mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/02/14 18:26:24
This commit is contained in:
parent
45698b083f
commit
951f0fb641
31 changed files with 231 additions and 126 deletions
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Motorola Untethered Jailbreak: Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass ",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-06T12:00:27Z",
|
||||
"updated_at": "2024-02-06T16:48:26Z",
|
||||
"updated_at": "2024-02-14T16:52:45Z",
|
||||
"pushed_at": "2017-08-30T15:17:08Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -216,6 +216,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -44,17 +44,17 @@
|
|||
"fork": false,
|
||||
"created_at": "2017-05-06T15:35:42Z",
|
||||
"updated_at": "2024-01-16T16:25:35Z",
|
||||
"pushed_at": "2020-01-03T21:50:36Z",
|
||||
"pushed_at": "2024-02-14T16:18:07Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T14:25:39Z",
|
||||
"updated_at": "2024-02-14T08:10:20Z",
|
||||
"updated_at": "2024-02-14T17:25:57Z",
|
||||
"pushed_at": "2019-11-21T15:03:15Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Nexus Repository Manager 3 Remote Code Execution without authentication < 3.15.0",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T13:16:02Z",
|
||||
"updated_at": "2023-12-15T12:10:29Z",
|
||||
"updated_at": "2024-02-14T14:05:19Z",
|
||||
"pushed_at": "2019-08-19T17:33:56Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -62,7 +62,7 @@
|
|||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2024-02-12T05:45:33Z",
|
||||
"updated_at": "2024-02-14T12:28:54Z",
|
||||
"pushed_at": "2023-07-20T10:51:42Z",
|
||||
"stargazers_count": 1671,
|
||||
"watchers_count": 1671,
|
||||
"stargazers_count": 1672,
|
||||
"watchers_count": 1672,
|
||||
"has_discussions": false,
|
||||
"forks_count": 366,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 366,
|
||||
"watchers": 1671,
|
||||
"watchers": 1672,
|
||||
"score": 0,
|
||||
"subscribers_count": 87
|
||||
},
|
||||
|
|
|
@ -148,10 +148,10 @@
|
|||
"description": "An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-02T05:13:07Z",
|
||||
"updated_at": "2024-01-12T16:39:42Z",
|
||||
"updated_at": "2024-02-14T18:13:50Z",
|
||||
"pushed_at": "2021-07-20T03:03:30Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -160,7 +160,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -286,10 +286,10 @@
|
|||
"description": "exiftool exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-21T11:07:19Z",
|
||||
"updated_at": "2023-09-24T01:56:21Z",
|
||||
"updated_at": "2024-02-14T16:29:37Z",
|
||||
"pushed_at": "2022-02-21T12:20:15Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -298,7 +298,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -316,10 +316,10 @@
|
|||
"description": "Exploit for CVE-2021-22204 (ExifTool) - Arbitrary Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-16T22:49:47Z",
|
||||
"updated_at": "2024-01-21T04:44:11Z",
|
||||
"updated_at": "2024-02-14T16:19:17Z",
|
||||
"pushed_at": "2022-06-07T23:09:29Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": true,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -341,7 +341,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-40346 PoC (HAProxy HTTP Smuggling)",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-08T22:26:19Z",
|
||||
"updated_at": "2023-12-05T14:42:05Z",
|
||||
"updated_at": "2024-02-14T15:04:41Z",
|
||||
"pushed_at": "2021-09-08T22:37:15Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A demo exploit for CVE-2021-44026, a SQL injection in Roundcube",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-14T11:32:36Z",
|
||||
"updated_at": "2024-01-06T15:13:10Z",
|
||||
"updated_at": "2024-02-14T17:51:21Z",
|
||||
"pushed_at": "2023-12-22T11:29:43Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-08T20:24:38Z",
|
||||
"updated_at": "2023-12-21T06:40:08Z",
|
||||
"updated_at": "2024-02-14T17:51:54Z",
|
||||
"pushed_at": "2021-12-08T21:43:16Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -907,7 +907,7 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-02-14T03:43:29Z",
|
||||
"updated_at": "2024-02-14T15:19:54Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1706,
|
||||
"watchers_count": 1706,
|
||||
|
|
|
@ -692,36 +692,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 502734227,
|
||||
"name": "CVE-2022-22954",
|
||||
"full_name": "1SeaMy\/CVE-2022-22954",
|
||||
"owner": {
|
||||
"login": "1SeaMy",
|
||||
"id": 92841021,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92841021?v=4",
|
||||
"html_url": "https:\/\/github.com\/1SeaMy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1SeaMy\/CVE-2022-22954",
|
||||
"description": "I'm trying",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-12T21:41:38Z",
|
||||
"updated_at": "2024-02-12T20:12:09Z",
|
||||
"pushed_at": "2022-06-12T21:49:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 524471767,
|
||||
"name": "CVE-2022-22954",
|
||||
|
|
|
@ -518,10 +518,10 @@
|
|||
"description": "Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-06T02:43:06Z",
|
||||
"updated_at": "2024-01-11T14:51:06Z",
|
||||
"updated_at": "2024-02-14T18:21:41Z",
|
||||
"pushed_at": "2022-06-06T03:37:25Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -530,7 +530,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T23:26:47Z",
|
||||
"updated_at": "2024-02-08T08:12:36Z",
|
||||
"updated_at": "2024-02-14T13:02:18Z",
|
||||
"pushed_at": "2022-11-20T03:03:53Z",
|
||||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"stargazers_count": 204,
|
||||
"watchers_count": 204,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 203,
|
||||
"watchers": 204,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-02-13T19:40:31Z",
|
||||
"pushed_at": "2024-02-14T12:09:43Z",
|
||||
"pushed_at": "2024-02-14T14:46:41Z",
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"has_discussions": true,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-13T13:17:20Z",
|
||||
"updated_at": "2024-02-13T16:13:18Z",
|
||||
"updated_at": "2024-02-14T17:38:27Z",
|
||||
"pushed_at": "2024-02-11T03:01:51Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-11T15:04:51Z",
|
||||
"updated_at": "2024-01-14T17:54:12Z",
|
||||
"updated_at": "2024-02-14T15:13:16Z",
|
||||
"pushed_at": "2024-01-09T21:11:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-22T03:06:31Z",
|
||||
"updated_at": "2024-02-10T23:38:55Z",
|
||||
"updated_at": "2024-02-14T16:10:31Z",
|
||||
"pushed_at": "2023-09-10T10:44:32Z",
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"stargazers_count": 241,
|
||||
"watchers_count": 241,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -67,7 +67,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 240,
|
||||
"watchers": 241,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -58,5 +58,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 757418361,
|
||||
"name": "CVE-2023-30547",
|
||||
"full_name": "Cur1iosity\/CVE-2023-30547",
|
||||
"owner": {
|
||||
"login": "Cur1iosity",
|
||||
"id": 22967390,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22967390?v=4",
|
||||
"html_url": "https:\/\/github.com\/Cur1iosity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Cur1iosity\/CVE-2023-30547",
|
||||
"description": "Tool for exploring CVE-2023-30547",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-14T13:05:57Z",
|
||||
"updated_at": "2024-02-14T13:25:25Z",
|
||||
"pushed_at": "2024-02-14T13:25:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -443,5 +443,35 @@
|
|||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 757410546,
|
||||
"name": "CVE-2023-36845-Juniper-Vulnerability",
|
||||
"full_name": "0xNehru\/CVE-2023-36845-Juniper-Vulnerability",
|
||||
"owner": {
|
||||
"login": "0xNehru",
|
||||
"id": 160024662,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/160024662?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xNehru"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xNehru\/CVE-2023-36845-Juniper-Vulnerability",
|
||||
"description": "This Python script automates the Proof of Concept (PoC) for CVE-2023-36845, a vulnerability impacting Juniper Networks Junos OS on EX and SRX Series devices. The vulnerability resides in the J-Web component, allowing remote manipulation of the PHPRC variable, potentially leading to code injection.",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-14T12:47:21Z",
|
||||
"updated_at": "2024-02-14T14:51:34Z",
|
||||
"pushed_at": "2024-02-14T14:07:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-47464.json
Normal file
32
2023/CVE-2023-47464.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 757485554,
|
||||
"name": "CVE-2023-47464",
|
||||
"full_name": "HadessCS\/CVE-2023-47464",
|
||||
"owner": {
|
||||
"login": "HadessCS",
|
||||
"id": 102136070,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102136070?v=4",
|
||||
"html_url": "https:\/\/github.com\/HadessCS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HadessCS\/CVE-2023-47464",
|
||||
"description": "CVE-2023-47464 POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-14T15:39:34Z",
|
||||
"updated_at": "2024-02-14T15:40:38Z",
|
||||
"pushed_at": "2024-02-14T15:43:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC for CVE-2023-4911",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-04T14:12:16Z",
|
||||
"updated_at": "2024-02-09T14:12:36Z",
|
||||
"updated_at": "2024-02-14T15:46:11Z",
|
||||
"pushed_at": "2023-10-04T14:16:36Z",
|
||||
"stargazers_count": 369,
|
||||
"watchers_count": 369,
|
||||
"stargazers_count": 370,
|
||||
"watchers_count": 370,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 369,
|
||||
"watchers": 370,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-4911 proof of concept",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-04T14:32:49Z",
|
||||
"updated_at": "2024-02-06T10:48:33Z",
|
||||
"updated_at": "2024-02-14T13:11:24Z",
|
||||
"pushed_at": "2023-10-08T23:24:24Z",
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 159,
|
||||
"watchers": 160,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-02T02:51:29Z",
|
||||
"updated_at": "2024-02-04T09:05:55Z",
|
||||
"updated_at": "2024-02-14T17:19:25Z",
|
||||
"pushed_at": "2024-02-02T09:49:34Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-02T22:59:21Z",
|
||||
"updated_at": "2024-02-14T09:27:57Z",
|
||||
"updated_at": "2024-02-14T15:23:11Z",
|
||||
"pushed_at": "2024-02-02T23:27:10Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-09T14:31:56Z",
|
||||
"updated_at": "2024-02-13T09:16:06Z",
|
||||
"updated_at": "2024-02-14T15:39:08Z",
|
||||
"pushed_at": "2024-02-09T15:14:03Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -215,14 +215,14 @@
|
|||
{
|
||||
"id": 749060845,
|
||||
"name": "PoC-Fix-jenkins-rce_CVE-2024-23897",
|
||||
"full_name": "iota4\/PoC-Fix-jenkins-rce_CVE-2024-23897",
|
||||
"full_name": "10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897",
|
||||
"owner": {
|
||||
"login": "iota4",
|
||||
"login": "10T4",
|
||||
"id": 148342080,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148342080?v=4",
|
||||
"html_url": "https:\/\/github.com\/iota4"
|
||||
"html_url": "https:\/\/github.com\/10T4"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/iota4\/PoC-Fix-jenkins-rce_CVE-2024-23897",
|
||||
"html_url": "https:\/\/github.com\/10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897",
|
||||
"description": "on this git you can find all information on the CVE-2024-23897",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-27T13:27:57Z",
|
||||
|
|
32
2024/CVE-2024-24386.json
Normal file
32
2024/CVE-2024-24386.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 755087413,
|
||||
"name": "CVE-2024-24386",
|
||||
"full_name": "erick-duarte\/CVE-2024-24386",
|
||||
"owner": {
|
||||
"login": "erick-duarte",
|
||||
"id": 59427098,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59427098?v=4",
|
||||
"html_url": "https:\/\/github.com\/erick-duarte"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/erick-duarte\/CVE-2024-24386",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-09T12:22:08Z",
|
||||
"updated_at": "2024-02-14T13:50:39Z",
|
||||
"pushed_at": "2024-02-14T13:42:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
15
README.md
15
README.md
|
@ -323,7 +323,7 @@
|
|||
- [vmtyan/poc-cve-2024-23897](https://github.com/vmtyan/poc-cve-2024-23897)
|
||||
- [yoryio/CVE-2024-23897](https://github.com/yoryio/CVE-2024-23897)
|
||||
- [CKevens/CVE-2024-23897](https://github.com/CKevens/CVE-2024-23897)
|
||||
- [iota4/PoC-Fix-jenkins-rce_CVE-2024-23897](https://github.com/iota4/PoC-Fix-jenkins-rce_CVE-2024-23897)
|
||||
- [10T4/PoC-Fix-jenkins-rce_CVE-2024-23897](https://github.com/10T4/PoC-Fix-jenkins-rce_CVE-2024-23897)
|
||||
- [wjlin0/CVE-2024-23897](https://github.com/wjlin0/CVE-2024-23897)
|
||||
- [Vozec/CVE-2024-23897](https://github.com/Vozec/CVE-2024-23897)
|
||||
- [raheel0x01/CVE-2024-23897](https://github.com/raheel0x01/CVE-2024-23897)
|
||||
|
@ -411,6 +411,9 @@
|
|||
|
||||
- [nitipoom-jar/CVE-2024-24337](https://github.com/nitipoom-jar/CVE-2024-24337)
|
||||
|
||||
### CVE-2024-24386
|
||||
- [erick-duarte/CVE-2024-24386](https://github.com/erick-duarte/CVE-2024-24386)
|
||||
|
||||
### CVE-2024-24396 (2024-02-05)
|
||||
|
||||
<code>Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the search bar component.
|
||||
|
@ -3492,6 +3495,7 @@
|
|||
|
||||
- [rvizx/CVE-2023-30547](https://github.com/rvizx/CVE-2023-30547)
|
||||
- [user0x1337/CVE-2023-30547](https://github.com/user0x1337/CVE-2023-30547)
|
||||
- [Cur1iosity/CVE-2023-30547](https://github.com/Cur1iosity/CVE-2023-30547)
|
||||
|
||||
### CVE-2023-30765 (2023-07-10)
|
||||
|
||||
|
@ -4770,6 +4774,7 @@
|
|||
- [CharonDefalt/Juniper-exploit-CVE-2023-36845](https://github.com/CharonDefalt/Juniper-exploit-CVE-2023-36845)
|
||||
- [iveresk/CVE-2023-36845-6-](https://github.com/iveresk/CVE-2023-36845-6-)
|
||||
- [ak1t4/CVE-2023-36845](https://github.com/ak1t4/CVE-2023-36845)
|
||||
- [0xNehru/CVE-2023-36845-Juniper-Vulnerability](https://github.com/0xNehru/CVE-2023-36845-Juniper-Vulnerability)
|
||||
|
||||
### CVE-2023-36846 (2023-08-17)
|
||||
|
||||
|
@ -6659,6 +6664,13 @@
|
|||
|
||||
- [aleksey-vi/CVE-2023-47460](https://github.com/aleksey-vi/CVE-2023-47460)
|
||||
|
||||
### CVE-2023-47464 (2023-11-29)
|
||||
|
||||
<code>Insecure Permissions vulnerability in GL.iNet AX1800 version 4.0.0 before 4.5.0 allows a remote attacker to execute arbitrary code via the upload API function.
|
||||
</code>
|
||||
|
||||
- [HadessCS/CVE-2023-47464](https://github.com/HadessCS/CVE-2023-47464)
|
||||
|
||||
### CVE-2023-47488 (2023-11-09)
|
||||
|
||||
<code>Cross Site Scripting vulnerability in Combodo iTop v.3.1.0-2-11973 allows a local attacker to obtain sensitive information via a crafted script to the attrib_manager_id parameter in the General Information page and the id parameter in the contact page.
|
||||
|
@ -9009,7 +9021,6 @@
|
|||
- [orwagodfather/CVE-2022-22954](https://github.com/orwagodfather/CVE-2022-22954)
|
||||
- [b4dboy17/CVE-2022-22954](https://github.com/b4dboy17/CVE-2022-22954)
|
||||
- [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954)
|
||||
- [1SeaMy/CVE-2022-22954](https://github.com/1SeaMy/CVE-2022-22954)
|
||||
- [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954)
|
||||
- [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC)
|
||||
- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)
|
||||
|
|
Loading…
Add table
Reference in a new issue