024-11-20T22:35:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
20
README.md
20
README.md
|
@ -1838,6 +1838,7 @@
|
|||
|
||||
- [Chocapikk/CVE-2024-9474](https://github.com/Chocapikk/CVE-2024-9474)
|
||||
- [k4nfr3/CVE-2024-9474](https://github.com/k4nfr3/CVE-2024-9474)
|
||||
- [deathvu/CVE-2024-9474](https://github.com/deathvu/CVE-2024-9474)
|
||||
|
||||
### CVE-2024-9570 (2024-10-07)
|
||||
|
||||
|
@ -6512,6 +6513,13 @@
|
|||
|
||||
- [BrotherOfJhonny/CVE-2024-48955_Overview](https://github.com/BrotherOfJhonny/CVE-2024-48955_Overview)
|
||||
|
||||
### CVE-2024-48990 (2024-11-19)
|
||||
|
||||
<code>Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.
|
||||
</code>
|
||||
|
||||
- [makuga01/CVE-2024-48990-PoC](https://github.com/makuga01/CVE-2024-48990-PoC)
|
||||
|
||||
### CVE-2024-49039 (2024-11-12)
|
||||
|
||||
<code>Windows Task Scheduler Elevation of Privilege Vulnerability
|
||||
|
@ -6519,7 +6527,11 @@
|
|||
|
||||
- [je5442804/WPTaskScheduler_CVE-2024-49039](https://github.com/je5442804/WPTaskScheduler_CVE-2024-49039)
|
||||
|
||||
### CVE-2024-49203
|
||||
### CVE-2024-49203 (2024-11-20)
|
||||
|
||||
<code>Querydsl 5.1.0 allows SQL/HQL injection in orderBy in JPAQuery.
|
||||
</code>
|
||||
|
||||
- [CSIRTTrizna/CVE-2024-49203](https://github.com/CSIRTTrizna/CVE-2024-49203)
|
||||
|
||||
### CVE-2024-49328 (2024-10-20)
|
||||
|
@ -6876,7 +6888,11 @@
|
|||
- [famixcm/CVE-2024-52316](https://github.com/famixcm/CVE-2024-52316)
|
||||
- [TAM-K592/CVE-2024-52316](https://github.com/TAM-K592/CVE-2024-52316)
|
||||
|
||||
### CVE-2024-52677
|
||||
### CVE-2024-52677 (2024-11-20)
|
||||
|
||||
<code>HkCms <= v2.3.2.240702 is vulnerable to file upload in the getFileName method in /app/common/library/Upload.php.
|
||||
</code>
|
||||
|
||||
- [J-0k3r/CVE-2024-52677](https://github.com/J-0k3r/CVE-2024-52677)
|
||||
|
||||
### CVE-2024-52711 (2024-11-19)
|
||||
|
|
Loading…
Reference in a new issue