mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/17 00:32:18
This commit is contained in:
parent
240a568e4f
commit
9d171c6b40
28 changed files with 100 additions and 130 deletions
|
@ -546,13 +546,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-09T15:13:25Z",
|
||||
"updated_at": "2024-11-06T02:08:21Z",
|
||||
"updated_at": "2024-12-16T21:39:31Z",
|
||||
"pushed_at": "2021-07-29T12:00:48Z",
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 138,
|
||||
"watchers": 139,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Fork of the send module to deal with CVE-2017-20165",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-11T10:20:27Z",
|
||||
"updated_at": "2024-12-16T06:01:30Z",
|
||||
"pushed_at": "2024-12-16T06:01:33Z",
|
||||
"updated_at": "2024-12-16T20:04:38Z",
|
||||
"pushed_at": "2024-12-16T20:04:36Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-07T06:45:27Z",
|
||||
"updated_at": "2024-12-09T14:22:47Z",
|
||||
"updated_at": "2024-12-16T18:24:16Z",
|
||||
"pushed_at": "2022-06-26T06:08:02Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 101,
|
||||
"watchers": 102,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Apache OFBiz 16.11.04 is susceptible to XML external entity injection (XXE injection)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-24T12:23:21Z",
|
||||
"updated_at": "2024-06-21T06:39:42Z",
|
||||
"updated_at": "2024-12-16T20:11:35Z",
|
||||
"pushed_at": "2024-06-21T06:43:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -45,7 +45,7 @@
|
|||
"description": "CVE-2020-11023 PoC for bug bounty.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-03T02:35:37Z",
|
||||
"updated_at": "2024-06-05T16:58:15Z",
|
||||
"updated_at": "2024-12-16T18:31:44Z",
|
||||
"pushed_at": "2024-01-03T02:40:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -176,10 +176,10 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2024-12-08T14:49:17Z",
|
||||
"updated_at": "2024-12-16T19:07:57Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 636,
|
||||
"watchers_count": 636,
|
||||
"stargazers_count": 637,
|
||||
"watchers_count": 637,
|
||||
"has_discussions": false,
|
||||
"forks_count": 146,
|
||||
"allow_forking": true,
|
||||
|
@ -188,7 +188,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 146,
|
||||
"watchers": 636,
|
||||
"watchers": 637,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -3746,6 +3746,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2022-21660",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-10T05:50:35Z",
|
||||
"updated_at": "2024-08-19T12:18:08Z",
|
||||
"updated_at": "2024-12-16T23:26:40Z",
|
||||
"pushed_at": "2022-01-10T05:52:03Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -31,7 +31,7 @@
|
|||
"prestashop"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF\/Contact\/LDAP) syslink control href attribute escape, which was not fully fixed as CVE-2022-44666 in the patches released on December, 2022.",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-15T18:12:04Z",
|
||||
"updated_at": "2024-12-09T01:45:01Z",
|
||||
"updated_at": "2024-12-16T20:11:41Z",
|
||||
"pushed_at": "2023-06-18T21:10:39Z",
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 153,
|
||||
"watchers": 154,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-12-16T13:26:52Z",
|
||||
"updated_at": "2024-12-16T21:28:43Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1297,
|
||||
"watchers_count": 1297,
|
||||
"stargazers_count": 1299,
|
||||
"watchers_count": 1299,
|
||||
"has_discussions": false,
|
||||
"forks_count": 221,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 221,
|
||||
"watchers": 1297,
|
||||
"watchers": 1299,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A Proof of Concept for CVE-2023-50564 vulnerability in Pluck CMS version 4.7.18",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-21T20:15:10Z",
|
||||
"updated_at": "2024-12-07T09:46:34Z",
|
||||
"updated_at": "2024-12-16T18:54:55Z",
|
||||
"pushed_at": "2024-11-27T03:32:02Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2023-51518: Preauthenticated Java Deserialization via JMX in Apache James",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-03T19:48:53Z",
|
||||
"updated_at": "2024-06-03T20:13:29Z",
|
||||
"updated_at": "2024-12-16T20:25:17Z",
|
||||
"pushed_at": "2024-06-03T20:09:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-10793 poc exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-17T18:44:53Z",
|
||||
"updated_at": "2024-11-18T20:09:02Z",
|
||||
"updated_at": "2024-12-16T19:35:50Z",
|
||||
"pushed_at": "2024-11-17T19:51:53Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-12-16T13:59:35Z",
|
||||
"updated_at": "2024-12-16T23:05:21Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2300,
|
||||
"watchers_count": 2300,
|
||||
"stargazers_count": 2301,
|
||||
"watchers_count": 2301,
|
||||
"has_discussions": false,
|
||||
"forks_count": 297,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 297,
|
||||
"watchers": 2300,
|
||||
"watchers": 2301,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -45,8 +45,8 @@
|
|||
"description": "Proof of concept of the CVE-2024-24549, Exploit in Python. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-09T04:59:07Z",
|
||||
"updated_at": "2024-12-12T13:53:58Z",
|
||||
"pushed_at": "2024-12-09T05:09:43Z",
|
||||
"updated_at": "2024-12-16T23:48:16Z",
|
||||
"pushed_at": "2024-12-16T23:48:12Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-09T08:08:07Z",
|
||||
"updated_at": "2024-12-06T09:40:39Z",
|
||||
"updated_at": "2024-12-16T23:49:39Z",
|
||||
"pushed_at": "2024-04-13T09:02:39Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-13T19:30:20Z",
|
||||
"updated_at": "2024-12-16T00:30:08Z",
|
||||
"updated_at": "2024-12-16T23:17:33Z",
|
||||
"pushed_at": "2024-11-29T16:56:23Z",
|
||||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"stargazers_count": 222,
|
||||
"watchers_count": 222,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 221,
|
||||
"forks": 47,
|
||||
"watchers": 222,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -265,10 +265,10 @@
|
|||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T18:25:46Z",
|
||||
"updated_at": "2024-12-11T00:30:32Z",
|
||||
"updated_at": "2024-12-16T19:49:24Z",
|
||||
"pushed_at": "2024-08-27T12:22:39Z",
|
||||
"stargazers_count": 634,
|
||||
"watchers_count": 634,
|
||||
"stargazers_count": 635,
|
||||
"watchers_count": 635,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -277,7 +277,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 634,
|
||||
"watchers": 635,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T19:24:55Z",
|
||||
"updated_at": "2024-12-11T21:46:18Z",
|
||||
"updated_at": "2024-12-16T18:49:12Z",
|
||||
"pushed_at": "2024-12-09T22:58:22Z",
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 129,
|
||||
"watchers": 130,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-14T09:22:33Z",
|
||||
"updated_at": "2024-12-16T11:37:07Z",
|
||||
"updated_at": "2024-12-17T00:04:07Z",
|
||||
"pushed_at": "2024-12-14T10:13:45Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 16,
|
||||
"forks": 8,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -154,43 +154,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 893561658,
|
||||
"name": "needrestart-vulnerability-poc",
|
||||
"full_name": "njeru-codes\/needrestart-vulnerability-poc",
|
||||
"owner": {
|
||||
"login": "njeru-codes",
|
||||
"id": 111843624,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111843624?v=4",
|
||||
"html_url": "https:\/\/github.com\/njeru-codes",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/njeru-codes\/needrestart-vulnerability-poc",
|
||||
"description": "A Local Privilege Escalation poc scipts for CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224, and CVE-2024-11003",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-24T18:54:42Z",
|
||||
"updated_at": "2024-11-24T19:14:23Z",
|
||||
"pushed_at": "2024-11-24T19:14:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2024-10224",
|
||||
"cve-2024-11003",
|
||||
"cve-2024-48990",
|
||||
"cve-2024-48991",
|
||||
"cve-2024-48992"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 893730273,
|
||||
"name": "CVE-2024-48990-Exploit",
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "A short scraper looking for a POC of CVE-2024-49112",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-16T13:41:40Z",
|
||||
"updated_at": "2024-12-16T16:12:54Z",
|
||||
"pushed_at": "2024-12-16T14:12:03Z",
|
||||
"updated_at": "2024-12-16T19:35:06Z",
|
||||
"pushed_at": "2024-12-16T19:35:02Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-11T14:19:55Z",
|
||||
"updated_at": "2024-12-16T16:19:14Z",
|
||||
"updated_at": "2024-12-16T20:09:24Z",
|
||||
"pushed_at": "2024-12-11T14:23:19Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T17:42:55Z",
|
||||
"updated_at": "2024-12-16T12:06:11Z",
|
||||
"updated_at": "2024-12-16T19:31:01Z",
|
||||
"pushed_at": "2024-12-16T09:23:33Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-19T13:50:52Z",
|
||||
"updated_at": "2024-12-09T22:38:11Z",
|
||||
"pushed_at": "2024-11-21T17:43:56Z",
|
||||
"updated_at": "2024-12-16T20:15:32Z",
|
||||
"pushed_at": "2024-12-16T20:15:28Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"has_discussions": false,
|
||||
|
|
13
README.md
13
README.md
|
@ -4303,7 +4303,11 @@
|
|||
|
||||
- [swsmith2391/CVE-2024-29510](https://github.com/swsmith2391/CVE-2024-29510)
|
||||
|
||||
### CVE-2024-29671
|
||||
### CVE-2024-29671 (2024-12-16)
|
||||
|
||||
<code>Buffer Overflow vulnerability in NEXTU FLATA AX1500 Router v.1.0.2 allows a remote attacker to execute arbitrary code via the POST request handler component.
|
||||
</code>
|
||||
|
||||
- [laskdjlaskdj12/CVE-2024-29671-POC](https://github.com/laskdjlaskdj12/CVE-2024-29671-POC)
|
||||
|
||||
### CVE-2024-29824 (2024-05-31)
|
||||
|
@ -6914,7 +6918,6 @@
|
|||
- [felmoltor/CVE-2024-48990](https://github.com/felmoltor/CVE-2024-48990)
|
||||
- [Cyb3rFr0g/CVE-2024-48990-PoC](https://github.com/Cyb3rFr0g/CVE-2024-48990-PoC)
|
||||
- [pentestfunctions/CVE-2024-48990-PoC-Testing](https://github.com/pentestfunctions/CVE-2024-48990-PoC-Testing)
|
||||
- [njeru-codes/needrestart-vulnerability-poc](https://github.com/njeru-codes/needrestart-vulnerability-poc)
|
||||
- [ally-petitt/CVE-2024-48990-Exploit](https://github.com/ally-petitt/CVE-2024-48990-Exploit)
|
||||
- [r0xdeadbeef/CVE-2024-48990](https://github.com/r0xdeadbeef/CVE-2024-48990)
|
||||
- [CyberCrowCC/CVE-2024-48990](https://github.com/CyberCrowCC/CVE-2024-48990)
|
||||
|
@ -7472,7 +7475,11 @@
|
|||
|
||||
- [kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-](https://github.com/kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-)
|
||||
|
||||
### CVE-2024-55557
|
||||
### CVE-2024-55557 (2024-12-16)
|
||||
|
||||
<code>ui/pref/ProxyPrefView.java in weasis-core in Weasis 4.5.1 has a hardcoded key for symmetric encryption of proxy credentials.
|
||||
</code>
|
||||
|
||||
- [partywavesec/CVE-2024-55557](https://github.com/partywavesec/CVE-2024-55557)
|
||||
|
||||
### CVE-2024-55587 (2024-12-11)
|
||||
|
|
Loading…
Reference in a new issue