mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2025/01/13 12:33:40
This commit is contained in:
parent
0cc79627f1
commit
a68d6b8f4a
31 changed files with 224 additions and 144 deletions
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2014-4322 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2015-08-16T00:02:45Z",
|
||||
"updated_at": "2024-10-01T14:26:56Z",
|
||||
"updated_at": "2025-01-13T10:27:47Z",
|
||||
"pushed_at": "2016-01-24T16:19:47Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Local root exploit for Nexus5 Android 4.4.4(KTU84P)",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-26T06:33:52Z",
|
||||
"updated_at": "2024-07-12T09:42:33Z",
|
||||
"updated_at": "2025-01-13T07:23:51Z",
|
||||
"pushed_at": "2015-01-27T09:43:42Z",
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"has_discussions": false,
|
||||
"forks_count": 79,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 79,
|
||||
"watchers": 146,
|
||||
"watchers": 147,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-12-20T12:12:59Z",
|
||||
"updated_at": "2024-09-27T09:58:16Z",
|
||||
"updated_at": "2025-01-13T07:10:03Z",
|
||||
"pushed_at": "2019-01-31T23:27:45Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -76,10 +76,10 @@
|
|||
"description": "This repository contains a Proof of Concept (PoC) for CVE-2015-9251, a vulnerability in jQuery versions prior to 3.0.0 that allows attackers to perform Cross-Site Scripting (XSS) attacks under certain conditions.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-08T10:03:02Z",
|
||||
"updated_at": "2025-01-09T08:28:30Z",
|
||||
"updated_at": "2025-01-13T07:10:15Z",
|
||||
"pushed_at": "2025-01-09T08:28:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -429,10 +429,10 @@
|
|||
"description": "An exploit for Apache Struts CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-12T02:02:25Z",
|
||||
"updated_at": "2025-01-07T21:31:09Z",
|
||||
"updated_at": "2025-01-13T08:45:03Z",
|
||||
"pushed_at": "2018-05-21T18:33:26Z",
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"stargazers_count": 428,
|
||||
"watchers_count": 428,
|
||||
"has_discussions": false,
|
||||
"forks_count": 135,
|
||||
"allow_forking": true,
|
||||
|
@ -447,7 +447,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 135,
|
||||
"watchers": 429,
|
||||
"watchers": 428,
|
||||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
},
|
||||
|
|
|
@ -458,10 +458,10 @@
|
|||
"description": "Identify hikvision ip and probe for cve-s (CVE-2017-7921, CVE-2022-28171, CVE-2021-36260)",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T13:02:18Z",
|
||||
"updated_at": "2024-11-26T13:23:21Z",
|
||||
"updated_at": "2025-01-13T11:38:52Z",
|
||||
"pushed_at": "2024-11-26T13:21:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -470,7 +470,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -55,13 +55,13 @@
|
|||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"forks": 61,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
@ -112,10 +112,10 @@
|
|||
"description": "CVE-2019-0708-exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T02:24:21Z",
|
||||
"updated_at": "2024-11-20T06:13:32Z",
|
||||
"updated_at": "2025-01-13T10:04:30Z",
|
||||
"pushed_at": "2019-05-15T02:26:46Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -124,7 +124,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 117,
|
||||
"watchers": 118,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -422,10 +422,10 @@
|
|||
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T15:01:38Z",
|
||||
"updated_at": "2024-11-01T02:37:48Z",
|
||||
"updated_at": "2025-01-13T09:59:12Z",
|
||||
"pushed_at": "2019-06-13T13:07:03Z",
|
||||
"stargazers_count": 388,
|
||||
"watchers_count": 388,
|
||||
"stargazers_count": 389,
|
||||
"watchers_count": 389,
|
||||
"has_discussions": false,
|
||||
"forks_count": 189,
|
||||
"allow_forking": true,
|
||||
|
@ -445,7 +445,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 189,
|
||||
"watchers": 388,
|
||||
"watchers": 389,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
@ -1747,10 +1747,10 @@
|
|||
"description": "Only Hitting PoC [Tested on Windows Server 2008 r2]",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-28T02:25:21Z",
|
||||
"updated_at": "2024-10-07T22:23:45Z",
|
||||
"updated_at": "2025-01-13T10:03:50Z",
|
||||
"pushed_at": "2019-05-28T02:46:19Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -1759,7 +1759,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 127,
|
||||
"watchers": 128,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
@ -1995,10 +1995,10 @@
|
|||
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-31T00:04:12Z",
|
||||
"updated_at": "2024-10-02T21:50:49Z",
|
||||
"updated_at": "2025-01-13T10:23:37Z",
|
||||
"pushed_at": "2021-01-10T04:31:22Z",
|
||||
"stargazers_count": 344,
|
||||
"watchers_count": 344,
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"has_discussions": false,
|
||||
"forks_count": 125,
|
||||
"allow_forking": true,
|
||||
|
@ -2007,7 +2007,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 125,
|
||||
"watchers": 344,
|
||||
"watchers": 345,
|
||||
"score": 0,
|
||||
"subscribers_count": 30
|
||||
},
|
||||
|
@ -3086,10 +3086,10 @@
|
|||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T02:22:29Z",
|
||||
"updated_at": "2025-01-08T03:08:59Z",
|
||||
"updated_at": "2025-01-13T10:01:48Z",
|
||||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 323,
|
||||
"watchers_count": 323,
|
||||
"stargazers_count": 324,
|
||||
"watchers_count": 324,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -3098,7 +3098,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 323,
|
||||
"watchers": 324,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -3148,10 +3148,10 @@
|
|||
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-15T19:33:53Z",
|
||||
"updated_at": "2024-12-20T16:56:29Z",
|
||||
"updated_at": "2025-01-13T10:48:31Z",
|
||||
"pushed_at": "2022-03-28T04:10:20Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -3160,7 +3160,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -3644,10 +3644,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-02T12:03:12Z",
|
||||
"updated_at": "2024-06-02T12:08:26Z",
|
||||
"updated_at": "2025-01-13T10:34:49Z",
|
||||
"pushed_at": "2024-06-02T12:08:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -3656,7 +3656,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2024-12-22T19:40:46Z",
|
||||
"updated_at": "2025-01-13T08:49:52Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1800,
|
||||
"watchers_count": 1800,
|
||||
"stargazers_count": 1801,
|
||||
"watchers_count": 1801,
|
||||
"has_discussions": false,
|
||||
"forks_count": 249,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 249,
|
||||
"watchers": 1800,
|
||||
"watchers": 1801,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -132,13 +132,13 @@
|
|||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"has_discussions": false,
|
||||
"forks_count": 61,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"forks": 62,
|
||||
"watchers": 181,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
|
|
|
@ -265,10 +265,10 @@
|
|||
"description": "Identify hikvision ip and probe for cve-s (CVE-2017-7921, CVE-2022-28171, CVE-2021-36260)",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T13:02:18Z",
|
||||
"updated_at": "2024-11-26T13:23:21Z",
|
||||
"updated_at": "2025-01-13T11:38:52Z",
|
||||
"pushed_at": "2024-11-26T13:21:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -277,7 +277,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -386,7 +386,7 @@
|
|||
"stargazers_count": 1112,
|
||||
"watchers_count": 1112,
|
||||
"has_discussions": false,
|
||||
"forks_count": 535,
|
||||
"forks_count": 536,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -394,7 +394,7 @@
|
|||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 535,
|
||||
"forks": 536,
|
||||
"watchers": 1112,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
|
|
|
@ -1163,10 +1163,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2025-01-11T20:50:39Z",
|
||||
"updated_at": "2025-01-13T06:46:17Z",
|
||||
"pushed_at": "2023-05-20T05:55:45Z",
|
||||
"stargazers_count": 565,
|
||||
"watchers_count": 565,
|
||||
"stargazers_count": 566,
|
||||
"watchers_count": 566,
|
||||
"has_discussions": false,
|
||||
"forks_count": 144,
|
||||
"allow_forking": true,
|
||||
|
@ -1175,7 +1175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 144,
|
||||
"watchers": 565,
|
||||
"watchers": 566,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -266,10 +266,10 @@
|
|||
"description": "警惕 一种针对红队的新型溯源手段!",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-27T15:48:19Z",
|
||||
"updated_at": "2025-01-03T19:17:19Z",
|
||||
"updated_at": "2025-01-13T10:03:02Z",
|
||||
"pushed_at": "2022-07-27T15:55:01Z",
|
||||
"stargazers_count": 395,
|
||||
"watchers_count": 395,
|
||||
"stargazers_count": 396,
|
||||
"watchers_count": 396,
|
||||
"has_discussions": false,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
|
@ -278,7 +278,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 395,
|
||||
"watchers": 396,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -112,13 +112,13 @@
|
|||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 12,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Identify hikvision ip and probe for cve-s (CVE-2017-7921, CVE-2022-28171, CVE-2021-36260)",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T13:02:18Z",
|
||||
"updated_at": "2024-11-26T13:23:21Z",
|
||||
"updated_at": "2025-01-13T11:38:52Z",
|
||||
"pushed_at": "2024-11-26T13:21:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1121,10 +1121,10 @@
|
|||
"description": "All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word. This is a very simple POC, feel free to check the sources below for more threat intelligence.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-03T00:25:37Z",
|
||||
"updated_at": "2024-07-17T14:32:06Z",
|
||||
"updated_at": "2025-01-13T07:54:46Z",
|
||||
"pushed_at": "2022-08-06T01:04:51Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -1133,7 +1133,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -606,10 +606,10 @@
|
|||
"description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-26T02:34:44Z",
|
||||
"updated_at": "2024-12-29T10:33:38Z",
|
||||
"updated_at": "2025-01-13T08:27:08Z",
|
||||
"pushed_at": "2024-04-24T02:34:16Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -618,7 +618,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-20T07:14:06Z",
|
||||
"updated_at": "2025-01-13T05:51:37Z",
|
||||
"updated_at": "2025-01-13T09:07:02Z",
|
||||
"pushed_at": "2024-01-21T05:04:01Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "POC - CVE-2024–10914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-10T12:01:21Z",
|
||||
"updated_at": "2024-12-30T21:06:51Z",
|
||||
"updated_at": "2025-01-13T09:55:07Z",
|
||||
"pushed_at": "2024-11-27T08:26:29Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -65,7 +65,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T16:02:56Z",
|
||||
"updated_at": "2024-11-27T08:32:37Z",
|
||||
"updated_at": "2025-01-13T09:56:20Z",
|
||||
"pushed_at": "2024-07-05T16:06:16Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -957,13 +957,13 @@
|
|||
"stargazers_count": 3506,
|
||||
"watchers_count": 3506,
|
||||
"has_discussions": false,
|
||||
"forks_count": 240,
|
||||
"forks_count": 239,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 240,
|
||||
"forks": 239,
|
||||
"watchers": 3506,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-03T08:56:59Z",
|
||||
"updated_at": "2025-01-04T03:15:45Z",
|
||||
"updated_at": "2025-01-13T10:22:54Z",
|
||||
"pushed_at": "2024-11-18T23:48:31Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 48,
|
||||
"forks": 24,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-05T06:13:57Z",
|
||||
"updated_at": "2025-01-09T08:12:34Z",
|
||||
"updated_at": "2025-01-13T07:40:10Z",
|
||||
"pushed_at": "2024-12-05T07:55:04Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-07T21:03:30Z",
|
||||
"updated_at": "2025-01-12T23:38:11Z",
|
||||
"updated_at": "2025-01-13T12:27:15Z",
|
||||
"pushed_at": "2024-11-14T16:25:52Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-01T15:48:38Z",
|
||||
"updated_at": "2025-01-13T05:39:08Z",
|
||||
"updated_at": "2025-01-13T10:22:25Z",
|
||||
"pushed_at": "2025-01-02T16:07:23Z",
|
||||
"stargazers_count": 431,
|
||||
"watchers_count": 431,
|
||||
"stargazers_count": 437,
|
||||
"watchers_count": 437,
|
||||
"has_discussions": false,
|
||||
"forks_count": 102,
|
||||
"forks_count": 103,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 102,
|
||||
"watchers": 431,
|
||||
"forks": 103,
|
||||
"watchers": 437,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -45,10 +45,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-03T07:05:33Z",
|
||||
"updated_at": "2025-01-11T11:34:30Z",
|
||||
"updated_at": "2025-01-13T09:53:17Z",
|
||||
"pushed_at": "2025-01-03T08:20:03Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -76,10 +76,10 @@
|
|||
"description": "Hi, This is to check targets vulnerable for CVE-2024-49113 in bulk, faster.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-06T11:59:02Z",
|
||||
"updated_at": "2025-01-10T16:41:30Z",
|
||||
"updated_at": "2025-01-13T09:53:19Z",
|
||||
"pushed_at": "2025-01-06T12:04:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
33
2024/CVE-2024-50404.json
Normal file
33
2024/CVE-2024-50404.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 916015819,
|
||||
"name": "CVE-2024-50404",
|
||||
"full_name": "C411e\/CVE-2024-50404",
|
||||
"owner": {
|
||||
"login": "C411e",
|
||||
"id": 35147719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35147719?v=4",
|
||||
"html_url": "https:\/\/github.com\/C411e",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/C411e\/CVE-2024-50404",
|
||||
"description": "CVE-2024-50404",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-13T09:47:03Z",
|
||||
"updated_at": "2025-01-13T10:15:15Z",
|
||||
"pushed_at": "2025-01-13T10:15:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-12T11:20:21Z",
|
||||
"updated_at": "2025-01-12T23:10:49Z",
|
||||
"updated_at": "2025-01-13T10:07:24Z",
|
||||
"pushed_at": "2025-01-12T16:35:36Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
33
2024/CVE-2024-53691.json
Normal file
33
2024/CVE-2024-53691.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 916024485,
|
||||
"name": "CVE-2024-53691",
|
||||
"full_name": "C411e\/CVE-2024-53691",
|
||||
"owner": {
|
||||
"login": "C411e",
|
||||
"id": 35147719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35147719?v=4",
|
||||
"html_url": "https:\/\/github.com\/C411e",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/C411e\/CVE-2024-53691",
|
||||
"description": "CVE-2024-53691",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-13T10:07:25Z",
|
||||
"updated_at": "2025-01-13T10:17:01Z",
|
||||
"pushed_at": "2025-01-13T10:16:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Escape macOS Sandbox using sharedfilelistd exploit",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-08T09:55:44Z",
|
||||
"updated_at": "2025-01-13T02:16:47Z",
|
||||
"updated_at": "2025-01-13T08:23:43Z",
|
||||
"pushed_at": "2025-01-09T06:34:50Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 27,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-25T08:16:38Z",
|
||||
"updated_at": "2024-12-21T21:10:32Z",
|
||||
"updated_at": "2025-01-13T10:10:25Z",
|
||||
"pushed_at": "2024-12-21T21:09:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
14
README.md
14
README.md
|
@ -7481,6 +7481,13 @@
|
|||
|
||||
- [neko-hat/CVE-2024-50395](https://github.com/neko-hat/CVE-2024-50395)
|
||||
|
||||
### CVE-2024-50404 (2024-12-06)
|
||||
|
||||
<code>A link following vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.\n\nWe have already fixed the vulnerability in the following versions:\nQsync Central 4.4.0.16_20240819 ( 2024/08/19 ) and later
|
||||
</code>
|
||||
|
||||
- [C411e/CVE-2024-50404](https://github.com/C411e/CVE-2024-50404)
|
||||
|
||||
### CVE-2024-50427 (2024-10-29)
|
||||
|
||||
<code>Unrestricted Upload of File with Dangerous Type vulnerability in Devsoft Baltic OÜ SurveyJS: Drag & Drop WordPress Form Builder.This issue affects SurveyJS: Drag & Drop WordPress Form Builder: from n/a through 1.9.136.
|
||||
|
@ -8016,6 +8023,13 @@
|
|||
- [punitdarji/Apache-struts-cve-2024-53677](https://github.com/punitdarji/Apache-struts-cve-2024-53677)
|
||||
- [SeanRickerd/CVE-2024-53677](https://github.com/SeanRickerd/CVE-2024-53677)
|
||||
|
||||
### CVE-2024-53691 (2024-12-06)
|
||||
|
||||
<code>A link following vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.8.2823 build 20240712 and later\nQTS 5.2.0.2802 build 20240620 and later\nQuTS hero h5.1.8.2823 build 20240712 and later\nQuTS hero h5.2.0.2802 build 20240620 and later
|
||||
</code>
|
||||
|
||||
- [C411e/CVE-2024-53691](https://github.com/C411e/CVE-2024-53691)
|
||||
|
||||
### CVE-2024-54152 (2024-12-10)
|
||||
|
||||
<code>Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument.
|
||||
|
|
Loading…
Reference in a new issue