mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/09/15 18:29:42
This commit is contained in:
parent
c09fdb1a58
commit
b2e748e1f6
28 changed files with 190 additions and 92 deletions
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-09-14T03:36:03Z",
|
||||
"updated_at": "2024-09-15T13:52:05Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4098,
|
||||
"watchers_count": 4098,
|
||||
"stargazers_count": 4099,
|
||||
"watchers_count": 4099,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1090,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1090,
|
||||
"watchers": 4098,
|
||||
"watchers": 4099,
|
||||
"score": 0,
|
||||
"subscribers_count": 148
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-09-14T03:36:03Z",
|
||||
"updated_at": "2024-09-15T13:52:05Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4098,
|
||||
"watchers_count": 4098,
|
||||
"stargazers_count": 4099,
|
||||
"watchers_count": 4099,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1090,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1090,
|
||||
"watchers": 4098,
|
||||
"watchers": 4099,
|
||||
"score": 0,
|
||||
"subscribers_count": 148
|
||||
},
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 857806320,
|
||||
"name": "browser-crash-tool",
|
||||
"full_name": "lyonzon2\/browser-crash-tool",
|
||||
"owner": {
|
||||
"login": "lyonzon2",
|
||||
"id": 67530243,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67530243?v=4",
|
||||
"html_url": "https:\/\/github.com\/lyonzon2"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lyonzon2\/browser-crash-tool",
|
||||
"description": "A Bash script for Kali Linux that exploits an iOS WebKit vulnerability (CVE-2020-27950) using Metasploit and ngrok. Automates payload delivery with a public URL via ngrok, checks for required tools, handles errors, and provides an easy way to crash browsers for educational purposes only.",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-15T16:54:03Z",
|
||||
"updated_at": "2024-09-15T16:59:49Z",
|
||||
"pushed_at": "2024-09-15T16:59:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-10T14:38:05Z",
|
||||
"updated_at": "2024-08-12T20:10:15Z",
|
||||
"updated_at": "2024-09-15T12:45:05Z",
|
||||
"pushed_at": "2021-02-10T14:39:04Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2021-22005批量验证python脚本",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-25T07:19:42Z",
|
||||
"updated_at": "2024-08-12T20:16:42Z",
|
||||
"updated_at": "2024-09-15T12:36:18Z",
|
||||
"pushed_at": "2021-09-25T07:58:15Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 13,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -168,13 +168,13 @@
|
|||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"forks": 30,
|
||||
"watchers": 117,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 12,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -1463,10 +1463,10 @@
|
|||
"description": "cve-2021-41773 即 cve-2021-42013 批量检测脚本",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-09T11:33:56Z",
|
||||
"updated_at": "2024-08-12T20:17:07Z",
|
||||
"updated_at": "2024-09-15T12:36:18Z",
|
||||
"pushed_at": "2021-10-09T12:14:29Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -1475,7 +1475,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -285,10 +285,10 @@
|
|||
"html_url": "https:\/\/github.com\/btar1gan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/btar1gan\/exploit_CVE-2022-24112",
|
||||
"description": "New exploit for Apache APISIX 2.12.1 - Remote code execution (RCE)",
|
||||
"description": "New exploit for Apache APISIX v2.12.1 - Remote code execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-03T17:33:59Z",
|
||||
"updated_at": "2024-09-13T20:28:29Z",
|
||||
"updated_at": "2024-09-15T17:20:39Z",
|
||||
"pushed_at": "2024-06-07T05:09:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-25375 - Demo exploit of RNDIS USB Gadget",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-17T14:02:58Z",
|
||||
"updated_at": "2024-08-12T20:20:41Z",
|
||||
"updated_at": "2024-09-15T12:30:43Z",
|
||||
"pushed_at": "2022-02-20T19:56:48Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -118,5 +118,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 857813726,
|
||||
"name": "exploit_CVE-2023-0297",
|
||||
"full_name": "btar1gan\/exploit_CVE-2023-0297",
|
||||
"owner": {
|
||||
"login": "btar1gan",
|
||||
"id": 92728059,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92728059?v=4",
|
||||
"html_url": "https:\/\/github.com\/btar1gan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/btar1gan\/exploit_CVE-2023-0297",
|
||||
"description": "New exploit for pyLoad v0.5.0 - Unauthenticated remote code excecution",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-15T17:15:33Z",
|
||||
"updated_at": "2024-09-15T17:19:52Z",
|
||||
"pushed_at": "2024-09-15T17:18:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,12 +13,12 @@
|
|||
"description": "MOC3ingbird Exploit for Live2D (CVE-2023-27566)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-03T01:57:28Z",
|
||||
"updated_at": "2024-08-20T16:35:03Z",
|
||||
"updated_at": "2024-09-15T14:51:28Z",
|
||||
"pushed_at": "2023-09-19T01:12:41Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": true,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -31,8 +31,8 @@
|
|||
"security-vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 77,
|
||||
"forks": 6,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-04T07:48:13Z",
|
||||
"updated_at": "2024-08-16T09:36:35Z",
|
||||
"updated_at": "2024-09-15T14:13:58Z",
|
||||
"pushed_at": "2024-01-08T03:34:51Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 127,
|
||||
"watchers": 128,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-27T12:22:05Z",
|
||||
"updated_at": "2024-09-06T00:21:34Z",
|
||||
"updated_at": "2024-09-15T15:28:05Z",
|
||||
"pushed_at": "2023-07-10T16:57:44Z",
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 171,
|
||||
"watchers": 170,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T12:30:53Z",
|
||||
"updated_at": "2024-09-12T12:44:28Z",
|
||||
"updated_at": "2024-09-15T17:41:39Z",
|
||||
"pushed_at": "2024-07-25T18:12:57Z",
|
||||
"stargazers_count": 218,
|
||||
"watchers_count": 218,
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 218,
|
||||
"watchers": 219,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -283,19 +283,24 @@
|
|||
"description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-15T12:15:35Z",
|
||||
"updated_at": "2024-09-15T12:30:15Z",
|
||||
"pushed_at": "2024-09-15T12:30:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2024-09-15T14:24:25Z",
|
||||
"pushed_at": "2024-09-15T14:24:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve-2024-23692",
|
||||
"rce-exploit",
|
||||
"rejetto-http-file-server",
|
||||
"unauthenticated-rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Auto exploitation tool for CVE-2024-24401. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-18T20:05:46Z",
|
||||
"updated_at": "2024-09-14T04:38:57Z",
|
||||
"updated_at": "2024-09-15T17:28:35Z",
|
||||
"pushed_at": "2024-09-07T03:02:43Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 857770278,
|
||||
"name": "CVE-2024-27564",
|
||||
"full_name": "Quantum-Hacker\/CVE-2024-27564",
|
||||
"owner": {
|
||||
"login": "Quantum-Hacker",
|
||||
"id": 140636140,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140636140?v=4",
|
||||
"html_url": "https:\/\/github.com\/Quantum-Hacker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Quantum-Hacker\/CVE-2024-27564",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-15T15:11:54Z",
|
||||
"updated_at": "2024-09-15T15:54:24Z",
|
||||
"pushed_at": "2024-09-15T15:54:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,8 +43,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-14T16:08:56Z",
|
||||
"updated_at": "2024-09-14T16:53:31Z",
|
||||
"pushed_at": "2024-09-14T16:53:28Z",
|
||||
"updated_at": "2024-09-15T15:53:54Z",
|
||||
"pushed_at": "2024-09-15T15:53:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC of CVE-2024-33883, RCE vulnerability of ejs.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-25T18:40:31Z",
|
||||
"updated_at": "2024-09-02T02:15:25Z",
|
||||
"updated_at": "2024-09-15T16:58:40Z",
|
||||
"pushed_at": "2024-07-06T19:51:36Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1,19 +1,19 @@
|
|||
[
|
||||
{
|
||||
"id": 800659974,
|
||||
"name": "CVE-2024-34716_PoC",
|
||||
"full_name": "aelmokhtar\/CVE-2024-34716_PoC",
|
||||
"name": "CVE-2024-34716",
|
||||
"full_name": "aelmokhtar\/CVE-2024-34716",
|
||||
"owner": {
|
||||
"login": "aelmokhtar",
|
||||
"id": 66908023,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66908023?v=4",
|
||||
"html_url": "https:\/\/github.com\/aelmokhtar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aelmokhtar\/CVE-2024-34716_PoC",
|
||||
"html_url": "https:\/\/github.com\/aelmokhtar\/CVE-2024-34716",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T18:48:41Z",
|
||||
"updated_at": "2024-05-15T18:21:48Z",
|
||||
"updated_at": "2024-09-15T15:32:19Z",
|
||||
"pushed_at": "2024-05-15T18:21:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-06T00:49:40Z",
|
||||
"updated_at": "2024-09-11T09:38:54Z",
|
||||
"updated_at": "2024-09-15T14:09:02Z",
|
||||
"pushed_at": "2024-07-12T00:41:36Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -256,10 +256,10 @@
|
|||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T18:25:46Z",
|
||||
"updated_at": "2024-09-15T07:47:50Z",
|
||||
"updated_at": "2024-09-15T17:05:39Z",
|
||||
"pushed_at": "2024-08-27T12:22:39Z",
|
||||
"stargazers_count": 570,
|
||||
"watchers_count": 570,
|
||||
"stargazers_count": 572,
|
||||
"watchers_count": 572,
|
||||
"has_discussions": false,
|
||||
"forks_count": 103,
|
||||
"allow_forking": true,
|
||||
|
@ -268,7 +268,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"watchers": 570,
|
||||
"watchers": 572,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -140,10 +140,10 @@
|
|||
"description": "PoC RCE in OpenSSH",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T12:51:18Z",
|
||||
"updated_at": "2024-09-04T22:58:20Z",
|
||||
"updated_at": "2024-09-15T17:00:44Z",
|
||||
"pushed_at": "2024-07-01T13:34:47Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -152,7 +152,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-14T06:27:11Z",
|
||||
"updated_at": "2024-09-15T12:24:26Z",
|
||||
"pushed_at": "2024-09-14T06:32:51Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"updated_at": "2024-09-15T17:24:13Z",
|
||||
"pushed_at": "2024-09-15T15:32:42Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -2923,6 +2923,7 @@
|
|||
</code>
|
||||
|
||||
- [MuhammadWaseem29/SSRF-Exploit-CVE-2024-27564](https://github.com/MuhammadWaseem29/SSRF-Exploit-CVE-2024-27564)
|
||||
- [Quantum-Hacker/CVE-2024-27564](https://github.com/Quantum-Hacker/CVE-2024-27564)
|
||||
|
||||
### CVE-2024-27619 (2024-03-29)
|
||||
|
||||
|
@ -3987,7 +3988,7 @@
|
|||
<code>PrestaShop is an open source e-commerce web application. A cross-site scripting (XSS) vulnerability that only affects PrestaShops with customer-thread feature flag enabled is present starting from PrestaShop 8.1.0 and prior to PrestaShop 8.1.6. When the customer thread feature flag is enabled through the front-office contact form, a hacker can upload a malicious file containing an XSS that will be executed when an admin opens the attached file in back office. The script injected can access the session and the security token, which allows it to perform any authenticated action in the scope of the administrator's right. This vulnerability is patched in 8.1.6. A workaround is to disable the customer-thread feature-flag.
|
||||
</code>
|
||||
|
||||
- [aelmokhtar/CVE-2024-34716_PoC](https://github.com/aelmokhtar/CVE-2024-34716_PoC)
|
||||
- [aelmokhtar/CVE-2024-34716](https://github.com/aelmokhtar/CVE-2024-34716)
|
||||
|
||||
### CVE-2024-34831 (2024-09-10)
|
||||
|
||||
|
@ -5042,6 +5043,7 @@
|
|||
- [Small-ears/CVE-2023-0297](https://github.com/Small-ears/CVE-2023-0297)
|
||||
- [JacobEbben/CVE-2023-0297](https://github.com/JacobEbben/CVE-2023-0297)
|
||||
- [overgrowncarrot1/CVE-2023-0297](https://github.com/overgrowncarrot1/CVE-2023-0297)
|
||||
- [btar1gan/exploit_CVE-2023-0297](https://github.com/btar1gan/exploit_CVE-2023-0297)
|
||||
|
||||
### CVE-2023-0315 (2023-01-16)
|
||||
|
||||
|
@ -31259,6 +31261,7 @@
|
|||
</code>
|
||||
|
||||
- [synacktiv/CVE-2020-27950](https://github.com/synacktiv/CVE-2020-27950)
|
||||
- [lyonzon2/browser-crash-tool](https://github.com/lyonzon2/browser-crash-tool)
|
||||
|
||||
### CVE-2020-27955 (2020-11-05)
|
||||
|
||||
|
|
Loading…
Reference in a new issue