mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 01:54:09 +01:00
Auto Update 2025/01/18 00:31:48
This commit is contained in:
parent
37bb376d06
commit
afff2d0063
26 changed files with 127 additions and 119 deletions
|
@ -188,15 +188,15 @@
|
|||
{
|
||||
"id": 887626775,
|
||||
"name": "CVE-2013-0156",
|
||||
"full_name": "oxBEN10\/CVE-2013-0156",
|
||||
"full_name": "oxben10\/CVE-2013-0156",
|
||||
"owner": {
|
||||
"login": "oxBEN10",
|
||||
"login": "oxben10",
|
||||
"id": 119909271,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119909271?v=4",
|
||||
"html_url": "https:\/\/github.com\/oxBEN10",
|
||||
"html_url": "https:\/\/github.com\/oxben10",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/oxBEN10\/CVE-2013-0156",
|
||||
"html_url": "https:\/\/github.com\/oxben10\/CVE-2013-0156",
|
||||
"description": "This script is specifically designed to solve the challenge on PentesterLab for the CVE-2013-0156 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-13T02:10:20Z",
|
||||
|
|
|
@ -182,7 +182,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-11-14T04:35:59Z",
|
||||
"updated_at": "2025-01-05T15:26:10Z",
|
||||
"pushed_at": "2025-01-17T14:30:14Z",
|
||||
"pushed_at": "2025-01-17T19:35:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2025-01-12T12:20:05Z",
|
||||
"updated_at": "2025-01-17T21:46:03Z",
|
||||
"pushed_at": "2022-12-27T20:25:09Z",
|
||||
"stargazers_count": 383,
|
||||
"watchers_count": 383,
|
||||
"stargazers_count": 382,
|
||||
"watchers_count": 382,
|
||||
"has_discussions": false,
|
||||
"forks_count": 100,
|
||||
"allow_forking": true,
|
||||
|
@ -94,7 +94,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 100,
|
||||
"watchers": 383,
|
||||
"watchers": 382,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-12T05:48:13Z",
|
||||
"updated_at": "2025-01-17T12:15:05Z",
|
||||
"updated_at": "2025-01-17T21:05:43Z",
|
||||
"pushed_at": "2023-04-09T13:50:29Z",
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"has_discussions": false,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 226,
|
||||
"watchers": 227,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
}
|
||||
|
|
|
@ -83,10 +83,10 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2024-12-20T22:43:48Z",
|
||||
"updated_at": "2025-01-17T20:51:12Z",
|
||||
"pushed_at": "2021-01-08T10:31:22Z",
|
||||
"stargazers_count": 583,
|
||||
"watchers_count": 583,
|
||||
"stargazers_count": 584,
|
||||
"watchers_count": 584,
|
||||
"has_discussions": false,
|
||||
"forks_count": 173,
|
||||
"allow_forking": true,
|
||||
|
@ -105,7 +105,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 173,
|
||||
"watchers": 583,
|
||||
"watchers": 584,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T02:41:44Z",
|
||||
"updated_at": "2024-08-12T19:57:26Z",
|
||||
"updated_at": "2025-01-17T23:33:01Z",
|
||||
"pushed_at": "2020-02-19T03:47:33Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -233,10 +233,10 @@
|
|||
"description": "Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-07T15:03:07Z",
|
||||
"updated_at": "2025-01-08T09:10:38Z",
|
||||
"updated_at": "2025-01-17T23:21:37Z",
|
||||
"pushed_at": "2022-09-04T14:16:50Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -250,7 +250,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files and all non-administator passwords, private keys and High Availability passwords.",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-08T11:00:40Z",
|
||||
"updated_at": "2025-01-17T12:43:47Z",
|
||||
"updated_at": "2025-01-17T18:25:19Z",
|
||||
"pushed_at": "2023-12-19T16:39:37Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -424,10 +424,10 @@
|
|||
"description": "cve-2020-1472 复现利用及其exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T03:40:47Z",
|
||||
"updated_at": "2024-12-12T02:02:00Z",
|
||||
"updated_at": "2025-01-17T19:29:09Z",
|
||||
"pushed_at": "2020-09-16T15:03:32Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -436,7 +436,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -1046,6 +1046,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -2151,7 +2151,7 @@
|
|||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 452919328,
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"forks": 36,
|
||||
"watchers": 87,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
@ -500,13 +500,13 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
@ -562,13 +562,13 @@
|
|||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
@ -743,19 +743,19 @@
|
|||
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T06:54:15Z",
|
||||
"updated_at": "2025-01-17T18:21:22Z",
|
||||
"updated_at": "2025-01-17T18:43:45Z",
|
||||
"pushed_at": "2025-01-16T09:56:36Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 41,
|
||||
"forks": 16,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -200,10 +200,10 @@
|
|||
"description": "JeecgBoot SQL(CVE-2023-1454)sqlmap 注入不出来的情况可以使用该脚本",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-31T06:47:01Z",
|
||||
"updated_at": "2024-09-08T04:48:34Z",
|
||||
"updated_at": "2025-01-17T23:35:44Z",
|
||||
"pushed_at": "2024-01-10T08:09:11Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -212,7 +212,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2025-01-17T11:20:55Z",
|
||||
"updated_at": "2025-01-17T19:06:51Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1389,
|
||||
"watchers_count": 1389,
|
||||
"stargazers_count": 1390,
|
||||
"watchers_count": 1390,
|
||||
"has_discussions": false,
|
||||
"forks_count": 238,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 238,
|
||||
"watchers": 1389,
|
||||
"watchers": 1390,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -200,10 +200,10 @@
|
|||
"description": "EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It features automated ADB connection checks, APK pushing, UID extraction, payload generation, and real-time progress updates, providing a seamless and professional user experience.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-04T13:14:10Z",
|
||||
"updated_at": "2024-12-21T23:23:19Z",
|
||||
"updated_at": "2025-01-17T23:20:08Z",
|
||||
"pushed_at": "2024-08-05T14:13:18Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -212,7 +212,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-21683 Confluence Post Auth RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-23T09:05:40Z",
|
||||
"updated_at": "2024-12-06T09:40:41Z",
|
||||
"updated_at": "2025-01-17T21:08:15Z",
|
||||
"pushed_at": "2024-05-27T03:47:36Z",
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 122,
|
||||
"watchers": 123,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 16,
|
||||
"watchers": 95,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
|
|
|
@ -50,19 +50,19 @@
|
|||
"description": "Unauthenticated Remote Code Execution via Angular-Base64-Upload Library (npm:bower)",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T23:54:30Z",
|
||||
"updated_at": "2024-11-21T03:18:25Z",
|
||||
"updated_at": "2025-01-17T22:37:04Z",
|
||||
"pushed_at": "2024-11-20T22:15:11Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T12:39:44Z",
|
||||
"updated_at": "2025-01-17T18:21:50Z",
|
||||
"updated_at": "2025-01-17T21:41:13Z",
|
||||
"pushed_at": "2025-01-16T09:48:07Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 36,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "POC exploit for CVE-2024-49138",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-15T00:43:37Z",
|
||||
"updated_at": "2025-01-17T14:04:02Z",
|
||||
"pushed_at": "2025-01-15T01:01:21Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"updated_at": "2025-01-17T21:52:04Z",
|
||||
"pushed_at": "2025-01-17T22:40:51Z",
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 145,
|
||||
"watchers": 146,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-53691",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-13T10:07:25Z",
|
||||
"updated_at": "2025-01-17T03:02:45Z",
|
||||
"updated_at": "2025-01-17T22:24:19Z",
|
||||
"pushed_at": "2025-01-13T10:16:58Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T07:26:15Z",
|
||||
"updated_at": "2025-01-17T18:16:57Z",
|
||||
"updated_at": "2025-01-17T20:19:59Z",
|
||||
"pushed_at": "2025-01-16T08:58:49Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 36,
|
||||
"forks": 9,
|
||||
"watchers": 37,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1715,8 +1715,8 @@
|
|||
},
|
||||
{
|
||||
"id": 823899223,
|
||||
"name": "sshd-logingracetime0",
|
||||
"full_name": "liqhtnd\/sshd-logingracetime0",
|
||||
"name": "sshd-logingracetime",
|
||||
"full_name": "liqhtnd\/sshd-logingracetime",
|
||||
"owner": {
|
||||
"login": "liqhtnd",
|
||||
"id": 88907425,
|
||||
|
@ -1724,11 +1724,11 @@
|
|||
"html_url": "https:\/\/github.com\/liqhtnd",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/liqhtnd\/sshd-logingracetime0",
|
||||
"html_url": "https:\/\/github.com\/liqhtnd\/sshd-logingracetime",
|
||||
"description": "Script to address CVE-2024-6387 by changing the LoginGraceTime in sshd.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-04T01:02:34Z",
|
||||
"updated_at": "2024-07-13T18:45:36Z",
|
||||
"updated_at": "2025-01-17T18:49:12Z",
|
||||
"pushed_at": "2024-07-13T18:43:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-15T18:27:12Z",
|
||||
"updated_at": "2025-01-17T10:17:32Z",
|
||||
"updated_at": "2025-01-17T21:52:43Z",
|
||||
"pushed_at": "2025-01-16T15:44:15Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -169,19 +169,19 @@
|
|||
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T14:45:53Z",
|
||||
"updated_at": "2025-01-17T12:35:08Z",
|
||||
"updated_at": "2025-01-17T18:40:56Z",
|
||||
"pushed_at": "2025-01-16T20:09:52Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 17,
|
||||
"forks": 2,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
[
|
||||
{
|
||||
"id": 917869167,
|
||||
"name": "CVE-2024-510T",
|
||||
"full_name": "g0v3lla\/CVE-2024-510T",
|
||||
"id": 918359148,
|
||||
"name": "CVE-2025-510T",
|
||||
"full_name": "g0v3lla\/CVE-2025-510T",
|
||||
"owner": {
|
||||
"login": "g0v3lla",
|
||||
"id": 185237270,
|
||||
|
@ -10,12 +10,12 @@
|
|||
"html_url": "https:\/\/github.com\/g0v3lla",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/g0v3lla\/CVE-2024-510T",
|
||||
"html_url": "https:\/\/github.com\/g0v3lla\/CVE-2025-510T",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T19:51:01Z",
|
||||
"updated_at": "2025-01-17T10:12:45Z",
|
||||
"pushed_at": "2025-01-17T13:36:30Z",
|
||||
"created_at": "2025-01-17T19:08:52Z",
|
||||
"updated_at": "2025-01-17T19:59:01Z",
|
||||
"pushed_at": "2025-01-17T19:59:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
22
README.md
22
README.md
|
@ -13,6 +13,9 @@
|
|||
- [watchtowrlabs/CVE-2025-0282](https://github.com/watchtowrlabs/CVE-2025-0282)
|
||||
- [sfewer-r7/CVE-2025-0282](https://github.com/sfewer-r7/CVE-2025-0282)
|
||||
|
||||
### CVE-2025-510
|
||||
- [g0v3lla/CVE-2025-510T](https://github.com/g0v3lla/CVE-2025-510T)
|
||||
|
||||
### CVE-2025-21385 (2025-01-09)
|
||||
|
||||
<code>A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network.
|
||||
|
@ -352,9 +355,6 @@
|
|||
### CVE-2024-436
|
||||
- [Julian-gmz/CVE-2024-436_Exploit](https://github.com/Julian-gmz/CVE-2024-436_Exploit)
|
||||
|
||||
### CVE-2024-510
|
||||
- [g0v3lla/CVE-2024-510T](https://github.com/g0v3lla/CVE-2024-510T)
|
||||
|
||||
### CVE-2024-1071 (2024-03-13)
|
||||
|
||||
<code>The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'sorting' parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
||||
|
@ -1508,7 +1508,7 @@
|
|||
- [harshinsecurity/sentinelssh](https://github.com/harshinsecurity/sentinelssh)
|
||||
- [t3rry327/cve-2024-6387-poc](https://github.com/t3rry327/cve-2024-6387-poc)
|
||||
- [jocker2410/CVE-2024-6387_poc](https://github.com/jocker2410/CVE-2024-6387_poc)
|
||||
- [liqhtnd/sshd-logingracetime0](https://github.com/liqhtnd/sshd-logingracetime0)
|
||||
- [liqhtnd/sshd-logingracetime](https://github.com/liqhtnd/sshd-logingracetime)
|
||||
- [JackSparrowhk/ssh-CVE-2024-6387-poc](https://github.com/JackSparrowhk/ssh-CVE-2024-6387-poc)
|
||||
- [turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker](https://github.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker)
|
||||
- [sms2056/CVE-2024-6387](https://github.com/sms2056/CVE-2024-6387)
|
||||
|
@ -8488,7 +8488,11 @@
|
|||
|
||||
- [absholi7ly/CVE-2024-56512-Apache-NiFi-Exploit](https://github.com/absholi7ly/CVE-2024-56512-Apache-NiFi-Exploit)
|
||||
|
||||
### CVE-2024-57252
|
||||
### CVE-2024-57252 (2025-01-17)
|
||||
|
||||
<code>OtCMS <=V7.46 is vulnerable to Server-Side Request Forgery (SSRF) in /admin/read.php, which can Read system files arbitrarily.
|
||||
</code>
|
||||
|
||||
- [J-0k3r/CVE-2024-57252](https://github.com/J-0k3r/CVE-2024-57252)
|
||||
|
||||
### CVE-2024-57487 (2025-01-13)
|
||||
|
@ -41751,7 +41755,11 @@
|
|||
- [andyfeili/CVE-2018-9276](https://github.com/andyfeili/CVE-2018-9276)
|
||||
- [alvinsmith-eroad/CVE-2018-9276](https://github.com/alvinsmith-eroad/CVE-2018-9276)
|
||||
|
||||
### CVE-2018-9375
|
||||
### CVE-2018-9375 (2025-01-17)
|
||||
|
||||
<code>In multiple functions of UserDictionaryProvider.java, there is a possible way to add and delete words in the user dictionary due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
||||
</code>
|
||||
|
||||
- [IOActive/AOSP-ExploitUserDictionary](https://github.com/IOActive/AOSP-ExploitUserDictionary)
|
||||
|
||||
### CVE-2018-9411 (2024-11-19)
|
||||
|
@ -49018,7 +49026,7 @@
|
|||
- [bsodmike/rails-exploit-cve-2013-0156](https://github.com/bsodmike/rails-exploit-cve-2013-0156)
|
||||
- [R3dKn33-zz/CVE-2013-0156](https://github.com/R3dKn33-zz/CVE-2013-0156)
|
||||
- [Jjdt12/kuang_grade_mk11](https://github.com/Jjdt12/kuang_grade_mk11)
|
||||
- [oxBEN10/CVE-2013-0156](https://github.com/oxBEN10/CVE-2013-0156)
|
||||
- [oxben10/CVE-2013-0156](https://github.com/oxben10/CVE-2013-0156)
|
||||
|
||||
### CVE-2013-0212 (2013-02-24)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue