mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/05/29 18:29:23
This commit is contained in:
parent
a494929755
commit
be36746863
45 changed files with 266 additions and 293 deletions
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 12,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -177,6 +177,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,8 +43,8 @@
|
|||
"description": "A tool for retrieving login credentials from Netwave IP cameras using a memory dump vulnerability (CVE-2018-17240)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-04T21:44:21Z",
|
||||
"updated_at": "2024-05-28T13:53:51Z",
|
||||
"pushed_at": "2024-05-29T08:32:02Z",
|
||||
"updated_at": "2024-05-29T12:18:35Z",
|
||||
"pushed_at": "2024-05-29T12:18:34Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2024-05-05T06:05:09Z",
|
||||
"updated_at": "2024-05-29T14:17:34Z",
|
||||
"pushed_at": "2022-12-11T10:44:39Z",
|
||||
"stargazers_count": 514,
|
||||
"watchers_count": 514,
|
||||
|
|
|
@ -2565,8 +2565,8 @@
|
|||
"description": "CVE-2018-6574-go-get-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T17:30:06Z",
|
||||
"updated_at": "2024-05-20T16:29:28Z",
|
||||
"pushed_at": "2024-05-20T16:29:25Z",
|
||||
"updated_at": "2024-05-29T17:55:04Z",
|
||||
"pushed_at": "2024-05-29T17:55:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "simple Python exploit using CVE-2018-7449 on embOS\/IP FTP Server v3.22",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-05T10:38:23Z",
|
||||
"updated_at": "2024-05-28T14:43:57Z",
|
||||
"updated_at": "2024-05-29T14:45:09Z",
|
||||
"pushed_at": "2023-05-08T08:18:48Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1566,10 +1566,10 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2024-05-29T09:10:13Z",
|
||||
"updated_at": "2024-05-29T16:21:33Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 889,
|
||||
"watchers_count": 889,
|
||||
"stargazers_count": 890,
|
||||
"watchers_count": 890,
|
||||
"has_discussions": false,
|
||||
"forks_count": 240,
|
||||
"allow_forking": true,
|
||||
|
@ -1578,7 +1578,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 240,
|
||||
"watchers": 889,
|
||||
"watchers": 890,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
|
File diff suppressed because one or more lines are too long
|
@ -43,10 +43,10 @@
|
|||
"description": "Proof of Concept for CVE-2019-18634",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T18:07:03Z",
|
||||
"updated_at": "2024-05-28T09:32:45Z",
|
||||
"updated_at": "2024-05-29T12:17:30Z",
|
||||
"pushed_at": "2021-09-12T02:55:24Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 201,
|
||||
"watchers": 202,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -109,10 +109,10 @@
|
|||
"description": "RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420)",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-23T02:52:31Z",
|
||||
"updated_at": "2024-05-25T09:46:29Z",
|
||||
"updated_at": "2024-05-29T17:01:39Z",
|
||||
"pushed_at": "2023-01-19T12:13:40Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -123,7 +123,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 133,
|
||||
"watchers": 134,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-23T19:07:18Z",
|
||||
"updated_at": "2024-05-13T02:02:12Z",
|
||||
"updated_at": "2024-05-29T13:16:45Z",
|
||||
"pushed_at": "2021-01-24T09:05:40Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2020-28032 (It's just a POP chain in WordPress < 5.5.2 for exploiting PHP Object Injection)",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-17T07:09:47Z",
|
||||
"updated_at": "2022-11-16T05:43:01Z",
|
||||
"updated_at": "2024-05-29T18:15:46Z",
|
||||
"pushed_at": "2021-11-17T07:43:54Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 807731524,
|
||||
"name": "CVE-2020-5377",
|
||||
"full_name": "c0d3cr4f73r\/CVE-2020-5377",
|
||||
"owner": {
|
||||
"login": "c0d3cr4f73r",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c0d3cr4f73r\/CVE-2020-5377",
|
||||
"description": "CVE-2020-5377: Dell OpenManage Server Administrator File Read",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-29T17:01:16Z",
|
||||
"updated_at": "2024-05-29T17:21:00Z",
|
||||
"pushed_at": "2024-05-29T17:20:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -71,35 +71,5 @@
|
|||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 693348964,
|
||||
"name": "CVE-2020-5844-exploit",
|
||||
"full_name": "1Gould\/CVE-2020-5844-exploit",
|
||||
"owner": {
|
||||
"login": "1Gould",
|
||||
"id": 7574362,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7574362?v=4",
|
||||
"html_url": "https:\/\/github.com\/1Gould"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1Gould\/CVE-2020-5844-exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-18T21:14:30Z",
|
||||
"updated_at": "2023-09-18T21:20:08Z",
|
||||
"pushed_at": "2023-09-18T21:34:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 692936858,
|
||||
"name": "CVE-2020-5847-exploit",
|
||||
"full_name": "1Gould\/CVE-2020-5847-exploit",
|
||||
"owner": {
|
||||
"login": "1Gould",
|
||||
"id": 7574362,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7574362?v=4",
|
||||
"html_url": "https:\/\/github.com\/1Gould"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1Gould\/CVE-2020-5847-exploit",
|
||||
"description": "CVE-2020-5847 exploit written in python",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-18T02:19:38Z",
|
||||
"updated_at": "2023-09-18T02:34:10Z",
|
||||
"pushed_at": "2023-10-16T19:34:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -301,10 +301,10 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2024-05-21T11:16:14Z",
|
||||
"updated_at": "2024-05-29T16:15:53Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 973,
|
||||
"watchers_count": 973,
|
||||
"stargazers_count": 972,
|
||||
"watchers_count": 972,
|
||||
"has_discussions": false,
|
||||
"forks_count": 231,
|
||||
"allow_forking": true,
|
||||
|
@ -313,7 +313,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 231,
|
||||
"watchers": 973,
|
||||
"watchers": 972,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-20T22:16:49Z",
|
||||
"updated_at": "2024-05-21T17:02:49Z",
|
||||
"updated_at": "2024-05-29T17:01:46Z",
|
||||
"pushed_at": "2022-01-16T02:09:46Z",
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 202,
|
||||
"watchers": 203,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -242,35 +242,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 805918438,
|
||||
"name": "SamuelTulach_voidmap",
|
||||
"full_name": "SultanPLX\/SamuelTulach_voidmap",
|
||||
"owner": {
|
||||
"login": "SultanPLX",
|
||||
"id": 170830154,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170830154?v=4",
|
||||
"html_url": "https:\/\/github.com\/SultanPLX"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SultanPLX\/SamuelTulach_voidmap",
|
||||
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-25T20:58:26Z",
|
||||
"updated_at": "2024-05-25T20:58:31Z",
|
||||
"pushed_at": "2024-05-25T20:58:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -4980,7 +4980,7 @@
|
|||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -4993,7 +4993,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"forks": 19,
|
||||
"watchers": 74,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
|
|
|
@ -583,10 +583,10 @@
|
|||
"description": "Bash script to check for CVE-2022-0847 \"Dirty Pipe\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T17:13:24Z",
|
||||
"updated_at": "2024-04-24T21:24:05Z",
|
||||
"updated_at": "2024-05-29T12:39:24Z",
|
||||
"pushed_at": "2023-06-14T23:25:46Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -595,7 +595,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1190,13 +1190,13 @@
|
|||
"stargazers_count": 514,
|
||||
"watchers_count": 514,
|
||||
"has_discussions": false,
|
||||
"forks_count": 137,
|
||||
"forks_count": 138,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 137,
|
||||
"forks": 138,
|
||||
"watchers": 514,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
|
|
|
@ -913,10 +913,10 @@
|
|||
"description": "CVE-2022-22947 memshell",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-18T07:17:17Z",
|
||||
"updated_at": "2024-05-04T12:03:26Z",
|
||||
"updated_at": "2024-05-29T12:46:10Z",
|
||||
"pushed_at": "2022-03-18T07:17:45Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -929,7 +929,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 14,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-28T09:51:41Z",
|
||||
"updated_at": "2024-05-20T07:13:23Z",
|
||||
"updated_at": "2024-05-29T16:36:38Z",
|
||||
"pushed_at": "2022-11-18T15:47:17Z",
|
||||
"stargazers_count": 527,
|
||||
"watchers_count": 527,
|
||||
"stargazers_count": 528,
|
||||
"watchers_count": 528,
|
||||
"has_discussions": false,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 527,
|
||||
"watchers": 528,
|
||||
"score": 0,
|
||||
"subscribers_count": 47
|
||||
},
|
||||
|
|
|
@ -336,35 +336,5 @@
|
|||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 805918361,
|
||||
"name": "SamuelTulach_nullmap",
|
||||
"full_name": "SultanPLX\/SamuelTulach_nullmap",
|
||||
"owner": {
|
||||
"login": "SultanPLX",
|
||||
"id": 170830154,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170830154?v=4",
|
||||
"html_url": "https:\/\/github.com\/SultanPLX"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SultanPLX\/SamuelTulach_nullmap",
|
||||
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-25T20:58:11Z",
|
||||
"updated_at": "2024-05-25T20:58:16Z",
|
||||
"pushed_at": "2024-05-25T20:58:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -343,10 +343,10 @@
|
|||
"description": "Atlassian Confluence - Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-23T10:55:28Z",
|
||||
"updated_at": "2024-03-19T20:19:21Z",
|
||||
"updated_at": "2024-05-29T16:58:07Z",
|
||||
"pushed_at": "2024-01-23T11:30:10Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -355,7 +355,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -586,10 +586,10 @@
|
|||
"description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-26T02:34:44Z",
|
||||
"updated_at": "2024-05-29T09:12:03Z",
|
||||
"updated_at": "2024-05-29T13:30:08Z",
|
||||
"pushed_at": "2024-04-24T02:34:16Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -598,7 +598,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -253,8 +253,8 @@
|
|||
"description": "CVE-2023-29489-XSS",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-01T18:13:17Z",
|
||||
"updated_at": "2024-05-28T08:41:07Z",
|
||||
"pushed_at": "2024-05-28T08:41:04Z",
|
||||
"updated_at": "2024-05-29T14:16:23Z",
|
||||
"pushed_at": "2024-05-29T14:16:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -73,19 +73,19 @@
|
|||
"description": "Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T15:10:12Z",
|
||||
"updated_at": "2024-05-29T10:13:02Z",
|
||||
"updated_at": "2024-05-29T18:28:22Z",
|
||||
"pushed_at": "2024-05-28T15:10:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-01T02:17:20Z",
|
||||
"updated_at": "2024-05-28T16:29:28Z",
|
||||
"updated_at": "2024-05-29T14:37:41Z",
|
||||
"pushed_at": "2023-06-04T12:19:12Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-05T16:33:32Z",
|
||||
"updated_at": "2024-05-14T23:44:40Z",
|
||||
"updated_at": "2024-05-29T17:03:20Z",
|
||||
"pushed_at": "2023-11-24T12:55:00Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-17T10:32:31Z",
|
||||
"updated_at": "2024-05-27T18:11:07Z",
|
||||
"updated_at": "2024-05-29T16:29:28Z",
|
||||
"pushed_at": "2023-11-21T10:45:58Z",
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 186,
|
||||
"watchers": 187,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
32
2023/CVE-2023-43622.json
Normal file
32
2023/CVE-2023-43622.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 807622468,
|
||||
"name": "CVE-2023-43622",
|
||||
"full_name": "visudade\/CVE-2023-43622",
|
||||
"owner": {
|
||||
"login": "visudade",
|
||||
"id": 49928261,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49928261?v=4",
|
||||
"html_url": "https:\/\/github.com\/visudade"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/visudade\/CVE-2023-43622",
|
||||
"description": "CVE-2023–43622",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-29T13:04:29Z",
|
||||
"updated_at": "2024-05-29T13:19:21Z",
|
||||
"pushed_at": "2024-05-29T13:19:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-05-29T12:13:29Z",
|
||||
"pushed_at": "2024-05-27T04:30:54Z",
|
||||
"stargazers_count": 746,
|
||||
"watchers_count": 746,
|
||||
"updated_at": "2024-05-29T18:14:28Z",
|
||||
"pushed_at": "2024-05-29T14:55:57Z",
|
||||
"stargazers_count": 748,
|
||||
"watchers_count": 748,
|
||||
"has_discussions": false,
|
||||
"forks_count": 129,
|
||||
"forks_count": 132,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 129,
|
||||
"watchers": 746,
|
||||
"forks": 132,
|
||||
"watchers": 748,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -723,5 +723,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 807674683,
|
||||
"name": "honeypot.rs",
|
||||
"full_name": "mranv\/honeypot.rs",
|
||||
"owner": {
|
||||
"login": "mranv",
|
||||
"id": 61981861,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61981861?v=4",
|
||||
"html_url": "https:\/\/github.com\/mranv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mranv\/honeypot.rs",
|
||||
"description": " CVE-2023-46604 (Apache ActiveMQ RCE Vulnerability) and focused on getting Indicators of Compromise.",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-29T14:56:41Z",
|
||||
"updated_at": "2024-05-29T18:18:22Z",
|
||||
"pushed_at": "2024-05-29T18:18:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-16T17:41:59Z",
|
||||
"updated_at": "2024-05-09T03:08:28Z",
|
||||
"updated_at": "2024-05-29T16:36:38Z",
|
||||
"pushed_at": "2023-11-16T17:44:39Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-13T20:26:59Z",
|
||||
"updated_at": "2024-05-15T06:21:59Z",
|
||||
"updated_at": "2024-05-29T16:58:18Z",
|
||||
"pushed_at": "2024-02-06T23:22:31Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -39,7 +39,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-21345",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-26T16:38:17Z",
|
||||
"updated_at": "2024-05-23T06:50:44Z",
|
||||
"updated_at": "2024-05-29T16:21:56Z",
|
||||
"pushed_at": "2024-04-26T16:39:48Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T14:34:09Z",
|
||||
"updated_at": "2024-05-29T10:35:01Z",
|
||||
"updated_at": "2024-05-29T14:28:38Z",
|
||||
"pushed_at": "2024-05-21T11:56:19Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-26T19:00:03Z",
|
||||
"updated_at": "2024-05-22T22:03:20Z",
|
||||
"updated_at": "2024-05-29T16:57:52Z",
|
||||
"pushed_at": "2024-02-29T12:13:21Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2024-05-29T11:53:34Z",
|
||||
"updated_at": "2024-05-29T17:15:04Z",
|
||||
"pushed_at": "2024-05-28T03:19:34Z",
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 139,
|
||||
"watchers": 149,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -1012,10 +1012,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-05-29T11:30:35Z",
|
||||
"updated_at": "2024-05-29T14:58:48Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3470,
|
||||
"watchers_count": 3470,
|
||||
"stargazers_count": 3471,
|
||||
"watchers_count": 3471,
|
||||
"has_discussions": false,
|
||||
"forks_count": 232,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,7 +1024,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 232,
|
||||
"watchers": 3470,
|
||||
"watchers": 3471,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
|
@ -73,12 +73,12 @@
|
|||
"description": "Exploit PoC for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T19:33:08Z",
|
||||
"updated_at": "2024-05-29T02:35:37Z",
|
||||
"updated_at": "2024-05-29T18:14:16Z",
|
||||
"pushed_at": "2024-05-19T07:12:00Z",
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"stargazers_count": 289,
|
||||
"watchers_count": 289,
|
||||
"has_discussions": false,
|
||||
"forks_count": 81,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -89,8 +89,8 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 81,
|
||||
"watchers": 277,
|
||||
"forks": 83,
|
||||
"watchers": 289,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -108,19 +108,19 @@
|
|||
"description": "Hook for the PoC for exploiting CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T19:35:44Z",
|
||||
"updated_at": "2024-05-28T12:52:10Z",
|
||||
"updated_at": "2024-05-29T13:47:51Z",
|
||||
"pushed_at": "2024-05-19T06:30:05Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 7,
|
||||
"forks": 13,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T10:02:23Z",
|
||||
"updated_at": "2024-05-29T11:15:20Z",
|
||||
"updated_at": "2024-05-29T14:51:53Z",
|
||||
"pushed_at": "2024-05-23T10:07:41Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "CVE-2024-4956 : Nexus Repository Manager 3 poc exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-28T15:05:31Z",
|
||||
"updated_at": "2024-05-29T11:54:29Z",
|
||||
"updated_at": "2024-05-29T15:04:38Z",
|
||||
"pushed_at": "2024-05-29T11:54:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -223,10 +223,10 @@
|
|||
"description": "Proof-Of-Concept (POC) for CVE-2024-4956",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-28T21:20:53Z",
|
||||
"updated_at": "2024-05-29T07:38:55Z",
|
||||
"updated_at": "2024-05-29T15:04:40Z",
|
||||
"pushed_at": "2024-05-29T07:37:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T20:04:10Z",
|
||||
"updated_at": "2024-05-28T12:30:54Z",
|
||||
"updated_at": "2024-05-29T15:05:52Z",
|
||||
"pushed_at": "2024-05-28T12:30:51Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
31
README.md
31
README.md
|
@ -2308,7 +2308,11 @@
|
|||
|
||||
- [Gr-1m/CVE-2024-34958-1](https://github.com/Gr-1m/CVE-2024-34958-1)
|
||||
|
||||
### CVE-2024-35333
|
||||
### CVE-2024-35333 (-)
|
||||
|
||||
<code>A stack-buffer-overflow vulnerability exists in the read_charset_decl function of html2xhtml 1.3. This vulnerability occurs due to improper bounds checking when copying data into a fixed-size stack buffer. An attacker can exploit this vulnerability by providing a specially crafted input to the vulnerable function, causing a buffer overflow and potentially leading to arbitrary code execution, denial of service, or data corruption.
|
||||
</code>
|
||||
|
||||
- [momo1239/CVE-2024-35333](https://github.com/momo1239/CVE-2024-35333)
|
||||
|
||||
### CVE-2024-35475 (-)
|
||||
|
@ -4119,7 +4123,6 @@
|
|||
- [Rosayxy/Recreate-cve-2023-21768](https://github.com/Rosayxy/Recreate-cve-2023-21768)
|
||||
- [Ha0-Y/CVE-2023-21768](https://github.com/Ha0-Y/CVE-2023-21768)
|
||||
- [xboxoneresearch/CVE-2023-21768-dotnet](https://github.com/xboxoneresearch/CVE-2023-21768-dotnet)
|
||||
- [SultanPLX/SamuelTulach_nullmap](https://github.com/SultanPLX/SamuelTulach_nullmap)
|
||||
|
||||
### CVE-2023-21823 (2023-02-14)
|
||||
|
||||
|
@ -8423,6 +8426,13 @@
|
|||
|
||||
- [Mr-xn/CVE-2023-43482](https://github.com/Mr-xn/CVE-2023-43482)
|
||||
|
||||
### CVE-2023-43622 (2023-10-23)
|
||||
|
||||
<code>An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern.\nThis has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout.\n\nThis issue affects Apache HTTP Server: from 2.4.55 through 2.4.57.\n\nUsers are recommended to upgrade to version 2.4.58, which fixes the issue.\n\n
|
||||
</code>
|
||||
|
||||
- [visudade/CVE-2023-43622](https://github.com/visudade/CVE-2023-43622)
|
||||
|
||||
### CVE-2023-43654 (2023-09-28)
|
||||
|
||||
<code>TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper input validation, enabling third parties to invoke remote HTTP download requests and write files to the disk. This issue could be taken advantage of to compromise the integrity of the system and sensitive data. This issue is present in versions 0.1.0 to 0.8.1. A user is able to load the model of their choice from any URL that they would like to use. The user of TorchServe is responsible for configuring both the allowed_urls and specifying the model URL to be used. A pull request to warn the user when the default value for allowed_urls is used has been merged in PR #2534. TorchServe release 0.8.2 includes this change. Users are advised to upgrade. There are no known workarounds for this issue.
|
||||
|
@ -9053,6 +9063,7 @@
|
|||
- [Arlenhiack/ActiveMQ-RCE-Exploit](https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit)
|
||||
- [vulncheck-oss/cve-2023-46604](https://github.com/vulncheck-oss/cve-2023-46604)
|
||||
- [thinkycx/activemq-rce-cve-2023-46604](https://github.com/thinkycx/activemq-rce-cve-2023-46604)
|
||||
- [mranv/honeypot.rs](https://github.com/mranv/honeypot.rs)
|
||||
|
||||
### CVE-2023-46615 (2024-02-12)
|
||||
|
||||
|
@ -21194,7 +21205,6 @@
|
|||
- [BL0odz/CVE-2021-40449-NtGdiResetDC-UAF](https://github.com/BL0odz/CVE-2021-40449-NtGdiResetDC-UAF)
|
||||
- [SamuelTulach/voidmap](https://github.com/SamuelTulach/voidmap)
|
||||
- [toanthang1842002/CVE-2021-40449](https://github.com/toanthang1842002/CVE-2021-40449)
|
||||
- [SultanPLX/SamuelTulach_voidmap](https://github.com/SultanPLX/SamuelTulach_voidmap)
|
||||
|
||||
### CVE-2021-40492 (2021-09-03)
|
||||
|
||||
|
@ -24656,6 +24666,7 @@
|
|||
</code>
|
||||
|
||||
- [und3sc0n0c1d0/AFR-in-OMSA](https://github.com/und3sc0n0c1d0/AFR-in-OMSA)
|
||||
- [c0d3cr4f73r/CVE-2020-5377](https://github.com/c0d3cr4f73r/CVE-2020-5377)
|
||||
|
||||
### CVE-2020-5398 (2020-01-16)
|
||||
|
||||
|
@ -24735,14 +24746,6 @@
|
|||
|
||||
- [TheCyberGeek/CVE-2020-5844](https://github.com/TheCyberGeek/CVE-2020-5844)
|
||||
- [UNICORDev/exploit-CVE-2020-5844](https://github.com/UNICORDev/exploit-CVE-2020-5844)
|
||||
- [1Gould/CVE-2020-5844-exploit](https://github.com/1Gould/CVE-2020-5844-exploit)
|
||||
|
||||
### CVE-2020-5847 (2020-03-16)
|
||||
|
||||
<code>Unraid through 6.8.0 allows Remote Code Execution.
|
||||
</code>
|
||||
|
||||
- [1Gould/CVE-2020-5847-exploit](https://github.com/1Gould/CVE-2020-5847-exploit)
|
||||
|
||||
### CVE-2020-5902 (2020-07-01)
|
||||
|
||||
|
@ -28954,7 +28957,7 @@
|
|||
|
||||
### CVE-2019-1125 (2019-09-03)
|
||||
|
||||
<code>An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.
|
||||
<code>An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries.\nTo exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further.\nOn January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125.\nMicrosoft released a security update on July 9, 2019 that addresses the vulnerability through a software change that mitigates how the CPU speculatively accesses memory. Note that this vulnerability does not require a microcode update from your device OEM.\n
|
||||
</code>
|
||||
|
||||
- [bitdefender/swapgs-attack-poc](https://github.com/bitdefender/swapgs-attack-poc)
|
||||
|
@ -28969,7 +28972,7 @@
|
|||
|
||||
### CVE-2019-1181 (2019-08-14)
|
||||
|
||||
<code>A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1182, CVE-2019-1222, CVE-2019-1226.
|
||||
<code>A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\nTo exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP.\nThe update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.\n
|
||||
</code>
|
||||
|
||||
- [major203/cve-2019-1181](https://github.com/major203/cve-2019-1181)
|
||||
|
@ -28983,7 +28986,7 @@
|
|||
|
||||
### CVE-2019-1218 (2019-08-14)
|
||||
|
||||
<code>A spoofing vulnerability exists in the way Microsoft Outlook iOS software parses specifically crafted email messages, aka 'Outlook iOS Spoofing Vulnerability'.
|
||||
<code>A spoofing vulnerability exists in the way Microsoft Outlook iOS software parses specifically crafted email messages. An authenticated attacker could exploit the vulnerability by sending a specially crafted email message to a victim.\nThe attacker who successfully exploited this vulnerability could then perform cross-site scripting attacks on the affected systems and run scripts in the security context of the current user.\nThe security update addresses the vulnerability by correcting how Outlook iOS parses specially crafted email messages.\n
|
||||
</code>
|
||||
|
||||
- [d0gukank/CVE-2019-1218](https://github.com/d0gukank/CVE-2019-1218)
|
||||
|
|
Loading…
Reference in a new issue