mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/06/11 00:29:13
This commit is contained in:
parent
95337c03aa
commit
bef6bc6d0a
22 changed files with 77 additions and 71 deletions
|
@ -363,19 +363,19 @@
|
|||
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-17T15:38:15Z",
|
||||
"updated_at": "2024-05-22T01:17:24Z",
|
||||
"updated_at": "2024-06-10T19:00:59Z",
|
||||
"pushed_at": "2018-04-26T15:40:28Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 121,
|
||||
"forks": 64,
|
||||
"watchers": 122,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -62,14 +62,14 @@
|
|||
{
|
||||
"id": 766075527,
|
||||
"name": "CVE-2019-1663",
|
||||
"full_name": "Oraxiage\/CVE-2019-1663",
|
||||
"full_name": "abrumsen\/CVE-2019-1663",
|
||||
"owner": {
|
||||
"login": "Oraxiage",
|
||||
"login": "abrumsen",
|
||||
"id": 106036263,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106036263?v=4",
|
||||
"html_url": "https:\/\/github.com\/Oraxiage"
|
||||
"html_url": "https:\/\/github.com\/abrumsen"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Oraxiage\/CVE-2019-1663",
|
||||
"html_url": "https:\/\/github.com\/abrumsen\/CVE-2019-1663",
|
||||
"description": "Exploiting the pre-authentication code execution vulnerability found on RV130 cisco routers in 2019.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-02T09:15:26Z",
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 10,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
"subscribers_count": 36
|
||||
},
|
||||
{
|
||||
"id": 320642790,
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 24,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 245688871,
|
||||
|
|
|
@ -57,6 +57,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2024-05-26T14:45:16Z",
|
||||
"updated_at": "2024-06-10T19:47:15Z",
|
||||
"pushed_at": "2024-04-02T02:48:18Z",
|
||||
"stargazers_count": 394,
|
||||
"watchers_count": 394,
|
||||
"stargazers_count": 393,
|
||||
"watchers_count": 393,
|
||||
"has_discussions": false,
|
||||
"forks_count": 132,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 132,
|
||||
"watchers": 394,
|
||||
"watchers": 393,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -33,6 +33,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -34,6 +34,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -34,6 +34,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -34,6 +34,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -34,6 +34,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -10,10 +10,10 @@
|
|||
"html_url": "https:\/\/github.com\/xcanwin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xcanwin\/CVE-2023-4357-Chrome-XXE",
|
||||
"description": "全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
|
||||
"description": "[漏洞复现] 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-17T10:32:31Z",
|
||||
"updated_at": "2024-05-29T16:29:28Z",
|
||||
"updated_at": "2024-06-10T22:12:18Z",
|
||||
"pushed_at": "2023-11-21T10:45:58Z",
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
|
@ -22,7 +22,9 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve-2023-4357"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 187,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-06-10T13:51:04Z",
|
||||
"updated_at": "2024-06-10T22:33:04Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2093,
|
||||
"watchers_count": 2093,
|
||||
"stargazers_count": 2094,
|
||||
"watchers_count": 2094,
|
||||
"has_discussions": false,
|
||||
"forks_count": 268,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 268,
|
||||
"watchers": 2093,
|
||||
"watchers": 2094,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T15:17:59Z",
|
||||
"updated_at": "2024-06-10T02:34:29Z",
|
||||
"updated_at": "2024-06-10T19:08:59Z",
|
||||
"pushed_at": "2024-02-19T20:00:35Z",
|
||||
"stargazers_count": 630,
|
||||
"watchers_count": 630,
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"has_discussions": false,
|
||||
"forks_count": 140,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 140,
|
||||
"watchers": 630,
|
||||
"watchers": 629,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T17:02:03Z",
|
||||
"updated_at": "2024-06-10T17:17:47Z",
|
||||
"updated_at": "2024-06-11T00:07:25Z",
|
||||
"pushed_at": "2024-06-10T17:17:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -50,10 +50,10 @@
|
|||
"description": "Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-03T19:08:24Z",
|
||||
"updated_at": "2024-06-10T12:07:31Z",
|
||||
"updated_at": "2024-06-10T19:47:07Z",
|
||||
"pushed_at": "2024-06-03T19:20:10Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T06:12:20Z",
|
||||
"updated_at": "2024-06-10T18:27:27Z",
|
||||
"updated_at": "2024-06-11T00:06:34Z",
|
||||
"pushed_at": "2024-06-10T07:53:44Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 31,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T05:50:23Z",
|
||||
"updated_at": "2024-06-10T11:50:04Z",
|
||||
"updated_at": "2024-06-11T00:15:09Z",
|
||||
"pushed_at": "2024-06-07T11:49:08Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 60,
|
||||
"watchers": 62,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -163,19 +163,19 @@
|
|||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:52:54Z",
|
||||
"updated_at": "2024-06-10T15:44:42Z",
|
||||
"updated_at": "2024-06-10T20:10:39Z",
|
||||
"pushed_at": "2024-06-07T09:53:15Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 85,
|
||||
"forks": 20,
|
||||
"watchers": 87,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -527,15 +527,15 @@
|
|||
"html_url": "https:\/\/github.com\/xcanwin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xcanwin\/CVE-2024-4577-PHP-RCE",
|
||||
"description": "全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP,共享原创EXP,支持SSRF,支持绕过WAF。The world's first CVE-2024-4577 PHP-CGI RCE exploit utilizing the default PHP environment. Sharing original exploit, supports SSRF, supports WAF bypass.",
|
||||
"description": "[漏洞复现] 全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP,共享原创EXP,支持SSRF,支持绕过WAF。The world's first CVE-2024-4577 PHP-CGI RCE exploit utilizing the default PHP environment. Sharing original exploit, supports SSRF, supports WAF bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-08T13:04:45Z",
|
||||
"updated_at": "2024-06-10T18:20:28Z",
|
||||
"pushed_at": "2024-06-10T17:50:22Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"updated_at": "2024-06-11T00:12:13Z",
|
||||
"pushed_at": "2024-06-10T18:46:40Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -549,8 +549,8 @@
|
|||
"xampp"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 42,
|
||||
"forks": 9,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -372,13 +372,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -2574,7 +2574,11 @@
|
|||
### CVE-2024-36821
|
||||
- [IvanGlinkin/CVE-2024-36821](https://github.com/IvanGlinkin/CVE-2024-36821)
|
||||
|
||||
### CVE-2024-37393
|
||||
### CVE-2024-37393 (2024-06-10)
|
||||
|
||||
<code>Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature.
|
||||
</code>
|
||||
|
||||
- [optistream/securenvoy-cve-2024-37393](https://github.com/optistream/securenvoy-cve-2024-37393)
|
||||
|
||||
### CVE-2024-65230
|
||||
|
@ -29522,7 +29526,7 @@
|
|||
|
||||
- [StealYourCode/CVE-2019-1663](https://github.com/StealYourCode/CVE-2019-1663)
|
||||
- [e180175/CVE-2019-1663-vuln](https://github.com/e180175/CVE-2019-1663-vuln)
|
||||
- [Oraxiage/CVE-2019-1663](https://github.com/Oraxiage/CVE-2019-1663)
|
||||
- [abrumsen/CVE-2019-1663](https://github.com/abrumsen/CVE-2019-1663)
|
||||
|
||||
### CVE-2019-1759 (2019-03-27)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue