mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/17 00:32:18
This commit is contained in:
parent
240a568e4f
commit
9d171c6b40
28 changed files with 100 additions and 130 deletions
|
@ -546,13 +546,13 @@
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 2,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2017-10-09T15:13:25Z",
|
"created_at": "2017-10-09T15:13:25Z",
|
||||||
"updated_at": "2024-11-06T02:08:21Z",
|
"updated_at": "2024-12-16T21:39:31Z",
|
||||||
"pushed_at": "2021-07-29T12:00:48Z",
|
"pushed_at": "2021-07-29T12:00:48Z",
|
||||||
"stargazers_count": 138,
|
"stargazers_count": 139,
|
||||||
"watchers_count": 138,
|
"watchers_count": 139,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 50,
|
"forks_count": 50,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -32,7 +32,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 50,
|
"forks": 50,
|
||||||
"watchers": 138,
|
"watchers": 139,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 11
|
"subscribers_count": 11
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,8 +14,8 @@
|
||||||
"description": "Fork of the send module to deal with CVE-2017-20165",
|
"description": "Fork of the send module to deal with CVE-2017-20165",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-01-11T10:20:27Z",
|
"created_at": "2023-01-11T10:20:27Z",
|
||||||
"updated_at": "2024-12-16T06:01:30Z",
|
"updated_at": "2024-12-16T20:04:38Z",
|
||||||
"pushed_at": "2024-12-16T06:01:33Z",
|
"pushed_at": "2024-12-16T20:04:36Z",
|
||||||
"stargazers_count": 13,
|
"stargazers_count": 13,
|
||||||
"watchers_count": 13,
|
"watchers_count": 13,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019",
|
"description": "TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-02-07T06:45:27Z",
|
"created_at": "2019-02-07T06:45:27Z",
|
||||||
"updated_at": "2024-12-09T14:22:47Z",
|
"updated_at": "2024-12-16T18:24:16Z",
|
||||||
"pushed_at": "2022-06-26T06:08:02Z",
|
"pushed_at": "2022-06-26T06:08:02Z",
|
||||||
"stargazers_count": 101,
|
"stargazers_count": 102,
|
||||||
"watchers_count": 101,
|
"watchers_count": 102,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 20,
|
"forks_count": 20,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -34,7 +34,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 20,
|
"forks": 20,
|
||||||
"watchers": 101,
|
"watchers": 102,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 12
|
"subscribers_count": 12
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Apache OFBiz 16.11.04 is susceptible to XML external entity injection (XXE injection)",
|
"description": "Apache OFBiz 16.11.04 is susceptible to XML external entity injection (XXE injection)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-04-24T12:23:21Z",
|
"created_at": "2024-04-24T12:23:21Z",
|
||||||
"updated_at": "2024-06-21T06:39:42Z",
|
"updated_at": "2024-12-16T20:11:35Z",
|
||||||
"pushed_at": "2024-06-21T06:43:10Z",
|
"pushed_at": "2024-06-21T06:43:10Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 0,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -32,7 +32,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -45,7 +45,7 @@
|
||||||
"description": "CVE-2020-11023 PoC for bug bounty.",
|
"description": "CVE-2020-11023 PoC for bug bounty.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-01-03T02:35:37Z",
|
"created_at": "2024-01-03T02:35:37Z",
|
||||||
"updated_at": "2024-06-05T16:58:15Z",
|
"updated_at": "2024-12-16T18:31:44Z",
|
||||||
"pushed_at": "2024-01-03T02:40:45Z",
|
"pushed_at": "2024-01-03T02:40:45Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
|
|
|
@ -176,10 +176,10 @@
|
||||||
"description": "Exploit for zerologon cve-2020-1472",
|
"description": "Exploit for zerologon cve-2020-1472",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-09-14T19:19:07Z",
|
"created_at": "2020-09-14T19:19:07Z",
|
||||||
"updated_at": "2024-12-08T14:49:17Z",
|
"updated_at": "2024-12-16T19:07:57Z",
|
||||||
"pushed_at": "2020-10-15T18:31:15Z",
|
"pushed_at": "2020-10-15T18:31:15Z",
|
||||||
"stargazers_count": 636,
|
"stargazers_count": 637,
|
||||||
"watchers_count": 636,
|
"watchers_count": 637,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 146,
|
"forks_count": 146,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -188,7 +188,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 146,
|
"forks": 146,
|
||||||
"watchers": 636,
|
"watchers": 637,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 12
|
"subscribers_count": 12
|
||||||
},
|
},
|
||||||
|
|
|
@ -3746,6 +3746,6 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "CVE-2022-21660",
|
"description": "CVE-2022-21660",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-01-10T05:50:35Z",
|
"created_at": "2022-01-10T05:50:35Z",
|
||||||
"updated_at": "2024-08-19T12:18:08Z",
|
"updated_at": "2024-12-16T23:26:40Z",
|
||||||
"pushed_at": "2022-01-10T05:52:03Z",
|
"pushed_at": "2022-01-10T05:52:03Z",
|
||||||
"stargazers_count": 26,
|
"stargazers_count": 27,
|
||||||
"watchers_count": 26,
|
"watchers_count": 27,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 2,
|
||||||
"watchers": 26,
|
"watchers": 27,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -19,7 +19,7 @@
|
||||||
"stargazers_count": 41,
|
"stargazers_count": 41,
|
||||||
"watchers_count": 41,
|
"watchers_count": 41,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 5,
|
"forks_count": 6,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
|
@ -31,7 +31,7 @@
|
||||||
"prestashop"
|
"prestashop"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 5,
|
"forks": 6,
|
||||||
"watchers": 41,
|
"watchers": 41,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 10
|
"subscribers_count": 10
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF\/Contact\/LDAP) syslink control href attribute escape, which was not fully fixed as CVE-2022-44666 in the patches released on December, 2022.",
|
"description": "Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF\/Contact\/LDAP) syslink control href attribute escape, which was not fully fixed as CVE-2022-44666 in the patches released on December, 2022.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-02-15T18:12:04Z",
|
"created_at": "2023-02-15T18:12:04Z",
|
||||||
"updated_at": "2024-12-09T01:45:01Z",
|
"updated_at": "2024-12-16T20:11:41Z",
|
||||||
"pushed_at": "2023-06-18T21:10:39Z",
|
"pushed_at": "2023-06-18T21:10:39Z",
|
||||||
"stargazers_count": 153,
|
"stargazers_count": 154,
|
||||||
"watchers_count": 153,
|
"watchers_count": 154,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 26,
|
"forks_count": 26,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 26,
|
"forks": 26,
|
||||||
"watchers": 153,
|
"watchers": 154,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 6
|
"subscribers_count": 6
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-01-16T06:52:02Z",
|
"created_at": "2024-01-16T06:52:02Z",
|
||||||
"updated_at": "2024-12-16T13:26:52Z",
|
"updated_at": "2024-12-16T21:28:43Z",
|
||||||
"pushed_at": "2024-08-18T08:26:46Z",
|
"pushed_at": "2024-08-18T08:26:46Z",
|
||||||
"stargazers_count": 1297,
|
"stargazers_count": 1299,
|
||||||
"watchers_count": 1297,
|
"watchers_count": 1299,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 221,
|
"forks_count": 221,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 221,
|
"forks": 221,
|
||||||
"watchers": 1297,
|
"watchers": 1299,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 21
|
"subscribers_count": 21
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "A Proof of Concept for CVE-2023-50564 vulnerability in Pluck CMS version 4.7.18",
|
"description": "A Proof of Concept for CVE-2023-50564 vulnerability in Pluck CMS version 4.7.18",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-21T20:15:10Z",
|
"created_at": "2024-07-21T20:15:10Z",
|
||||||
"updated_at": "2024-12-07T09:46:34Z",
|
"updated_at": "2024-12-16T18:54:55Z",
|
||||||
"pushed_at": "2024-11-27T03:32:02Z",
|
"pushed_at": "2024-11-27T03:32:02Z",
|
||||||
"stargazers_count": 19,
|
"stargazers_count": 20,
|
||||||
"watchers_count": 19,
|
"watchers_count": 20,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 19,
|
"watchers": 20,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "CVE-2023-51518: Preauthenticated Java Deserialization via JMX in Apache James",
|
"description": "CVE-2023-51518: Preauthenticated Java Deserialization via JMX in Apache James",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-06-03T19:48:53Z",
|
"created_at": "2024-06-03T19:48:53Z",
|
||||||
"updated_at": "2024-06-03T20:13:29Z",
|
"updated_at": "2024-12-16T20:25:17Z",
|
||||||
"pushed_at": "2024-06-03T20:09:42Z",
|
"pushed_at": "2024-06-03T20:09:42Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 0,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -34,7 +34,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "CVE-2024-10793 poc exploit",
|
"description": "CVE-2024-10793 poc exploit",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-11-17T18:44:53Z",
|
"created_at": "2024-11-17T18:44:53Z",
|
||||||
"updated_at": "2024-11-18T20:09:02Z",
|
"updated_at": "2024-12-16T19:35:50Z",
|
||||||
"pushed_at": "2024-11-17T19:51:53Z",
|
"pushed_at": "2024-11-17T19:51:53Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 3,
|
"watchers_count": 4,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 3,
|
"watchers": 4,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-03-20T21:16:41Z",
|
"created_at": "2024-03-20T21:16:41Z",
|
||||||
"updated_at": "2024-12-16T13:59:35Z",
|
"updated_at": "2024-12-16T23:05:21Z",
|
||||||
"pushed_at": "2024-04-17T16:09:54Z",
|
"pushed_at": "2024-04-17T16:09:54Z",
|
||||||
"stargazers_count": 2300,
|
"stargazers_count": 2301,
|
||||||
"watchers_count": 2300,
|
"watchers_count": 2301,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 297,
|
"forks_count": 297,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -32,7 +32,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 297,
|
"forks": 297,
|
||||||
"watchers": 2300,
|
"watchers": 2301,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 26
|
"subscribers_count": 26
|
||||||
},
|
},
|
||||||
|
|
|
@ -45,8 +45,8 @@
|
||||||
"description": "Proof of concept of the CVE-2024-24549, Exploit in Python. ",
|
"description": "Proof of concept of the CVE-2024-24549, Exploit in Python. ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-09T04:59:07Z",
|
"created_at": "2024-12-09T04:59:07Z",
|
||||||
"updated_at": "2024-12-12T13:53:58Z",
|
"updated_at": "2024-12-16T23:48:16Z",
|
||||||
"pushed_at": "2024-12-09T05:09:43Z",
|
"pushed_at": "2024-12-16T23:48:12Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 6,
|
||||||
"watchers_count": 6,
|
"watchers_count": 6,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested)",
|
"description": "Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-04-09T08:08:07Z",
|
"created_at": "2024-04-09T08:08:07Z",
|
||||||
"updated_at": "2024-12-06T09:40:39Z",
|
"updated_at": "2024-12-16T23:49:39Z",
|
||||||
"pushed_at": "2024-04-13T09:02:39Z",
|
"pushed_at": "2024-04-13T09:02:39Z",
|
||||||
"stargazers_count": 13,
|
"stargazers_count": 14,
|
||||||
"watchers_count": 13,
|
"watchers_count": 14,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -33,7 +33,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 13,
|
"watchers": 14,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,19 +14,19 @@
|
||||||
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
|
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-13T19:30:20Z",
|
"created_at": "2024-10-13T19:30:20Z",
|
||||||
"updated_at": "2024-12-16T00:30:08Z",
|
"updated_at": "2024-12-16T23:17:33Z",
|
||||||
"pushed_at": "2024-11-29T16:56:23Z",
|
"pushed_at": "2024-11-29T16:56:23Z",
|
||||||
"stargazers_count": 221,
|
"stargazers_count": 222,
|
||||||
"watchers_count": 221,
|
"watchers_count": 222,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 46,
|
"forks_count": 47,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 46,
|
"forks": 47,
|
||||||
"watchers": 221,
|
"watchers": 222,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 6
|
"subscribers_count": 6
|
||||||
},
|
},
|
||||||
|
|
|
@ -265,10 +265,10 @@
|
||||||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-24T18:25:46Z",
|
"created_at": "2024-08-24T18:25:46Z",
|
||||||
"updated_at": "2024-12-11T00:30:32Z",
|
"updated_at": "2024-12-16T19:49:24Z",
|
||||||
"pushed_at": "2024-08-27T12:22:39Z",
|
"pushed_at": "2024-08-27T12:22:39Z",
|
||||||
"stargazers_count": 634,
|
"stargazers_count": 635,
|
||||||
"watchers_count": 634,
|
"watchers_count": 635,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 116,
|
"forks_count": 116,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -277,7 +277,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 116,
|
"forks": 116,
|
||||||
"watchers": 634,
|
"watchers": 635,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability",
|
"description": "CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-09-24T19:24:55Z",
|
"created_at": "2024-09-24T19:24:55Z",
|
||||||
"updated_at": "2024-12-11T21:46:18Z",
|
"updated_at": "2024-12-16T18:49:12Z",
|
||||||
"pushed_at": "2024-12-09T22:58:22Z",
|
"pushed_at": "2024-12-09T22:58:22Z",
|
||||||
"stargazers_count": 129,
|
"stargazers_count": 130,
|
||||||
"watchers_count": 129,
|
"watchers_count": 130,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 26,
|
"forks_count": 26,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 26,
|
"forks": 26,
|
||||||
"watchers": 129,
|
"watchers": 130,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,19 +14,19 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-14T09:22:33Z",
|
"created_at": "2024-12-14T09:22:33Z",
|
||||||
"updated_at": "2024-12-16T11:37:07Z",
|
"updated_at": "2024-12-17T00:04:07Z",
|
||||||
"pushed_at": "2024-12-14T10:13:45Z",
|
"pushed_at": "2024-12-14T10:13:45Z",
|
||||||
"stargazers_count": 16,
|
"stargazers_count": 19,
|
||||||
"watchers_count": 16,
|
"watchers_count": 19,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 7,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 8,
|
||||||
"watchers": 16,
|
"watchers": 19,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -154,43 +154,6 @@
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"id": 893561658,
|
|
||||||
"name": "needrestart-vulnerability-poc",
|
|
||||||
"full_name": "njeru-codes\/needrestart-vulnerability-poc",
|
|
||||||
"owner": {
|
|
||||||
"login": "njeru-codes",
|
|
||||||
"id": 111843624,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111843624?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/njeru-codes",
|
|
||||||
"user_view_type": "public"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/njeru-codes\/needrestart-vulnerability-poc",
|
|
||||||
"description": "A Local Privilege Escalation poc scipts for CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224, and CVE-2024-11003",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2024-11-24T18:54:42Z",
|
|
||||||
"updated_at": "2024-11-24T19:14:23Z",
|
|
||||||
"pushed_at": "2024-11-24T19:14:19Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"has_discussions": false,
|
|
||||||
"forks_count": 0,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [
|
|
||||||
"cve-2024-10224",
|
|
||||||
"cve-2024-11003",
|
|
||||||
"cve-2024-48990",
|
|
||||||
"cve-2024-48991",
|
|
||||||
"cve-2024-48992"
|
|
||||||
],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0,
|
|
||||||
"subscribers_count": 1
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 893730273,
|
"id": 893730273,
|
||||||
"name": "CVE-2024-48990-Exploit",
|
"name": "CVE-2024-48990-Exploit",
|
||||||
|
|
|
@ -14,8 +14,8 @@
|
||||||
"description": "A short scraper looking for a POC of CVE-2024-49112",
|
"description": "A short scraper looking for a POC of CVE-2024-49112",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-16T13:41:40Z",
|
"created_at": "2024-12-16T13:41:40Z",
|
||||||
"updated_at": "2024-12-16T16:12:54Z",
|
"updated_at": "2024-12-16T19:35:06Z",
|
||||||
"pushed_at": "2024-12-16T14:12:03Z",
|
"pushed_at": "2024-12-16T19:35:02Z",
|
||||||
"stargazers_count": 4,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 4,
|
"watchers_count": 4,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
|
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-11T14:19:55Z",
|
"created_at": "2024-12-11T14:19:55Z",
|
||||||
"updated_at": "2024-12-16T16:19:14Z",
|
"updated_at": "2024-12-16T20:09:24Z",
|
||||||
"pushed_at": "2024-12-11T14:23:19Z",
|
"pushed_at": "2024-12-11T14:23:19Z",
|
||||||
"stargazers_count": 18,
|
"stargazers_count": 19,
|
||||||
"watchers_count": 18,
|
"watchers_count": 19,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 5,
|
"forks_count": 5,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 5,
|
"forks": 5,
|
||||||
"watchers": 18,
|
"watchers": 19,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-13T17:42:55Z",
|
"created_at": "2024-12-13T17:42:55Z",
|
||||||
"updated_at": "2024-12-16T12:06:11Z",
|
"updated_at": "2024-12-16T19:31:01Z",
|
||||||
"pushed_at": "2024-12-16T09:23:33Z",
|
"pushed_at": "2024-12-16T09:23:33Z",
|
||||||
"stargazers_count": 8,
|
"stargazers_count": 9,
|
||||||
"watchers_count": 8,
|
"watchers_count": 9,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 5,
|
"forks_count": 5,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -57,7 +57,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 5,
|
"forks": 5,
|
||||||
"watchers": 8,
|
"watchers": 9,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,8 +14,8 @@
|
||||||
"description": "Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)",
|
"description": "Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-19T13:50:52Z",
|
"created_at": "2024-10-19T13:50:52Z",
|
||||||
"updated_at": "2024-12-09T22:38:11Z",
|
"updated_at": "2024-12-16T20:15:32Z",
|
||||||
"pushed_at": "2024-11-21T17:43:56Z",
|
"pushed_at": "2024-12-16T20:15:28Z",
|
||||||
"stargazers_count": 88,
|
"stargazers_count": 88,
|
||||||
"watchers_count": 88,
|
"watchers_count": 88,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
13
README.md
13
README.md
|
@ -4303,7 +4303,11 @@
|
||||||
|
|
||||||
- [swsmith2391/CVE-2024-29510](https://github.com/swsmith2391/CVE-2024-29510)
|
- [swsmith2391/CVE-2024-29510](https://github.com/swsmith2391/CVE-2024-29510)
|
||||||
|
|
||||||
### CVE-2024-29671
|
### CVE-2024-29671 (2024-12-16)
|
||||||
|
|
||||||
|
<code>Buffer Overflow vulnerability in NEXTU FLATA AX1500 Router v.1.0.2 allows a remote attacker to execute arbitrary code via the POST request handler component.
|
||||||
|
</code>
|
||||||
|
|
||||||
- [laskdjlaskdj12/CVE-2024-29671-POC](https://github.com/laskdjlaskdj12/CVE-2024-29671-POC)
|
- [laskdjlaskdj12/CVE-2024-29671-POC](https://github.com/laskdjlaskdj12/CVE-2024-29671-POC)
|
||||||
|
|
||||||
### CVE-2024-29824 (2024-05-31)
|
### CVE-2024-29824 (2024-05-31)
|
||||||
|
@ -6914,7 +6918,6 @@
|
||||||
- [felmoltor/CVE-2024-48990](https://github.com/felmoltor/CVE-2024-48990)
|
- [felmoltor/CVE-2024-48990](https://github.com/felmoltor/CVE-2024-48990)
|
||||||
- [Cyb3rFr0g/CVE-2024-48990-PoC](https://github.com/Cyb3rFr0g/CVE-2024-48990-PoC)
|
- [Cyb3rFr0g/CVE-2024-48990-PoC](https://github.com/Cyb3rFr0g/CVE-2024-48990-PoC)
|
||||||
- [pentestfunctions/CVE-2024-48990-PoC-Testing](https://github.com/pentestfunctions/CVE-2024-48990-PoC-Testing)
|
- [pentestfunctions/CVE-2024-48990-PoC-Testing](https://github.com/pentestfunctions/CVE-2024-48990-PoC-Testing)
|
||||||
- [njeru-codes/needrestart-vulnerability-poc](https://github.com/njeru-codes/needrestart-vulnerability-poc)
|
|
||||||
- [ally-petitt/CVE-2024-48990-Exploit](https://github.com/ally-petitt/CVE-2024-48990-Exploit)
|
- [ally-petitt/CVE-2024-48990-Exploit](https://github.com/ally-petitt/CVE-2024-48990-Exploit)
|
||||||
- [r0xdeadbeef/CVE-2024-48990](https://github.com/r0xdeadbeef/CVE-2024-48990)
|
- [r0xdeadbeef/CVE-2024-48990](https://github.com/r0xdeadbeef/CVE-2024-48990)
|
||||||
- [CyberCrowCC/CVE-2024-48990](https://github.com/CyberCrowCC/CVE-2024-48990)
|
- [CyberCrowCC/CVE-2024-48990](https://github.com/CyberCrowCC/CVE-2024-48990)
|
||||||
|
@ -7472,7 +7475,11 @@
|
||||||
|
|
||||||
- [kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-](https://github.com/kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-)
|
- [kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-](https://github.com/kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-)
|
||||||
|
|
||||||
### CVE-2024-55557
|
### CVE-2024-55557 (2024-12-16)
|
||||||
|
|
||||||
|
<code>ui/pref/ProxyPrefView.java in weasis-core in Weasis 4.5.1 has a hardcoded key for symmetric encryption of proxy credentials.
|
||||||
|
</code>
|
||||||
|
|
||||||
- [partywavesec/CVE-2024-55557](https://github.com/partywavesec/CVE-2024-55557)
|
- [partywavesec/CVE-2024-55557](https://github.com/partywavesec/CVE-2024-55557)
|
||||||
|
|
||||||
### CVE-2024-55587 (2024-12-11)
|
### CVE-2024-55587 (2024-12-11)
|
||||||
|
|
Loading…
Reference in a new issue