mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/28 06:31:19
This commit is contained in:
parent
ca20470f4f
commit
ad93c6913d
31 changed files with 144 additions and 80 deletions
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for CVE-2018-18500 - Firefox Use-After-Free",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-18T00:26:10Z",
|
||||
"updated_at": "2024-10-15T16:33:12Z",
|
||||
"updated_at": "2024-12-28T02:11:09Z",
|
||||
"pushed_at": "2019-04-18T20:32:46Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-02T18:31:11Z",
|
||||
"updated_at": "2024-09-25T13:33:26Z",
|
||||
"updated_at": "2024-12-28T01:47:05Z",
|
||||
"pushed_at": "2020-01-15T12:34:10Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC Exploiting SQL Injection in Android's Download Provider (CVE-2018-9493)",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-02T18:32:55Z",
|
||||
"updated_at": "2024-08-12T19:46:17Z",
|
||||
"updated_at": "2024-12-28T01:47:03Z",
|
||||
"pushed_at": "2020-01-15T12:33:07Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC Exploiting Headers Disclosure in Android's Download Provider (CVE-2018-9546)",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-02T18:32:17Z",
|
||||
"updated_at": "2024-08-12T19:46:17Z",
|
||||
"updated_at": "2024-12-28T01:47:06Z",
|
||||
"pushed_at": "2020-01-15T12:33:46Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -206,10 +206,10 @@
|
|||
"description": "Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto.",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-16T20:13:23Z",
|
||||
"updated_at": "2024-12-19T04:52:25Z",
|
||||
"updated_at": "2024-12-28T01:04:41Z",
|
||||
"pushed_at": "2021-06-16T16:49:33Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -218,7 +218,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "POC for CVE-2020-13151",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-01T14:29:59Z",
|
||||
"updated_at": "2024-11-23T20:27:06Z",
|
||||
"updated_at": "2024-12-28T04:04:39Z",
|
||||
"pushed_at": "2020-08-03T18:55:37Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -2068,5 +2068,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 909197043,
|
||||
"name": "ZerologonWithImpacket-CVE2020-1472",
|
||||
"full_name": "TuanCui22\/ZerologonWithImpacket-CVE2020-1472",
|
||||
"owner": {
|
||||
"login": "TuanCui22",
|
||||
"id": 124656776,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124656776?v=4",
|
||||
"html_url": "https:\/\/github.com\/TuanCui22",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TuanCui22\/ZerologonWithImpacket-CVE2020-1472",
|
||||
"description": "This project combines the Zerologon vulnerability exploit (CVE-2020-1472) with Impacket tools for streamlined exploitation and post-exploitation activities. It allows penetration testers to assess and demonstrate the impact of this critical vulnerability in a controlled and authorized environment.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-28T01:58:26Z",
|
||||
"updated_at": "2024-12-28T02:43:41Z",
|
||||
"pushed_at": "2024-12-28T02:43:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -848,10 +848,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-12-27T09:08:06Z",
|
||||
"updated_at": "2024-12-28T01:54:56Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1358,
|
||||
"watchers_count": 1358,
|
||||
"stargazers_count": 1359,
|
||||
"watchers_count": 1359,
|
||||
"has_discussions": false,
|
||||
"forks_count": 167,
|
||||
"allow_forking": true,
|
||||
|
@ -867,7 +867,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 167,
|
||||
"watchers": 1358,
|
||||
"watchers": 1359,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -386,7 +386,7 @@
|
|||
"stargazers_count": 1110,
|
||||
"watchers_count": 1110,
|
||||
"has_discussions": false,
|
||||
"forks_count": 536,
|
||||
"forks_count": 535,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -394,7 +394,7 @@
|
|||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 536,
|
||||
"forks": 535,
|
||||
"watchers": 1110,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
|
@ -1574,7 +1574,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2024-04-29T17:48:37Z",
|
||||
"pushed_at": "2024-12-26T19:27:05Z",
|
||||
"pushed_at": "2024-12-28T04:32:25Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -792,10 +792,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-12-27T09:08:06Z",
|
||||
"updated_at": "2024-12-28T01:54:56Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1358,
|
||||
"watchers_count": 1358,
|
||||
"stargazers_count": 1359,
|
||||
"watchers_count": 1359,
|
||||
"has_discussions": false,
|
||||
"forks_count": 167,
|
||||
"allow_forking": true,
|
||||
|
@ -811,7 +811,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 167,
|
||||
"watchers": 1358,
|
||||
"watchers": 1359,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 362,
|
||||
"watchers_count": 362,
|
||||
"has_discussions": false,
|
||||
"forks_count": 106,
|
||||
"forks_count": 105,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -34,7 +34,7 @@
|
|||
"tomcat"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 106,
|
||||
"forks": 105,
|
||||
"watchers": 362,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-12-24T08:04:15Z",
|
||||
"updated_at": "2024-12-28T04:24:02Z",
|
||||
"pushed_at": "2024-08-01T15:09:15Z",
|
||||
"stargazers_count": 311,
|
||||
"watchers_count": 311,
|
||||
"stargazers_count": 312,
|
||||
"watchers_count": 312,
|
||||
"has_discussions": true,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 311,
|
||||
"watchers": 312,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -59,6 +59,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -146,8 +146,8 @@
|
|||
"description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-16T16:32:05Z",
|
||||
"updated_at": "2024-12-27T15:54:38Z",
|
||||
"pushed_at": "2024-12-27T15:54:34Z",
|
||||
"updated_at": "2024-12-28T06:13:38Z",
|
||||
"pushed_at": "2024-12-28T05:50:13Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -112,13 +112,13 @@
|
|||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"forks": 13,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-15T08:07:05Z",
|
||||
"updated_at": "2024-12-26T09:48:29Z",
|
||||
"updated_at": "2024-12-28T03:53:59Z",
|
||||
"pushed_at": "2024-09-08T21:23:34Z",
|
||||
"stargazers_count": 431,
|
||||
"watchers_count": 431,
|
||||
"stargazers_count": 432,
|
||||
"watchers_count": 432,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 431,
|
||||
"watchers": 432,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -952,10 +952,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-12-28T00:23:22Z",
|
||||
"updated_at": "2024-12-28T03:44:43Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3502,
|
||||
"watchers_count": 3502,
|
||||
"stargazers_count": 3503,
|
||||
"watchers_count": 3503,
|
||||
"has_discussions": false,
|
||||
"forks_count": 240,
|
||||
"allow_forking": true,
|
||||
|
@ -964,7 +964,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 240,
|
||||
"watchers": 3502,
|
||||
"watchers": 3503,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-19T03:51:54Z",
|
||||
"updated_at": "2024-12-22T19:42:49Z",
|
||||
"updated_at": "2024-12-28T05:47:37Z",
|
||||
"pushed_at": "2024-07-19T04:01:13Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T05:50:23Z",
|
||||
"updated_at": "2024-12-17T11:23:46Z",
|
||||
"updated_at": "2024-12-28T05:47:39Z",
|
||||
"pushed_at": "2024-06-11T04:46:42Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
|
|
|
@ -262,19 +262,19 @@
|
|||
"description": "CVE-2024-50379-exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-25T02:41:31Z",
|
||||
"updated_at": "2024-12-27T19:59:23Z",
|
||||
"updated_at": "2024-12-28T06:28:45Z",
|
||||
"pushed_at": "2024-12-26T08:52:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -307,7 +307,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 908364457,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "CVE-2024-52316 - Apache Tomcat Authentication Bypass Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-20T10:22:50Z",
|
||||
"updated_at": "2024-11-20T10:40:23Z",
|
||||
"updated_at": "2024-12-28T05:47:37Z",
|
||||
"pushed_at": "2024-11-20T10:40:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "CVE-2024-52317 - Apache Tomcat HTTP\/2 Data Leakage Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-21T06:20:42Z",
|
||||
"updated_at": "2024-12-11T03:48:06Z",
|
||||
"updated_at": "2024-12-28T05:47:34Z",
|
||||
"pushed_at": "2024-11-21T06:33:37Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "CVE-2024-52318 - Apache Tomcat XSS Vulnerability in Generated JSPs",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-21T06:38:48Z",
|
||||
"updated_at": "2024-11-21T06:44:43Z",
|
||||
"updated_at": "2024-12-28T05:47:34Z",
|
||||
"pushed_at": "2024-11-21T06:44:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T17:42:55Z",
|
||||
"updated_at": "2024-12-27T06:18:13Z",
|
||||
"updated_at": "2024-12-28T05:47:35Z",
|
||||
"pushed_at": "2024-12-20T10:05:15Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 74,
|
||||
"watchers": 76,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -467,7 +467,7 @@
|
|||
"description": "Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote code execution (RCE) with root privileges. This vulnerability, identified as CVE-2024-6387, resides in the OpenSSH server component (sshd), which is designed to listen for connections from client applications.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T02:51:37Z",
|
||||
"updated_at": "2024-12-17T13:08:21Z",
|
||||
"updated_at": "2024-12-28T05:47:38Z",
|
||||
"pushed_at": "2024-07-02T03:23:00Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
|
@ -2180,7 +2180,7 @@
|
|||
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T11:27:49Z",
|
||||
"updated_at": "2024-12-27T20:08:20Z",
|
||||
"updated_at": "2024-12-28T04:01:22Z",
|
||||
"pushed_at": "2024-08-22T08:50:25Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
|
|
|
@ -215,5 +215,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 909188493,
|
||||
"name": "RCE_CVE-2024-7954-",
|
||||
"full_name": "0dayan0n\/RCE_CVE-2024-7954-",
|
||||
"owner": {
|
||||
"login": "0dayan0n",
|
||||
"id": 170557167,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170557167?v=4",
|
||||
"html_url": "https:\/\/github.com\/0dayan0n",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0dayan0n\/RCE_CVE-2024-7954-",
|
||||
"description": "The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. (CRITICAL)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-28T01:05:05Z",
|
||||
"updated_at": "2024-12-28T01:20:15Z",
|
||||
"pushed_at": "2024-12-28T01:20:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-25T05:19:17Z",
|
||||
"updated_at": "2024-12-27T06:36:48Z",
|
||||
"updated_at": "2024-12-28T01:11:14Z",
|
||||
"pushed_at": "2024-12-25T05:28:55Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,8 +26,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"description": "Nortek Linear eMerge E3 Pre-Auth RCE PoC (CVE-2024-9441)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-03T11:28:46Z",
|
||||
"updated_at": "2024-10-16T04:34:58Z",
|
||||
"updated_at": "2024-12-28T06:13:35Z",
|
||||
"pushed_at": "2024-10-03T11:32:27Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -59,6 +59,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1656,6 +1656,7 @@
|
|||
- [MuhammadWaseem29/RCE-CVE-2024-7954](https://github.com/MuhammadWaseem29/RCE-CVE-2024-7954)
|
||||
- [issamjr/CVE-2024-7954](https://github.com/issamjr/CVE-2024-7954)
|
||||
- [zxj-hub/CVE-2024-7954POC](https://github.com/zxj-hub/CVE-2024-7954POC)
|
||||
- [0dayan0n/RCE_CVE-2024-7954-](https://github.com/0dayan0n/RCE_CVE-2024-7954-)
|
||||
|
||||
### CVE-2024-7965 (2024-08-21)
|
||||
|
||||
|
@ -30659,6 +30660,7 @@
|
|||
- [whoami-chmod777/Zerologon-Attack-CVE-2020-1472-POC](https://github.com/whoami-chmod777/Zerologon-Attack-CVE-2020-1472-POC)
|
||||
- [JolynNgSC/Zerologon_CVE-2020-1472](https://github.com/JolynNgSC/Zerologon_CVE-2020-1472)
|
||||
- [blackh00d/zerologon-poc](https://github.com/blackh00d/zerologon-poc)
|
||||
- [TuanCui22/ZerologonWithImpacket-CVE2020-1472](https://github.com/TuanCui22/ZerologonWithImpacket-CVE2020-1472)
|
||||
|
||||
### CVE-2020-1493 (2020-08-17)
|
||||
|
||||
|
|
Loading…
Reference in a new issue