mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/08/13 12:30:10
This commit is contained in:
parent
7d910fd64f
commit
b0d4228340
42 changed files with 361 additions and 143 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2013-4786 Go exploitation tool",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-23T20:01:37Z",
|
||||
"updated_at": "2024-07-11T17:24:16Z",
|
||||
"updated_at": "2024-08-13T09:47:06Z",
|
||||
"pushed_at": "2023-11-01T19:23:34Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"phpmyadmin-scanner"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-22T05:06:33Z",
|
||||
"updated_at": "2024-08-12T20:13:15Z",
|
||||
"updated_at": "2024-08-13T08:11:36Z",
|
||||
"pushed_at": "2021-11-21T10:34:06Z",
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 163,
|
||||
"watchers": 162,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-08-12T19:59:34Z",
|
||||
"updated_at": "2024-08-13T07:31:20Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4082,
|
||||
"watchers_count": 4082,
|
||||
"stargazers_count": 4083,
|
||||
"watchers_count": 4083,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1088,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1088,
|
||||
"watchers": 4082,
|
||||
"watchers": 4083,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Double-Free BUG in WhatsApp exploit poc.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-10T15:25:59Z",
|
||||
"updated_at": "2024-08-12T20:01:20Z",
|
||||
"updated_at": "2024-08-13T11:22:56Z",
|
||||
"pushed_at": "2020-05-10T15:32:54Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 90,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-08-12T19:59:34Z",
|
||||
"updated_at": "2024-08-13T07:31:20Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4082,
|
||||
"watchers_count": 4082,
|
||||
"stargazers_count": 4083,
|
||||
"watchers_count": 4083,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1088,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1088,
|
||||
"watchers": 4082,
|
||||
"watchers": 4083,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-08-05T06:15:26Z",
|
||||
"updated_at": "2024-08-05T13:25:25Z",
|
||||
"pushed_at": "2024-08-05T13:25:22Z",
|
||||
"pushed_at": "2024-08-13T06:34:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1074,10 +1074,10 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2024-08-12T20:11:14Z",
|
||||
"updated_at": "2024-08-13T10:42:23Z",
|
||||
"pushed_at": "2022-01-13T05:48:01Z",
|
||||
"stargazers_count": 726,
|
||||
"watchers_count": 726,
|
||||
"stargazers_count": 727,
|
||||
"watchers_count": 727,
|
||||
"has_discussions": false,
|
||||
"forks_count": 169,
|
||||
"allow_forking": true,
|
||||
|
@ -1086,7 +1086,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 169,
|
||||
"watchers": 726,
|
||||
"watchers": 727,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -574,7 +574,7 @@
|
|||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -591,7 +591,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-22T05:06:33Z",
|
||||
"updated_at": "2024-08-12T20:13:15Z",
|
||||
"updated_at": "2024-08-13T08:11:36Z",
|
||||
"pushed_at": "2021-11-21T10:34:06Z",
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 163,
|
||||
"watchers": 162,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-22629 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-09T17:21:27Z",
|
||||
"updated_at": "2024-08-12T20:26:53Z",
|
||||
"updated_at": "2024-08-13T08:43:37Z",
|
||||
"pushed_at": "2022-09-09T21:23:08Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2024-08-12T20:23:42Z",
|
||||
"updated_at": "2024-08-13T08:17:28Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1147,
|
||||
"watchers_count": 1147,
|
||||
"stargazers_count": 1148,
|
||||
"watchers_count": 1148,
|
||||
"has_discussions": true,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 190,
|
||||
"watchers": 1147,
|
||||
"watchers": 1148,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "检测域内常见一把梭漏洞,包括:NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-17T06:29:44Z",
|
||||
"updated_at": "2024-07-31T13:16:07Z",
|
||||
"updated_at": "2024-08-13T10:12:39Z",
|
||||
"pushed_at": "2023-10-23T04:47:11Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2024-08-12T20:22:37Z",
|
||||
"updated_at": "2024-08-13T11:23:08Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 365,
|
||||
"watchers_count": 365,
|
||||
"stargazers_count": 366,
|
||||
"watchers_count": 366,
|
||||
"has_discussions": false,
|
||||
"forks_count": 93,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 93,
|
||||
"watchers": 365,
|
||||
"watchers": 366,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -208,10 +208,10 @@
|
|||
"description": "Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-23T09:44:46Z",
|
||||
"updated_at": "2024-08-13T04:03:13Z",
|
||||
"updated_at": "2024-08-13T10:54:39Z",
|
||||
"pushed_at": "2024-07-23T10:03:08Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -220,7 +220,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -46,10 +46,10 @@
|
|||
"description": "Bootloader unlock using CVE-2022-38694 for Anbernic Unisoc T820 devices",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-27T14:28:13Z",
|
||||
"updated_at": "2024-07-17T16:41:53Z",
|
||||
"updated_at": "2024-08-13T08:36:58Z",
|
||||
"pushed_at": "2024-07-01T22:13:19Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -58,7 +58,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-11T15:04:51Z",
|
||||
"updated_at": "2024-08-08T20:02:03Z",
|
||||
"updated_at": "2024-08-13T10:47:32Z",
|
||||
"pushed_at": "2024-01-09T21:11:58Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "cve-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-10T03:36:52Z",
|
||||
"updated_at": "2024-08-13T00:04:38Z",
|
||||
"updated_at": "2024-08-13T09:47:57Z",
|
||||
"pushed_at": "2023-03-10T04:03:04Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "pocs & exploit for CVE-2023-24871 (rce + lpe)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-21T15:01:15Z",
|
||||
"updated_at": "2024-08-07T20:47:41Z",
|
||||
"updated_at": "2024-08-13T08:19:00Z",
|
||||
"pushed_at": "2024-07-17T12:34:16Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -52,7 +52,7 @@
|
|||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -66,7 +66,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"forks": 36,
|
||||
"watchers": 262,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
32
2023/CVE-2023-3897.json
Normal file
32
2023/CVE-2023-3897.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 841902358,
|
||||
"name": "CVE-2023-3897",
|
||||
"full_name": "jFriedli\/CVE-2023-3897",
|
||||
"owner": {
|
||||
"login": "jFriedli",
|
||||
"id": 12858685,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12858685?v=4",
|
||||
"html_url": "https:\/\/github.com\/jFriedli"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jFriedli\/CVE-2023-3897",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-08-13T09:20:21Z",
|
||||
"updated_at": "2024-08-13T09:26:04Z",
|
||||
"pushed_at": "2024-08-13T09:26:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-08-13T03:50:46Z",
|
||||
"updated_at": "2024-08-13T12:01:00Z",
|
||||
"pushed_at": "2024-07-24T13:17:05Z",
|
||||
"stargazers_count": 1051,
|
||||
"watchers_count": 1051,
|
||||
"stargazers_count": 1054,
|
||||
"watchers_count": 1054,
|
||||
"has_discussions": false,
|
||||
"forks_count": 180,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 180,
|
||||
"watchers": 1051,
|
||||
"watchers": 1054,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-27T05:57:21Z",
|
||||
"updated_at": "2024-08-03T04:27:34Z",
|
||||
"updated_at": "2024-08-13T08:45:34Z",
|
||||
"pushed_at": "2024-01-29T02:28:11Z",
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 212,
|
||||
"watchers": 213,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"forks": 30,
|
||||
"watchers": 148,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -77,10 +77,10 @@
|
|||
"description": "This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the server.",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-24T05:38:18Z",
|
||||
"updated_at": "2024-07-31T04:13:17Z",
|
||||
"updated_at": "2024-08-13T09:36:06Z",
|
||||
"pushed_at": "2024-05-24T05:56:48Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -89,7 +89,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
32
2024/CVE-2024-23709.json
Normal file
32
2024/CVE-2024-23709.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 841887434,
|
||||
"name": "external_sonivox_CVE-2024-23709",
|
||||
"full_name": "AbrarKhan\/external_sonivox_CVE-2024-23709",
|
||||
"owner": {
|
||||
"login": "AbrarKhan",
|
||||
"id": 3054615,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3054615?v=4",
|
||||
"html_url": "https:\/\/github.com\/AbrarKhan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AbrarKhan\/external_sonivox_CVE-2024-23709",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-08-13T08:44:25Z",
|
||||
"updated_at": "2024-08-13T08:52:26Z",
|
||||
"pushed_at": "2024-08-13T08:52:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -350,19 +350,19 @@
|
|||
"description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information #RCE #python3",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-12T04:46:34Z",
|
||||
"updated_at": "2024-08-13T04:31:18Z",
|
||||
"updated_at": "2024-08-13T09:27:51Z",
|
||||
"pushed_at": "2024-08-12T04:47:04Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A Pwn2Own SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-27T13:47:52Z",
|
||||
"updated_at": "2024-08-05T07:44:30Z",
|
||||
"updated_at": "2024-08-13T07:55:18Z",
|
||||
"pushed_at": "2024-07-07T03:36:49Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -108,13 +108,13 @@
|
|||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"forks": 27,
|
||||
"watchers": 292,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
|
|
|
@ -498,7 +498,7 @@
|
|||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -509,7 +509,7 @@
|
|||
"xz"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"forks": 21,
|
||||
"watchers": 142,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
|
32
2024/CVE-2024-31315.json
Normal file
32
2024/CVE-2024-31315.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 710515841,
|
||||
"name": "frameworks_base_CVE-2024-31315",
|
||||
"full_name": "uthrasri\/frameworks_base_CVE-2024-31315",
|
||||
"owner": {
|
||||
"login": "uthrasri",
|
||||
"id": 145666390,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
|
||||
"html_url": "https:\/\/github.com\/uthrasri"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/uthrasri\/frameworks_base_CVE-2024-31315",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-26T21:21:46Z",
|
||||
"updated_at": "2024-08-13T09:07:15Z",
|
||||
"pushed_at": "2024-08-09T12:52:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit for CVE-2024-3273, supports single and multiple hosts",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-07T15:36:18Z",
|
||||
"updated_at": "2024-08-01T14:29:58Z",
|
||||
"updated_at": "2024-08-13T12:07:07Z",
|
||||
"pushed_at": "2024-04-07T15:41:42Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "BlueStacks privilege escalation through VM backdooring",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-16T07:38:19Z",
|
||||
"updated_at": "2024-08-04T21:59:33Z",
|
||||
"updated_at": "2024-08-13T08:50:05Z",
|
||||
"pushed_at": "2024-07-16T09:12:57Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 18,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -592,5 +592,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 841861554,
|
||||
"name": "CVE-2024-34102",
|
||||
"full_name": "EQSTSeminar\/CVE-2024-34102",
|
||||
"owner": {
|
||||
"login": "EQSTSeminar",
|
||||
"id": 148991397,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148991397?v=4",
|
||||
"html_url": "https:\/\/github.com\/EQSTSeminar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EQSTSeminar\/CVE-2024-34102",
|
||||
"description": "PoC for CVE-2024-34102",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-13T07:33:20Z",
|
||||
"updated_at": "2024-08-13T08:48:50Z",
|
||||
"pushed_at": "2024-08-13T08:48:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-36424.json
Normal file
32
2024/CVE-2024-36424.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 841733200,
|
||||
"name": "CVE-2024-36424",
|
||||
"full_name": "secunnix\/CVE-2024-36424",
|
||||
"owner": {
|
||||
"login": "secunnix",
|
||||
"id": 104568161,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104568161?v=4",
|
||||
"html_url": "https:\/\/github.com\/secunnix"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/secunnix\/CVE-2024-36424",
|
||||
"description": "K7 Ultimate Security < v17.0.2019 \"K7RKScan.sys\" Null Pointer Dereference PoC ",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-13T00:06:17Z",
|
||||
"updated_at": "2024-08-13T11:08:05Z",
|
||||
"pushed_at": "2024-08-13T00:26:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "原文已被作者删除,备份用,非原创,EXP & POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-09T01:18:48Z",
|
||||
"updated_at": "2024-08-13T03:43:52Z",
|
||||
"updated_at": "2024-08-13T11:37:27Z",
|
||||
"pushed_at": "2024-08-09T17:18:10Z",
|
||||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"stargazers_count": 310,
|
||||
"watchers_count": 310,
|
||||
"has_discussions": false,
|
||||
"forks_count": 212,
|
||||
"forks_count": 214,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 212,
|
||||
"watchers": 303,
|
||||
"forks": 214,
|
||||
"watchers": 310,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
@ -43,19 +43,19 @@
|
|||
"description": "RDL的堆溢出导致的RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-09T05:00:44Z",
|
||||
"updated_at": "2024-08-13T03:20:21Z",
|
||||
"updated_at": "2024-08-13T12:03:32Z",
|
||||
"pushed_at": "2024-08-09T10:12:42Z",
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 149,
|
||||
"forks": 59,
|
||||
"watchers": 153,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -103,10 +103,10 @@
|
|||
"description": "远程探测 remote desktop licensing 服务开放情况,用于 CVE-2024-38077 漏洞快速排查",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-09T07:45:25Z",
|
||||
"updated_at": "2024-08-13T06:32:35Z",
|
||||
"updated_at": "2024-08-13T07:38:42Z",
|
||||
"pushed_at": "2024-08-09T08:06:19Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -193,10 +193,10 @@
|
|||
"description": "检测RDL服务是否运行,快速排查受影响资产",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-10T01:10:06Z",
|
||||
"updated_at": "2024-08-12T13:38:36Z",
|
||||
"updated_at": "2024-08-13T07:38:52Z",
|
||||
"pushed_at": "2024-08-10T02:19:43Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-08T02:40:56Z",
|
||||
"updated_at": "2024-08-13T00:17:16Z",
|
||||
"updated_at": "2024-08-13T07:57:28Z",
|
||||
"pushed_at": "2024-08-11T03:28:23Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-40348. Will attempt to read \/etc\/passwd from target",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-21T00:54:55Z",
|
||||
"updated_at": "2024-08-06T15:31:57Z",
|
||||
"updated_at": "2024-08-13T12:27:26Z",
|
||||
"pushed_at": "2024-07-21T09:54:02Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -62,5 +62,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 841861299,
|
||||
"name": "CVE-2024-43044-POC",
|
||||
"full_name": "v9d0g\/CVE-2024-43044-POC",
|
||||
"owner": {
|
||||
"login": "v9d0g",
|
||||
"id": 139420834,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139420834?v=4",
|
||||
"html_url": "https:\/\/github.com\/v9d0g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/v9d0g\/CVE-2024-43044-POC",
|
||||
"description": "CVE-2024-43044的利用方式",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-13T07:32:35Z",
|
||||
"updated_at": "2024-08-13T07:43:25Z",
|
||||
"pushed_at": "2024-08-13T07:43:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -163,10 +163,10 @@
|
|||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:52:54Z",
|
||||
"updated_at": "2024-08-07T12:42:53Z",
|
||||
"updated_at": "2024-08-13T08:53:07Z",
|
||||
"pushed_at": "2024-06-22T15:13:52Z",
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 185,
|
||||
"watchers": 186,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-18T07:52:46Z",
|
||||
"updated_at": "2024-08-13T02:26:38Z",
|
||||
"updated_at": "2024-08-13T07:51:01Z",
|
||||
"pushed_at": "2024-08-12T20:48:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
30
README.md
30
README.md
|
@ -1752,6 +1752,13 @@
|
|||
|
||||
- [uthrasri/CVE-2024-23708](https://github.com/uthrasri/CVE-2024-23708)
|
||||
|
||||
### CVE-2024-23709 (2024-05-07)
|
||||
|
||||
<code>In multiple locations, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.
|
||||
</code>
|
||||
|
||||
- [AbrarKhan/external_sonivox_CVE-2024-23709](https://github.com/AbrarKhan/external_sonivox_CVE-2024-23709)
|
||||
|
||||
### CVE-2024-23722 (2024-03-26)
|
||||
|
||||
<code>In Fluent Bit 2.1.8 through 2.2.1, a NULL pointer dereference can be caused via an invalid HTTP payload with the content type of x-www-form-urlencoded. It crashes and does not restart. This could result in logs not being delivered properly.
|
||||
|
@ -2949,6 +2956,13 @@
|
|||
|
||||
- [Abdurahmon3236/-CVE-2024-31211](https://github.com/Abdurahmon3236/-CVE-2024-31211)
|
||||
|
||||
### CVE-2024-31315 (2024-07-09)
|
||||
|
||||
<code>In multiple functions of ManagedServices.java, there is a possible way to hide an app with notification access in the Device & app notifications settings due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
|
||||
</code>
|
||||
|
||||
- [uthrasri/frameworks_base_CVE-2024-31315](https://github.com/uthrasri/frameworks_base_CVE-2024-31315)
|
||||
|
||||
### CVE-2024-31351 (2024-05-17)
|
||||
|
||||
<code>Unrestricted Upload of File with Dangerous Type vulnerability in Copymatic Copymatic – AI Content Writer & Generator.This issue affects Copymatic – AI Content Writer & Generator: from n/a through 1.6.
|
||||
|
@ -3298,6 +3312,7 @@
|
|||
- [etx-Arn/CVE-2024-34102-RCE](https://github.com/etx-Arn/CVE-2024-34102-RCE)
|
||||
- [etx-Arn/CVE-2024-34102-RCE-PoC](https://github.com/etx-Arn/CVE-2024-34102-RCE-PoC)
|
||||
- [wubinworks/magento2-cosmic-sting-patch](https://github.com/wubinworks/magento2-cosmic-sting-patch)
|
||||
- [EQSTSeminar/CVE-2024-34102](https://github.com/EQSTSeminar/CVE-2024-34102)
|
||||
|
||||
### CVE-2024-34144 (2024-05-02)
|
||||
|
||||
|
@ -3575,6 +3590,13 @@
|
|||
|
||||
- [kva55/CVE-2024-36416](https://github.com/kva55/CVE-2024-36416)
|
||||
|
||||
### CVE-2024-36424 (2024-08-06)
|
||||
|
||||
<code>K7RKScan.sys in K7 Ultimate Security before 17.0.2019 allows local users to cause a denial of service (BSOD) because of a NULL pointer dereference.
|
||||
</code>
|
||||
|
||||
- [secunnix/CVE-2024-36424](https://github.com/secunnix/CVE-2024-36424)
|
||||
|
||||
### CVE-2024-36527 (2024-06-17)
|
||||
|
||||
<code>puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.
|
||||
|
@ -4115,6 +4137,7 @@
|
|||
|
||||
- [HwMex0/CVE-2024-43044](https://github.com/HwMex0/CVE-2024-43044)
|
||||
- [jenkinsci-cert/SECURITY-3430](https://github.com/jenkinsci-cert/SECURITY-3430)
|
||||
- [v9d0g/CVE-2024-43044-POC](https://github.com/v9d0g/CVE-2024-43044-POC)
|
||||
|
||||
### CVE-2024-56662
|
||||
- [nimosec/cve-2024-56662](https://github.com/nimosec/cve-2024-56662)
|
||||
|
@ -4862,6 +4885,13 @@
|
|||
|
||||
- [AnugiArrawwala/CVE-Research](https://github.com/AnugiArrawwala/CVE-Research)
|
||||
|
||||
### CVE-2023-3897 (2023-07-25)
|
||||
|
||||
<code>\nUsername enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message.\n\nThis issue affects SureMDM On-premise: 6.31 and below version \n\n
|
||||
</code>
|
||||
|
||||
- [jFriedli/CVE-2023-3897](https://github.com/jFriedli/CVE-2023-3897)
|
||||
|
||||
### CVE-2023-3971 (2023-10-04)
|
||||
|
||||
<code>An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.
|
||||
|
|
Loading…
Reference in a new issue