mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/21 12:32:02
This commit is contained in:
parent
2304645eb8
commit
9ebf19b794
38 changed files with 313 additions and 104 deletions
|
@ -14,10 +14,10 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2024-12-15T07:06:04Z",
|
||||
"updated_at": "2024-12-21T07:10:47Z",
|
||||
"pushed_at": "2023-01-22T09:39:45Z",
|
||||
"stargazers_count": 389,
|
||||
"watchers_count": 389,
|
||||
"stargazers_count": 390,
|
||||
"watchers_count": 390,
|
||||
"has_discussions": false,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 110,
|
||||
"watchers": 389,
|
||||
"watchers": 390,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -246,5 +246,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 906576715,
|
||||
"name": "cve-2017-12149",
|
||||
"full_name": "zesnd\/cve-2017-12149",
|
||||
"owner": {
|
||||
"login": "zesnd",
|
||||
"id": 109968085,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109968085?v=4",
|
||||
"html_url": "https:\/\/github.com\/zesnd",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zesnd\/cve-2017-12149",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-21T09:38:36Z",
|
||||
"updated_at": "2024-12-21T09:39:32Z",
|
||||
"pushed_at": "2024-12-21T09:39:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-09T22:30:42Z",
|
||||
"updated_at": "2024-11-12T00:23:00Z",
|
||||
"updated_at": "2024-12-21T07:22:59Z",
|
||||
"pushed_at": "2023-09-28T18:58:28Z",
|
||||
"stargazers_count": 670,
|
||||
"watchers_count": 670,
|
||||
"stargazers_count": 669,
|
||||
"watchers_count": 669,
|
||||
"has_discussions": false,
|
||||
"forks_count": 131,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 131,
|
||||
"watchers": 670,
|
||||
"watchers": 669,
|
||||
"score": 0,
|
||||
"subscribers_count": 43
|
||||
},
|
||||
|
|
|
@ -954,5 +954,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 906576137,
|
||||
"name": "CVE-2020-14882-POC",
|
||||
"full_name": "zesnd\/CVE-2020-14882-POC",
|
||||
"owner": {
|
||||
"login": "zesnd",
|
||||
"id": 109968085,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109968085?v=4",
|
||||
"html_url": "https:\/\/github.com\/zesnd",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zesnd\/CVE-2020-14882-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-21T09:36:18Z",
|
||||
"updated_at": "2024-12-21T09:37:48Z",
|
||||
"pushed_at": "2024-12-21T09:37:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2024-12-17T10:32:29Z",
|
||||
"updated_at": "2024-12-21T10:46:19Z",
|
||||
"pushed_at": "2024-04-02T02:48:18Z",
|
||||
"stargazers_count": 412,
|
||||
"watchers_count": 412,
|
||||
"stargazers_count": 413,
|
||||
"watchers_count": 413,
|
||||
"has_discussions": false,
|
||||
"forks_count": 136,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 136,
|
||||
"watchers": 412,
|
||||
"watchers": 413,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -107,10 +107,10 @@
|
|||
"description": "CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-07T06:16:48Z",
|
||||
"updated_at": "2024-08-12T20:14:31Z",
|
||||
"updated_at": "2024-12-21T10:39:42Z",
|
||||
"pushed_at": "2021-07-07T07:19:03Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -125,7 +125,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -6374,10 +6374,10 @@
|
|||
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T23:33:51Z",
|
||||
"updated_at": "2024-12-11T09:38:58Z",
|
||||
"updated_at": "2024-12-21T07:23:09Z",
|
||||
"pushed_at": "2022-03-23T18:12:51Z",
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"stargazers_count": 344,
|
||||
"watchers_count": 344,
|
||||
"has_discussions": false,
|
||||
"forks_count": 87,
|
||||
"allow_forking": true,
|
||||
|
@ -6386,7 +6386,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 87,
|
||||
"watchers": 345,
|
||||
"watchers": 344,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-07T13:06:44Z",
|
||||
"updated_at": "2024-12-06T02:36:59Z",
|
||||
"updated_at": "2024-12-21T08:39:32Z",
|
||||
"pushed_at": "2024-11-07T13:38:18Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -696,10 +696,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T09:19:02Z",
|
||||
"updated_at": "2024-11-29T07:25:20Z",
|
||||
"updated_at": "2024-12-21T08:17:49Z",
|
||||
"pushed_at": "2022-06-07T10:35:18Z",
|
||||
"stargazers_count": 334,
|
||||
"watchers_count": 334,
|
||||
"stargazers_count": 335,
|
||||
"watchers_count": 335,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
|
@ -708,7 +708,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 334,
|
||||
"watchers": 335,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Attacks against QUIC (CVE-2022-30591)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-30T18:25:23Z",
|
||||
"updated_at": "2024-11-15T04:16:53Z",
|
||||
"updated_at": "2024-12-21T09:02:33Z",
|
||||
"pushed_at": "2022-12-31T01:55:15Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,19 +14,28 @@
|
|||
"description": "CVE-2022-39227 : Proof of Concept ",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-07T11:11:12Z",
|
||||
"updated_at": "2024-07-12T19:04:28Z",
|
||||
"updated_at": "2024-12-21T11:10:19Z",
|
||||
"pushed_at": "2024-03-19T14:37:31Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"ctf",
|
||||
"cve",
|
||||
"cve-2022-39227",
|
||||
"exploit",
|
||||
"hackthebox",
|
||||
"it-security",
|
||||
"jwt",
|
||||
"jwt-token"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1423,7 +1423,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-02-08T20:55:09Z",
|
||||
"updated_at": "2024-02-08T20:55:23Z",
|
||||
"pushed_at": "2024-12-17T18:06:54Z",
|
||||
"pushed_at": "2024-12-21T12:11:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -45,7 +45,7 @@
|
|||
"description": "harbor unauthorized detection",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-21T10:40:19Z",
|
||||
"updated_at": "2024-12-21T04:46:10Z",
|
||||
"updated_at": "2024-12-21T08:30:28Z",
|
||||
"pushed_at": "2024-12-12T07:37:01Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "MOC3ingbird Exploit for Live2D (CVE-2023-27566)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-03T01:57:28Z",
|
||||
"updated_at": "2024-12-18T12:41:54Z",
|
||||
"updated_at": "2024-12-21T11:03:49Z",
|
||||
"pushed_at": "2023-09-19T01:12:41Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"has_discussions": true,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 81,
|
||||
"watchers": 82,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T20:32:45Z",
|
||||
"updated_at": "2024-12-20T19:04:31Z",
|
||||
"updated_at": "2024-12-21T09:53:25Z",
|
||||
"pushed_at": "2024-10-05T20:37:02Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-12-20T13:21:17Z",
|
||||
"updated_at": "2024-12-21T10:33:12Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1305,
|
||||
"watchers_count": 1305,
|
||||
"stargazers_count": 1306,
|
||||
"watchers_count": 1306,
|
||||
"has_discussions": false,
|
||||
"forks_count": 221,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 221,
|
||||
"watchers": 1305,
|
||||
"watchers": 1306,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -392,10 +392,10 @@
|
|||
"description": "CVE-2023-7028 POC && Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-21T04:14:55Z",
|
||||
"updated_at": "2024-10-08T09:02:23Z",
|
||||
"updated_at": "2024-12-21T06:40:31Z",
|
||||
"pushed_at": "2024-08-21T04:16:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -404,7 +404,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-21306 BadBlue implementation (Using DuckyScript)",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-06T02:05:02Z",
|
||||
"updated_at": "2024-12-15T09:33:29Z",
|
||||
"updated_at": "2024-12-21T07:04:49Z",
|
||||
"pushed_at": "2024-07-11T05:13:43Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -344,5 +344,36 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 906538490,
|
||||
"name": "HFS2.3_poc",
|
||||
"full_name": "NingXin2002\/HFS2.3_poc",
|
||||
"owner": {
|
||||
"login": "NingXin2002",
|
||||
"id": 138864342,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4",
|
||||
"html_url": "https:\/\/github.com\/NingXin2002",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NingXin2002\/HFS2.3_poc",
|
||||
"description": "HFS2.3未经身份验证的远程代码执行(CVE-2024-23692)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-21T07:13:11Z",
|
||||
"updated_at": "2024-12-21T07:14:30Z",
|
||||
"pushed_at": "2024-12-21T07:14:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -461,6 +461,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -265,10 +265,10 @@
|
|||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T18:25:46Z",
|
||||
"updated_at": "2024-12-19T20:46:08Z",
|
||||
"updated_at": "2024-12-21T09:47:59Z",
|
||||
"pushed_at": "2024-08-27T12:22:39Z",
|
||||
"stargazers_count": 637,
|
||||
"watchers_count": 637,
|
||||
"stargazers_count": 636,
|
||||
"watchers_count": 636,
|
||||
"has_discussions": false,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
|
@ -277,7 +277,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 637,
|
||||
"watchers": 636,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-03T08:56:59Z",
|
||||
"updated_at": "2024-12-18T10:56:35Z",
|
||||
"updated_at": "2024-12-21T07:19:27Z",
|
||||
"pushed_at": "2024-11-18T23:48:31Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -45,7 +45,7 @@
|
|||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T20:32:45Z",
|
||||
"updated_at": "2024-12-20T19:04:31Z",
|
||||
"updated_at": "2024-12-21T09:53:25Z",
|
||||
"pushed_at": "2024-10-05T20:37:02Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
|
|
33
2024/CVE-2024-39914.json
Normal file
33
2024/CVE-2024-39914.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 906558100,
|
||||
"name": "FOG-Project",
|
||||
"full_name": "9874621368\/FOG-Project",
|
||||
"owner": {
|
||||
"login": "9874621368",
|
||||
"id": 154233216,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154233216?v=4",
|
||||
"html_url": "https:\/\/github.com\/9874621368",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/9874621368\/FOG-Project",
|
||||
"description": "FOG Project CVE-2024-39914 命令执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-21T08:30:00Z",
|
||||
"updated_at": "2024-12-21T08:33:57Z",
|
||||
"pushed_at": "2024-12-21T08:33:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -59,6 +59,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -60,5 +60,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 906575821,
|
||||
"name": "cve-2024-CVE-2024-41713",
|
||||
"full_name": "Sanandd\/cve-2024-CVE-2024-41713",
|
||||
"owner": {
|
||||
"login": "Sanandd",
|
||||
"id": 192220387,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192220387?v=4",
|
||||
"html_url": "https:\/\/github.com\/Sanandd",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Sanandd\/cve-2024-CVE-2024-41713",
|
||||
"description": "cve-2024-CVE-2024-41713",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-21T09:35:12Z",
|
||||
"updated_at": "2024-12-21T09:36:20Z",
|
||||
"pushed_at": "2024-12-21T09:36:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup\/Arbitrary Options Update\/Administrative User Creation",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-12T10:03:14Z",
|
||||
"updated_at": "2024-10-15T23:45:27Z",
|
||||
"updated_at": "2024-12-21T07:07:20Z",
|
||||
"pushed_at": "2024-06-12T10:23:05Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-18T01:06:54Z",
|
||||
"updated_at": "2024-12-20T03:34:26Z",
|
||||
"updated_at": "2024-12-21T06:46:18Z",
|
||||
"pushed_at": "2024-12-18T01:17:11Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -59,7 +59,7 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 906070879,
|
||||
|
@ -90,7 +90,7 @@
|
|||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 906416890,
|
||||
|
@ -121,6 +121,37 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 906517672,
|
||||
"name": "Tomcat-CVE-2024-50379-Poc",
|
||||
"full_name": "ph0ebus\/Tomcat-CVE-2024-50379-Poc",
|
||||
"owner": {
|
||||
"login": "ph0ebus",
|
||||
"id": 108201283,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108201283?v=4",
|
||||
"html_url": "https:\/\/github.com\/ph0ebus",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ph0ebus\/Tomcat-CVE-2024-50379-Poc",
|
||||
"description": "RCE through a race condition in Apache Tomcat",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-21T05:54:29Z",
|
||||
"updated_at": "2024-12-21T08:57:38Z",
|
||||
"pushed_at": "2024-12-21T08:56:44Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T17:42:55Z",
|
||||
"updated_at": "2024-12-21T01:51:32Z",
|
||||
"updated_at": "2024-12-21T07:55:19Z",
|
||||
"pushed_at": "2024-12-20T10:05:15Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-20T03:34:01Z",
|
||||
"updated_at": "2024-12-21T05:14:20Z",
|
||||
"pushed_at": "2024-12-20T04:26:44Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"updated_at": "2024-12-21T10:59:02Z",
|
||||
"pushed_at": "2024-12-21T10:28:39Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -26,8 +26,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -274,7 +274,7 @@
|
|||
"stargazers_count": 460,
|
||||
"watchers_count": 460,
|
||||
"has_discussions": false,
|
||||
"forks_count": 88,
|
||||
"forks_count": 89,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -286,7 +286,7 @@
|
|||
"redteam"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 88,
|
||||
"forks": 89,
|
||||
"watchers": 460,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-10T06:27:59Z",
|
||||
"updated_at": "2024-12-16T08:03:54Z",
|
||||
"updated_at": "2024-12-21T06:44:02Z",
|
||||
"pushed_at": "2024-10-17T05:12:29Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -214,6 +214,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "SourceCodester Online Eyewear Shop Remote File Inclusion Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-28T15:58:54Z",
|
||||
"updated_at": "2024-09-28T16:06:34Z",
|
||||
"updated_at": "2024-12-21T06:40:14Z",
|
||||
"pushed_at": "2024-09-28T16:06:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "All-in-One WP Migration and Backup <= 7.86 - Authenticated (Administrator+) Arbitrary PHP Code Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-29T19:34:59Z",
|
||||
"updated_at": "2024-10-29T21:42:00Z",
|
||||
"updated_at": "2024-12-21T06:52:20Z",
|
||||
"pushed_at": "2024-10-27T21:45:12Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
12
README.md
12
README.md
|
@ -3086,6 +3086,7 @@
|
|||
- [pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692](https://github.com/pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692)
|
||||
- [verylazytech/CVE-2024-23692](https://github.com/verylazytech/CVE-2024-23692)
|
||||
- [XiaomingX/cve-2024-23692-poc](https://github.com/XiaomingX/cve-2024-23692-poc)
|
||||
- [NingXin2002/HFS2.3_poc](https://github.com/NingXin2002/HFS2.3_poc)
|
||||
|
||||
### CVE-2024-23708 (2024-05-07)
|
||||
|
||||
|
@ -5917,6 +5918,13 @@
|
|||
|
||||
- [SpiralBL0CK/CVE-2024-39908](https://github.com/SpiralBL0CK/CVE-2024-39908)
|
||||
|
||||
### CVE-2024-39914 (2024-07-12)
|
||||
|
||||
<code>FOG is a cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.34, packages/web/lib/fog/reportmaker.class.php in FOG was affected by a command injection via the filename parameter to /fog/management/export.php. This vulnerability is fixed in 1.5.10.34.
|
||||
</code>
|
||||
|
||||
- [9874621368/FOG-Project](https://github.com/9874621368/FOG-Project)
|
||||
|
||||
### CVE-2024-39929 (2024-07-04)
|
||||
|
||||
<code>Exim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users.
|
||||
|
@ -6213,6 +6221,7 @@
|
|||
|
||||
- [watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713](https://github.com/watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713)
|
||||
- [zxj-hub/CVE-2024-41713POC](https://github.com/zxj-hub/CVE-2024-41713POC)
|
||||
- [Sanandd/cve-2024-CVE-2024-41713](https://github.com/Sanandd/cve-2024-CVE-2024-41713)
|
||||
|
||||
### CVE-2024-41958 (2024-08-05)
|
||||
|
||||
|
@ -7094,6 +7103,7 @@
|
|||
- [JFOZ1010/Nuclei-Template-CVE-2024-50379](https://github.com/JFOZ1010/Nuclei-Template-CVE-2024-50379)
|
||||
- [iSee857/CVE-2024-50379-PoC](https://github.com/iSee857/CVE-2024-50379-PoC)
|
||||
- [Alchemist3dot14/CVE-2024-50379](https://github.com/Alchemist3dot14/CVE-2024-50379)
|
||||
- [ph0ebus/Tomcat-CVE-2024-50379-Poc](https://github.com/ph0ebus/Tomcat-CVE-2024-50379-Poc)
|
||||
|
||||
### CVE-2024-50395 (2024-11-22)
|
||||
|
||||
|
@ -33075,6 +33085,7 @@
|
|||
- [Danny-LLi/CVE-2020-14882](https://github.com/Danny-LLi/CVE-2020-14882)
|
||||
- [LucasPDiniz/CVE-2020-14882](https://github.com/LucasPDiniz/CVE-2020-14882)
|
||||
- [xMr110/CVE-2020-14882](https://github.com/xMr110/CVE-2020-14882)
|
||||
- [zesnd/CVE-2020-14882-POC](https://github.com/zesnd/CVE-2020-14882-POC)
|
||||
|
||||
### CVE-2020-14883 (2020-10-21)
|
||||
|
||||
|
@ -44144,6 +44155,7 @@
|
|||
- [VVeakee/CVE-2017-12149](https://github.com/VVeakee/CVE-2017-12149)
|
||||
- [MrE-Fog/jboss-_CVE-2017-12149](https://github.com/MrE-Fog/jboss-_CVE-2017-12149)
|
||||
- [JesseClarkND/CVE-2017-12149](https://github.com/JesseClarkND/CVE-2017-12149)
|
||||
- [zesnd/cve-2017-12149](https://github.com/zesnd/cve-2017-12149)
|
||||
|
||||
### CVE-2017-12426 (2017-08-14)
|
||||
|
||||
|
|
Loading…
Reference in a new issue