mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 01:24:10 +01:00
Auto Update 2024/09/25 12:31:08
This commit is contained in:
parent
4e0421439b
commit
b0578fb16d
55 changed files with 494 additions and 210 deletions
2004
2007
2009
2011
2014
2015
2016
2018
2019
2020
2021
2022
CVE-2022-0316.jsonCVE-2022-0337.jsonCVE-2022-0847.jsonCVE-2022-20452.jsonCVE-2022-22947.jsonCVE-2022-37434.jsonCVE-2022-42046.jsonCVE-2022-46463.json
2023
CVE-2023-25136.jsonCVE-2023-27350.jsonCVE-2023-38646.jsonCVE-2023-42793.jsonCVE-2023-45866.jsonCVE-2023-51467.json
2024
CVE-2024-0015.jsonCVE-2024-20017.jsonCVE-2024-24401.jsonCVE-2024-26229.jsonCVE-2024-28987.jsonCVE-2024-3094.jsonCVE-2024-36991.jsonCVE-2024-38063.jsonCVE-2024-38816.jsonCVE-2024-43998.jsonCVE-2024-44346.jsonCVE-2024-46627.jsonCVE-2024-47066.jsonCVE-2024-5084.jsonCVE-2024-5274.jsonCVE-2024-5324.jsonCVE-2024-6592.jsonCVE-2024-7646.jsonCVE-2024-8190.jsonCVE-2024-8484.json
README.md
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 382165102,
|
||||
"name": "distccd_rce_CVE-2004-2687",
|
||||
"full_name": "N3rdyN3xus\/distccd_rce_CVE-2004-2687",
|
||||
"full_name": "NyxByt3\/distccd_rce_CVE-2004-2687",
|
||||
"owner": {
|
||||
"login": "N3rdyN3xus",
|
||||
"login": "NyxByt3",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus"
|
||||
"html_url": "https:\/\/github.com\/NyxByt3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus\/distccd_rce_CVE-2004-2687",
|
||||
"html_url": "https:\/\/github.com\/NyxByt3\/distccd_rce_CVE-2004-2687",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T21:56:34Z",
|
||||
|
|
|
@ -692,14 +692,14 @@
|
|||
{
|
||||
"id": 557398595,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "N3rdyN3xus\/CVE-2007-2447",
|
||||
"full_name": "NyxByt3\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "N3rdyN3xus",
|
||||
"login": "NyxByt3",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus"
|
||||
"html_url": "https:\/\/github.com\/NyxByt3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2007-2447",
|
||||
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2007-2447",
|
||||
"description": "Exploit Samba smbd 3.0.20-Debian",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-25T16:05:16Z",
|
||||
|
|
|
@ -32,14 +32,14 @@
|
|||
{
|
||||
"id": 386447803,
|
||||
"name": "CVE-2009-2265",
|
||||
"full_name": "N3rdyN3xus\/CVE-2009-2265",
|
||||
"full_name": "NyxByt3\/CVE-2009-2265",
|
||||
"owner": {
|
||||
"login": "N3rdyN3xus",
|
||||
"login": "NyxByt3",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus"
|
||||
"html_url": "https:\/\/github.com\/NyxByt3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2009-2265",
|
||||
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2009-2265",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-15T23:14:11Z",
|
||||
|
|
|
@ -32,14 +32,14 @@
|
|||
{
|
||||
"id": 384774726,
|
||||
"name": "CVE-2011-1249",
|
||||
"full_name": "N3rdyN3xus\/CVE-2011-1249",
|
||||
"full_name": "NyxByt3\/CVE-2011-1249",
|
||||
"owner": {
|
||||
"login": "N3rdyN3xus",
|
||||
"login": "NyxByt3",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus"
|
||||
"html_url": "https:\/\/github.com\/NyxByt3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2011-1249",
|
||||
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2011-1249",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-10T19:27:23Z",
|
||||
|
|
|
@ -1728,14 +1728,14 @@
|
|||
{
|
||||
"id": 485013657,
|
||||
"name": "CVE-2014-0160_Heartbleed",
|
||||
"full_name": "N3rdyN3xus\/CVE-2014-0160_Heartbleed",
|
||||
"full_name": "NyxByt3\/CVE-2014-0160_Heartbleed",
|
||||
"owner": {
|
||||
"login": "N3rdyN3xus",
|
||||
"login": "NyxByt3",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus"
|
||||
"html_url": "https:\/\/github.com\/NyxByt3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2014-0160_Heartbleed",
|
||||
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2014-0160_Heartbleed",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-24T11:53:16Z",
|
||||
|
|
|
@ -244,14 +244,14 @@
|
|||
{
|
||||
"id": 385080605,
|
||||
"name": "CVE-2015-1635-POC",
|
||||
"full_name": "N3rdyN3xus\/CVE-2015-1635-POC",
|
||||
"full_name": "NyxByt3\/CVE-2015-1635-POC",
|
||||
"owner": {
|
||||
"login": "N3rdyN3xus",
|
||||
"login": "NyxByt3",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus"
|
||||
"html_url": "https:\/\/github.com\/NyxByt3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2015-1635-POC",
|
||||
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2015-1635-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-12T00:23:30Z",
|
||||
|
@ -274,14 +274,14 @@
|
|||
{
|
||||
"id": 385082908,
|
||||
"name": "CVE-2015-1635",
|
||||
"full_name": "N3rdyN3xus\/CVE-2015-1635",
|
||||
"full_name": "NyxByt3\/CVE-2015-1635",
|
||||
"owner": {
|
||||
"login": "N3rdyN3xus",
|
||||
"login": "NyxByt3",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus"
|
||||
"html_url": "https:\/\/github.com\/NyxByt3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2015-1635",
|
||||
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2015-1635",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-12T00:37:54Z",
|
||||
|
|
|
@ -32,14 +32,14 @@
|
|||
{
|
||||
"id": 386433999,
|
||||
"name": "CVE-2015-6668",
|
||||
"full_name": "N3rdyN3xus\/CVE-2015-6668",
|
||||
"full_name": "NyxByt3\/CVE-2015-6668",
|
||||
"owner": {
|
||||
"login": "N3rdyN3xus",
|
||||
"login": "NyxByt3",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus"
|
||||
"html_url": "https:\/\/github.com\/NyxByt3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2015-6668",
|
||||
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2015-6668",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-15T21:58:15Z",
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 615366361,
|
||||
"name": "CVE-2016-1531",
|
||||
"full_name": "N3rdyN3xus\/CVE-2016-1531",
|
||||
"full_name": "NyxByt3\/CVE-2016-1531",
|
||||
"owner": {
|
||||
"login": "N3rdyN3xus",
|
||||
"login": "NyxByt3",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus"
|
||||
"html_url": "https:\/\/github.com\/NyxByt3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/N3rdyN3xus\/CVE-2016-1531",
|
||||
"html_url": "https:\/\/github.com\/NyxByt3\/CVE-2016-1531",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-17T14:30:15Z",
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T15:44:29Z",
|
||||
"updated_at": "2024-08-12T19:39:29Z",
|
||||
"updated_at": "2024-09-25T11:21:13Z",
|
||||
"pushed_at": "2024-02-15T22:16:16Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 200,
|
||||
"watchers": 201,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-01-04T21:44:21Z",
|
||||
"updated_at": "2024-09-19T00:29:58Z",
|
||||
"pushed_at": "2024-09-19T00:29:57Z",
|
||||
"pushed_at": "2024-09-25T08:45:17Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -509,10 +509,10 @@
|
|||
"description": "This repository provides a dockerized infrastructure and a python implementation of the CVE-2019-11043 exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-05T09:43:44Z",
|
||||
"updated_at": "2024-07-14T10:37:16Z",
|
||||
"updated_at": "2024-09-25T11:31:52Z",
|
||||
"pushed_at": "2020-05-25T05:53:56Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -521,7 +521,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T06:26:27Z",
|
||||
"updated_at": "2024-08-12T19:55:03Z",
|
||||
"updated_at": "2024-09-25T12:05:37Z",
|
||||
"pushed_at": "2019-11-21T09:27:59Z",
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"has_discussions": false,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"watchers": 185,
|
||||
"watchers": 186,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T04:09:29Z",
|
||||
"updated_at": "2023-07-24T16:19:26Z",
|
||||
"updated_at": "2024-09-25T09:59:05Z",
|
||||
"pushed_at": "2020-02-26T09:24:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T16:42:34Z",
|
||||
"updated_at": "2024-09-24T16:58:49Z",
|
||||
"updated_at": "2024-09-25T10:00:17Z",
|
||||
"pushed_at": "2021-12-23T16:28:28Z",
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"stargazers_count": 337,
|
||||
"watchers_count": 337,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 336,
|
||||
"watchers": 337,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -1006,10 +1006,10 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2024-09-22T02:14:45Z",
|
||||
"updated_at": "2024-09-25T10:01:21Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1296,
|
||||
"watchers_count": 1296,
|
||||
"stargazers_count": 1297,
|
||||
"watchers_count": 1297,
|
||||
"has_discussions": false,
|
||||
"forks_count": 344,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,7 +1024,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 344,
|
||||
"watchers": 1296,
|
||||
"watchers": 1297,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -1065,10 +1065,10 @@
|
|||
"description": "CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-05T14:49:32Z",
|
||||
"updated_at": "2024-08-19T05:58:41Z",
|
||||
"updated_at": "2024-09-25T08:35:59Z",
|
||||
"pushed_at": "2021-12-05T14:51:28Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -1077,7 +1077,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit code for CVE-2021-1961",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-03T13:31:13Z",
|
||||
"updated_at": "2024-09-10T23:47:58Z",
|
||||
"updated_at": "2024-09-25T07:44:16Z",
|
||||
"pushed_at": "2022-09-07T11:47:56Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
}
|
||||
|
|
32
2021/CVE-2021-24959.json
Normal file
32
2021/CVE-2021-24959.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 861757230,
|
||||
"name": "CVE-2021-24959",
|
||||
"full_name": "RandomRobbieBF\/CVE-2021-24959",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2021-24959",
|
||||
"description": "WP Email Users <= 1.7.6 - SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-23T13:15:34Z",
|
||||
"updated_at": "2024-09-25T08:13:57Z",
|
||||
"pushed_at": "2024-09-23T13:19:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -103,10 +103,10 @@
|
|||
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-01T12:41:03Z",
|
||||
"updated_at": "2024-08-26T13:49:24Z",
|
||||
"updated_at": "2024-09-25T08:36:01Z",
|
||||
"pushed_at": "2022-03-01T16:11:31Z",
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"stargazers_count": 252,
|
||||
"watchers_count": 252,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 251,
|
||||
"watchers": 252,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -29,36 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 444456600,
|
||||
"name": "CVE-2021-42342",
|
||||
"full_name": "Mr-xn\/CVE-2021-42342",
|
||||
"owner": {
|
||||
"login": "Mr-xn",
|
||||
"id": 18260135,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mr-xn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-42342",
|
||||
"description": "CVE-2021-42342 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-04T14:48:59Z",
|
||||
"updated_at": "2024-08-12T20:19:29Z",
|
||||
"pushed_at": "2022-01-04T14:54:39Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 711394073,
|
||||
"name": "-zeroboo-Gohead-CVE-2021-42342-1",
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-19T08:10:46Z",
|
||||
"updated_at": "2024-08-15T14:16:50Z",
|
||||
"updated_at": "2024-09-25T07:23:48Z",
|
||||
"pushed_at": "2022-09-04T17:28:56Z",
|
||||
"stargazers_count": 326,
|
||||
"watchers_count": 326,
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -41,7 +41,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 326,
|
||||
"watchers": 327,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -403,10 +403,10 @@
|
|||
"description": "The Dirty Pipe Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T13:48:55Z",
|
||||
"updated_at": "2024-07-19T15:31:53Z",
|
||||
"updated_at": "2024-09-25T08:36:01Z",
|
||||
"pushed_at": "2022-03-08T13:54:08Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -415,7 +415,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T16:24:51Z",
|
||||
"updated_at": "2024-09-20T20:33:06Z",
|
||||
"updated_at": "2024-09-25T08:36:08Z",
|
||||
"pushed_at": "2023-04-12T17:28:49Z",
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 273,
|
||||
"watchers": 274,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -1284,10 +1284,10 @@
|
|||
"description": "CVE-2022-22947 注入Godzilla内存马",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-26T05:48:27Z",
|
||||
"updated_at": "2024-08-31T17:19:11Z",
|
||||
"updated_at": "2024-09-25T07:25:05Z",
|
||||
"pushed_at": "2022-04-26T05:55:58Z",
|
||||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"stargazers_count": 204,
|
||||
"watchers_count": 204,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -1296,7 +1296,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 203,
|
||||
"watchers": 204,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "u think that it doesnt but it do",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-15T00:29:38Z",
|
||||
"updated_at": "2024-07-19T15:31:58Z",
|
||||
"updated_at": "2024-09-25T08:36:07Z",
|
||||
"pushed_at": "2022-10-15T00:46:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-17T16:45:13Z",
|
||||
"updated_at": "2024-09-02T09:18:30Z",
|
||||
"updated_at": "2024-09-25T06:37:01Z",
|
||||
"pushed_at": "2022-12-24T10:29:08Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"has_discussions": true,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 160,
|
||||
"watchers": 161,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "harbor unauthorized detection",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-21T10:40:19Z",
|
||||
"updated_at": "2024-08-22T08:25:31Z",
|
||||
"updated_at": "2024-09-25T07:54:00Z",
|
||||
"pushed_at": "2023-03-28T04:23:42Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-22T19:44:08Z",
|
||||
"updated_at": "2024-09-06T00:15:50Z",
|
||||
"updated_at": "2024-09-25T08:36:09Z",
|
||||
"pushed_at": "2023-03-07T10:43:36Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 101,
|
||||
"watchers": 102,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"forks": 19,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"forks": 13,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
"teamcity"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 14,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 1178,
|
||||
"watchers_count": 1178,
|
||||
"has_discussions": false,
|
||||
"forks_count": 199,
|
||||
"forks_count": 200,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 199,
|
||||
"forks": 200,
|
||||
"watchers": 1178,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
|
|
|
@ -89,10 +89,10 @@
|
|||
"description": "A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-29T17:47:54Z",
|
||||
"updated_at": "2024-08-03T02:03:13Z",
|
||||
"updated_at": "2024-09-25T10:52:29Z",
|
||||
"pushed_at": "2023-12-31T21:29:59Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -106,7 +106,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -124,10 +124,10 @@
|
|||
"description": "This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-02T14:20:10Z",
|
||||
"updated_at": "2024-06-23T14:32:41Z",
|
||||
"updated_at": "2024-09-25T10:55:06Z",
|
||||
"pushed_at": "2024-03-24T18:20:52Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -136,7 +136,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "a demo poc for CVE-2024-0015",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-19T10:00:21Z",
|
||||
"updated_at": "2024-09-12T06:20:31Z",
|
||||
"updated_at": "2024-09-25T12:18:28Z",
|
||||
"pushed_at": "2024-08-14T09:53:13Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "exploits for CVE-2024-20017",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-30T05:54:36Z",
|
||||
"updated_at": "2024-09-25T05:20:30Z",
|
||||
"updated_at": "2024-09-25T10:01:43Z",
|
||||
"pushed_at": "2024-09-07T10:11:22Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 80,
|
||||
"watchers": 85,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Auto exploitation tool for CVE-2024-24401. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-18T20:05:46Z",
|
||||
"updated_at": "2024-09-15T17:28:35Z",
|
||||
"updated_at": "2024-09-25T11:24:58Z",
|
||||
"pushed_at": "2024-09-07T03:02:43Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 24,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T17:02:03Z",
|
||||
"updated_at": "2024-09-18T22:48:02Z",
|
||||
"updated_at": "2024-09-25T07:04:09Z",
|
||||
"pushed_at": "2024-07-04T10:39:15Z",
|
||||
"stargazers_count": 309,
|
||||
"watchers_count": 309,
|
||||
"stargazers_count": 310,
|
||||
"watchers_count": 310,
|
||||
"has_discussions": false,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 309,
|
||||
"watchers": 310,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 862512431,
|
||||
"name": "CVE-2024-28987",
|
||||
"full_name": "horizon3ai\/CVE-2024-28987",
|
||||
"owner": {
|
||||
"login": "horizon3ai",
|
||||
"id": 79593994,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
|
||||
"html_url": "https:\/\/github.com\/horizon3ai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/horizon3ai\/CVE-2024-28987",
|
||||
"description": "Proof of Concept Exploit for CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T18:12:38Z",
|
||||
"updated_at": "2024-09-25T10:21:16Z",
|
||||
"pushed_at": "2024-09-24T18:27:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -982,19 +982,19 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-09-24T17:47:50Z",
|
||||
"updated_at": "2024-09-25T08:41:01Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3485,
|
||||
"watchers_count": 3485,
|
||||
"stargazers_count": 3486,
|
||||
"watchers_count": 3486,
|
||||
"has_discussions": false,
|
||||
"forks_count": 236,
|
||||
"forks_count": 237,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 236,
|
||||
"watchers": 3485,
|
||||
"forks": 237,
|
||||
"watchers": 3486,
|
||||
"score": 0,
|
||||
"subscribers_count": 39
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-06T00:49:40Z",
|
||||
"updated_at": "2024-09-20T13:23:52Z",
|
||||
"updated_at": "2024-09-25T10:19:26Z",
|
||||
"pushed_at": "2024-07-12T00:41:36Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -406,10 +406,10 @@
|
|||
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-31T13:56:26Z",
|
||||
"updated_at": "2024-09-22T02:29:01Z",
|
||||
"updated_at": "2024-09-25T11:13:12Z",
|
||||
"pushed_at": "2024-09-13T14:30:18Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -418,7 +418,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -623,8 +623,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-23T11:45:42Z",
|
||||
"updated_at": "2024-09-23T11:47:02Z",
|
||||
"pushed_at": "2024-09-23T11:46:58Z",
|
||||
"updated_at": "2024-09-25T12:01:17Z",
|
||||
"pushed_at": "2024-09-25T12:01:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 862846646,
|
||||
"name": "CVE-2024-38816-PoC",
|
||||
"full_name": "masa42\/CVE-2024-38816-PoC",
|
||||
"owner": {
|
||||
"login": "masa42",
|
||||
"id": 46730934,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46730934?v=4",
|
||||
"html_url": "https:\/\/github.com\/masa42"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/masa42\/CVE-2024-38816-PoC",
|
||||
"description": "CVE-2024-38816 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-25T09:36:59Z",
|
||||
"updated_at": "2024-09-25T10:26:03Z",
|
||||
"pushed_at": "2024-09-25T10:20:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-43998.json
Normal file
32
2024/CVE-2024-43998.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 855090098,
|
||||
"name": "CVE-2024-43998",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-43998",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-43998",
|
||||
"description": "Blogpoet <= 1.0.2 - Missing Authorization via blogpoet_install_and_activate_plugins()",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-10T09:38:20Z",
|
||||
"updated_at": "2024-09-25T08:14:14Z",
|
||||
"pushed_at": "2024-09-10T09:45:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Public Disclosure",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-13T10:27:23Z",
|
||||
"updated_at": "2024-09-13T10:28:14Z",
|
||||
"pushed_at": "2024-09-13T10:28:11Z",
|
||||
"updated_at": "2024-09-25T06:45:26Z",
|
||||
"pushed_at": "2024-09-25T06:45:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
32
2024/CVE-2024-46627.json
Normal file
32
2024/CVE-2024-46627.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 862873525,
|
||||
"name": "CVE-2024-46627",
|
||||
"full_name": "d4lyw\/CVE-2024-46627",
|
||||
"owner": {
|
||||
"login": "d4lyw",
|
||||
"id": 53091736,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53091736?v=4",
|
||||
"html_url": "https:\/\/github.com\/d4lyw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/d4lyw\/CVE-2024-46627",
|
||||
"description": "CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary commands via crafted web requests.",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-25T10:32:53Z",
|
||||
"updated_at": "2024-09-25T10:52:13Z",
|
||||
"pushed_at": "2024-09-25T10:52:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-47066",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T09:59:27Z",
|
||||
"updated_at": "2024-09-24T23:56:49Z",
|
||||
"updated_at": "2024-09-25T11:12:45Z",
|
||||
"pushed_at": "2024-09-24T15:35:56Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -52,7 +52,7 @@
|
|||
"description": "Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T20:04:10Z",
|
||||
"updated_at": "2024-09-18T22:48:01Z",
|
||||
"updated_at": "2024-09-25T09:36:38Z",
|
||||
"pushed_at": "2024-07-17T23:40:18Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Guardian Code: A Script to Uncover CVE-2024-5274 Vulnerabilities",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-10T02:15:56Z",
|
||||
"updated_at": "2024-07-12T05:33:12Z",
|
||||
"updated_at": "2024-09-25T07:17:42Z",
|
||||
"pushed_at": "2024-07-10T08:56:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
36
2024/CVE-2024-5324.json
Normal file
36
2024/CVE-2024-5324.json
Normal file
|
@ -0,0 +1,36 @@
|
|||
[
|
||||
{
|
||||
"id": 811264259,
|
||||
"name": "CVE-2024-5324",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-5324",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-5324",
|
||||
"description": "Login\/Signup Popup ( Inline Form + Woocommerce ) 2.7.1 - 2.7.2 - Missing Authorization to Arbitrary Options Update",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-06T09:01:46Z",
|
||||
"updated_at": "2024-09-25T08:14:30Z",
|
||||
"pushed_at": "2024-06-06T09:05:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2024-5324",
|
||||
"easy-login-woocommerce",
|
||||
"wordpress"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-6592.json
Normal file
32
2024/CVE-2024-6592.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 858770133,
|
||||
"name": "watchguard-sso-client",
|
||||
"full_name": "RedTeamPentesting\/watchguard-sso-client",
|
||||
"owner": {
|
||||
"login": "RedTeamPentesting",
|
||||
"id": 34096076,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34096076?v=4",
|
||||
"html_url": "https:\/\/github.com\/RedTeamPentesting"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RedTeamPentesting\/watchguard-sso-client",
|
||||
"description": "Client Implementation for the WatchGuard SSO Agent Protocol used for Security Research (CVE-2024-6592, CVE-2024-6593, CVE-2024-6594)",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-17T14:01:10Z",
|
||||
"updated_at": "2024-09-25T11:54:25Z",
|
||||
"pushed_at": "2024-09-17T14:12:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 862891732,
|
||||
"name": "cve-2024-7646",
|
||||
"full_name": "dovics\/cve-2024-7646",
|
||||
"owner": {
|
||||
"login": "dovics",
|
||||
"id": 45029442,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45029442?v=4",
|
||||
"html_url": "https:\/\/github.com\/dovics"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dovics\/cve-2024-7646",
|
||||
"description": "PoC CVE-2024-7646",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-25T11:13:07Z",
|
||||
"updated_at": "2024-09-25T11:15:30Z",
|
||||
"pushed_at": "2024-09-25T11:13:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-16T15:33:46Z",
|
||||
"updated_at": "2024-09-23T08:03:07Z",
|
||||
"updated_at": "2024-09-25T06:53:56Z",
|
||||
"pushed_at": "2024-09-16T15:43:44Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
32
2024/CVE-2024-8484.json
Normal file
32
2024/CVE-2024-8484.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 862372924,
|
||||
"name": "CVE-2024-8484",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-8484",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-8484",
|
||||
"description": "REST API TO MiniProgram <= 4.7.1 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T13:46:02Z",
|
||||
"updated_at": "2024-09-25T08:13:24Z",
|
||||
"pushed_at": "2024-09-24T13:49:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
48
README.md
48
README.md
|
@ -1062,6 +1062,13 @@
|
|||
- [Alchemist3dot14/CVE-2024-5274-Detection](https://github.com/Alchemist3dot14/CVE-2024-5274-Detection)
|
||||
- [mistymntncop/CVE-2024-5274](https://github.com/mistymntncop/CVE-2024-5274)
|
||||
|
||||
### CVE-2024-5324 (2024-06-06)
|
||||
|
||||
<code>The Login/Signup Popup ( Inline Form + Woocommerce ) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'import_settings' function in versions 2.7.1 to 2.7.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-5324](https://github.com/RandomRobbieBF/CVE-2024-5324)
|
||||
|
||||
### CVE-2024-5326 (2024-05-30)
|
||||
|
||||
<code>The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'postx_presets_callback' function in all versions up to, and including, 4.1.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator.
|
||||
|
@ -1317,6 +1324,9 @@
|
|||
|
||||
- [apena-ba/CVE-2024-6536](https://github.com/apena-ba/CVE-2024-6536)
|
||||
|
||||
### CVE-2024-6592
|
||||
- [RedTeamPentesting/watchguard-sso-client](https://github.com/RedTeamPentesting/watchguard-sso-client)
|
||||
|
||||
### CVE-2024-6624 (2024-07-11)
|
||||
|
||||
<code>The JSON API User plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.9.3. This is due to improper controls on custom user meta fields. This makes it possible for unauthenticated attackers to register as administrators on the site. The plugin requires the JSON API plugin to also be installed.
|
||||
|
@ -1404,6 +1414,7 @@
|
|||
</code>
|
||||
|
||||
- [r0binak/CVE-2024-7646](https://github.com/r0binak/CVE-2024-7646)
|
||||
- [dovics/cve-2024-7646](https://github.com/dovics/cve-2024-7646)
|
||||
|
||||
### CVE-2024-7703 (2024-08-17)
|
||||
|
||||
|
@ -1464,6 +1475,9 @@
|
|||
### CVE-2024-8349
|
||||
- [karlemilnikka/CVE-2024-8349-and-CVE-2024-8350](https://github.com/karlemilnikka/CVE-2024-8349-and-CVE-2024-8350)
|
||||
|
||||
### CVE-2024-8484
|
||||
- [RandomRobbieBF/CVE-2024-8484](https://github.com/RandomRobbieBF/CVE-2024-8484)
|
||||
|
||||
### CVE-2024-8504 (2024-09-10)
|
||||
|
||||
<code>An attacker with authenticated access to VICIdial as an "agent" can execute arbitrary shell commands as the "root" user. This attack can be chained with CVE-2024-8503 to execute arbitrary shell commands starting from an unauthenticated perspective.
|
||||
|
@ -3175,6 +3189,7 @@
|
|||
</code>
|
||||
|
||||
- [fa-rrel/CVE-2024-28987-POC](https://github.com/fa-rrel/CVE-2024-28987-POC)
|
||||
- [horizon3ai/CVE-2024-28987](https://github.com/horizon3ai/CVE-2024-28987)
|
||||
|
||||
### CVE-2024-28991 (2024-09-12)
|
||||
|
||||
|
@ -4521,6 +4536,7 @@
|
|||
</code>
|
||||
|
||||
- [weliveby/cve-2024-38816-demo](https://github.com/weliveby/cve-2024-38816-demo)
|
||||
- [masa42/CVE-2024-38816-PoC](https://github.com/masa42/CVE-2024-38816-PoC)
|
||||
|
||||
### CVE-2024-38856 (2024-08-05)
|
||||
|
||||
|
@ -4931,6 +4947,9 @@
|
|||
|
||||
- [KTN1990/CVE-2024-43918](https://github.com/KTN1990/CVE-2024-43918)
|
||||
|
||||
### CVE-2024-43998
|
||||
- [RandomRobbieBF/CVE-2024-43998](https://github.com/RandomRobbieBF/CVE-2024-43998)
|
||||
|
||||
### CVE-2024-44000
|
||||
- [absholi7ly/CVE-2024-44000-LiteSpeed-Cache](https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache)
|
||||
- [gbrsh/CVE-2024-44000](https://github.com/gbrsh/CVE-2024-44000)
|
||||
|
@ -5080,6 +5099,9 @@
|
|||
|
||||
- [vidura2/CVE-2024-46451](https://github.com/vidura2/CVE-2024-46451)
|
||||
|
||||
### CVE-2024-46627
|
||||
- [d4lyw/CVE-2024-46627](https://github.com/d4lyw/CVE-2024-46627)
|
||||
|
||||
### CVE-2024-46986
|
||||
- [vidura2/CVE-2024-46986](https://github.com/vidura2/CVE-2024-46986)
|
||||
|
||||
|
@ -22169,6 +22191,13 @@
|
|||
- [dikalasenjadatang/CVE-2021-24917](https://github.com/dikalasenjadatang/CVE-2021-24917)
|
||||
- [Cappricio-Securities/CVE-2021-24917](https://github.com/Cappricio-Securities/CVE-2021-24917)
|
||||
|
||||
### CVE-2021-24959 (2022-03-14)
|
||||
|
||||
<code>The WP Email Users WordPress plugin through 1.7.6 does not escape the data_raw parameter in the weu_selected_users_1 AJAX action, available to any authenticated users, allowing them to perform SQL injection attacks.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2021-24959](https://github.com/RandomRobbieBF/CVE-2021-24959)
|
||||
|
||||
### CVE-2021-25003 (2022-03-14)
|
||||
|
||||
<code>The WPCargo Track & Trace WordPress plugin before 6.9.0 contains a file which could allow unauthenticated attackers to write a PHP file anywhere on the web server, leading to RCE
|
||||
|
@ -25206,7 +25235,6 @@
|
|||
</code>
|
||||
|
||||
- [kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-](https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-)
|
||||
- [Mr-xn/CVE-2021-42342](https://github.com/Mr-xn/CVE-2021-42342)
|
||||
- [ijh4723/-zeroboo-Gohead-CVE-2021-42342-1](https://github.com/ijh4723/-zeroboo-Gohead-CVE-2021-42342-1)
|
||||
|
||||
### CVE-2021-42362 (2021-11-17)
|
||||
|
@ -42006,7 +42034,7 @@
|
|||
<code>Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
|
||||
</code>
|
||||
|
||||
- [N3rdyN3xus/CVE-2016-1531](https://github.com/N3rdyN3xus/CVE-2016-1531)
|
||||
- [NyxByt3/CVE-2016-1531](https://github.com/NyxByt3/CVE-2016-1531)
|
||||
|
||||
### CVE-2016-1542 (2016-06-13)
|
||||
|
||||
|
@ -43292,8 +43320,8 @@
|
|||
- [bongbongco/MS15-034](https://github.com/bongbongco/MS15-034)
|
||||
- [aedoo/CVE-2015-1635-POC](https://github.com/aedoo/CVE-2015-1635-POC)
|
||||
- [limkokholefork/CVE-2015-1635](https://github.com/limkokholefork/CVE-2015-1635)
|
||||
- [N3rdyN3xus/CVE-2015-1635-POC](https://github.com/N3rdyN3xus/CVE-2015-1635-POC)
|
||||
- [N3rdyN3xus/CVE-2015-1635](https://github.com/N3rdyN3xus/CVE-2015-1635)
|
||||
- [NyxByt3/CVE-2015-1635-POC](https://github.com/NyxByt3/CVE-2015-1635-POC)
|
||||
- [NyxByt3/CVE-2015-1635](https://github.com/NyxByt3/CVE-2015-1635)
|
||||
- [w01ke/CVE-2015-1635-POC](https://github.com/w01ke/CVE-2015-1635-POC)
|
||||
- [SkinAir/ms15-034-Scan](https://github.com/SkinAir/ms15-034-Scan)
|
||||
- [Cappricio-Securities/CVE-2015-1635](https://github.com/Cappricio-Securities/CVE-2015-1635)
|
||||
|
@ -43792,7 +43820,7 @@
|
|||
</code>
|
||||
|
||||
- [G01d3nW01f/CVE-2015-6668](https://github.com/G01d3nW01f/CVE-2015-6668)
|
||||
- [N3rdyN3xus/CVE-2015-6668](https://github.com/N3rdyN3xus/CVE-2015-6668)
|
||||
- [NyxByt3/CVE-2015-6668](https://github.com/NyxByt3/CVE-2015-6668)
|
||||
- [jimdiroffii/CVE-2015-6668](https://github.com/jimdiroffii/CVE-2015-6668)
|
||||
|
||||
### CVE-2015-6748 (2017-09-25)
|
||||
|
@ -44113,7 +44141,7 @@
|
|||
- [ingochris/heartpatch.us](https://github.com/ingochris/heartpatch.us)
|
||||
- [BelminD/heartbleed](https://github.com/BelminD/heartbleed)
|
||||
- [pierceoneill/bleeding-heart](https://github.com/pierceoneill/bleeding-heart)
|
||||
- [N3rdyN3xus/CVE-2014-0160_Heartbleed](https://github.com/N3rdyN3xus/CVE-2014-0160_Heartbleed)
|
||||
- [NyxByt3/CVE-2014-0160_Heartbleed](https://github.com/NyxByt3/CVE-2014-0160_Heartbleed)
|
||||
- [GardeniaWhite/fuzzing](https://github.com/GardeniaWhite/fuzzing)
|
||||
- [undacmic/heartbleed-proof-of-concept](https://github.com/undacmic/heartbleed-proof-of-concept)
|
||||
- [cbk914/heartbleed-checker](https://github.com/cbk914/heartbleed-checker)
|
||||
|
@ -45596,7 +45624,7 @@
|
|||
</code>
|
||||
|
||||
- [Madusanka99/OHTS](https://github.com/Madusanka99/OHTS)
|
||||
- [N3rdyN3xus/CVE-2011-1249](https://github.com/N3rdyN3xus/CVE-2011-1249)
|
||||
- [NyxByt3/CVE-2011-1249](https://github.com/NyxByt3/CVE-2011-1249)
|
||||
|
||||
### CVE-2011-1473 (2012-06-16)
|
||||
|
||||
|
@ -46050,7 +46078,7 @@
|
|||
</code>
|
||||
|
||||
- [zaphoxx/zaphoxx-coldfusion](https://github.com/zaphoxx/zaphoxx-coldfusion)
|
||||
- [N3rdyN3xus/CVE-2009-2265](https://github.com/N3rdyN3xus/CVE-2009-2265)
|
||||
- [NyxByt3/CVE-2009-2265](https://github.com/NyxByt3/CVE-2009-2265)
|
||||
- [p1ckzi/CVE-2009-2265](https://github.com/p1ckzi/CVE-2009-2265)
|
||||
- [0xConstant/CVE-2009-2265](https://github.com/0xConstant/CVE-2009-2265)
|
||||
|
||||
|
@ -46349,7 +46377,7 @@
|
|||
- [mr-l0n3lly/CVE-2007-2447](https://github.com/mr-l0n3lly/CVE-2007-2447)
|
||||
- [HerculesRD/PyUsernameMapScriptRCE](https://github.com/HerculesRD/PyUsernameMapScriptRCE)
|
||||
- [Aviksaikat/CVE-2007-2447](https://github.com/Aviksaikat/CVE-2007-2447)
|
||||
- [N3rdyN3xus/CVE-2007-2447](https://github.com/N3rdyN3xus/CVE-2007-2447)
|
||||
- [NyxByt3/CVE-2007-2447](https://github.com/NyxByt3/CVE-2007-2447)
|
||||
- [bdunlap9/CVE-2007-2447_python](https://github.com/bdunlap9/CVE-2007-2447_python)
|
||||
- [MikeRega7/CVE-2007-2447-RCE](https://github.com/MikeRega7/CVE-2007-2447-RCE)
|
||||
- [0xTabun/CVE-2007-2447](https://github.com/0xTabun/CVE-2007-2447)
|
||||
|
@ -46634,7 +46662,7 @@
|
|||
<code>distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks.
|
||||
</code>
|
||||
|
||||
- [N3rdyN3xus/distccd_rce_CVE-2004-2687](https://github.com/N3rdyN3xus/distccd_rce_CVE-2004-2687)
|
||||
- [NyxByt3/distccd_rce_CVE-2004-2687](https://github.com/NyxByt3/distccd_rce_CVE-2004-2687)
|
||||
- [k4miyo/CVE-2004-2687](https://github.com/k4miyo/CVE-2004-2687)
|
||||
- [ss0wl/CVE-2004-2687_distcc_v1](https://github.com/ss0wl/CVE-2004-2687_distcc_v1)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue