mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/09 12:32:55
This commit is contained in:
parent
db2879baff
commit
bbdd0dc9ce
34 changed files with 215 additions and 139 deletions
|
@ -14,10 +14,10 @@
|
||||||
"description": "This Python script helps to detect the Etherleak (CVE-2003-0001) vulnerability on a target host by analyzing the padding data in network packets. The script uses Scapy to send various types of requests (ICMP, ARP, or TCP) and checks if the responses contain any padding data that could potentially leak sensitive memory contents.",
|
"description": "This Python script helps to detect the Etherleak (CVE-2003-0001) vulnerability on a target host by analyzing the padding data in network packets. The script uses Scapy to send various types of requests (ICMP, ARP, or TCP) and checks if the responses contain any padding data that could potentially leak sensitive memory contents.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-01T14:03:30Z",
|
"created_at": "2024-10-01T14:03:30Z",
|
||||||
"updated_at": "2024-10-08T15:25:48Z",
|
"updated_at": "2024-12-09T09:32:10Z",
|
||||||
"pushed_at": "2024-10-01T14:12:30Z",
|
"pushed_at": "2024-10-01T14:12:30Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 2,
|
"watchers_count": 3,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 2,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -153,5 +153,36 @@
|
||||||
"watchers": 9,
|
"watchers": 9,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 900659776,
|
||||||
|
"name": "CVE-2012-1823-Analyze",
|
||||||
|
"full_name": "Jimmy01240397\/CVE-2012-1823-Analyze",
|
||||||
|
"owner": {
|
||||||
|
"login": "Jimmy01240397",
|
||||||
|
"id": 57281249,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57281249?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/Jimmy01240397",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/Jimmy01240397\/CVE-2012-1823-Analyze",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-12-09T08:31:04Z",
|
||||||
|
"updated_at": "2024-12-09T08:32:04Z",
|
||||||
|
"pushed_at": "2024-12-09T08:32:00Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -355,10 +355,10 @@
|
||||||
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-11-13T11:01:41Z",
|
"created_at": "2022-11-13T11:01:41Z",
|
||||||
"updated_at": "2024-12-09T00:56:39Z",
|
"updated_at": "2024-12-09T08:01:15Z",
|
||||||
"pushed_at": "2022-11-15T09:05:50Z",
|
"pushed_at": "2022-11-15T09:05:50Z",
|
||||||
"stargazers_count": 205,
|
"stargazers_count": 206,
|
||||||
"watchers_count": 205,
|
"watchers_count": 206,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 18,
|
"forks_count": 18,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -367,7 +367,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 18,
|
"forks": 18,
|
||||||
"watchers": 205,
|
"watchers": 206,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
},
|
},
|
||||||
|
|
|
@ -76,10 +76,10 @@
|
||||||
"description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets",
|
"description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-05T16:55:40Z",
|
"created_at": "2024-08-05T16:55:40Z",
|
||||||
"updated_at": "2024-11-21T05:20:35Z",
|
"updated_at": "2024-12-09T06:35:04Z",
|
||||||
"pushed_at": "2024-08-05T18:31:16Z",
|
"pushed_at": "2024-08-05T18:31:16Z",
|
||||||
"stargazers_count": 13,
|
"stargazers_count": 14,
|
||||||
"watchers_count": 13,
|
"watchers_count": 14,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -88,7 +88,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 13,
|
"watchers": 14,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -76,10 +76,10 @@
|
||||||
"description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215",
|
"description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-10-14T17:27:37Z",
|
"created_at": "2019-10-14T17:27:37Z",
|
||||||
"updated_at": "2024-12-04T05:26:29Z",
|
"updated_at": "2024-12-09T09:14:21Z",
|
||||||
"pushed_at": "2019-10-15T01:04:08Z",
|
"pushed_at": "2019-10-15T01:04:08Z",
|
||||||
"stargazers_count": 110,
|
"stargazers_count": 111,
|
||||||
"watchers_count": 110,
|
"watchers_count": 111,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 48,
|
"forks_count": 48,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -88,7 +88,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 48,
|
"forks": 48,
|
||||||
"watchers": 110,
|
"watchers": 111,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 9
|
"subscribers_count": 9
|
||||||
},
|
},
|
||||||
|
|
|
@ -107,10 +107,10 @@
|
||||||
"description": "CVE-2019-3396 confluence SSTI RCE",
|
"description": "CVE-2019-3396 confluence SSTI RCE",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-04-10T02:15:47Z",
|
"created_at": "2019-04-10T02:15:47Z",
|
||||||
"updated_at": "2024-09-12T12:36:30Z",
|
"updated_at": "2024-12-09T11:39:34Z",
|
||||||
"pushed_at": "2020-10-01T08:40:07Z",
|
"pushed_at": "2020-10-01T08:40:07Z",
|
||||||
"stargazers_count": 173,
|
"stargazers_count": 174,
|
||||||
"watchers_count": 173,
|
"watchers_count": 174,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 66,
|
"forks_count": 66,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -124,7 +124,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 66,
|
"forks": 66,
|
||||||
"watchers": 173,
|
"watchers": 174,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 5
|
"subscribers_count": 5
|
||||||
},
|
},
|
||||||
|
|
|
@ -2,15 +2,15 @@
|
||||||
{
|
{
|
||||||
"id": 334947839,
|
"id": 334947839,
|
||||||
"name": "CVE-2019-8943",
|
"name": "CVE-2019-8943",
|
||||||
"full_name": "v0lck3r\/CVE-2019-8943",
|
"full_name": "oussama-rahali\/CVE-2019-8943",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "v0lck3r",
|
"login": "oussama-rahali",
|
||||||
"id": 61425261,
|
"id": 61425261,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61425261?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61425261?v=4",
|
||||||
"html_url": "https:\/\/github.com\/v0lck3r",
|
"html_url": "https:\/\/github.com\/oussama-rahali",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/v0lck3r\/CVE-2019-8943",
|
"html_url": "https:\/\/github.com\/oussama-rahali\/CVE-2019-8943",
|
||||||
"description": "Exploit of CVE-2019-8942 and CVE-2019-8943 ",
|
"description": "Exploit of CVE-2019-8942 and CVE-2019-8943 ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-02-01T12:47:28Z",
|
"created_at": "2021-02-01T12:47:28Z",
|
||||||
|
|
|
@ -888,10 +888,10 @@
|
||||||
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-11-13T11:01:41Z",
|
"created_at": "2022-11-13T11:01:41Z",
|
||||||
"updated_at": "2024-12-09T00:56:39Z",
|
"updated_at": "2024-12-09T08:01:15Z",
|
||||||
"pushed_at": "2022-11-15T09:05:50Z",
|
"pushed_at": "2022-11-15T09:05:50Z",
|
||||||
"stargazers_count": 205,
|
"stargazers_count": 206,
|
||||||
"watchers_count": 205,
|
"watchers_count": 206,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 18,
|
"forks_count": 18,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -900,7 +900,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 18,
|
"forks": 18,
|
||||||
"watchers": 205,
|
"watchers": 206,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
},
|
},
|
||||||
|
|
|
@ -972,7 +972,7 @@
|
||||||
"stargazers_count": 1088,
|
"stargazers_count": 1088,
|
||||||
"watchers_count": 1088,
|
"watchers_count": 1088,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 189,
|
"forks_count": 190,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
|
@ -980,7 +980,7 @@
|
||||||
"cve-2021-4034"
|
"cve-2021-4034"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 189,
|
"forks": 190,
|
||||||
"watchers": 1088,
|
"watchers": 1088,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 13
|
"subscribers_count": 13
|
||||||
|
|
|
@ -935,10 +935,10 @@
|
||||||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-10T23:19:28Z",
|
"created_at": "2021-12-10T23:19:28Z",
|
||||||
"updated_at": "2024-11-30T15:57:11Z",
|
"updated_at": "2024-12-09T06:19:58Z",
|
||||||
"pushed_at": "2024-02-12T22:37:25Z",
|
"pushed_at": "2024-02-12T22:37:25Z",
|
||||||
"stargazers_count": 1810,
|
"stargazers_count": 1811,
|
||||||
"watchers_count": 1810,
|
"watchers_count": 1811,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 529,
|
"forks_count": 529,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -952,7 +952,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 529,
|
"forks": 529,
|
||||||
"watchers": 1810,
|
"watchers": 1811,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 26
|
"subscribers_count": 26
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-02-08T17:25:44Z",
|
"created_at": "2022-02-08T17:25:44Z",
|
||||||
"updated_at": "2024-12-07T00:14:01Z",
|
"updated_at": "2024-12-09T10:33:10Z",
|
||||||
"pushed_at": "2022-02-09T16:54:09Z",
|
"pushed_at": "2022-02-09T16:54:09Z",
|
||||||
"stargazers_count": 776,
|
"stargazers_count": 777,
|
||||||
"watchers_count": 776,
|
"watchers_count": 777,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 160,
|
"forks_count": 160,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -29,7 +29,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 160,
|
"forks": 160,
|
||||||
"watchers": 776,
|
"watchers": 777,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 15
|
"subscribers_count": 15
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
|
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-30T07:54:45Z",
|
"created_at": "2022-03-30T07:54:45Z",
|
||||||
"updated_at": "2024-11-27T06:47:37Z",
|
"updated_at": "2024-12-09T09:21:05Z",
|
||||||
"pushed_at": "2022-11-09T15:46:06Z",
|
"pushed_at": "2022-11-09T15:46:06Z",
|
||||||
"stargazers_count": 361,
|
"stargazers_count": 362,
|
||||||
"watchers_count": 361,
|
"watchers_count": 362,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 105,
|
"forks_count": 105,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -35,7 +35,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 105,
|
"forks": 105,
|
||||||
"watchers": 361,
|
"watchers": 362,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 18
|
"subscribers_count": 18
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Let's control Secure Boot Chain ourselves.",
|
"description": "Let's control Secure Boot Chain ourselves.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-12-01T07:32:18Z",
|
"created_at": "2023-12-01T07:32:18Z",
|
||||||
"updated_at": "2024-11-29T18:12:25Z",
|
"updated_at": "2024-12-09T12:18:55Z",
|
||||||
"pushed_at": "2024-02-20T09:05:59Z",
|
"pushed_at": "2024-02-20T09:05:59Z",
|
||||||
"stargazers_count": 41,
|
"stargazers_count": 42,
|
||||||
"watchers_count": 41,
|
"watchers_count": 42,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 10,
|
"forks_count": 10,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -29,7 +29,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 10,
|
"forks": 10,
|
||||||
"watchers": 41,
|
"watchers": 42,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 5
|
"subscribers_count": 5
|
||||||
}
|
}
|
||||||
|
|
|
@ -332,10 +332,10 @@
|
||||||
"description": "CobaltStrike <= 4.7.1 RCE",
|
"description": "CobaltStrike <= 4.7.1 RCE",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-10-14T11:46:01Z",
|
"created_at": "2022-10-14T11:46:01Z",
|
||||||
"updated_at": "2024-11-25T09:21:07Z",
|
"updated_at": "2024-12-09T09:21:36Z",
|
||||||
"pushed_at": "2022-10-25T05:32:54Z",
|
"pushed_at": "2022-10-25T05:32:54Z",
|
||||||
"stargazers_count": 376,
|
"stargazers_count": 377,
|
||||||
"watchers_count": 376,
|
"watchers_count": 377,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 77,
|
"forks_count": 77,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -344,7 +344,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 77,
|
"forks": 77,
|
||||||
"watchers": 376,
|
"watchers": 377,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 7
|
"subscribers_count": 7
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "CVE-2023-21554 Windows MessageQueuing PoC,分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
|
"description": "CVE-2023-21554 Windows MessageQueuing PoC,分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-05-18T10:30:49Z",
|
"created_at": "2023-05-18T10:30:49Z",
|
||||||
"updated_at": "2024-11-18T13:26:39Z",
|
"updated_at": "2024-12-09T09:20:31Z",
|
||||||
"pushed_at": "2023-05-18T10:38:57Z",
|
"pushed_at": "2023-05-18T10:38:57Z",
|
||||||
"stargazers_count": 54,
|
"stargazers_count": 55,
|
||||||
"watchers_count": 54,
|
"watchers_count": 55,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 15,
|
"forks_count": 15,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 15,
|
"forks": 15,
|
||||||
"watchers": 54,
|
"watchers": 55,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -19,13 +19,13 @@
|
||||||
"stargazers_count": 189,
|
"stargazers_count": 189,
|
||||||
"watchers_count": 189,
|
"watchers_count": 189,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 38,
|
"forks_count": 37,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 38,
|
"forks": 37,
|
||||||
"watchers": 189,
|
"watchers": 189,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
|
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-10-14T09:35:07Z",
|
"created_at": "2023-10-14T09:35:07Z",
|
||||||
"updated_at": "2024-12-06T05:37:00Z",
|
"updated_at": "2024-12-09T07:21:54Z",
|
||||||
"pushed_at": "2024-05-16T07:42:00Z",
|
"pushed_at": "2024-05-16T07:42:00Z",
|
||||||
"stargazers_count": 222,
|
"stargazers_count": 223,
|
||||||
"watchers_count": 222,
|
"watchers_count": 223,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 23,
|
"forks_count": 23,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -61,7 +61,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 23,
|
"forks": 23,
|
||||||
"watchers": 222,
|
"watchers": 223,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-05-01T03:08:48Z",
|
"created_at": "2024-05-01T03:08:48Z",
|
||||||
"updated_at": "2024-11-20T16:30:45Z",
|
"updated_at": "2024-12-09T09:17:34Z",
|
||||||
"pushed_at": "2024-05-05T09:40:22Z",
|
"pushed_at": "2024-05-05T09:40:22Z",
|
||||||
"stargazers_count": 11,
|
"stargazers_count": 12,
|
||||||
"watchers_count": 11,
|
"watchers_count": 12,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 11,
|
"watchers": 12,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-02-16T15:17:59Z",
|
"created_at": "2024-02-16T15:17:59Z",
|
||||||
"updated_at": "2024-12-08T11:39:29Z",
|
"updated_at": "2024-12-09T09:21:37Z",
|
||||||
"pushed_at": "2024-02-19T20:00:35Z",
|
"pushed_at": "2024-02-19T20:00:35Z",
|
||||||
"stargazers_count": 706,
|
"stargazers_count": 707,
|
||||||
"watchers_count": 706,
|
"watchers_count": 707,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 153,
|
"forks_count": 153,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -57,7 +57,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 153,
|
"forks": 153,
|
||||||
"watchers": 706,
|
"watchers": 707,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 10
|
"subscribers_count": 10
|
||||||
},
|
},
|
||||||
|
@ -448,8 +448,8 @@
|
||||||
"description": "CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC",
|
"description": "CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-31T13:18:43Z",
|
"created_at": "2024-08-31T13:18:43Z",
|
||||||
"updated_at": "2024-10-25T10:52:39Z",
|
"updated_at": "2024-12-09T11:37:25Z",
|
||||||
"pushed_at": "2024-10-24T16:38:25Z",
|
"pushed_at": "2024-12-09T11:37:20Z",
|
||||||
"stargazers_count": 8,
|
"stargazers_count": 8,
|
||||||
"watchers_count": 8,
|
"watchers_count": 8,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -76,10 +76,10 @@
|
||||||
"description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1",
|
"description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-03-18T20:39:27Z",
|
"created_at": "2024-03-18T20:39:27Z",
|
||||||
"updated_at": "2024-12-02T12:25:59Z",
|
"updated_at": "2024-12-09T08:33:20Z",
|
||||||
"pushed_at": "2024-03-19T06:37:30Z",
|
"pushed_at": "2024-03-19T06:37:30Z",
|
||||||
"stargazers_count": 12,
|
"stargazers_count": 13,
|
||||||
"watchers_count": 12,
|
"watchers_count": 13,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -88,7 +88,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 12,
|
"watchers": 13,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
@ -107,10 +107,10 @@
|
||||||
"description": "aiohttp LFI (CVE-2024-23334)",
|
"description": "aiohttp LFI (CVE-2024-23334)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-03-19T16:28:56Z",
|
"created_at": "2024-03-19T16:28:56Z",
|
||||||
"updated_at": "2024-07-29T18:47:24Z",
|
"updated_at": "2024-12-09T08:17:11Z",
|
||||||
"pushed_at": "2024-03-19T17:06:26Z",
|
"pushed_at": "2024-03-19T17:06:26Z",
|
||||||
"stargazers_count": 22,
|
"stargazers_count": 23,
|
||||||
"watchers_count": 22,
|
"watchers_count": 23,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -119,7 +119,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 2,
|
||||||
"watchers": 22,
|
"watchers": 23,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
@ -342,5 +342,36 @@
|
||||||
"watchers": 1,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 900621696,
|
||||||
|
"name": "CVE-2024-23334-PoC",
|
||||||
|
"full_name": "Betan423\/CVE-2024-23334-PoC",
|
||||||
|
"owner": {
|
||||||
|
"login": "Betan423",
|
||||||
|
"id": 125627171,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125627171?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/Betan423",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/Betan423\/CVE-2024-23334-PoC",
|
||||||
|
"description": "This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt to replicate the bug in aiohttp that leads to Local File Inclusion (LFI).",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-12-09T06:51:13Z",
|
||||||
|
"updated_at": "2024-12-09T09:25:20Z",
|
||||||
|
"pushed_at": "2024-12-09T09:25:16Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -1074,6 +1074,6 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 1,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -288,10 +288,10 @@
|
||||||
"description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information",
|
"description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-04-22T22:14:24Z",
|
"created_at": "2024-04-22T22:14:24Z",
|
||||||
"updated_at": "2024-11-24T06:18:34Z",
|
"updated_at": "2024-12-09T06:46:31Z",
|
||||||
"pushed_at": "2024-07-19T14:42:24Z",
|
"pushed_at": "2024-07-19T14:42:24Z",
|
||||||
"stargazers_count": 26,
|
"stargazers_count": 27,
|
||||||
"watchers_count": 26,
|
"watchers_count": 27,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -311,7 +311,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 2,
|
||||||
"watchers": 26,
|
"watchers": 27,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Arbitrary Code Execution on FuguHub 8.4",
|
"description": "Arbitrary Code Execution on FuguHub 8.4",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-03-09T22:24:03Z",
|
"created_at": "2024-03-09T22:24:03Z",
|
||||||
"updated_at": "2024-11-28T09:26:23Z",
|
"updated_at": "2024-12-09T12:16:00Z",
|
||||||
"pushed_at": "2024-03-11T03:09:35Z",
|
"pushed_at": "2024-03-11T03:09:35Z",
|
||||||
"stargazers_count": 5,
|
"stargazers_count": 6,
|
||||||
"watchers_count": 5,
|
"watchers_count": 6,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 5,
|
"watchers": 6,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -121,7 +121,7 @@
|
||||||
"forks": 31,
|
"forks": 31,
|
||||||
"watchers": 427,
|
"watchers": 427,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 19
|
"subscribers_count": 20
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"id": 834461917,
|
"id": 834461917,
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
|
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-13T19:30:20Z",
|
"created_at": "2024-10-13T19:30:20Z",
|
||||||
"updated_at": "2024-12-07T06:30:14Z",
|
"updated_at": "2024-12-09T08:36:38Z",
|
||||||
"pushed_at": "2024-11-29T16:56:23Z",
|
"pushed_at": "2024-11-29T16:56:23Z",
|
||||||
"stargazers_count": 216,
|
"stargazers_count": 217,
|
||||||
"watchers_count": 216,
|
"watchers_count": 217,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 46,
|
"forks_count": 46,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 46,
|
"forks": 46,
|
||||||
"watchers": 216,
|
"watchers": 217,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 6
|
"subscribers_count": 6
|
||||||
},
|
},
|
||||||
|
|
|
@ -362,10 +362,10 @@
|
||||||
"description": "geoserver图形化漏洞利用工具",
|
"description": "geoserver图形化漏洞利用工具",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-05T10:08:55Z",
|
"created_at": "2024-10-05T10:08:55Z",
|
||||||
"updated_at": "2024-12-04T05:26:55Z",
|
"updated_at": "2024-12-09T06:55:27Z",
|
||||||
"pushed_at": "2024-10-08T03:16:26Z",
|
"pushed_at": "2024-10-08T03:16:26Z",
|
||||||
"stargazers_count": 21,
|
"stargazers_count": 22,
|
||||||
"watchers_count": 21,
|
"watchers_count": 22,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -374,7 +374,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 21,
|
"watchers": 22,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -420,10 +420,10 @@
|
||||||
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
|
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-31T13:56:26Z",
|
"created_at": "2024-08-31T13:56:26Z",
|
||||||
"updated_at": "2024-11-24T20:48:28Z",
|
"updated_at": "2024-12-09T08:30:58Z",
|
||||||
"pushed_at": "2024-11-24T10:59:13Z",
|
"pushed_at": "2024-12-09T07:16:33Z",
|
||||||
"stargazers_count": 15,
|
"stargazers_count": 16,
|
||||||
"watchers_count": 15,
|
"watchers_count": 16,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -432,7 +432,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 15,
|
"watchers": 16,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,19 +14,19 @@
|
||||||
"description": "poc code for CVE-2024-38080",
|
"description": "poc code for CVE-2024-38080",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-09-01T11:25:22Z",
|
"created_at": "2024-09-01T11:25:22Z",
|
||||||
"updated_at": "2024-12-05T12:34:41Z",
|
"updated_at": "2024-12-09T07:04:48Z",
|
||||||
"pushed_at": "2024-09-01T11:35:25Z",
|
"pushed_at": "2024-09-01T11:35:25Z",
|
||||||
"stargazers_count": 28,
|
"stargazers_count": 29,
|
||||||
"watchers_count": 28,
|
"watchers_count": 29,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 9,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 9,
|
||||||
"watchers": 28,
|
"watchers": 29,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,19 +14,19 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-03T08:56:59Z",
|
"created_at": "2024-12-03T08:56:59Z",
|
||||||
"updated_at": "2024-12-09T06:13:16Z",
|
"updated_at": "2024-12-09T11:39:03Z",
|
||||||
"pushed_at": "2024-11-18T23:48:31Z",
|
"pushed_at": "2024-11-18T23:48:31Z",
|
||||||
"stargazers_count": 7,
|
"stargazers_count": 14,
|
||||||
"watchers_count": 7,
|
"watchers_count": 14,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 6,
|
"forks_count": 11,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 6,
|
"forks": 11,
|
||||||
"watchers": 7,
|
"watchers": 14,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-05T06:13:57Z",
|
"created_at": "2024-12-05T06:13:57Z",
|
||||||
"updated_at": "2024-12-07T12:14:47Z",
|
"updated_at": "2024-12-09T07:52:01Z",
|
||||||
"pushed_at": "2024-12-05T07:55:04Z",
|
"pushed_at": "2024-12-05T07:55:04Z",
|
||||||
"stargazers_count": 9,
|
"stargazers_count": 10,
|
||||||
"watchers_count": 9,
|
"watchers_count": 10,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 5,
|
"forks_count": 5,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 5,
|
"forks": 5,
|
||||||
"watchers": 9,
|
"watchers": 10,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.",
|
"description": "The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-08T08:28:26Z",
|
"created_at": "2024-08-08T08:28:26Z",
|
||||||
"updated_at": "2024-12-02T12:24:10Z",
|
"updated_at": "2024-12-09T08:34:29Z",
|
||||||
"pushed_at": "2024-08-08T09:32:00Z",
|
"pushed_at": "2024-08-08T09:32:00Z",
|
||||||
"stargazers_count": 11,
|
"stargazers_count": 12,
|
||||||
"watchers_count": 11,
|
"watchers_count": 12,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 6,
|
"forks_count": 6,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -30,7 +30,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 6,
|
"forks": 6,
|
||||||
"watchers": 11,
|
"watchers": 12,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
@ -80,10 +80,10 @@
|
||||||
"description": "CVE-2024-43044的利用方式",
|
"description": "CVE-2024-43044的利用方式",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-13T07:32:35Z",
|
"created_at": "2024-08-13T07:32:35Z",
|
||||||
"updated_at": "2024-10-16T01:14:36Z",
|
"updated_at": "2024-12-09T08:34:51Z",
|
||||||
"pushed_at": "2024-08-13T07:43:22Z",
|
"pushed_at": "2024-08-13T07:43:22Z",
|
||||||
"stargazers_count": 15,
|
"stargazers_count": 16,
|
||||||
"watchers_count": 15,
|
"watchers_count": 16,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -92,7 +92,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 2,
|
||||||
"watchers": 15,
|
"watchers": 16,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,19 +14,19 @@
|
||||||
"description": "PoC for CVE-2024-48990",
|
"description": "PoC for CVE-2024-48990",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-11-20T18:41:25Z",
|
"created_at": "2024-11-20T18:41:25Z",
|
||||||
"updated_at": "2024-12-06T00:28:40Z",
|
"updated_at": "2024-12-09T08:38:49Z",
|
||||||
"pushed_at": "2024-11-20T18:49:33Z",
|
"pushed_at": "2024-11-20T18:49:33Z",
|
||||||
"stargazers_count": 85,
|
"stargazers_count": 87,
|
||||||
"watchers_count": 85,
|
"watchers_count": 87,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 14,
|
"forks_count": 15,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 14,
|
"forks": 15,
|
||||||
"watchers": 85,
|
"watchers": 87,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
|
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-11-19T08:57:18Z",
|
"created_at": "2024-11-19T08:57:18Z",
|
||||||
"updated_at": "2024-12-09T04:09:57Z",
|
"updated_at": "2024-12-09T08:10:55Z",
|
||||||
"pushed_at": "2024-11-19T09:15:26Z",
|
"pushed_at": "2024-11-19T09:15:26Z",
|
||||||
"stargazers_count": 82,
|
"stargazers_count": 83,
|
||||||
"watchers_count": 82,
|
"watchers_count": 83,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 18,
|
"forks_count": 18,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 18,
|
"forks": 18,
|
||||||
"watchers": 82,
|
"watchers": 83,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
22
README.md
22
README.md
|
@ -2952,6 +2952,7 @@
|
||||||
- [Pylonet/CVE-2024-23334](https://github.com/Pylonet/CVE-2024-23334)
|
- [Pylonet/CVE-2024-23334](https://github.com/Pylonet/CVE-2024-23334)
|
||||||
- [Arc4he/CVE-2024-23334-PoC](https://github.com/Arc4he/CVE-2024-23334-PoC)
|
- [Arc4he/CVE-2024-23334-PoC](https://github.com/Arc4he/CVE-2024-23334-PoC)
|
||||||
- [TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC](https://github.com/TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC)
|
- [TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC](https://github.com/TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC)
|
||||||
|
- [Betan423/CVE-2024-23334-PoC](https://github.com/Betan423/CVE-2024-23334-PoC)
|
||||||
|
|
||||||
### CVE-2024-23339 (2024-01-22)
|
### CVE-2024-23339 (2024-01-22)
|
||||||
|
|
||||||
|
@ -6634,7 +6635,11 @@
|
||||||
|
|
||||||
- [jackalkarlos/CVE-2024-46658](https://github.com/jackalkarlos/CVE-2024-46658)
|
- [jackalkarlos/CVE-2024-46658](https://github.com/jackalkarlos/CVE-2024-46658)
|
||||||
|
|
||||||
### CVE-2024-46901
|
### CVE-2024-46901 (2024-12-09)
|
||||||
|
|
||||||
|
<code>Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository.\n\nAll versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue.\n\nRepositories served via other access methods are not affected.
|
||||||
|
</code>
|
||||||
|
|
||||||
- [devhaozi/CVE-2024-46901](https://github.com/devhaozi/CVE-2024-46901)
|
- [devhaozi/CVE-2024-46901](https://github.com/devhaozi/CVE-2024-46901)
|
||||||
|
|
||||||
### CVE-2024-46986 (2024-09-18)
|
### CVE-2024-46986 (2024-09-18)
|
||||||
|
@ -11040,7 +11045,11 @@
|
||||||
|
|
||||||
- [Toxich4/CVE-2023-30459](https://github.com/Toxich4/CVE-2023-30459)
|
- [Toxich4/CVE-2023-30459](https://github.com/Toxich4/CVE-2023-30459)
|
||||||
|
|
||||||
### CVE-2023-30486
|
### CVE-2023-30486 (2024-12-09)
|
||||||
|
|
||||||
|
<code>Missing Authorization vulnerability in HashThemes Square allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Square: from n/a through 2.0.0.
|
||||||
|
</code>
|
||||||
|
|
||||||
- [RandomRobbieBF/CVE-2023-30486](https://github.com/RandomRobbieBF/CVE-2023-30486)
|
- [RandomRobbieBF/CVE-2023-30486](https://github.com/RandomRobbieBF/CVE-2023-30486)
|
||||||
|
|
||||||
### CVE-2023-30533 (2023-04-24)
|
### CVE-2023-30533 (2023-04-24)
|
||||||
|
@ -11390,7 +11399,11 @@
|
||||||
|
|
||||||
- [jmrcsnchz/CVE-2023-32073](https://github.com/jmrcsnchz/CVE-2023-32073)
|
- [jmrcsnchz/CVE-2023-32073](https://github.com/jmrcsnchz/CVE-2023-32073)
|
||||||
|
|
||||||
### CVE-2023-32117
|
### CVE-2023-32117 (2024-12-09)
|
||||||
|
|
||||||
|
<code>Missing Authorization vulnerability in SoftLab Integrate Google Drive allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Integrate Google Drive: from n/a through 1.1.99.
|
||||||
|
</code>
|
||||||
|
|
||||||
- [RandomRobbieBF/CVE-2023-32117](https://github.com/RandomRobbieBF/CVE-2023-32117)
|
- [RandomRobbieBF/CVE-2023-32117](https://github.com/RandomRobbieBF/CVE-2023-32117)
|
||||||
|
|
||||||
### CVE-2023-32162 (2023-09-06)
|
### CVE-2023-32162 (2023-09-06)
|
||||||
|
@ -36126,7 +36139,7 @@
|
||||||
<code>WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.
|
<code>WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [v0lck3r/CVE-2019-8943](https://github.com/v0lck3r/CVE-2019-8943)
|
- [oussama-rahali/CVE-2019-8943](https://github.com/oussama-rahali/CVE-2019-8943)
|
||||||
- [hadrian3689/wordpress_cropimage](https://github.com/hadrian3689/wordpress_cropimage)
|
- [hadrian3689/wordpress_cropimage](https://github.com/hadrian3689/wordpress_cropimage)
|
||||||
|
|
||||||
### CVE-2019-8956 (2019-04-01)
|
### CVE-2019-8956 (2019-04-01)
|
||||||
|
@ -48152,6 +48165,7 @@
|
||||||
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
|
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
|
||||||
- [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823)
|
- [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823)
|
||||||
- [0xl0k1/CVE-2012-1823](https://github.com/0xl0k1/CVE-2012-1823)
|
- [0xl0k1/CVE-2012-1823](https://github.com/0xl0k1/CVE-2012-1823)
|
||||||
|
- [Jimmy01240397/CVE-2012-1823-Analyze](https://github.com/Jimmy01240397/CVE-2012-1823-Analyze)
|
||||||
|
|
||||||
### CVE-2012-1831 (2012-07-05)
|
### CVE-2012-1831 (2012-07-05)
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue