mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 01:54:09 +01:00
Auto Update 2025/01/19 06:31:42
This commit is contained in:
parent
a95fdb0548
commit
9c1dec1ee1
34 changed files with 167 additions and 95 deletions
|
@ -50,7 +50,7 @@
|
|||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -61,7 +61,7 @@
|
|||
"saltstack"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"forks": 15,
|
||||
"watchers": 107,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
|
|
@ -176,10 +176,10 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2025-01-15T05:57:38Z",
|
||||
"updated_at": "2025-01-19T02:03:08Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 645,
|
||||
"watchers_count": 645,
|
||||
"stargazers_count": 646,
|
||||
"watchers_count": 646,
|
||||
"has_discussions": false,
|
||||
"forks_count": 146,
|
||||
"allow_forking": true,
|
||||
|
@ -188,7 +188,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 146,
|
||||
"watchers": 645,
|
||||
"watchers": 646,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -33,19 +33,19 @@
|
|||
{
|
||||
"id": 584128166,
|
||||
"name": "CVE-2020-17382",
|
||||
"full_name": "houseofxyz\/CVE-2020-17382",
|
||||
"full_name": "houseofint3\/CVE-2020-17382",
|
||||
"owner": {
|
||||
"login": "houseofxyz",
|
||||
"id": 121667935,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121667935?v=4",
|
||||
"html_url": "https:\/\/github.com\/houseofxyz",
|
||||
"login": "houseofint3",
|
||||
"id": 138196270,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138196270?v=4",
|
||||
"html_url": "https:\/\/github.com\/houseofint3",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/houseofxyz\/CVE-2020-17382",
|
||||
"html_url": "https:\/\/github.com\/houseofint3\/CVE-2020-17382",
|
||||
"description": "CVE-2020-17382 Windows 10 x64 2004 Build 19041.264 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-01T13:49:07Z",
|
||||
"updated_at": "2024-06-21T00:10:39Z",
|
||||
"updated_at": "2025-01-19T05:28:03Z",
|
||||
"pushed_at": "2023-01-01T13:49:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -424,10 +424,10 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2025-01-11T06:52:53Z",
|
||||
"updated_at": "2025-01-19T02:19:58Z",
|
||||
"pushed_at": "2022-04-14T11:51:18Z",
|
||||
"stargazers_count": 432,
|
||||
"watchers_count": 432,
|
||||
"stargazers_count": 433,
|
||||
"watchers_count": 433,
|
||||
"has_discussions": false,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
|
@ -436,7 +436,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 110,
|
||||
"watchers": 432,
|
||||
"watchers": 433,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A Proof of concept scenario for exploitation of CVE2021-38297 GO WASM buffer-overflow",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-15T20:52:36Z",
|
||||
"updated_at": "2024-10-08T11:25:29Z",
|
||||
"updated_at": "2025-01-19T01:46:43Z",
|
||||
"pushed_at": "2023-12-05T21:38:17Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -935,10 +935,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2025-01-13T14:46:25Z",
|
||||
"updated_at": "2025-01-19T03:50:29Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1815,
|
||||
"watchers_count": 1815,
|
||||
"stargazers_count": 1816,
|
||||
"watchers_count": 1816,
|
||||
"has_discussions": false,
|
||||
"forks_count": 530,
|
||||
"allow_forking": true,
|
||||
|
@ -952,7 +952,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 530,
|
||||
"watchers": 1815,
|
||||
"watchers": 1816,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -805,8 +805,8 @@
|
|||
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T15:32:21Z",
|
||||
"updated_at": "2025-01-19T00:17:26Z",
|
||||
"pushed_at": "2025-01-19T00:17:24Z",
|
||||
"updated_at": "2025-01-19T06:07:44Z",
|
||||
"pushed_at": "2025-01-19T06:07:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -823,6 +823,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 597871098,
|
||||
"name": "CVE-2022-45544",
|
||||
"full_name": "tristao-marinho\/CVE-2022-45544",
|
||||
"full_name": "tristao-io\/CVE-2022-45544",
|
||||
"owner": {
|
||||
"login": "tristao-marinho",
|
||||
"login": "tristao-io",
|
||||
"id": 101610912,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho",
|
||||
"html_url": "https:\/\/github.com\/tristao-io",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2022-45544",
|
||||
"html_url": "https:\/\/github.com\/tristao-io\/CVE-2022-45544",
|
||||
"description": "SCHLIX CMS 2.2.7-2 arbitrary File Upload",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-05T21:45:37Z",
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 614934943,
|
||||
"name": "CVE-2023-27842",
|
||||
"full_name": "tristao-marinho\/CVE-2023-27842",
|
||||
"full_name": "tristao-io\/CVE-2023-27842",
|
||||
"owner": {
|
||||
"login": "tristao-marinho",
|
||||
"login": "tristao-io",
|
||||
"id": 101610912,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho",
|
||||
"html_url": "https:\/\/github.com\/tristao-io",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-27842",
|
||||
"html_url": "https:\/\/github.com\/tristao-io\/CVE-2023-27842",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T15:59:39Z",
|
||||
|
|
|
@ -28,7 +28,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 755572375,
|
||||
|
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 686063462,
|
||||
"name": "CVE-2023-41646",
|
||||
"full_name": "tristao-marinho\/CVE-2023-41646",
|
||||
"full_name": "tristao-io\/CVE-2023-41646",
|
||||
"owner": {
|
||||
"login": "tristao-marinho",
|
||||
"login": "tristao-io",
|
||||
"id": 101610912,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho",
|
||||
"html_url": "https:\/\/github.com\/tristao-io",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-41646",
|
||||
"html_url": "https:\/\/github.com\/tristao-io\/CVE-2023-41646",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-01T16:46:07Z",
|
||||
|
|
|
@ -498,6 +498,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -231,10 +231,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-12-18T23:12:25Z",
|
||||
"updated_at": "2024-12-28T12:49:29Z",
|
||||
"updated_at": "2025-01-19T04:57:41Z",
|
||||
"pushed_at": "2024-05-13T17:40:58Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 737775658,
|
||||
"name": "CVE-2023-48981",
|
||||
"full_name": "tristao-marinho\/CVE-2023-48981",
|
||||
"full_name": "tristao-io\/CVE-2023-48981",
|
||||
"owner": {
|
||||
"login": "tristao-marinho",
|
||||
"login": "tristao-io",
|
||||
"id": 101610912,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho",
|
||||
"html_url": "https:\/\/github.com\/tristao-io",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48981",
|
||||
"html_url": "https:\/\/github.com\/tristao-io\/CVE-2023-48981",
|
||||
"description": "POC CVE-2023-48981",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-01T13:06:39Z",
|
||||
|
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 737777512,
|
||||
"name": "CVE-2023-48982",
|
||||
"full_name": "tristao-marinho\/CVE-2023-48982",
|
||||
"full_name": "tristao-io\/CVE-2023-48982",
|
||||
"owner": {
|
||||
"login": "tristao-marinho",
|
||||
"login": "tristao-io",
|
||||
"id": 101610912,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho",
|
||||
"html_url": "https:\/\/github.com\/tristao-io",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48982",
|
||||
"html_url": "https:\/\/github.com\/tristao-io\/CVE-2023-48982",
|
||||
"description": "POC CVE-2023-48982",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-01T13:14:49Z",
|
||||
|
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 737778720,
|
||||
"name": "CVE-2023-48983",
|
||||
"full_name": "tristao-marinho\/CVE-2023-48983",
|
||||
"full_name": "tristao-io\/CVE-2023-48983",
|
||||
"owner": {
|
||||
"login": "tristao-marinho",
|
||||
"login": "tristao-io",
|
||||
"id": 101610912,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho",
|
||||
"html_url": "https:\/\/github.com\/tristao-io",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48983",
|
||||
"html_url": "https:\/\/github.com\/tristao-io\/CVE-2023-48983",
|
||||
"description": "POC CVE-2023-48983",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-01T13:19:54Z",
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -400,10 +400,10 @@
|
|||
"description": "Shell scripts to identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6) or upgrading to latest version. Added Ansible Playbook",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-30T19:23:30Z",
|
||||
"updated_at": "2024-08-04T13:52:01Z",
|
||||
"updated_at": "2025-01-19T05:21:56Z",
|
||||
"pushed_at": "2024-04-07T07:40:48Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -428,7 +428,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -59,6 +59,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-13T19:54:27Z",
|
||||
"updated_at": "2025-01-18T19:34:03Z",
|
||||
"updated_at": "2025-01-19T02:19:25Z",
|
||||
"pushed_at": "2024-09-11T20:00:46Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T12:39:44Z",
|
||||
"updated_at": "2025-01-18T17:26:14Z",
|
||||
"updated_at": "2025-01-19T05:19:28Z",
|
||||
"pushed_at": "2025-01-16T09:48:07Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -90,6 +90,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-53691",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-13T10:07:25Z",
|
||||
"updated_at": "2025-01-18T02:20:21Z",
|
||||
"updated_at": "2025-01-19T02:03:26Z",
|
||||
"pushed_at": "2025-01-13T10:16:58Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -59,6 +59,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
33
2024/CVE-2024-55504.json
Normal file
33
2024/CVE-2024-55504.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 918841666,
|
||||
"name": "CVE-2024-55504",
|
||||
"full_name": "SyFi\/CVE-2024-55504",
|
||||
"owner": {
|
||||
"login": "SyFi",
|
||||
"id": 26314806,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314806?v=4",
|
||||
"html_url": "https:\/\/github.com\/SyFi",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SyFi\/CVE-2024-55504",
|
||||
"description": "CVE-2024-55504",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-19T01:58:38Z",
|
||||
"updated_at": "2025-01-19T02:12:29Z",
|
||||
"pushed_at": "2025-01-19T02:12:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -45,8 +45,8 @@
|
|||
"description": "Checks for authentication bypass vulnerability inFortinet's FortiOS, potentially exploited by remote attackers.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T15:17:07Z",
|
||||
"updated_at": "2025-01-19T00:17:18Z",
|
||||
"pushed_at": "2025-01-19T00:17:15Z",
|
||||
"updated_at": "2025-01-19T06:24:49Z",
|
||||
"pushed_at": "2025-01-19T06:24:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -59,6 +59,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -152,6 +152,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -112,13 +112,13 @@
|
|||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
33
2025/CVE-2025-22620.json
Normal file
33
2025/CVE-2025-22620.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 918881461,
|
||||
"name": "checkout-index",
|
||||
"full_name": "EliahKagan\/checkout-index",
|
||||
"owner": {
|
||||
"login": "EliahKagan",
|
||||
"id": 1771172,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1771172?v=4",
|
||||
"html_url": "https:\/\/github.com\/EliahKagan",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EliahKagan\/checkout-index",
|
||||
"description": "Reproducer for CVE-2025-22620",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-19T05:31:13Z",
|
||||
"updated_at": "2025-01-19T05:31:30Z",
|
||||
"pushed_at": "2025-01-19T05:32:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
20
README.md
20
README.md
|
@ -36,6 +36,9 @@
|
|||
|
||||
- [DoTTak/CVE-2025-22510](https://github.com/DoTTak/CVE-2025-22510)
|
||||
|
||||
### CVE-2025-22620
|
||||
- [EliahKagan/checkout-index](https://github.com/EliahKagan/checkout-index)
|
||||
|
||||
### CVE-2025-22710
|
||||
- [DoTTak/CVE-2025-22710](https://github.com/DoTTak/CVE-2025-22710)
|
||||
|
||||
|
@ -8334,6 +8337,9 @@
|
|||
|
||||
- [SyFi/CVE-2024-55503](https://github.com/SyFi/CVE-2024-55503)
|
||||
|
||||
### CVE-2024-55504
|
||||
- [SyFi/CVE-2024-55504](https://github.com/SyFi/CVE-2024-55504)
|
||||
|
||||
### CVE-2024-55557 (2024-12-16)
|
||||
|
||||
<code>ui/pref/ProxyPrefView.java in weasis-core in Weasis 4.5.1 has a hardcoded key for symmetric encryption of proxy credentials.
|
||||
|
@ -11742,7 +11748,7 @@
|
|||
<code>Insecure Permissions vulnerability found in Extplorer File manager eXtplorer v.2.1.15 allows a remote attacker to execute arbitrary code via the index.php compenent
|
||||
</code>
|
||||
|
||||
- [tristao-marinho/CVE-2023-27842](https://github.com/tristao-marinho/CVE-2023-27842)
|
||||
- [tristao-io/CVE-2023-27842](https://github.com/tristao-io/CVE-2023-27842)
|
||||
- [cowsecurity/CVE-2023-27842](https://github.com/cowsecurity/CVE-2023-27842)
|
||||
|
||||
### CVE-2023-27997 (2023-06-13)
|
||||
|
@ -14821,7 +14827,7 @@
|
|||
<code>Buttercup v2.20.3 allows attackers to obtain the hash of the master password for the password manager via accessing the file /vaults.json/
|
||||
</code>
|
||||
|
||||
- [tristao-marinho/CVE-2023-41646](https://github.com/tristao-marinho/CVE-2023-41646)
|
||||
- [tristao-io/CVE-2023-41646](https://github.com/tristao-io/CVE-2023-41646)
|
||||
|
||||
### CVE-2023-41652 (2023-11-03)
|
||||
|
||||
|
@ -16385,13 +16391,13 @@
|
|||
- [vinnie1717/CVE-2023-48974](https://github.com/vinnie1717/CVE-2023-48974)
|
||||
|
||||
### CVE-2023-48981
|
||||
- [tristao-marinho/CVE-2023-48981](https://github.com/tristao-marinho/CVE-2023-48981)
|
||||
- [tristao-io/CVE-2023-48981](https://github.com/tristao-io/CVE-2023-48981)
|
||||
|
||||
### CVE-2023-48982
|
||||
- [tristao-marinho/CVE-2023-48982](https://github.com/tristao-marinho/CVE-2023-48982)
|
||||
- [tristao-io/CVE-2023-48982](https://github.com/tristao-io/CVE-2023-48982)
|
||||
|
||||
### CVE-2023-48983
|
||||
- [tristao-marinho/CVE-2023-48983](https://github.com/tristao-marinho/CVE-2023-48983)
|
||||
- [tristao-io/CVE-2023-48983](https://github.com/tristao-io/CVE-2023-48983)
|
||||
|
||||
### CVE-2023-49002 (2023-12-27)
|
||||
|
||||
|
@ -23393,7 +23399,7 @@
|
|||
<code>Insecure Permission vulnerability in Schlix Web Inc SCHLIX CMS 2.2.7-2 allows attacker to upload arbitrary files and execute arbitrary code via the tristao parameter. NOTE: this is disputed by the vendor because an admin is intentionally allowed to upload new executable PHP code, such as a theme that was obtained from a trusted source or was developed for their own website. Only an admin can upload such code, not someone else in an "attacker" role.
|
||||
</code>
|
||||
|
||||
- [tristao-marinho/CVE-2022-45544](https://github.com/tristao-marinho/CVE-2022-45544)
|
||||
- [tristao-io/CVE-2022-45544](https://github.com/tristao-io/CVE-2022-45544)
|
||||
|
||||
### CVE-2022-45599 (2023-02-22)
|
||||
|
||||
|
@ -34513,7 +34519,7 @@
|
|||
</code>
|
||||
|
||||
- [uf0o/CVE-2020-17382](https://github.com/uf0o/CVE-2020-17382)
|
||||
- [houseofxyz/CVE-2020-17382](https://github.com/houseofxyz/CVE-2020-17382)
|
||||
- [houseofint3/CVE-2020-17382](https://github.com/houseofint3/CVE-2020-17382)
|
||||
|
||||
### CVE-2020-17453 (2021-04-05)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue