mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2024/09/15 12:29:56
This commit is contained in:
parent
5ecd0cd44f
commit
c09fdb1a58
26 changed files with 209 additions and 69 deletions
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"forks": 110,
|
||||
"watchers": 340,
|
||||
"score": 0,
|
||||
"subscribers_count": 48
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"forks": 110,
|
||||
"watchers": 340,
|
||||
"score": 0,
|
||||
"subscribers_count": 48
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A coordinated disclosure and security advisory on Fermax Intercom DTML Injection vulneraiblity. Special thanks to Fermax International for prompt responses and allowing details to be publicized.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-20T07:20:50Z",
|
||||
"updated_at": "2024-09-14T07:20:23Z",
|
||||
"updated_at": "2024-09-15T10:11:01Z",
|
||||
"pushed_at": "2020-07-30T19:15:08Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T10:12:44Z",
|
||||
"updated_at": "2024-09-15T03:06:04Z",
|
||||
"updated_at": "2024-09-15T08:18:14Z",
|
||||
"pushed_at": "2019-02-08T12:38:05Z",
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 223,
|
||||
"watchers": 224,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T06:22:40Z",
|
||||
"updated_at": "2024-09-07T09:57:51Z",
|
||||
"updated_at": "2024-09-15T10:16:59Z",
|
||||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 206,
|
||||
"watchers": 207,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2024-09-12T09:52:10Z",
|
||||
"updated_at": "2024-09-15T10:15:11Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1828,
|
||||
"watchers_count": 1828,
|
||||
"stargazers_count": 1829,
|
||||
"watchers_count": 1829,
|
||||
"has_discussions": false,
|
||||
"forks_count": 582,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 582,
|
||||
"watchers": 1828,
|
||||
"watchers": 1829,
|
||||
"score": 0,
|
||||
"subscribers_count": 44
|
||||
},
|
||||
|
@ -301,10 +301,10 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2024-09-10T03:31:59Z",
|
||||
"updated_at": "2024-09-15T10:16:20Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 998,
|
||||
"watchers_count": 998,
|
||||
"stargazers_count": 999,
|
||||
"watchers_count": 999,
|
||||
"has_discussions": false,
|
||||
"forks_count": 231,
|
||||
"allow_forking": true,
|
||||
|
@ -313,7 +313,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 231,
|
||||
"watchers": 998,
|
||||
"watchers": 999,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
"vulnerabilities"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"forks": 17,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-09-15T04:39:00Z",
|
||||
"updated_at": "2024-09-15T11:17:18Z",
|
||||
"pushed_at": "2024-08-01T15:09:15Z",
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"has_discussions": true,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 257,
|
||||
"watchers": 258,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE exploit for CVE-2023-36802",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T17:32:15Z",
|
||||
"updated_at": "2024-08-31T19:35:14Z",
|
||||
"updated_at": "2024-09-15T12:17:03Z",
|
||||
"pushed_at": "2023-10-10T17:44:17Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -148,5 +148,35 @@
|
|||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 857700493,
|
||||
"name": "WordPress-Exploit-CVE-2024-1071",
|
||||
"full_name": "Dogu589\/WordPress-Exploit-CVE-2024-1071",
|
||||
"owner": {
|
||||
"login": "Dogu589",
|
||||
"id": 73641405,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73641405?v=4",
|
||||
"html_url": "https:\/\/github.com\/Dogu589"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Dogu589\/WordPress-Exploit-CVE-2024-1071",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-15T11:28:47Z",
|
||||
"updated_at": "2024-09-15T12:29:00Z",
|
||||
"pushed_at": "2024-09-15T12:28:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 28,
|
||||
"watchers": 125,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 4
|
||||
}
|
||||
]
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
"cve-2024-20767"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 33,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"forks": 32,
|
||||
"watchers": 148,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -268,5 +268,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 857714170,
|
||||
"name": "CVE-2024-23692",
|
||||
"full_name": "verylazytech\/CVE-2024-23692",
|
||||
"owner": {
|
||||
"login": "verylazytech",
|
||||
"id": 172168670,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
|
||||
"html_url": "https:\/\/github.com\/verylazytech"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-23692",
|
||||
"description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-15T12:15:35Z",
|
||||
"updated_at": "2024-09-15T12:30:15Z",
|
||||
"pushed_at": "2024-09-15T12:30:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -256,10 +256,10 @@
|
|||
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-27T19:34:48Z",
|
||||
"updated_at": "2024-09-05T08:36:04Z",
|
||||
"updated_at": "2024-09-15T08:12:18Z",
|
||||
"pushed_at": "2024-03-16T07:55:41Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -272,7 +272,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -910,7 +910,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-02T08:19:50Z",
|
||||
"updated_at": "2024-06-02T15:37:49Z",
|
||||
"updated_at": "2024-09-15T08:14:14Z",
|
||||
"pushed_at": "2024-06-02T08:24:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
"subscribers_count": 11
|
||||
}
|
||||
]
|
32
2024/CVE-2024-27564.json
Normal file
32
2024/CVE-2024-27564.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 857682897,
|
||||
"name": "SSRF-Exploit-CVE-2024-27564",
|
||||
"full_name": "MuhammadWaseem29\/SSRF-Exploit-CVE-2024-27564",
|
||||
"owner": {
|
||||
"login": "MuhammadWaseem29",
|
||||
"id": 161931698,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161931698?v=4",
|
||||
"html_url": "https:\/\/github.com\/MuhammadWaseem29"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MuhammadWaseem29\/SSRF-Exploit-CVE-2024-27564",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-15T10:25:01Z",
|
||||
"updated_at": "2024-09-15T11:55:28Z",
|
||||
"pushed_at": "2024-09-15T11:55:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -57,6 +57,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Ivanti EPM AgentPortal RCE Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-13T14:02:04Z",
|
||||
"updated_at": "2024-09-15T04:14:57Z",
|
||||
"updated_at": "2024-09-15T11:39:02Z",
|
||||
"pushed_at": "2024-09-13T14:02:30Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -256,10 +256,10 @@
|
|||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T18:25:46Z",
|
||||
"updated_at": "2024-09-15T01:21:55Z",
|
||||
"updated_at": "2024-09-15T07:47:50Z",
|
||||
"pushed_at": "2024-08-27T12:22:39Z",
|
||||
"stargazers_count": 569,
|
||||
"watchers_count": 569,
|
||||
"stargazers_count": 570,
|
||||
"watchers_count": 570,
|
||||
"has_discussions": false,
|
||||
"forks_count": 103,
|
||||
"allow_forking": true,
|
||||
|
@ -268,7 +268,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"watchers": 569,
|
||||
"watchers": 570,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
32
2024/CVE-2024-38127.json
Normal file
32
2024/CVE-2024-38127.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 857638218,
|
||||
"name": "CVE-2024-38127",
|
||||
"full_name": "pwndorei\/CVE-2024-38127",
|
||||
"owner": {
|
||||
"login": "pwndorei",
|
||||
"id": 96749184,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96749184?v=4",
|
||||
"html_url": "https:\/\/github.com\/pwndorei"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pwndorei\/CVE-2024-38127",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-15T07:38:44Z",
|
||||
"updated_at": "2024-09-15T08:07:47Z",
|
||||
"pushed_at": "2024-09-15T07:39:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-08-30T17:24:58Z",
|
||||
"updated_at": "2024-09-13T13:48:23Z",
|
||||
"updated_at": "2024-09-15T09:16:35Z",
|
||||
"pushed_at": "2024-08-31T19:25:38Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Makes IDA (most versions) to crash upon opening it. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-25T12:33:14Z",
|
||||
"updated_at": "2024-09-15T04:29:46Z",
|
||||
"updated_at": "2024-09-15T08:04:44Z",
|
||||
"pushed_at": "2024-08-30T09:58:12Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-14T06:27:11Z",
|
||||
"updated_at": "2024-09-15T04:48:54Z",
|
||||
"updated_at": "2024-09-15T12:24:26Z",
|
||||
"pushed_at": "2024-09-14T06:32:51Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,8 +25,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
16
README.md
16
README.md
|
@ -271,6 +271,7 @@
|
|||
- [Matrexdz/CVE-2024-1071](https://github.com/Matrexdz/CVE-2024-1071)
|
||||
- [Matrexdz/CVE-2024-1071-Docker](https://github.com/Matrexdz/CVE-2024-1071-Docker)
|
||||
- [fa-rrel/CVE-2024-1071-SQL-Injection](https://github.com/fa-rrel/CVE-2024-1071-SQL-Injection)
|
||||
- [Dogu589/WordPress-Exploit-CVE-2024-1071](https://github.com/Dogu589/WordPress-Exploit-CVE-2024-1071)
|
||||
|
||||
### CVE-2024-1086 (2024-01-31)
|
||||
|
||||
|
@ -2078,6 +2079,7 @@
|
|||
- [BBD-YZZ/CVE-2024-23692](https://github.com/BBD-YZZ/CVE-2024-23692)
|
||||
- [0x20c/CVE-2024-23692-EXP](https://github.com/0x20c/CVE-2024-23692-EXP)
|
||||
- [pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692](https://github.com/pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692)
|
||||
- [verylazytech/CVE-2024-23692](https://github.com/verylazytech/CVE-2024-23692)
|
||||
|
||||
### CVE-2024-23705 (2024-05-07)
|
||||
|
||||
|
@ -2915,6 +2917,13 @@
|
|||
|
||||
- [secunnix/CVE-2024-27518](https://github.com/secunnix/CVE-2024-27518)
|
||||
|
||||
### CVE-2024-27564 (2024-03-05)
|
||||
|
||||
<code>A Server-Side Request Forgery (SSRF) in pictureproxy.php of ChatGPT commit f9f4bbc allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the urlparameter.
|
||||
</code>
|
||||
|
||||
- [MuhammadWaseem29/SSRF-Exploit-CVE-2024-27564](https://github.com/MuhammadWaseem29/SSRF-Exploit-CVE-2024-27564)
|
||||
|
||||
### CVE-2024-27619 (2024-03-29)
|
||||
|
||||
<code>Dlink Dir-3040us A1 1.20b03a hotfix is vulnerable to Buffer Overflow. Any user having read/write access to ftp server can write directly to ram causing buffer overflow if file or files uploaded are greater than available ram. Ftp server allows change of directory to root which is one level up than root of usb flash directory. During upload ram is getting filled and causing system resource exhaustion (no free memory) which causes system to crash and reboot.
|
||||
|
@ -4374,6 +4383,13 @@
|
|||
|
||||
- [Florian-Hoth/CVE-2024-38100-RCE-POC](https://github.com/Florian-Hoth/CVE-2024-38100-RCE-POC)
|
||||
|
||||
### CVE-2024-38127 (2024-08-13)
|
||||
|
||||
<code>Windows Hyper-V Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [pwndorei/CVE-2024-38127](https://github.com/pwndorei/CVE-2024-38127)
|
||||
|
||||
### CVE-2024-38189 (2024-08-13)
|
||||
|
||||
<code>Microsoft Project Remote Code Execution Vulnerability
|
||||
|
|
Loading…
Add table
Reference in a new issue