mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 01:54:09 +01:00
Auto Update 2025/01/18 12:31:39
This commit is contained in:
parent
77c3492f13
commit
b728142901
16 changed files with 178 additions and 42 deletions
|
@ -182,7 +182,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-11-14T04:35:59Z",
|
||||
"updated_at": "2025-01-05T15:26:10Z",
|
||||
"pushed_at": "2025-01-18T05:35:58Z",
|
||||
"pushed_at": "2025-01-18T07:52:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2025-01-16T19:49:51Z",
|
||||
"updated_at": "2025-01-18T08:56:30Z",
|
||||
"pushed_at": "2022-07-10T22:23:13Z",
|
||||
"stargazers_count": 997,
|
||||
"watchers_count": 997,
|
||||
"stargazers_count": 998,
|
||||
"watchers_count": 998,
|
||||
"has_discussions": false,
|
||||
"forks_count": 192,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 192,
|
||||
"watchers": 997,
|
||||
"watchers": 998,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
},
|
||||
|
|
|
@ -743,10 +743,10 @@
|
|||
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T06:54:15Z",
|
||||
"updated_at": "2025-01-18T06:03:34Z",
|
||||
"updated_at": "2025-01-18T12:02:37Z",
|
||||
"pushed_at": "2025-01-16T09:56:36Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -755,7 +755,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -468,5 +468,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 918591329,
|
||||
"name": "CVE-2023-44487",
|
||||
"full_name": "aulauniversal\/CVE-2023-44487",
|
||||
"owner": {
|
||||
"login": "aulauniversal",
|
||||
"id": 168633732,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168633732?v=4",
|
||||
"html_url": "https:\/\/github.com\/aulauniversal",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aulauniversal\/CVE-2023-44487",
|
||||
"description": "RapidResetClient",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T10:39:58Z",
|
||||
"updated_at": "2025-01-18T11:39:56Z",
|
||||
"pushed_at": "2025-01-18T11:39:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2025-01-18T04:12:03Z",
|
||||
"updated_at": "2025-01-18T10:47:32Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1391,
|
||||
"watchers_count": 1391,
|
||||
"stargazers_count": 1392,
|
||||
"watchers_count": 1392,
|
||||
"has_discussions": false,
|
||||
"forks_count": 238,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 238,
|
||||
"watchers": 1391,
|
||||
"watchers": 1392,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
33
2024/CVE-2024-13375.json
Normal file
33
2024/CVE-2024-13375.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 918590212,
|
||||
"name": "CVE-2024-13375",
|
||||
"full_name": "McTavishSue\/CVE-2024-13375",
|
||||
"owner": {
|
||||
"login": "McTavishSue",
|
||||
"id": 186207823,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186207823?v=4",
|
||||
"html_url": "https:\/\/github.com\/McTavishSue",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/McTavishSue\/CVE-2024-13375",
|
||||
"description": "CVE-2024-13375 Unverified Password Change",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T10:35:47Z",
|
||||
"updated_at": "2025-01-18T10:50:25Z",
|
||||
"pushed_at": "2025-01-18T10:48:52Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -952,10 +952,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2025-01-18T05:18:06Z",
|
||||
"updated_at": "2025-01-18T11:28:51Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3506,
|
||||
"watchers_count": 3506,
|
||||
"stargazers_count": 3505,
|
||||
"watchers_count": 3505,
|
||||
"has_discussions": false,
|
||||
"forks_count": 239,
|
||||
"allow_forking": true,
|
||||
|
@ -964,7 +964,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 239,
|
||||
"watchers": 3506,
|
||||
"watchers": 3505,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T12:39:44Z",
|
||||
"updated_at": "2025-01-17T21:41:13Z",
|
||||
"updated_at": "2025-01-18T11:54:10Z",
|
||||
"pushed_at": "2025-01-16T09:48:07Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "POC for CVE-2024-46310 For FXServer version's v9601 and prior, Incorrect Access Control in FXServer version's v9601 and prior, for CFX.re FiveM, allows unauthenticated users to modify and read userdata via exposed api endpoint",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-28T19:36:52Z",
|
||||
"updated_at": "2025-01-13T21:52:23Z",
|
||||
"updated_at": "2025-01-18T08:37:33Z",
|
||||
"pushed_at": "2024-10-07T13:09:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-01T15:48:38Z",
|
||||
"updated_at": "2025-01-17T09:02:57Z",
|
||||
"updated_at": "2025-01-18T12:25:04Z",
|
||||
"pushed_at": "2025-01-02T16:07:23Z",
|
||||
"stargazers_count": 448,
|
||||
"watchers_count": 448,
|
||||
"stargazers_count": 449,
|
||||
"watchers_count": 449,
|
||||
"has_discussions": false,
|
||||
"forks_count": 105,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"watchers": 448,
|
||||
"watchers": 449,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,12 +14,12 @@
|
|||
"description": "POC exploit for CVE-2024-49138",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-15T00:43:37Z",
|
||||
"updated_at": "2025-01-18T03:57:24Z",
|
||||
"pushed_at": "2025-01-17T22:40:51Z",
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"updated_at": "2025-01-18T08:57:10Z",
|
||||
"pushed_at": "2025-01-18T11:08:28Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 149,
|
||||
"forks": 30,
|
||||
"watchers": 152,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 918594689,
|
||||
"name": "CVE-2024-54369-PoC",
|
||||
"full_name": "Nxploited\/CVE-2024-54369-PoC",
|
||||
"owner": {
|
||||
"login": "Nxploited",
|
||||
"id": 188819918,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nxploited",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-54369-PoC",
|
||||
"description": "PoC: Plugin: Zita Site Builder <= 1.0.2 - Arbitrary Plugin Installation",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T10:52:03Z",
|
||||
"updated_at": "2025-01-18T11:22:40Z",
|
||||
"pushed_at": "2025-01-18T11:22:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T07:26:15Z",
|
||||
"updated_at": "2025-01-18T04:27:04Z",
|
||||
"updated_at": "2025-01-18T10:18:13Z",
|
||||
"pushed_at": "2025-01-16T08:58:49Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 38,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -122,5 +122,36 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 917875317,
|
||||
"name": "CVE-2024-9474",
|
||||
"full_name": "aratane\/CVE-2024-9474",
|
||||
"owner": {
|
||||
"login": "aratane",
|
||||
"id": 76691705,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76691705?v=4",
|
||||
"html_url": "https:\/\/github.com\/aratane",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aratane\/CVE-2024-9474",
|
||||
"description": "Palo Alto RCE Vuln",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T20:07:14Z",
|
||||
"updated_at": "2025-01-18T12:14:08Z",
|
||||
"pushed_at": "2025-01-16T20:35:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
10
README.md
10
README.md
|
@ -2046,6 +2046,7 @@
|
|||
- [k4nfr3/CVE-2024-9474](https://github.com/k4nfr3/CVE-2024-9474)
|
||||
- [deathvu/CVE-2024-9474](https://github.com/deathvu/CVE-2024-9474)
|
||||
- [coskper-papa/PAN-OS_CVE-2024-9474](https://github.com/coskper-papa/PAN-OS_CVE-2024-9474)
|
||||
- [aratane/CVE-2024-9474](https://github.com/aratane/CVE-2024-9474)
|
||||
|
||||
### CVE-2024-9570 (2024-10-07)
|
||||
|
||||
|
@ -2686,6 +2687,13 @@
|
|||
|
||||
- [Aether-0/CVE-2024-12986](https://github.com/Aether-0/CVE-2024-12986)
|
||||
|
||||
### CVE-2024-13375 (2025-01-18)
|
||||
|
||||
<code>The Adifier System plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.1.7. This is due to the plugin not properly validating a user's identity prior to updating their details like password through the adifier_recover() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
|
||||
</code>
|
||||
|
||||
- [McTavishSue/CVE-2024-13375](https://github.com/McTavishSue/CVE-2024-13375)
|
||||
|
||||
### CVE-2024-20017 (2024-03-04)
|
||||
|
||||
<code>In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132.
|
||||
|
@ -8234,6 +8242,7 @@
|
|||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-54369](https://github.com/RandomRobbieBF/CVE-2024-54369)
|
||||
- [Nxploited/CVE-2024-54369-PoC](https://github.com/Nxploited/CVE-2024-54369-PoC)
|
||||
|
||||
### CVE-2024-54374 (2024-12-16)
|
||||
|
||||
|
@ -15434,6 +15443,7 @@
|
|||
- [TYuan0816/cve-2023-44487](https://github.com/TYuan0816/cve-2023-44487)
|
||||
- [sn130hk/CVE-2023-44487](https://github.com/sn130hk/CVE-2023-44487)
|
||||
- [threatlabindonesia/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC](https://github.com/threatlabindonesia/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC)
|
||||
- [aulauniversal/CVE-2023-44487](https://github.com/aulauniversal/CVE-2023-44487)
|
||||
|
||||
### CVE-2023-44758 (2023-10-06)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue