mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 09:34:11 +01:00
Auto Update 2025/01/18 18:32:06
This commit is contained in:
parent
b728142901
commit
8e2c60ac9e
27 changed files with 310 additions and 70 deletions
|
@ -14,7 +14,7 @@
|
|||
"description": "Python 3 implementation of an existing CVE-2011-3556 proof of concept (PoC).",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-29T20:22:09Z",
|
||||
"updated_at": "2022-07-23T10:25:47Z",
|
||||
"updated_at": "2025-01-18T17:13:35Z",
|
||||
"pushed_at": "2019-01-29T20:26:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -182,7 +182,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-11-14T04:35:59Z",
|
||||
"updated_at": "2025-01-05T15:26:10Z",
|
||||
"pushed_at": "2025-01-18T07:52:14Z",
|
||||
"pushed_at": "2025-01-18T15:32:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T00:23:34Z",
|
||||
"updated_at": "2024-10-31T14:02:51Z",
|
||||
"updated_at": "2025-01-18T13:50:18Z",
|
||||
"pushed_at": "2020-12-22T03:10:47Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 165,
|
||||
"watchers": 166,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -1243,10 +1243,10 @@
|
|||
"description": "该资源为CVE-2020-0796漏洞复现,包括Python版本和C++版本。主要是集合了github大神们的资源,希望您喜欢~",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-02T12:12:03Z",
|
||||
"updated_at": "2024-08-12T19:59:37Z",
|
||||
"updated_at": "2025-01-18T17:41:59Z",
|
||||
"pushed_at": "2020-08-28T09:21:00Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -1255,7 +1255,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -45,7 +45,7 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2025-01-17T08:04:47Z",
|
||||
"updated_at": "2025-01-18T16:55:16Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1857,
|
||||
"watchers_count": 1857,
|
||||
|
|
|
@ -848,10 +848,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2025-01-17T07:55:13Z",
|
||||
"updated_at": "2025-01-18T16:01:21Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1368,
|
||||
"watchers_count": 1368,
|
||||
"stargazers_count": 1369,
|
||||
"watchers_count": 1369,
|
||||
"has_discussions": false,
|
||||
"forks_count": 167,
|
||||
"allow_forking": true,
|
||||
|
@ -867,7 +867,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 167,
|
||||
"watchers": 1368,
|
||||
"watchers": 1369,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -50,10 +50,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2025-01-16T19:49:37Z",
|
||||
"updated_at": "2025-01-18T17:09:19Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 826,
|
||||
"watchers_count": 826,
|
||||
"stargazers_count": 827,
|
||||
"watchers_count": 827,
|
||||
"has_discussions": false,
|
||||
"forks_count": 125,
|
||||
"allow_forking": true,
|
||||
|
@ -62,7 +62,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 125,
|
||||
"watchers": 826,
|
||||
"watchers": 827,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -792,10 +792,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2025-01-17T07:55:13Z",
|
||||
"updated_at": "2025-01-18T16:01:21Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1368,
|
||||
"watchers_count": 1368,
|
||||
"stargazers_count": 1369,
|
||||
"watchers_count": 1369,
|
||||
"has_discussions": false,
|
||||
"forks_count": 167,
|
||||
"allow_forking": true,
|
||||
|
@ -811,7 +811,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 167,
|
||||
"watchers": 1368,
|
||||
"watchers": 1369,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -743,10 +743,10 @@
|
|||
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T06:54:15Z",
|
||||
"updated_at": "2025-01-18T12:02:37Z",
|
||||
"updated_at": "2025-01-18T13:33:44Z",
|
||||
"pushed_at": "2025-01-16T09:56:36Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -755,7 +755,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -789,5 +789,40 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 918683582,
|
||||
"name": "fortigate-belsen-leak",
|
||||
"full_name": "AKboss1221\/fortigate-belsen-leak",
|
||||
"owner": {
|
||||
"login": "AKboss1221",
|
||||
"id": 58637001,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58637001?v=4",
|
||||
"html_url": "https:\/\/github.com\/AKboss1221",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AKboss1221\/fortigate-belsen-leak",
|
||||
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T15:32:21Z",
|
||||
"updated_at": "2025-01-18T18:19:26Z",
|
||||
"pushed_at": "2025-01-18T18:19:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"belsen",
|
||||
"fortigate",
|
||||
"leak"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -76,10 +76,10 @@
|
|||
"description": "GameOver(lay) Ubuntu Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T22:02:42Z",
|
||||
"updated_at": "2025-01-16T15:20:27Z",
|
||||
"updated_at": "2025-01-18T15:28:50Z",
|
||||
"pushed_at": "2023-10-09T22:44:21Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 121,
|
||||
"watchers": 122,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1,4 +1,35 @@
|
|||
[
|
||||
{
|
||||
"id": 721727666,
|
||||
"name": "ivanti-cve-2023-35080-privilege-escalation-bof",
|
||||
"full_name": "tijme\/ivanti-cve-2023-35080-privilege-escalation-bof",
|
||||
"owner": {
|
||||
"login": "tijme",
|
||||
"id": 5873573,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5873573?v=4",
|
||||
"html_url": "https:\/\/github.com\/tijme",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tijme\/ivanti-cve-2023-35080-privilege-escalation-bof",
|
||||
"description": "Ivanti Secure Access (previously Pulse Secure) privilege escalation Cobalt Strike BOF (CVE-2023-35080).",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-21T16:46:35Z",
|
||||
"updated_at": "2025-01-18T16:37:10Z",
|
||||
"pushed_at": "2023-12-05T09:17:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 755572375,
|
||||
"name": "Ivanti-Pulse_VPN-Client_Exploit-CVE-2023-35080_Privilege-escalation",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof-of-Concept for CVE-2023-38146 (\"ThemeBleed\")",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-13T04:00:14Z",
|
||||
"updated_at": "2024-12-30T13:28:54Z",
|
||||
"updated_at": "2025-01-18T14:23:48Z",
|
||||
"pushed_at": "2023-09-13T04:50:29Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 191,
|
||||
"watchers": 192,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2025-01-18T10:47:32Z",
|
||||
"updated_at": "2025-01-18T14:53:33Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1392,
|
||||
"watchers_count": 1392,
|
||||
"stargazers_count": 1393,
|
||||
"watchers_count": 1393,
|
||||
"has_discussions": false,
|
||||
"forks_count": 238,
|
||||
"forks_count": 239,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 238,
|
||||
"watchers": 1392,
|
||||
"forks": 239,
|
||||
"watchers": 1393,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-13375 Unverified Password Change",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T10:35:47Z",
|
||||
"updated_at": "2025-01-18T10:50:25Z",
|
||||
"updated_at": "2025-01-18T14:00:19Z",
|
||||
"pushed_at": "2025-01-18T10:48:52Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-08-14T16:20:38Z",
|
||||
"updated_at": "2025-01-17T02:40:27Z",
|
||||
"updated_at": "2025-01-18T14:52:01Z",
|
||||
"pushed_at": "2024-09-05T23:21:00Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 115,
|
||||
"watchers": 116,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -952,10 +952,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2025-01-18T11:28:51Z",
|
||||
"updated_at": "2025-01-18T17:54:18Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3505,
|
||||
"watchers_count": 3505,
|
||||
"stargazers_count": 3506,
|
||||
"watchers_count": 3506,
|
||||
"has_discussions": false,
|
||||
"forks_count": 239,
|
||||
"allow_forking": true,
|
||||
|
@ -964,7 +964,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 239,
|
||||
"watchers": 3505,
|
||||
"watchers": 3506,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
|
@ -362,10 +362,10 @@
|
|||
"description": "geoserver图形化漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T10:08:55Z",
|
||||
"updated_at": "2025-01-11T10:30:26Z",
|
||||
"updated_at": "2025-01-18T13:03:26Z",
|
||||
"pushed_at": "2024-10-08T03:16:26Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -374,7 +374,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 918629965,
|
||||
"name": "CVE-2024-38821-POC",
|
||||
"full_name": "masa42\/CVE-2024-38821-POC",
|
||||
"owner": {
|
||||
"login": "masa42",
|
||||
"id": 46730934,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46730934?v=4",
|
||||
"html_url": "https:\/\/github.com\/masa42",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/masa42\/CVE-2024-38821-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T12:52:34Z",
|
||||
"updated_at": "2025-01-18T13:41:07Z",
|
||||
"pushed_at": "2025-01-18T13:38:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T12:39:44Z",
|
||||
"updated_at": "2025-01-18T11:54:10Z",
|
||||
"updated_at": "2025-01-18T17:26:14Z",
|
||||
"pushed_at": "2025-01-16T09:48:07Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -11,10 +11,10 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-46542",
|
||||
"description": null,
|
||||
"description": "Veritas SQL injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-30T08:58:05Z",
|
||||
"updated_at": "2024-12-31T12:17:30Z",
|
||||
"updated_at": "2025-01-18T13:26:56Z",
|
||||
"pushed_at": "2024-12-31T12:17:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-11T14:19:55Z",
|
||||
"updated_at": "2025-01-08T08:14:00Z",
|
||||
"updated_at": "2025-01-18T16:57:20Z",
|
||||
"pushed_at": "2024-12-11T14:23:19Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
|
|
33
2024/CVE-2024-54792.json
Normal file
33
2024/CVE-2024-54792.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 918644304,
|
||||
"name": "CVE-2024-54792",
|
||||
"full_name": "MarioTesoro\/CVE-2024-54792",
|
||||
"owner": {
|
||||
"login": "MarioTesoro",
|
||||
"id": 62204045,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4",
|
||||
"html_url": "https:\/\/github.com\/MarioTesoro",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-54792",
|
||||
"description": "SpagoBI csrf",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T13:37:57Z",
|
||||
"updated_at": "2025-01-18T14:13:20Z",
|
||||
"pushed_at": "2025-01-18T14:12:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-54794.json
Normal file
33
2024/CVE-2024-54794.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 918594190,
|
||||
"name": "CVE-2024-54794",
|
||||
"full_name": "MarioTesoro\/CVE-2024-54794",
|
||||
"owner": {
|
||||
"login": "MarioTesoro",
|
||||
"id": 62204045,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4",
|
||||
"html_url": "https:\/\/github.com\/MarioTesoro",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-54794",
|
||||
"description": "SpagoBI command injection",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T10:50:21Z",
|
||||
"updated_at": "2025-01-18T14:29:26Z",
|
||||
"pushed_at": "2025-01-18T14:29:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-54795.json
Normal file
33
2024/CVE-2024-54795.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 918657905,
|
||||
"name": "CVE-2024-54795",
|
||||
"full_name": "MarioTesoro\/CVE-2024-54795",
|
||||
"owner": {
|
||||
"login": "MarioTesoro",
|
||||
"id": 62204045,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4",
|
||||
"html_url": "https:\/\/github.com\/MarioTesoro",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-54795",
|
||||
"description": "SpagoBI multiple stored xss",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T14:17:03Z",
|
||||
"updated_at": "2025-01-18T14:31:55Z",
|
||||
"pushed_at": "2025-01-18T14:31:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 918678336,
|
||||
"name": "fortios-auth-bypass-check-CVE-2024-55591",
|
||||
"full_name": "souzatyler\/fortios-auth-bypass-check-CVE-2024-55591",
|
||||
"owner": {
|
||||
"login": "souzatyler",
|
||||
"id": 171995105,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171995105?v=4",
|
||||
"html_url": "https:\/\/github.com\/souzatyler",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/souzatyler\/fortios-auth-bypass-check-CVE-2024-55591",
|
||||
"description": "Checks for authentication bypass vulnerability inFortinet's FortiOS, potentially exploited by remote attackers.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T15:17:07Z",
|
||||
"updated_at": "2025-01-18T18:19:28Z",
|
||||
"pushed_at": "2025-01-18T18:19:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-11T02:06:51Z",
|
||||
"updated_at": "2025-01-17T15:52:15Z",
|
||||
"updated_at": "2025-01-18T16:06:24Z",
|
||||
"pushed_at": "2025-01-11T23:54:06Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -107,8 +107,8 @@
|
|||
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-15T18:27:12Z",
|
||||
"updated_at": "2025-01-17T21:52:43Z",
|
||||
"pushed_at": "2025-01-16T15:44:15Z",
|
||||
"updated_at": "2025-01-18T16:59:09Z",
|
||||
"pushed_at": "2025-01-18T16:59:07Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
|
|
13
README.md
13
README.md
|
@ -6160,6 +6160,7 @@
|
|||
</code>
|
||||
|
||||
- [mouadk/cve-2024-38821](https://github.com/mouadk/cve-2024-38821)
|
||||
- [masa42/CVE-2024-38821-POC](https://github.com/masa42/CVE-2024-38821-POC)
|
||||
|
||||
### CVE-2024-38856 (2024-08-05)
|
||||
|
||||
|
@ -8293,6 +8294,15 @@
|
|||
|
||||
- [nscan9/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection](https://github.com/nscan9/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection)
|
||||
|
||||
### CVE-2024-54792
|
||||
- [MarioTesoro/CVE-2024-54792](https://github.com/MarioTesoro/CVE-2024-54792)
|
||||
|
||||
### CVE-2024-54794
|
||||
- [MarioTesoro/CVE-2024-54794](https://github.com/MarioTesoro/CVE-2024-54794)
|
||||
|
||||
### CVE-2024-54795
|
||||
- [MarioTesoro/CVE-2024-54795](https://github.com/MarioTesoro/CVE-2024-54795)
|
||||
|
||||
### CVE-2024-54819 (2025-01-07)
|
||||
|
||||
<code>I, Librarian before and including 5.11.1 is vulnerable to Server-Side Request Forgery (SSRF) due to improper input validation in classes/security/validation.php
|
||||
|
@ -8344,6 +8354,7 @@
|
|||
</code>
|
||||
|
||||
- [watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591](https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591)
|
||||
- [souzatyler/fortios-auth-bypass-check-CVE-2024-55591](https://github.com/souzatyler/fortios-auth-bypass-check-CVE-2024-55591)
|
||||
|
||||
### CVE-2024-55875 (2024-12-12)
|
||||
|
||||
|
@ -13390,6 +13401,7 @@
|
|||
<code>A vulnerability has been identified in the Ivanti Secure Access Windows client, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to various security risks, including the escalation of privileges, denial of service, or information disclosure.
|
||||
</code>
|
||||
|
||||
- [tijme/ivanti-cve-2023-35080-privilege-escalation-bof](https://github.com/tijme/ivanti-cve-2023-35080-privilege-escalation-bof)
|
||||
- [HopHouse/Ivanti-Pulse_VPN-Client_Exploit-CVE-2023-35080_Privilege-escalation](https://github.com/HopHouse/Ivanti-Pulse_VPN-Client_Exploit-CVE-2023-35080_Privilege-escalation)
|
||||
|
||||
### CVE-2023-35082 (2023-08-15)
|
||||
|
@ -22577,6 +22589,7 @@
|
|||
- [Anthony1500/CVE-2022-40684](https://github.com/Anthony1500/CVE-2022-40684)
|
||||
- [arsolutioner/fortigate-belsen-leak](https://github.com/arsolutioner/fortigate-belsen-leak)
|
||||
- [Rofell0s/Fortigate-Leak-CVE-2022-40684](https://github.com/Rofell0s/Fortigate-Leak-CVE-2022-40684)
|
||||
- [AKboss1221/fortigate-belsen-leak](https://github.com/AKboss1221/fortigate-belsen-leak)
|
||||
|
||||
### CVE-2022-40687 (2022-11-18)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue