mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/06/18 12:29:35
This commit is contained in:
parent
8e649ac75e
commit
a91f562df6
38 changed files with 525 additions and 120 deletions
|
@ -259,14 +259,14 @@
|
|||
{
|
||||
"id": 511454479,
|
||||
"name": "CVE-2017-9841-Scan",
|
||||
"full_name": "yoloskr\/CVE-2017-9841-Scan",
|
||||
"full_name": "omgdomgd\/CVE-2017-9841-Scan",
|
||||
"owner": {
|
||||
"login": "yoloskr",
|
||||
"login": "omgdomgd",
|
||||
"id": 9586181,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9586181?v=4",
|
||||
"html_url": "https:\/\/github.com\/yoloskr"
|
||||
"html_url": "https:\/\/github.com\/omgdomgd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yoloskr\/CVE-2017-9841-Scan",
|
||||
"html_url": "https:\/\/github.com\/omgdomgd\/CVE-2017-9841-Scan",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-07T08:57:58Z",
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-01-04T21:44:21Z",
|
||||
"updated_at": "2024-06-17T15:41:23Z",
|
||||
"pushed_at": "2024-06-17T15:41:22Z",
|
||||
"pushed_at": "2024-06-18T08:36:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-08T14:41:20Z",
|
||||
"updated_at": "2024-06-18T04:59:35Z",
|
||||
"updated_at": "2024-06-18T11:45:01Z",
|
||||
"pushed_at": "2024-02-07T23:51:49Z",
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 176,
|
||||
"watchers": 177,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
}
|
||||
|
|
|
@ -1571,13 +1571,13 @@
|
|||
"stargazers_count": 893,
|
||||
"watchers_count": 893,
|
||||
"has_discussions": false,
|
||||
"forks_count": 240,
|
||||
"forks_count": 241,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 240,
|
||||
"forks": 241,
|
||||
"watchers": 893,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
|
|
32
2019/CVE-2019-17133.json
Normal file
32
2019/CVE-2019-17133.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 816642141,
|
||||
"name": "linux_4.19.72_CVE-2019-17133",
|
||||
"full_name": "krnidhi\/linux_4.19.72_CVE-2019-17133",
|
||||
"owner": {
|
||||
"login": "krnidhi",
|
||||
"id": 168801672,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168801672?v=4",
|
||||
"html_url": "https:\/\/github.com\/krnidhi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/krnidhi\/linux_4.19.72_CVE-2019-17133",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T06:21:53Z",
|
||||
"updated_at": "2024-06-18T08:03:28Z",
|
||||
"pushed_at": "2024-06-18T08:01:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"forks": 52,
|
||||
"watchers": 106,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
32
2019/CVE-2019-8805.json
Normal file
32
2019/CVE-2019-8805.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 816731747,
|
||||
"name": "CVE-2019-8805",
|
||||
"full_name": "securelayer7\/CVE-2019-8805",
|
||||
"owner": {
|
||||
"login": "securelayer7",
|
||||
"id": 14994455,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14994455?v=4",
|
||||
"html_url": "https:\/\/github.com\/securelayer7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/securelayer7\/CVE-2019-8805",
|
||||
"description": "Exploit for CVE-2019-8805 Apple EndpointSecurity framework Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T09:49:03Z",
|
||||
"updated_at": "2024-06-18T09:54:13Z",
|
||||
"pushed_at": "2024-06-18T09:54:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"forks": 69,
|
||||
"watchers": 214,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
|
|
62
2020/CVE-2020-0201.json
Normal file
62
2020/CVE-2020-0201.json
Normal file
|
@ -0,0 +1,62 @@
|
|||
[
|
||||
{
|
||||
"id": 710491787,
|
||||
"name": "Packages_app_settings_CVE-2020-0201",
|
||||
"full_name": "uthrasri\/Packages_app_settings_CVE-2020-0201",
|
||||
"owner": {
|
||||
"login": "uthrasri",
|
||||
"id": 145666390,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
|
||||
"html_url": "https:\/\/github.com\/uthrasri"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/uthrasri\/Packages_app_settings_CVE-2020-0201",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-26T20:01:07Z",
|
||||
"updated_at": "2024-06-18T10:10:54Z",
|
||||
"pushed_at": "2024-06-18T10:10:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 816647824,
|
||||
"name": "packages_apps_Settings_CVE-2020-0201",
|
||||
"full_name": "Trinadh465\/packages_apps_Settings_CVE-2020-0201",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_Settings_CVE-2020-0201",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T06:36:13Z",
|
||||
"updated_at": "2024-06-18T06:39:16Z",
|
||||
"pushed_at": "2024-06-18T06:39:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -451,7 +451,7 @@
|
|||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"has_discussions": false,
|
||||
"forks_count": 122,
|
||||
"forks_count": 123,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -462,7 +462,7 @@
|
|||
"smbghost"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 122,
|
||||
"forks": 123,
|
||||
"watchers": 322,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
|
|
32
2021/CVE-2021-0392.json
Normal file
32
2021/CVE-2021-0392.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 816643355,
|
||||
"name": "System_Connectivity_Wificond_CVE-2021-0392",
|
||||
"full_name": "uthrasri\/System_Connectivity_Wificond_CVE-2021-0392",
|
||||
"owner": {
|
||||
"login": "uthrasri",
|
||||
"id": 145666390,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
|
||||
"html_url": "https:\/\/github.com\/uthrasri"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/uthrasri\/System_Connectivity_Wificond_CVE-2021-0392",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T06:25:02Z",
|
||||
"updated_at": "2024-06-18T07:43:08Z",
|
||||
"pushed_at": "2024-06-18T07:43:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2024-06-18T05:10:46Z",
|
||||
"updated_at": "2024-06-18T10:31:09Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1810,
|
||||
"watchers_count": 1810,
|
||||
"stargazers_count": 1811,
|
||||
"watchers_count": 1811,
|
||||
"has_discussions": false,
|
||||
"forks_count": 583,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 583,
|
||||
"watchers": 1810,
|
||||
"watchers": 1811,
|
||||
"score": 0,
|
||||
"subscribers_count": 44
|
||||
},
|
||||
|
|
|
@ -984,10 +984,10 @@
|
|||
"description": "CVE-2021-3156非交互式执行命令",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-09T19:25:18Z",
|
||||
"updated_at": "2024-03-20T10:02:13Z",
|
||||
"updated_at": "2024-06-18T07:38:01Z",
|
||||
"pushed_at": "2021-02-09T19:31:33Z",
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -996,7 +996,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 195,
|
||||
"watchers": 197,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -236,10 +236,10 @@
|
|||
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T20:13:49Z",
|
||||
"updated_at": "2024-06-13T19:02:56Z",
|
||||
"updated_at": "2024-06-18T09:44:59Z",
|
||||
"pushed_at": "2024-05-19T16:25:52Z",
|
||||
"stargazers_count": 765,
|
||||
"watchers_count": 765,
|
||||
"stargazers_count": 766,
|
||||
"watchers_count": 766,
|
||||
"has_discussions": false,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
|
@ -248,7 +248,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 765,
|
||||
"watchers": 766,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -1305,10 +1305,10 @@
|
|||
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T17:53:16Z",
|
||||
"updated_at": "2024-06-17T10:13:58Z",
|
||||
"updated_at": "2024-06-18T11:27:02Z",
|
||||
"pushed_at": "2022-01-28T00:29:15Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -1317,7 +1317,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -223,10 +223,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2024-06-13T19:07:06Z",
|
||||
"updated_at": "2024-06-18T09:56:20Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1543,
|
||||
"watchers_count": 1543,
|
||||
"stargazers_count": 1544,
|
||||
"watchers_count": 1544,
|
||||
"has_discussions": false,
|
||||
"forks_count": 481,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 481,
|
||||
"watchers": 1543,
|
||||
"watchers": 1544,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -1268,10 +1268,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2024-06-17T13:59:42Z",
|
||||
"updated_at": "2024-06-18T09:06:02Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 784,
|
||||
"watchers_count": 784,
|
||||
"stargazers_count": 785,
|
||||
"watchers_count": 785,
|
||||
"has_discussions": false,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
|
@ -1285,7 +1285,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"watchers": 784,
|
||||
"watchers": 785,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -705,10 +705,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T09:19:02Z",
|
||||
"updated_at": "2024-05-29T07:09:56Z",
|
||||
"updated_at": "2024-06-18T07:55:20Z",
|
||||
"pushed_at": "2022-06-07T10:35:18Z",
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -717,7 +717,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 327,
|
||||
"watchers": 328,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-04T08:22:41Z",
|
||||
"updated_at": "2024-06-05T11:10:57Z",
|
||||
"updated_at": "2024-06-18T06:58:18Z",
|
||||
"pushed_at": "2022-08-19T09:04:09Z",
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 275,
|
||||
"watchers": 276,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -95,13 +95,13 @@
|
|||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-21T21:39:24Z",
|
||||
"updated_at": "2024-06-17T07:27:52Z",
|
||||
"updated_at": "2024-06-18T11:36:28Z",
|
||||
"pushed_at": "2024-03-22T06:45:43Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 119,
|
||||
"watchers": 121,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE exploit for CVE-2023-36802",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T17:32:15Z",
|
||||
"updated_at": "2024-05-26T16:25:44Z",
|
||||
"updated_at": "2024-06-18T12:18:59Z",
|
||||
"pushed_at": "2023-10-10T17:44:17Z",
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 150,
|
||||
"watchers": 151,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -133,8 +133,8 @@
|
|||
"description": "Procedure to Recreate the Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-12T06:19:50Z",
|
||||
"updated_at": "2024-06-15T09:56:08Z",
|
||||
"pushed_at": "2024-06-15T09:47:53Z",
|
||||
"updated_at": "2024-06-18T07:56:59Z",
|
||||
"pushed_at": "2024-06-18T07:56:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-concept code for Android APEX key reuse vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-26T21:17:38Z",
|
||||
"updated_at": "2024-06-09T12:30:24Z",
|
||||
"updated_at": "2024-06-18T06:35:32Z",
|
||||
"pushed_at": "2024-01-31T19:33:59Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 71,
|
||||
"watchers": 72,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-06-17T23:48:49Z",
|
||||
"updated_at": "2024-06-18T12:25:13Z",
|
||||
"pushed_at": "2024-06-12T19:17:54Z",
|
||||
"stargazers_count": 902,
|
||||
"watchers_count": 902,
|
||||
"stargazers_count": 906,
|
||||
"watchers_count": 906,
|
||||
"has_discussions": false,
|
||||
"forks_count": 153,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 153,
|
||||
"watchers": 902,
|
||||
"watchers": 906,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "exploit for f5-big-ip RCE cve-2023-46747",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-01T09:31:05Z",
|
||||
"updated_at": "2024-06-07T18:34:04Z",
|
||||
"updated_at": "2024-06-18T09:29:26Z",
|
||||
"pushed_at": "2024-03-26T03:01:04Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 199,
|
||||
"watchers": 200,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
32
2024/CVE-2024-0044.json
Normal file
32
2024/CVE-2024-0044.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 816719987,
|
||||
"name": "android_autorooter",
|
||||
"full_name": "scs-labrat\/android_autorooter",
|
||||
"owner": {
|
||||
"login": "scs-labrat",
|
||||
"id": 102700300,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102700300?v=4",
|
||||
"html_url": "https:\/\/github.com\/scs-labrat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/scs-labrat\/android_autorooter",
|
||||
"description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T09:22:59Z",
|
||||
"updated_at": "2024-06-18T10:42:42Z",
|
||||
"pushed_at": "2024-06-18T09:35:44Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-17T07:46:21Z",
|
||||
"updated_at": "2024-06-18T01:21:07Z",
|
||||
"updated_at": "2024-06-18T10:51:47Z",
|
||||
"pushed_at": "2024-06-17T07:53:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-06-18T03:43:15Z",
|
||||
"updated_at": "2024-06-18T12:31:35Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2124,
|
||||
"watchers_count": 2124,
|
||||
"stargazers_count": 2128,
|
||||
"watchers_count": 2128,
|
||||
"has_discussions": false,
|
||||
"forks_count": 275,
|
||||
"forks_count": 277,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 275,
|
||||
"watchers": 2124,
|
||||
"forks": 277,
|
||||
"watchers": 2128,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
},
|
||||
|
@ -49,10 +49,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-03T13:09:22Z",
|
||||
"updated_at": "2024-05-19T06:51:49Z",
|
||||
"updated_at": "2024-06-18T07:54:41Z",
|
||||
"pushed_at": "2024-05-19T06:51:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -328,5 +328,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 816689478,
|
||||
"name": "CVE-2024-21413",
|
||||
"full_name": "ShubhamKanhere307\/CVE-2024-21413",
|
||||
"owner": {
|
||||
"login": "ShubhamKanhere307",
|
||||
"id": 173140854,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173140854?v=4",
|
||||
"html_url": "https:\/\/github.com\/ShubhamKanhere307"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ShubhamKanhere307\/CVE-2024-21413",
|
||||
"description": "This script is the Proof of Concept (PoC) of the CVE-2024-21413, a significant security vulnerability discovered in the Microsoft Windows Outlook having a strong 9.8 critical CVSS score. Named as #MonikerLink Bug, this vulnerability allows the attacker to execute the arbitrary code remotely on the victim's machine, thus becomes a full-fledged RCE. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T08:11:33Z",
|
||||
"updated_at": "2024-06-18T08:18:16Z",
|
||||
"pushed_at": "2024-06-18T08:18:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-2257.json
Normal file
32
2024/CVE-2024-2257.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 816772228,
|
||||
"name": "Digisol-DG-GR1321-s-Password-Policy-Bypass-CVE-2024-2257",
|
||||
"full_name": "Redfox-Secuirty\/Digisol-DG-GR1321-s-Password-Policy-Bypass-CVE-2024-2257",
|
||||
"owner": {
|
||||
"login": "Redfox-Secuirty",
|
||||
"id": 173128884,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173128884?v=4",
|
||||
"html_url": "https:\/\/github.com\/Redfox-Secuirty"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Redfox-Secuirty\/Digisol-DG-GR1321-s-Password-Policy-Bypass-CVE-2024-2257",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T11:27:57Z",
|
||||
"updated_at": "2024-06-18T11:28:00Z",
|
||||
"pushed_at": "2024-06-18T11:27:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T17:02:03Z",
|
||||
"updated_at": "2024-06-18T05:25:09Z",
|
||||
"updated_at": "2024-06-18T11:05:51Z",
|
||||
"pushed_at": "2024-06-17T19:46:27Z",
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 219,
|
||||
"watchers": 223,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "Windows LPE",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-11T08:03:29Z",
|
||||
"updated_at": "2024-06-18T02:45:39Z",
|
||||
"updated_at": "2024-06-18T11:05:45Z",
|
||||
"pushed_at": "2024-06-11T20:41:59Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 50,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -73,10 +73,10 @@
|
|||
"description": "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-12T11:11:16Z",
|
||||
"updated_at": "2024-06-18T01:58:25Z",
|
||||
"updated_at": "2024-06-18T11:04:52Z",
|
||||
"pushed_at": "2024-06-13T07:30:48Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 165,
|
||||
"watchers": 173,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -103,10 +103,10 @@
|
|||
"description": "Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从而控制受影响的系统、执行任意命令、安装恶意软件或访问敏感数据。 微软已发出警告成功利用此漏洞的攻击者可以获得 SYSTEM 权限,这是 Windows 系统上的最高访问级别。这增加了与 CVE-2024-26229 相关的风险,使其成为恶意行为者的主要目标。",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-16T05:06:31Z",
|
||||
"updated_at": "2024-06-16T05:29:29Z",
|
||||
"updated_at": "2024-06-18T11:14:18Z",
|
||||
"pushed_at": "2024-06-16T05:29:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2024-06-18T06:11:18Z",
|
||||
"updated_at": "2024-06-18T11:14:00Z",
|
||||
"pushed_at": "2024-06-17T08:10:13Z",
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 271,
|
||||
"watchers": 274,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 816713290,
|
||||
"name": "CVE-2024-29824",
|
||||
"full_name": "R4be1\/CVE-2024-29824",
|
||||
"owner": {
|
||||
"login": "R4be1",
|
||||
"id": 110738599,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110738599?v=4",
|
||||
"html_url": "https:\/\/github.com\/R4be1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/R4be1\/CVE-2024-29824",
|
||||
"description": "Ivanti EPM SQL Injection Remote Code Execution Vulnerability(Optimized version based on h3)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T09:07:23Z",
|
||||
"updated_at": "2024-06-18T09:21:45Z",
|
||||
"pushed_at": "2024-06-18T09:13:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2024-30078 Detection and Command Execution Script",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-16T08:06:03Z",
|
||||
"updated_at": "2024-06-18T06:04:41Z",
|
||||
"updated_at": "2024-06-18T11:25:04Z",
|
||||
"pushed_at": "2024-06-15T20:21:26Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 18,
|
||||
"forks": 28,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
32
2024/CVE-2024-4231.json
Normal file
32
2024/CVE-2024-4231.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 816778703,
|
||||
"name": "Digisol-DG-GR1321-s-Improper-Access-Control-CVE-2024-4231",
|
||||
"full_name": "Redfox-Secuirty\/Digisol-DG-GR1321-s-Improper-Access-Control-CVE-2024-4231",
|
||||
"owner": {
|
||||
"login": "Redfox-Secuirty",
|
||||
"id": 173128884,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173128884?v=4",
|
||||
"html_url": "https:\/\/github.com\/Redfox-Secuirty"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Redfox-Secuirty\/Digisol-DG-GR1321-s-Improper-Access-Control-CVE-2024-4231",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T11:43:23Z",
|
||||
"updated_at": "2024-06-18T11:43:27Z",
|
||||
"pushed_at": "2024-06-18T11:43:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-4232.json
Normal file
32
2024/CVE-2024-4232.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 816762824,
|
||||
"name": "Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232",
|
||||
"full_name": "Redfox-Secuirty\/Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232",
|
||||
"owner": {
|
||||
"login": "Redfox-Secuirty",
|
||||
"id": 173128884,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173128884?v=4",
|
||||
"html_url": "https:\/\/github.com\/Redfox-Secuirty"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Redfox-Secuirty\/Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T11:05:06Z",
|
||||
"updated_at": "2024-06-18T11:05:10Z",
|
||||
"pushed_at": "2024-06-18T11:05:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -535,13 +535,13 @@
|
|||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"forks": 27,
|
||||
"watchers": 99,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -964,10 +964,10 @@
|
|||
"description": "PHP CGI Remote Code Execution (CVE-2024-4577) PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-15T18:05:31Z",
|
||||
"updated_at": "2024-06-18T06:08:48Z",
|
||||
"updated_at": "2024-06-18T10:53:00Z",
|
||||
"pushed_at": "2024-06-15T18:12:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -976,7 +976,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
61
README.md
61
README.md
|
@ -15,6 +15,13 @@
|
|||
|
||||
- [41yn14/CVE-2024-0039-Exploit](https://github.com/41yn14/CVE-2024-0039-Exploit)
|
||||
|
||||
### CVE-2024-0044 (2024-03-11)
|
||||
|
||||
<code>In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n
|
||||
</code>
|
||||
|
||||
- [scs-labrat/android_autorooter](https://github.com/scs-labrat/android_autorooter)
|
||||
|
||||
### CVE-2024-0195 (2024-01-02)
|
||||
|
||||
<code>Es wurde eine Schwachstelle in spider-flow 0.4.3 gefunden. Sie wurde als kritisch eingestuft. Es betrifft die Funktion FunctionService.saveFunction der Datei src/main/java/org/spiderflow/controller/FunctionController.java. Durch Manipulieren mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
|
||||
|
@ -331,6 +338,13 @@
|
|||
|
||||
- [uthrasri/CVE-2024-2193](https://github.com/uthrasri/CVE-2024-2193)
|
||||
|
||||
### CVE-2024-2257 (2024-05-10)
|
||||
|
||||
<code>This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to improper implementation of password policies. An attacker with physical access could exploit this by creating password that do not adhere to the defined security standards/policy on the vulnerable system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to expose the router to potential security threats.
|
||||
</code>
|
||||
|
||||
- [Redfox-Secuirty/Digisol-DG-GR1321-s-Password-Policy-Bypass-CVE-2024-2257](https://github.com/Redfox-Secuirty/Digisol-DG-GR1321-s-Password-Policy-Bypass-CVE-2024-2257)
|
||||
|
||||
### CVE-2024-2389 (2024-04-02)
|
||||
|
||||
<code>In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command injection vulnerability has been identified. An unauthenticated user can gain entry to the system via the Flowmon management interface, allowing for the execution of arbitrary system commands.\n\n
|
||||
|
@ -593,6 +607,20 @@
|
|||
- [gotr00t0day/CVE-2024-4040](https://github.com/gotr00t0day/CVE-2024-4040)
|
||||
- [1ncendium/CVE-2024-4040](https://github.com/1ncendium/CVE-2024-4040)
|
||||
|
||||
### CVE-2024-4231 (2024-05-10)
|
||||
|
||||
<code>This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to presence of root terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by identifying UART pins and accessing the root shell on the vulnerable system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to access the sensitive information on the targeted system.
|
||||
</code>
|
||||
|
||||
- [Redfox-Secuirty/Digisol-DG-GR1321-s-Improper-Access-Control-CVE-2024-4231](https://github.com/Redfox-Secuirty/Digisol-DG-GR1321-s-Improper-Access-Control-CVE-2024-4231)
|
||||
|
||||
### CVE-2024-4232 (2024-05-10)
|
||||
|
||||
<code>This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to lack of encryption or hashing in storing of passwords within the router's firmware/ database. An attacker with physical access could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext passwords on the vulnerable system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system.
|
||||
</code>
|
||||
|
||||
- [Redfox-Secuirty/Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232](https://github.com/Redfox-Secuirty/Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232)
|
||||
|
||||
### CVE-2024-4295 (2024-06-05)
|
||||
|
||||
<code>The Email Subscribers by Icegram Express plugin for WordPress is vulnerable to SQL Injection via the ‘hash’ parameter in all versions up to, and including, 5.7.20 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
||||
|
@ -945,6 +973,7 @@
|
|||
- [dshabani96/CVE-2024-21413](https://github.com/dshabani96/CVE-2024-21413)
|
||||
- [X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit](https://github.com/X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit)
|
||||
- [th3Hellion/CVE-2024-21413](https://github.com/th3Hellion/CVE-2024-21413)
|
||||
- [ShubhamKanhere307/CVE-2024-21413](https://github.com/ShubhamKanhere307/CVE-2024-21413)
|
||||
|
||||
### CVE-2024-21626 (2024-01-31)
|
||||
|
||||
|
@ -2160,6 +2189,7 @@
|
|||
</code>
|
||||
|
||||
- [horizon3ai/CVE-2024-29824](https://github.com/horizon3ai/CVE-2024-29824)
|
||||
- [R4be1/CVE-2024-29824](https://github.com/R4be1/CVE-2024-29824)
|
||||
|
||||
### CVE-2024-29849 (2024-05-22)
|
||||
|
||||
|
@ -17321,6 +17351,13 @@
|
|||
|
||||
- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0391](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0391)
|
||||
|
||||
### CVE-2021-0392 (2021-03-10)
|
||||
|
||||
<code>In main of main.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-175124730
|
||||
</code>
|
||||
|
||||
- [uthrasri/System_Connectivity_Wificond_CVE-2021-0392](https://github.com/uthrasri/System_Connectivity_Wificond_CVE-2021-0392)
|
||||
|
||||
### CVE-2021-0393 (2021-03-10)
|
||||
|
||||
<code>In Scanner::LiteralBuffer::NewCapacity of scanner.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if an attacker can supply a malicious PAC file, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-168041375
|
||||
|
@ -24044,6 +24081,14 @@
|
|||
|
||||
- [Trinadh465/external_libexif_AOSP10_r33_CVE-2020-0198](https://github.com/Trinadh465/external_libexif_AOSP10_r33_CVE-2020-0198)
|
||||
|
||||
### CVE-2020-0201 (2020-06-11)
|
||||
|
||||
<code>In showSecurityFields of WifiConfigController.java there is a possible credential leak due to a confused deputy. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-143601727
|
||||
</code>
|
||||
|
||||
- [uthrasri/Packages_app_settings_CVE-2020-0201](https://github.com/uthrasri/Packages_app_settings_CVE-2020-0201)
|
||||
- [Trinadh465/packages_apps_Settings_CVE-2020-0201](https://github.com/Trinadh465/packages_apps_Settings_CVE-2020-0201)
|
||||
|
||||
### CVE-2020-0203 (2020-06-11)
|
||||
|
||||
<code>In freeIsolatedUidLocked of ProcessList.java, there is a possible UID reuse due to improper cleanup. This could lead to local escalation of privilege between constrained processes with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146313311
|
||||
|
@ -30646,6 +30691,13 @@
|
|||
|
||||
- [ashleykinguk/Shazam-CVE-2019-8791-CVE-2019-8792](https://github.com/ashleykinguk/Shazam-CVE-2019-8791-CVE-2019-8792)
|
||||
|
||||
### CVE-2019-8805 (2019-12-18)
|
||||
|
||||
<code>A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. This issue is fixed in macOS Catalina 10.15.1. An application may be able to execute arbitrary code with system privileges.
|
||||
</code>
|
||||
|
||||
- [securelayer7/CVE-2019-8805](https://github.com/securelayer7/CVE-2019-8805)
|
||||
|
||||
### CVE-2019-8852 (2020-10-27)
|
||||
|
||||
<code>A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. An application may be able to execute arbitrary code with kernel privileges.
|
||||
|
@ -32448,6 +32500,13 @@
|
|||
|
||||
- [hessandrew/CVE-2019-17124](https://github.com/hessandrew/CVE-2019-17124)
|
||||
|
||||
### CVE-2019-17133 (2019-10-04)
|
||||
|
||||
<code>In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.
|
||||
</code>
|
||||
|
||||
- [krnidhi/linux_4.19.72_CVE-2019-17133](https://github.com/krnidhi/linux_4.19.72_CVE-2019-17133)
|
||||
|
||||
### CVE-2019-17137 (2020-02-10)
|
||||
|
||||
<code>This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR AC1200 R6220 Firmware version 1.1.0.86 Smart WiFi Router. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of path strings. By inserting a null byte into the path, the user can skip most authentication checks. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-8616.
|
||||
|
@ -38025,7 +38084,7 @@
|
|||
- [akr3ch/CVE-2017-9841](https://github.com/akr3ch/CVE-2017-9841)
|
||||
- [p1ckzi/CVE-2017-9841](https://github.com/p1ckzi/CVE-2017-9841)
|
||||
- [jax7sec/CVE-2017-9841](https://github.com/jax7sec/CVE-2017-9841)
|
||||
- [yoloskr/CVE-2017-9841-Scan](https://github.com/yoloskr/CVE-2017-9841-Scan)
|
||||
- [omgdomgd/CVE-2017-9841-Scan](https://github.com/omgdomgd/CVE-2017-9841-Scan)
|
||||
- [mileticluka1/eval-stdin](https://github.com/mileticluka1/eval-stdin)
|
||||
- [Jhonsonwannaa/CVE-2017-9841-](https://github.com/Jhonsonwannaa/CVE-2017-9841-)
|
||||
- [MadExploits/PHPunit-Exploit](https://github.com/MadExploits/PHPunit-Exploit)
|
||||
|
|
Loading…
Reference in a new issue