mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2025/01/02 06:31:48
This commit is contained in:
parent
53679091e7
commit
a90410985e
27 changed files with 187 additions and 83 deletions
|
@ -76,10 +76,10 @@
|
|||
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-12T05:48:13Z",
|
||||
"updated_at": "2024-12-29T07:42:19Z",
|
||||
"updated_at": "2025-01-02T03:01:47Z",
|
||||
"pushed_at": "2023-04-09T13:50:29Z",
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 216,
|
||||
"watchers": 217,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
}
|
||||
|
|
|
@ -271,13 +271,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -157,10 +157,10 @@
|
|||
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T16:31:34Z",
|
||||
"updated_at": "2024-12-03T03:14:01Z",
|
||||
"updated_at": "2025-01-02T02:56:12Z",
|
||||
"pushed_at": "2021-02-25T16:05:02Z",
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"stargazers_count": 252,
|
||||
"watchers_count": 252,
|
||||
"has_discussions": false,
|
||||
"forks_count": 87,
|
||||
"allow_forking": true,
|
||||
|
@ -169,7 +169,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 87,
|
||||
"watchers": 250,
|
||||
"watchers": 252,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -244,10 +244,10 @@
|
|||
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T20:13:49Z",
|
||||
"updated_at": "2024-12-24T16:03:15Z",
|
||||
"updated_at": "2025-01-02T00:37:03Z",
|
||||
"pushed_at": "2024-05-19T16:25:52Z",
|
||||
"stargazers_count": 788,
|
||||
"watchers_count": 788,
|
||||
"stargazers_count": 789,
|
||||
"watchers_count": 789,
|
||||
"has_discussions": false,
|
||||
"forks_count": 123,
|
||||
"allow_forking": true,
|
||||
|
@ -256,7 +256,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 123,
|
||||
"watchers": 788,
|
||||
"watchers": 789,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2024-12-30T11:29:55Z",
|
||||
"updated_at": "2025-01-02T04:02:56Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1348,
|
||||
"watchers_count": 1348,
|
||||
"stargazers_count": 1349,
|
||||
"watchers_count": 1349,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1348,
|
||||
"watchers": 1349,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -266,10 +266,10 @@
|
|||
"description": "警惕 一种针对红队的新型溯源手段!",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-27T15:48:19Z",
|
||||
"updated_at": "2024-12-17T08:11:23Z",
|
||||
"updated_at": "2025-01-02T03:21:47Z",
|
||||
"pushed_at": "2022-07-27T15:55:01Z",
|
||||
"stargazers_count": 395,
|
||||
"watchers_count": 395,
|
||||
"stargazers_count": 396,
|
||||
"watchers_count": 396,
|
||||
"has_discussions": false,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
|
@ -278,7 +278,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 395,
|
||||
"watchers": 396,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"forks": 55,
|
||||
"watchers": 157,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2022-32947 walkthough and demo",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-17T08:21:47Z",
|
||||
"updated_at": "2024-12-11T07:24:31Z",
|
||||
"updated_at": "2025-01-02T03:48:32Z",
|
||||
"pushed_at": "2023-09-18T03:04:48Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-12-31T14:43:42Z",
|
||||
"updated_at": "2025-01-02T02:48:11Z",
|
||||
"pushed_at": "2024-08-01T15:09:15Z",
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"has_discussions": true,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 314,
|
||||
"watchers": 315,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -264,10 +264,10 @@
|
|||
"description": "iOS customization app powered by CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-12T14:31:30Z",
|
||||
"updated_at": "2024-07-31T07:07:18Z",
|
||||
"updated_at": "2025-01-02T00:29:20Z",
|
||||
"pushed_at": "2023-02-12T01:37:16Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -286,7 +286,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -305,10 +305,10 @@
|
|||
"description": "Simple iOS bootlooper using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-23T23:58:00Z",
|
||||
"updated_at": "2023-03-03T18:05:25Z",
|
||||
"updated_at": "2025-01-02T03:19:23Z",
|
||||
"pushed_at": "2023-01-24T18:25:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -317,7 +317,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Plesk Obsidian <=18.0.49 - Open Redirect",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-26T06:56:05Z",
|
||||
"updated_at": "2024-09-18T15:02:55Z",
|
||||
"updated_at": "2025-01-02T02:37:15Z",
|
||||
"pushed_at": "2024-06-24T09:03:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2023-40429: An app may be able to access sensitive user data.",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T21:52:56Z",
|
||||
"updated_at": "2024-04-14T18:03:42Z",
|
||||
"updated_at": "2025-01-02T03:19:02Z",
|
||||
"pushed_at": "2023-10-09T22:21:04Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T14:20:42Z",
|
||||
"updated_at": "2024-11-22T12:42:49Z",
|
||||
"updated_at": "2025-01-02T01:39:15Z",
|
||||
"pushed_at": "2024-01-08T11:12:08Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 225,
|
||||
"watchers": 226,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2025-01-01T16:26:11Z",
|
||||
"updated_at": "2025-01-02T05:43:30Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1315,
|
||||
"watchers_count": 1315,
|
||||
"stargazers_count": 1317,
|
||||
"watchers_count": 1317,
|
||||
"has_discussions": false,
|
||||
"forks_count": 225,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 225,
|
||||
"watchers": 1315,
|
||||
"watchers": 1317,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -59,6 +59,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
33
2024/CVE-2024-10400.json
Normal file
33
2024/CVE-2024-10400.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 910972988,
|
||||
"name": "CVE-2024-10400",
|
||||
"full_name": "k0ns0l\/CVE-2024-10400",
|
||||
"owner": {
|
||||
"login": "k0ns0l",
|
||||
"id": 55334728,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55334728?v=4",
|
||||
"html_url": "https:\/\/github.com\/k0ns0l",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k0ns0l\/CVE-2024-10400",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-02T00:12:53Z",
|
||||
"updated_at": "2025-01-02T00:32:28Z",
|
||||
"pushed_at": "2025-01-02T00:31:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-29T06:13:36Z",
|
||||
"updated_at": "2024-12-22T00:37:10Z",
|
||||
"updated_at": "2025-01-02T02:40:25Z",
|
||||
"pushed_at": "2024-12-04T01:01:28Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1075,5 +1075,36 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 911010933,
|
||||
"name": "jenkins-lfi",
|
||||
"full_name": "Marouane133\/jenkins-lfi",
|
||||
"owner": {
|
||||
"login": "Marouane133",
|
||||
"id": 164184419,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164184419?v=4",
|
||||
"html_url": "https:\/\/github.com\/Marouane133",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Marouane133\/jenkins-lfi",
|
||||
"description": "Jenkins CVE-2024-23897 POC : Arbitrary File Read Vulnerability Leading to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-02T03:28:56Z",
|
||||
"updated_at": "2025-01-02T03:41:54Z",
|
||||
"pushed_at": "2025-01-02T03:41:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Windows LPE",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-11T08:03:29Z",
|
||||
"updated_at": "2024-12-18T02:05:23Z",
|
||||
"updated_at": "2025-01-02T06:02:52Z",
|
||||
"pushed_at": "2024-06-11T20:41:59Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T08:57:18Z",
|
||||
"updated_at": "2024-12-31T15:50:29Z",
|
||||
"updated_at": "2025-01-02T00:58:20Z",
|
||||
"pushed_at": "2024-11-19T09:15:26Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 115,
|
||||
"watchers": 116,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -76,19 +76,50 @@
|
|||
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49112",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-01T15:48:38Z",
|
||||
"updated_at": "2025-01-02T00:23:02Z",
|
||||
"updated_at": "2025-01-02T06:31:19Z",
|
||||
"pushed_at": "2025-01-01T21:57:56Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"forks": 11,
|
||||
"watchers": 58,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 911024680,
|
||||
"name": "CVE-2024-49112-RCE-PoC",
|
||||
"full_name": "BOl1o\/CVE-2024-49112-RCE-PoC",
|
||||
"owner": {
|
||||
"login": "BOl1o",
|
||||
"id": 192742679,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192742679?v=4",
|
||||
"html_url": "https:\/\/github.com\/BOl1o",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BOl1o\/CVE-2024-49112-RCE-PoC",
|
||||
"description": "CVE-2024-49112 Windows LDAP RCE PoC and Metasploit Module",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-02T04:29:47Z",
|
||||
"updated_at": "2025-01-02T04:30:53Z",
|
||||
"pushed_at": "2025-01-02T04:30:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
[
|
||||
{
|
||||
"id": 910931392,
|
||||
"id": 911020987,
|
||||
"name": "CVE-2024-53522",
|
||||
"full_name": "Safecloudth\/CVE-2024-53522",
|
||||
"owner": {
|
||||
|
@ -13,9 +13,9 @@
|
|||
"html_url": "https:\/\/github.com\/Safecloudth\/CVE-2024-53522",
|
||||
"description": "PoC for CVE-2024-53522 affecting HOSxP XE 4",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-01T20:30:58Z",
|
||||
"updated_at": "2025-01-01T20:32:48Z",
|
||||
"pushed_at": "2025-01-01T20:32:45Z",
|
||||
"created_at": "2025-01-02T04:13:37Z",
|
||||
"updated_at": "2025-01-02T04:16:45Z",
|
||||
"pushed_at": "2025-01-02T04:16:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -59,6 +59,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -90,6 +90,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -2076,6 +2076,13 @@
|
|||
|
||||
- [K1nakoo/CVE-2024-10355](https://github.com/K1nakoo/CVE-2024-10355)
|
||||
|
||||
### CVE-2024-10400 (2024-11-21)
|
||||
|
||||
<code>The Tutor LMS plugin for WordPress is vulnerable to SQL Injection via the ‘rating_filter’ parameter in all versions up to, and including, 2.7.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
||||
</code>
|
||||
|
||||
- [k0ns0l/CVE-2024-10400](https://github.com/k0ns0l/CVE-2024-10400)
|
||||
|
||||
### CVE-2024-10410 (2024-10-27)
|
||||
|
||||
<code>In SourceCodester Online Hotel Reservation System 1.0 wurde eine kritische Schwachstelle entdeckt. Dabei geht es um die Funktion upload der Datei /admin/mod_room/controller.php?action=add. Dank Manipulation des Arguments image mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
|
||||
|
@ -3323,6 +3330,7 @@
|
|||
- [ShieldAuth-PHP/PBL05-CVE-Analsys](https://github.com/ShieldAuth-PHP/PBL05-CVE-Analsys)
|
||||
- [verylazytech/CVE-2024-23897](https://github.com/verylazytech/CVE-2024-23897)
|
||||
- [D1se0/CVE-2024-23897-Vulnerabilidad-Jenkins](https://github.com/D1se0/CVE-2024-23897-Vulnerabilidad-Jenkins)
|
||||
- [Marouane133/jenkins-lfi](https://github.com/Marouane133/jenkins-lfi)
|
||||
|
||||
### CVE-2024-23995 (2024-04-29)
|
||||
|
||||
|
@ -7120,6 +7128,7 @@
|
|||
- [tnkr/poc_monitor](https://github.com/tnkr/poc_monitor)
|
||||
- [BOl1o/CVE-2024-49112-PoC](https://github.com/BOl1o/CVE-2024-49112-PoC)
|
||||
- [SafeBreach-Labs/CVE-2024-49112](https://github.com/SafeBreach-Labs/CVE-2024-49112)
|
||||
- [BOl1o/CVE-2024-49112-RCE-PoC](https://github.com/BOl1o/CVE-2024-49112-RCE-PoC)
|
||||
|
||||
### CVE-2024-49117 (2024-12-10)
|
||||
|
||||
|
|
Loading…
Reference in a new issue