mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/04 18:32:59
This commit is contained in:
parent
088987f975
commit
a81adc1cfe
41 changed files with 278 additions and 213 deletions
|
@ -14,10 +14,10 @@
|
|||
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T09:51:12Z",
|
||||
"updated_at": "2024-10-26T07:00:18Z",
|
||||
"updated_at": "2024-12-04T13:06:28Z",
|
||||
"pushed_at": "2024-05-03T22:24:07Z",
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -47,7 +47,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 186,
|
||||
"watchers": 187,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit PoC for Spring RCE issue (CVE-2011-2894)",
|
||||
"fork": false,
|
||||
"created_at": "2013-07-31T08:48:19Z",
|
||||
"updated_at": "2024-08-12T19:22:43Z",
|
||||
"updated_at": "2024-12-04T13:48:05Z",
|
||||
"pushed_at": "2023-12-17T23:28:49Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -596,10 +596,10 @@
|
|||
"description": "OpenSSH 2.3 < 7.7 - Username Enumeration",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-29T17:36:11Z",
|
||||
"updated_at": "2024-11-29T03:21:01Z",
|
||||
"updated_at": "2024-12-04T16:01:30Z",
|
||||
"pushed_at": "2023-09-04T20:57:42Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -608,7 +608,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -481,6 +481,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -45,8 +45,8 @@
|
|||
"description": "A tool for retrieving login credentials from Netwave IP cameras using a memory dump vulnerability (CVE-2018-17240)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-04T21:44:21Z",
|
||||
"updated_at": "2024-12-02T17:21:33Z",
|
||||
"pushed_at": "2024-12-04T09:38:17Z",
|
||||
"updated_at": "2024-12-04T16:36:36Z",
|
||||
"pushed_at": "2024-12-04T16:36:35Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -107,8 +107,8 @@
|
|||
"description": "CVE-2018-25031 tests",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:41:22Z",
|
||||
"updated_at": "2024-10-01T11:51:08Z",
|
||||
"pushed_at": "2024-10-01T11:51:04Z",
|
||||
"updated_at": "2024-12-04T13:45:34Z",
|
||||
"pushed_at": "2024-12-04T13:45:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -83,10 +83,10 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2024-12-03T02:18:25Z",
|
||||
"updated_at": "2024-12-04T15:23:57Z",
|
||||
"pushed_at": "2021-01-08T10:31:22Z",
|
||||
"stargazers_count": 580,
|
||||
"watchers_count": 580,
|
||||
"stargazers_count": 581,
|
||||
"watchers_count": 581,
|
||||
"has_discussions": false,
|
||||
"forks_count": 173,
|
||||
"allow_forking": true,
|
||||
|
@ -105,7 +105,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 173,
|
||||
"watchers": 580,
|
||||
"watchers": 581,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -1618,10 +1618,10 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2024-12-04T08:31:06Z",
|
||||
"updated_at": "2024-12-04T14:42:22Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 897,
|
||||
"watchers_count": 897,
|
||||
"stargazers_count": 898,
|
||||
"watchers_count": 898,
|
||||
"has_discussions": false,
|
||||
"forks_count": 242,
|
||||
"allow_forking": true,
|
||||
|
@ -1630,7 +1630,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 242,
|
||||
"watchers": 897,
|
||||
"watchers": 898,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
|
File diff suppressed because one or more lines are too long
|
@ -510,10 +510,10 @@
|
|||
"description": "This is a Python 3 version of this exploit. Hope it works!!!",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-20T10:04:13Z",
|
||||
"updated_at": "2024-07-25T13:41:37Z",
|
||||
"updated_at": "2024-12-04T16:46:23Z",
|
||||
"pushed_at": "2024-07-25T13:41:33Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -522,7 +522,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -233,10 +233,10 @@
|
|||
"description": "Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-07T15:03:07Z",
|
||||
"updated_at": "2024-12-01T16:37:55Z",
|
||||
"updated_at": "2024-12-04T12:15:00Z",
|
||||
"pushed_at": "2022-09-04T14:16:50Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -250,7 +250,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Demo Android application for CVE-2019-9465",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-19T13:57:11Z",
|
||||
"updated_at": "2024-01-16T16:26:24Z",
|
||||
"updated_at": "2024-12-04T12:15:09Z",
|
||||
"pushed_at": "2020-02-19T13:57:29Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -200,10 +200,10 @@
|
|||
"description": "A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-28T09:20:38Z",
|
||||
"updated_at": "2024-12-04T12:14:41Z",
|
||||
"updated_at": "2024-12-04T12:15:16Z",
|
||||
"pushed_at": "2023-11-21T13:32:01Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -227,7 +227,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 12,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1004,10 +1004,10 @@
|
|||
"description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-26T13:53:10Z",
|
||||
"updated_at": "2024-11-26T06:33:17Z",
|
||||
"updated_at": "2024-12-04T12:19:38Z",
|
||||
"pushed_at": "2021-10-17T13:29:56Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -1019,7 +1019,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 182,
|
||||
"watchers": 181,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -1088,37 +1088,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 447489190,
|
||||
"name": "CVE-2021-26084",
|
||||
"full_name": "ZZ-SOCMAP\/CVE-2021-26084",
|
||||
"owner": {
|
||||
"login": "ZZ-SOCMAP",
|
||||
"id": 98105412,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZZ-SOCMAP",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2021-26084",
|
||||
"description": "POC of CVE-2021-26084, which is Atlassian Confluence Server OGNL(Object-Graph Navigation Language) Pre-Auth RCE Injection Vulneralibity.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-13T06:29:51Z",
|
||||
"updated_at": "2024-09-19T01:54:41Z",
|
||||
"pushed_at": "2022-01-14T04:21:27Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 661577991,
|
||||
"name": "CVE-2021-26084-EXP",
|
||||
|
|
|
@ -922,5 +922,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 898590201,
|
||||
"name": "hoh4",
|
||||
"full_name": "Prabesh01\/hoh4",
|
||||
"owner": {
|
||||
"login": "Prabesh01",
|
||||
"id": 51240439,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51240439?v=4",
|
||||
"html_url": "https:\/\/github.com\/Prabesh01",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Prabesh01\/hoh4",
|
||||
"description": "Modified version of laravel ignition RCE (CVE-2021-3129) exploit script for Hour of Hack Session-4",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T17:04:03Z",
|
||||
"updated_at": "2024-12-04T18:08:39Z",
|
||||
"pushed_at": "2024-12-04T18:08:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -82,19 +82,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T12:10:49Z",
|
||||
"updated_at": "2024-12-03T20:36:34Z",
|
||||
"updated_at": "2024-12-04T15:34:42Z",
|
||||
"pushed_at": "2021-07-02T12:17:50Z",
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"stargazers_count": 264,
|
||||
"watchers_count": 264,
|
||||
"has_discussions": false,
|
||||
"forks_count": 67,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 263,
|
||||
"forks": 68,
|
||||
"watchers": 264,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -50,10 +50,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2024-12-03T21:56:46Z",
|
||||
"updated_at": "2024-12-04T13:16:44Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 812,
|
||||
"watchers_count": 812,
|
||||
"stargazers_count": 813,
|
||||
"watchers_count": 813,
|
||||
"has_discussions": false,
|
||||
"forks_count": 124,
|
||||
"allow_forking": true,
|
||||
|
@ -62,7 +62,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 124,
|
||||
"watchers": 812,
|
||||
"watchers": 813,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -129,5 +129,36 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 898463801,
|
||||
"name": "CVE-2022-1386",
|
||||
"full_name": "lamcodeofpwnosec\/CVE-2022-1386",
|
||||
"owner": {
|
||||
"login": "lamcodeofpwnosec",
|
||||
"id": 47277287,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47277287?v=4",
|
||||
"html_url": "https:\/\/github.com\/lamcodeofpwnosec",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lamcodeofpwnosec\/CVE-2022-1386",
|
||||
"description": "Fusion Builder < 3.6.2 - Unauthenticated SSRF",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T12:48:53Z",
|
||||
"updated_at": "2024-12-04T12:51:24Z",
|
||||
"pushed_at": "2024-12-04T12:51:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Apache CouchDB 3.2.1 - Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-20T04:28:51Z",
|
||||
"updated_at": "2024-08-12T20:23:25Z",
|
||||
"updated_at": "2024-12-04T13:36:36Z",
|
||||
"pushed_at": "2022-05-20T04:32:13Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1,33 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 572578872,
|
||||
"name": "CVE-2022-41049-POC",
|
||||
"full_name": "Nathan01110011\/CVE-2022-41049-POC",
|
||||
"owner": {
|
||||
"login": "Nathan01110011",
|
||||
"id": 43985198,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43985198?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nathan01110011",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nathan01110011\/CVE-2022-41049-POC",
|
||||
"description": "POC of Microcorp vuln",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-30T15:19:43Z",
|
||||
"updated_at": "2023-11-18T03:11:21Z",
|
||||
"pushed_at": "2022-11-30T15:28:18Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2023-23192",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T08:06:55Z",
|
||||
"updated_at": "2024-02-02T09:11:31Z",
|
||||
"updated_at": "2024-12-04T18:15:39Z",
|
||||
"pushed_at": "2023-03-27T07:42:56Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -358,8 +358,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T11:57:35Z",
|
||||
"updated_at": "2024-12-04T12:25:03Z",
|
||||
"pushed_at": "2024-12-04T12:24:59Z",
|
||||
"updated_at": "2024-12-04T12:53:41Z",
|
||||
"pushed_at": "2024-12-04T12:53:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-01T20:16:28Z",
|
||||
"updated_at": "2024-12-02T07:08:37Z",
|
||||
"updated_at": "2024-12-04T18:15:42Z",
|
||||
"pushed_at": "2024-02-12T03:18:54Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 70,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-04T11:58:21Z",
|
||||
"updated_at": "2024-11-21T12:27:37Z",
|
||||
"updated_at": "2024-12-04T14:17:30Z",
|
||||
"pushed_at": "2023-11-06T07:26:30Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -233,10 +233,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-09T11:27:20Z",
|
||||
"updated_at": "2023-11-15T10:22:43Z",
|
||||
"updated_at": "2024-12-04T14:17:17Z",
|
||||
"pushed_at": "2023-11-09T11:36:18Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -245,7 +245,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -236,7 +236,7 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -247,7 +247,7 @@
|
|||
"paloaltonetworks"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T12:30:53Z",
|
||||
"updated_at": "2024-12-04T10:06:57Z",
|
||||
"updated_at": "2024-12-04T15:02:41Z",
|
||||
"pushed_at": "2024-12-02T06:29:52Z",
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 262,
|
||||
"watchers": 263,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-12-03T07:17:07Z",
|
||||
"updated_at": "2024-12-04T17:39:32Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2294,
|
||||
"watchers_count": 2294,
|
||||
"stargazers_count": 2297,
|
||||
"watchers_count": 2297,
|
||||
"has_discussions": false,
|
||||
"forks_count": 299,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 299,
|
||||
"watchers": 2294,
|
||||
"watchers": 2297,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -610,19 +610,19 @@
|
|||
"description": "POC for CVE-2024-23897 Jenkins File-Read ",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T07:16:04Z",
|
||||
"updated_at": "2024-12-03T15:06:34Z",
|
||||
"updated_at": "2024-12-04T18:06:10Z",
|
||||
"pushed_at": "2024-02-17T16:39:19Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 17,
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "Auto exploitation tool for CVE-2024-24401. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-18T20:05:46Z",
|
||||
"updated_at": "2024-11-24T15:15:19Z",
|
||||
"updated_at": "2024-12-04T17:52:45Z",
|
||||
"pushed_at": "2024-09-07T03:02:43Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
|
|
|
@ -1907,8 +1907,8 @@
|
|||
"description": "hihihihaa",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-08T10:57:17Z",
|
||||
"updated_at": "2024-11-21T12:20:22Z",
|
||||
"pushed_at": "2024-11-21T12:20:19Z",
|
||||
"updated_at": "2024-12-04T16:21:49Z",
|
||||
"pushed_at": "2024-12-04T16:21:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -642,5 +642,45 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 898539017,
|
||||
"name": "magento2-encryption-key-manager-cli",
|
||||
"full_name": "wubinworks\/magento2-encryption-key-manager-cli",
|
||||
"owner": {
|
||||
"login": "wubinworks",
|
||||
"id": 127310257,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127310257?v=4",
|
||||
"html_url": "https:\/\/github.com\/wubinworks",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wubinworks\/magento2-encryption-key-manager-cli",
|
||||
"description": "A utility for Magento 2 encryption key rotation and management. CVE-2024-34102(aka Cosmic Sting) victims can use it as an aftercare.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T15:19:19Z",
|
||||
"updated_at": "2024-12-04T15:52:29Z",
|
||||
"pushed_at": "2024-12-04T15:47:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cli",
|
||||
"cosmic-sting",
|
||||
"cve-2024-34102",
|
||||
"deployment-automation",
|
||||
"encryption-key",
|
||||
"key-generation",
|
||||
"key-rotation",
|
||||
"magento2"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-18T23:34:34Z",
|
||||
"updated_at": "2024-12-04T12:22:21Z",
|
||||
"updated_at": "2024-12-04T15:35:36Z",
|
||||
"pushed_at": "2024-11-18T23:48:31Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 24,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "cve-2024-42327 ZBX-25623",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-01T00:15:27Z",
|
||||
"updated_at": "2024-12-04T12:15:06Z",
|
||||
"updated_at": "2024-12-04T18:29:22Z",
|
||||
"pushed_at": "2024-12-01T01:18:36Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 12,
|
||||
"forks": 8,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -45,19 +45,19 @@
|
|||
"description": "PoC for CVE-2024-42327 \/ ZBX-25623",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-03T12:44:07Z",
|
||||
"updated_at": "2024-12-04T11:43:42Z",
|
||||
"updated_at": "2024-12-04T14:31:56Z",
|
||||
"pushed_at": "2024-12-03T12:56:52Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 8,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -515,7 +515,7 @@
|
|||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -528,7 +528,7 @@
|
|||
"redteam"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 9,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-46538",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-23T10:50:01Z",
|
||||
"updated_at": "2024-11-15T17:31:24Z",
|
||||
"updated_at": "2024-12-04T15:38:53Z",
|
||||
"pushed_at": "2024-11-06T10:56:41Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -36,8 +36,39 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 898555204,
|
||||
"name": "CVE-2024-46538",
|
||||
"full_name": "LauLeysen\/CVE-2024-46538",
|
||||
"owner": {
|
||||
"login": "LauLeysen",
|
||||
"id": 54813361,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54813361?v=4",
|
||||
"html_url": "https:\/\/github.com\/LauLeysen",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LauLeysen\/CVE-2024-46538",
|
||||
"description": "based on [EQSTLab](https:\/\/github.com\/EQSTLab)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T15:51:40Z",
|
||||
"updated_at": "2024-12-04T16:00:54Z",
|
||||
"pushed_at": "2024-12-04T16:00:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,19 +14,19 @@
|
|||
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T08:57:18Z",
|
||||
"updated_at": "2024-12-04T12:19:36Z",
|
||||
"updated_at": "2024-12-04T18:26:55Z",
|
||||
"pushed_at": "2024-11-19T09:15:26Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 46,
|
||||
"forks": 13,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "TP-Link Archer AXE75 Authenticated Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-04T12:49:19Z",
|
||||
"updated_at": "2024-12-03T09:01:03Z",
|
||||
"updated_at": "2024-12-04T16:57:38Z",
|
||||
"pushed_at": "2024-11-23T00:33:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-5932",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-25T11:51:36Z",
|
||||
"updated_at": "2024-11-27T14:59:21Z",
|
||||
"updated_at": "2024-12-04T15:53:47Z",
|
||||
"pushed_at": "2024-08-29T02:13:12Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -68,7 +68,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
14
README.md
14
README.md
|
@ -4835,6 +4835,7 @@
|
|||
- [EQSTLab/CVE-2024-34102](https://github.com/EQSTLab/CVE-2024-34102)
|
||||
- [dream434/CVE-2024-34102](https://github.com/dream434/CVE-2024-34102)
|
||||
- [bka/magento-cve-2024-34102-exploit-cosmicstring](https://github.com/bka/magento-cve-2024-34102-exploit-cosmicstring)
|
||||
- [wubinworks/magento2-encryption-key-manager-cli](https://github.com/wubinworks/magento2-encryption-key-manager-cli)
|
||||
|
||||
### CVE-2024-34144 (2024-05-02)
|
||||
|
||||
|
@ -6536,6 +6537,7 @@
|
|||
</code>
|
||||
|
||||
- [EQSTLab/CVE-2024-46538](https://github.com/EQSTLab/CVE-2024-46538)
|
||||
- [LauLeysen/CVE-2024-46538](https://github.com/LauLeysen/CVE-2024-46538)
|
||||
|
||||
### CVE-2024-46627 (2024-09-26)
|
||||
|
||||
|
@ -16192,6 +16194,7 @@
|
|||
- [im-hanzou/fubucker](https://github.com/im-hanzou/fubucker)
|
||||
- [zycoder0day/CVE-2022-1386-Mass_Vulnerability](https://github.com/zycoder0day/CVE-2022-1386-Mass_Vulnerability)
|
||||
- [satyasai1460/CVE-2022-1386](https://github.com/satyasai1460/CVE-2022-1386)
|
||||
- [lamcodeofpwnosec/CVE-2022-1386](https://github.com/lamcodeofpwnosec/CVE-2022-1386)
|
||||
|
||||
### CVE-2022-1388 (2022-05-05)
|
||||
|
||||
|
@ -21215,13 +21218,6 @@
|
|||
- [TaroballzChen/CVE-2022-41040-metasploit-ProxyNotShell](https://github.com/TaroballzChen/CVE-2022-41040-metasploit-ProxyNotShell)
|
||||
- [0-Gram/CVE-2022-41040](https://github.com/0-Gram/CVE-2022-41040)
|
||||
|
||||
### CVE-2022-41049 (2022-11-09)
|
||||
|
||||
<code>Windows Mark of the Web Security Feature Bypass Vulnerability
|
||||
</code>
|
||||
|
||||
- [Nathan01110011/CVE-2022-41049-POC](https://github.com/Nathan01110011/CVE-2022-41049-POC)
|
||||
|
||||
### CVE-2022-41080 (2022-11-09)
|
||||
|
||||
<code>Microsoft Exchange Server Elevation of Privilege Vulnerability
|
||||
|
@ -23206,6 +23202,7 @@
|
|||
- [piperpwn/CVE-2021-3129-](https://github.com/piperpwn/CVE-2021-3129-)
|
||||
- [0x0d3ad/CVE-2021-3129](https://github.com/0x0d3ad/CVE-2021-3129)
|
||||
- [GodOfServer/CVE-2021-3129](https://github.com/GodOfServer/CVE-2021-3129)
|
||||
- [Prabesh01/hoh4](https://github.com/Prabesh01/hoh4)
|
||||
|
||||
### CVE-2021-3130 (2021-01-20)
|
||||
|
||||
|
@ -24876,7 +24873,6 @@
|
|||
- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
|
||||
- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
|
||||
- [30579096/Confluence-CVE-2021-26084](https://github.com/30579096/Confluence-CVE-2021-26084)
|
||||
- [ZZ-SOCMAP/CVE-2021-26084](https://github.com/ZZ-SOCMAP/CVE-2021-26084)
|
||||
- [vpxuser/CVE-2021-26084-EXP](https://github.com/vpxuser/CVE-2021-26084-EXP)
|
||||
- [nahcusira/CVE-2021-26084](https://github.com/nahcusira/CVE-2021-26084)
|
||||
- [BBD-YZZ/Confluence-RCE](https://github.com/BBD-YZZ/Confluence-RCE)
|
||||
|
@ -36674,7 +36670,7 @@
|
|||
|
||||
### CVE-2019-11881 (2019-06-10)
|
||||
|
||||
<code>A vulnerability exists in Rancher 2.1.4 in the login component, where the errorMsg parameter can be tampered to display arbitrary content, filtering tags but not special characters or symbols. There's no other limitation of the message, allowing malicious users to lure legitimate users to visit phishing sites with scare tactics, e.g., displaying a "This version of Rancher is outdated, please visit https://malicious.rancher.site/upgrading" message.
|
||||
<code>A vulnerability exists in Rancher before 2.2.4 in the login component, where the errorMsg parameter can be tampered to display arbitrary content, filtering tags but not special characters or symbols. There's no other limitation of the message, allowing malicious users to lure legitimate users to visit phishing sites with scare tactics, e.g., displaying a "This version of Rancher is outdated, please visit https://malicious.rancher.site/upgrading" message.
|
||||
</code>
|
||||
|
||||
- [MauroEldritch/VanCleef](https://github.com/MauroEldritch/VanCleef)
|
||||
|
|
Loading…
Reference in a new issue