mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/12/24 12:32:19
This commit is contained in:
parent
0631d90267
commit
b67f5e533b
33 changed files with 265 additions and 167 deletions
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-12T05:48:13Z",
|
||||
"updated_at": "2024-12-23T10:37:14Z",
|
||||
"updated_at": "2024-12-24T07:55:10Z",
|
||||
"pushed_at": "2023-04-09T13:50:29Z",
|
||||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 215,
|
||||
"watchers": 216,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2018-4248: Out-of-bounds read in libxpc during string serialization.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-10T04:31:38Z",
|
||||
"updated_at": "2024-12-11T03:37:27Z",
|
||||
"updated_at": "2024-12-24T11:02:09Z",
|
||||
"pushed_at": "2018-07-10T00:05:46Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 53,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"forks": 42,
|
||||
"watchers": 247,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
|
|
|
@ -122,5 +122,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 907742398,
|
||||
"name": "CVE-2018-9206",
|
||||
"full_name": "MikeyPPPPPPPP\/CVE-2018-9206",
|
||||
"owner": {
|
||||
"login": "MikeyPPPPPPPP",
|
||||
"id": 50926811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50926811?v=4",
|
||||
"html_url": "https:\/\/github.com\/MikeyPPPPPPPP",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MikeyPPPPPPPP\/CVE-2018-9206",
|
||||
"description": "Blueimp's jQuery File Upload",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-24T09:26:19Z",
|
||||
"updated_at": "2024-12-24T09:27:13Z",
|
||||
"pushed_at": "2024-12-24T09:27:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-18T08:23:46Z",
|
||||
"updated_at": "2024-09-26T09:49:18Z",
|
||||
"updated_at": "2024-12-24T06:25:44Z",
|
||||
"pushed_at": "2020-04-06T09:01:07Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 55,
|
||||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
}
|
||||
|
|
|
@ -461,7 +461,7 @@
|
|||
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T18:34:40Z",
|
||||
"updated_at": "2024-12-04T11:12:46Z",
|
||||
"updated_at": "2024-12-24T07:46:46Z",
|
||||
"pushed_at": "2023-02-26T07:01:03Z",
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2024-12-24T00:59:12Z",
|
||||
"updated_at": "2024-12-24T12:04:55Z",
|
||||
"pushed_at": "2023-07-20T10:51:42Z",
|
||||
"stargazers_count": 1744,
|
||||
"watchers_count": 1744,
|
||||
"stargazers_count": 1746,
|
||||
"watchers_count": 1746,
|
||||
"has_discussions": false,
|
||||
"forks_count": 359,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 359,
|
||||
"watchers": 1744,
|
||||
"watchers": 1746,
|
||||
"score": 0,
|
||||
"subscribers_count": 86
|
||||
},
|
||||
|
@ -107,10 +107,10 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2024-12-18T14:11:02Z",
|
||||
"updated_at": "2024-12-24T10:01:46Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 1200,
|
||||
"watchers_count": 1200,
|
||||
"stargazers_count": 1201,
|
||||
"watchers_count": 1201,
|
||||
"has_discussions": false,
|
||||
"forks_count": 284,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 284,
|
||||
"watchers": 1200,
|
||||
"watchers": 1201,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2024-12-20T11:54:42Z",
|
||||
"updated_at": "2024-12-24T09:54:29Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1848,
|
||||
"watchers_count": 1848,
|
||||
"stargazers_count": 1849,
|
||||
"watchers_count": 1849,
|
||||
"has_discussions": false,
|
||||
"forks_count": 583,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 583,
|
||||
"watchers": 1848,
|
||||
"watchers": 1849,
|
||||
"score": 0,
|
||||
"subscribers_count": 43
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-27T21:09:03Z",
|
||||
"updated_at": "2024-09-17T07:27:43Z",
|
||||
"updated_at": "2024-12-24T08:34:09Z",
|
||||
"pushed_at": "2022-10-19T21:24:35Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 16,
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -967,10 +967,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2024-12-24T01:49:03Z",
|
||||
"updated_at": "2024-12-24T10:18:05Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 1096,
|
||||
"watchers_count": 1096,
|
||||
"stargazers_count": 1098,
|
||||
"watchers_count": 1098,
|
||||
"has_discussions": false,
|
||||
"forks_count": 191,
|
||||
"allow_forking": true,
|
||||
|
@ -981,7 +981,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 191,
|
||||
"watchers": 1096,
|
||||
"watchers": 1098,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
@ -1982,10 +1982,10 @@
|
|||
"description": "Proof of concept for pwnkit vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T14:43:57Z",
|
||||
"updated_at": "2024-12-22T12:24:29Z",
|
||||
"updated_at": "2024-12-24T08:36:17Z",
|
||||
"pushed_at": "2023-01-12T19:23:29Z",
|
||||
"stargazers_count": 339,
|
||||
"watchers_count": 339,
|
||||
"stargazers_count": 338,
|
||||
"watchers_count": 338,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -1994,7 +1994,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 339,
|
||||
"watchers": 338,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -2168,10 +2168,10 @@
|
|||
"description": "CVE-2021-4034简单优化,以应对没有安装gcc和make的目标环境",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T02:54:38Z",
|
||||
"updated_at": "2024-10-28T04:01:21Z",
|
||||
"updated_at": "2024-12-24T09:20:44Z",
|
||||
"pushed_at": "2022-02-09T09:58:59Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -2180,7 +2180,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -1,39 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 445389358,
|
||||
"name": "snapshot-attack-demo",
|
||||
"full_name": "StanPlatinum\/snapshot-attack-demo",
|
||||
"id": 692762993,
|
||||
"name": "snapshot-demo",
|
||||
"full_name": "web-logs2\/snapshot-demo",
|
||||
"owner": {
|
||||
"login": "StanPlatinum",
|
||||
"id": 7992257,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7992257?v=4",
|
||||
"html_url": "https:\/\/github.com\/StanPlatinum",
|
||||
"login": "web-logs2",
|
||||
"id": 143675346,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143675346?v=4",
|
||||
"html_url": "https:\/\/github.com\/web-logs2",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/StanPlatinum\/snapshot-attack-demo",
|
||||
"html_url": "https:\/\/github.com\/web-logs2\/snapshot-demo",
|
||||
"description": "CVE-2022-27499",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-07T03:45:41Z",
|
||||
"updated_at": "2024-12-12T20:41:30Z",
|
||||
"created_at": "2023-09-17T14:08:59Z",
|
||||
"updated_at": "2023-09-17T14:08:59Z",
|
||||
"pushed_at": "2023-01-16T14:30:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2022-27499",
|
||||
"intel",
|
||||
"intel-sgx",
|
||||
"intel-sgx-sdk"
|
||||
],
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-12-18T20:36:56Z",
|
||||
"updated_at": "2024-12-24T08:04:15Z",
|
||||
"pushed_at": "2024-08-01T15:09:15Z",
|
||||
"stargazers_count": 310,
|
||||
"watchers_count": 310,
|
||||
"stargazers_count": 311,
|
||||
"watchers_count": 311,
|
||||
"has_discussions": true,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 310,
|
||||
"watchers": 311,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-27T21:09:03Z",
|
||||
"updated_at": "2024-09-17T07:27:43Z",
|
||||
"updated_at": "2024-12-24T08:34:09Z",
|
||||
"pushed_at": "2022-10-19T21:24:35Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 16,
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "CVE-2022-46463 harbor公开镜像全自动下载脚本",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-23T08:35:30Z",
|
||||
"updated_at": "2024-12-24T03:00:28Z",
|
||||
"updated_at": "2024-12-24T11:26:52Z",
|
||||
"pushed_at": "2024-12-23T08:40:16Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-24T13:54:42Z",
|
||||
"updated_at": "2024-12-13T10:50:47Z",
|
||||
"updated_at": "2024-12-24T06:26:43Z",
|
||||
"pushed_at": "2023-02-24T13:29:38Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"has_discussions": false,
|
||||
"forks_count": 108,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 108,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "Privilege escalation using the XAML diagnostics API (CVE-2023-36003)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-11T19:17:13Z",
|
||||
"updated_at": "2024-11-27T11:25:31Z",
|
||||
"updated_at": "2024-12-24T07:32:16Z",
|
||||
"pushed_at": "2024-01-11T19:42:03Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 91,
|
||||
"forks": 21,
|
||||
"watchers": 92,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -296,5 +296,36 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 907765018,
|
||||
"name": "CVE-2024-10914",
|
||||
"full_name": "dragonXZH\/CVE-2024-10914",
|
||||
"owner": {
|
||||
"login": "dragonXZH",
|
||||
"id": 191017577,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191017577?v=4",
|
||||
"html_url": "https:\/\/github.com\/dragonXZH",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dragonXZH\/CVE-2024-10914",
|
||||
"description": "A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-24T10:32:48Z",
|
||||
"updated_at": "2024-12-24T10:42:23Z",
|
||||
"pushed_at": "2024-12-24T10:42:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-12484.json
Normal file
33
2024/CVE-2024-12484.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 900580012,
|
||||
"name": "CVE-2024-12484",
|
||||
"full_name": "LiChaser\/CVE-2024-12484",
|
||||
"owner": {
|
||||
"login": "LiChaser",
|
||||
"id": 127033061,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127033061?v=4",
|
||||
"html_url": "https:\/\/github.com\/LiChaser",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LiChaser\/CVE-2024-12484",
|
||||
"description": "CVE-poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-09T04:42:19Z",
|
||||
"updated_at": "2024-12-24T08:49:04Z",
|
||||
"pushed_at": "2024-12-09T05:56:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T17:02:03Z",
|
||||
"updated_at": "2024-12-22T19:56:08Z",
|
||||
"updated_at": "2024-12-24T07:50:03Z",
|
||||
"pushed_at": "2024-07-04T10:39:15Z",
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 327,
|
||||
"watchers": 328,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "POC for CVE-2024-27804",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T14:17:06Z",
|
||||
"updated_at": "2024-11-14T22:49:15Z",
|
||||
"updated_at": "2024-12-24T11:04:18Z",
|
||||
"pushed_at": "2024-05-14T14:55:23Z",
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 132,
|
||||
"watchers": 131,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -1659,10 +1659,10 @@
|
|||
"description": "PoC of CVE-2024-32002 - Remote Code Execution while cloning special-crafted local repositories",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-30T14:58:00Z",
|
||||
"updated_at": "2024-12-22T16:18:14Z",
|
||||
"updated_at": "2024-12-24T09:45:12Z",
|
||||
"pushed_at": "2024-07-30T16:01:17Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -1671,7 +1671,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -101,5 +101,36 @@
|
|||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 907739057,
|
||||
"name": "CVE-2024-32113",
|
||||
"full_name": "MikeyPPPPPPPP\/CVE-2024-32113",
|
||||
"owner": {
|
||||
"login": "MikeyPPPPPPPP",
|
||||
"id": 50926811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50926811?v=4",
|
||||
"html_url": "https:\/\/github.com\/MikeyPPPPPPPP",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MikeyPPPPPPPP\/CVE-2024-32113",
|
||||
"description": "CVE-2024-32113 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-24T09:16:23Z",
|
||||
"updated_at": "2024-12-24T09:19:57Z",
|
||||
"pushed_at": "2024-12-24T09:19:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-13T19:30:20Z",
|
||||
"updated_at": "2024-12-24T04:07:34Z",
|
||||
"updated_at": "2024-12-24T08:37:48Z",
|
||||
"pushed_at": "2024-11-29T16:56:23Z",
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"has_discussions": false,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"watchers": 248,
|
||||
"watchers": 249,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -29,36 +29,5 @@
|
|||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 905004801,
|
||||
"name": "CVE-2024-49112-PoC",
|
||||
"full_name": "b0l1o\/CVE-2024-49112-PoC",
|
||||
"owner": {
|
||||
"login": "b0l1o",
|
||||
"id": 192051058,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192051058?v=4",
|
||||
"html_url": "https:\/\/github.com\/b0l1o",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/b0l1o\/CVE-2024-49112-PoC",
|
||||
"description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-18T01:06:54Z",
|
||||
"updated_at": "2024-12-21T06:46:18Z",
|
||||
"pushed_at": "2024-12-18T01:17:11Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -169,19 +169,19 @@
|
|||
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-23T07:20:47Z",
|
||||
"updated_at": "2024-12-24T05:40:04Z",
|
||||
"updated_at": "2024-12-24T10:44:23Z",
|
||||
"pushed_at": "2024-12-23T07:30:27Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Integer Overflow in Cart Logic in SimplCommerce allows remote attackers to manipulate product quantities and total prices via crafted inputs that exploit insufficient validation of the quantity parameter.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-19T23:33:21Z",
|
||||
"updated_at": "2024-12-20T21:17:39Z",
|
||||
"pushed_at": "2024-12-20T21:17:36Z",
|
||||
"updated_at": "2024-12-24T12:02:39Z",
|
||||
"pushed_at": "2024-12-24T12:02:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "SimplCommerce is affected by a Broken Access Control vulnerability in the review system, allowing unauthorized users to post reviews for products they have not purchased.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-20T00:43:18Z",
|
||||
"updated_at": "2024-12-21T01:25:07Z",
|
||||
"pushed_at": "2024-12-20T21:18:11Z",
|
||||
"updated_at": "2024-12-24T12:02:58Z",
|
||||
"pushed_at": "2024-12-24T12:02:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit for CyberPanel Pre-Auth RCE via Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-29T23:34:27Z",
|
||||
"updated_at": "2024-12-10T10:14:45Z",
|
||||
"updated_at": "2024-12-24T06:37:27Z",
|
||||
"pushed_at": "2024-11-01T10:12:49Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "SimplCommerce is affected by a race condition vulnerability in the checkout logic, allowing multiple users to purchase more products than are in stock via simultaneous checkout requests.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-20T00:27:22Z",
|
||||
"updated_at": "2024-12-20T21:18:00Z",
|
||||
"pushed_at": "2024-12-20T21:17:57Z",
|
||||
"updated_at": "2024-12-24T12:02:20Z",
|
||||
"pushed_at": "2024-12-24T12:02:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -405,10 +405,10 @@
|
|||
"description": "OpenSSH CVE-2024-6387 Vulnerability Checker",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T01:24:04Z",
|
||||
"updated_at": "2024-12-23T02:13:55Z",
|
||||
"updated_at": "2024-12-24T09:30:51Z",
|
||||
"pushed_at": "2024-07-02T01:31:11Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -417,7 +417,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -93,10 +93,10 @@
|
|||
"description": "Grafana RCE exploit (CVE-2024-9264)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-21T03:36:05Z",
|
||||
"updated_at": "2024-12-13T14:56:05Z",
|
||||
"updated_at": "2024-12-24T10:06:07Z",
|
||||
"pushed_at": "2024-10-21T22:31:47Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -112,7 +112,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
13
README.md
13
README.md
|
@ -2174,6 +2174,7 @@
|
|||
- [K3ysTr0K3R/CVE-2024-10914-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-10914-EXPLOIT)
|
||||
- [jahithoque/CVE-2024-10914-Exploit](https://github.com/jahithoque/CVE-2024-10914-Exploit)
|
||||
- [redspy-sec/D-Link](https://github.com/redspy-sec/D-Link)
|
||||
- [dragonXZH/CVE-2024-10914](https://github.com/dragonXZH/CVE-2024-10914)
|
||||
|
||||
### CVE-2024-10924 (2024-11-15)
|
||||
|
||||
|
@ -2372,6 +2373,13 @@
|
|||
|
||||
- [cloudefence/CVE-2024-12356](https://github.com/cloudefence/CVE-2024-12356)
|
||||
|
||||
### CVE-2024-12484 (2024-12-11)
|
||||
|
||||
<code>In Codezips Technical Discussion Forum 1.0 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Das betrifft eine unbekannte Funktionalität der Datei /signuppost.php. Durch das Manipulieren des Arguments Username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
|
||||
</code>
|
||||
|
||||
- [LiChaser/CVE-2024-12484](https://github.com/LiChaser/CVE-2024-12484)
|
||||
|
||||
### CVE-2024-12883 (2024-12-21)
|
||||
|
||||
<code>In code-projects Job Recruitment 1.0 wurde eine problematische Schwachstelle ausgemacht. Das betrifft eine unbekannte Funktionalität der Datei /_email.php. Mittels Manipulieren des Arguments email mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
|
||||
|
@ -4774,6 +4782,7 @@
|
|||
- [RacerZ-fighting/CVE-2024-32113-POC](https://github.com/RacerZ-fighting/CVE-2024-32113-POC)
|
||||
- [Mr-xn/CVE-2024-32113](https://github.com/Mr-xn/CVE-2024-32113)
|
||||
- [YongYe-Security/CVE-2024-32113](https://github.com/YongYe-Security/CVE-2024-32113)
|
||||
- [MikeyPPPPPPPP/CVE-2024-32113](https://github.com/MikeyPPPPPPPP/CVE-2024-32113)
|
||||
|
||||
### CVE-2024-32136 (2024-04-15)
|
||||
|
||||
|
@ -7038,7 +7047,6 @@
|
|||
</code>
|
||||
|
||||
- [tnkr/poc_monitor](https://github.com/tnkr/poc_monitor)
|
||||
- [b0l1o/CVE-2024-49112-PoC](https://github.com/b0l1o/CVE-2024-49112-PoC)
|
||||
|
||||
### CVE-2024-49117 (2024-12-10)
|
||||
|
||||
|
@ -19370,7 +19378,7 @@
|
|||
<code>Premature release of resource during expected lifetime in the Intel(R) SGX SDK software may allow a privileged user to potentially enable information disclosure via local access.
|
||||
</code>
|
||||
|
||||
- [StanPlatinum/snapshot-attack-demo](https://github.com/StanPlatinum/snapshot-attack-demo)
|
||||
- [web-logs2/snapshot-demo](https://github.com/web-logs2/snapshot-demo)
|
||||
|
||||
### CVE-2022-27502 (2022-06-10)
|
||||
|
||||
|
@ -40761,6 +40769,7 @@
|
|||
- [Stahlz/JQShell](https://github.com/Stahlz/JQShell)
|
||||
- [cved-sources/cve-2018-9206](https://github.com/cved-sources/cve-2018-9206)
|
||||
- [mi-hood/CVE-2018-9206](https://github.com/mi-hood/CVE-2018-9206)
|
||||
- [MikeyPPPPPPPP/CVE-2018-9206](https://github.com/MikeyPPPPPPPP/CVE-2018-9206)
|
||||
|
||||
### CVE-2018-9207 (2018-11-19)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue