mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 01:54:09 +01:00
Auto Update 2025/01/16 18:32:45
This commit is contained in:
parent
cb967ee197
commit
c31f3195a8
22 changed files with 268 additions and 130 deletions
|
@ -543,6 +543,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -250,36 +250,5 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 728154421,
|
||||
"name": "CVE-2020-25213",
|
||||
"full_name": "Nguyen-id\/CVE-2020-25213",
|
||||
"owner": {
|
||||
"login": "Nguyen-id",
|
||||
"id": 145361899,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145361899?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nguyen-id",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nguyen-id\/CVE-2020-25213",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-12-06T10:47:11Z",
|
||||
"updated_at": "2023-12-06T10:47:54Z",
|
||||
"pushed_at": "2023-12-06T10:47:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -29,42 +29,5 @@
|
|||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 808546624,
|
||||
"name": "jhviw.github.io",
|
||||
"full_name": "JHVIW\/jhviw.github.io",
|
||||
"owner": {
|
||||
"login": "JHVIW",
|
||||
"id": 37812681,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37812681?v=4",
|
||||
"html_url": "https:\/\/github.com\/JHVIW",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JHVIW\/jhviw.github.io",
|
||||
"description": "Results of my research I have done on CVE-2021-30481 and on wallhacks in the videogame Counter-Strike 2",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-31T09:43:39Z",
|
||||
"updated_at": "2025-01-16T01:26:56Z",
|
||||
"pushed_at": "2025-01-16T01:26:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cheats",
|
||||
"counter-strike-2",
|
||||
"cs2",
|
||||
"research-paper",
|
||||
"research-project"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -138,10 +138,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Exploiter",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-22T06:39:07Z",
|
||||
"updated_at": "2025-01-07T06:04:22Z",
|
||||
"updated_at": "2025-01-16T16:44:49Z",
|
||||
"pushed_at": "2023-01-12T09:05:52Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 448079716,
|
||||
"name": "CVE-2021-46071",
|
||||
"full_name": "plsanu\/CVE-2021-46071",
|
||||
"owner": {
|
||||
"login": "plsanu",
|
||||
"id": 61007700,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
|
||||
"html_url": "https:\/\/github.com\/plsanu",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46071",
|
||||
"description": "CVE-2021-46071 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Category List Section in login panel.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T19:09:36Z",
|
||||
"updated_at": "2023-12-30T08:24:20Z",
|
||||
"pushed_at": "2022-01-14T19:10:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -261,5 +261,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 917709059,
|
||||
"name": "CVE-2022-31814",
|
||||
"full_name": "Inplex-sys\/CVE-2022-31814",
|
||||
"owner": {
|
||||
"login": "Inplex-sys",
|
||||
"id": 69421356,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4",
|
||||
"html_url": "https:\/\/github.com\/Inplex-sys",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Inplex-sys\/CVE-2022-31814",
|
||||
"description": "Proof of concept for CVE-2022-31814",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T13:59:45Z",
|
||||
"updated_at": "2025-01-16T14:01:17Z",
|
||||
"pushed_at": "2025-01-16T14:01:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "u think that it doesnt but it do",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-15T00:29:38Z",
|
||||
"updated_at": "2024-10-29T11:15:07Z",
|
||||
"updated_at": "2025-01-16T16:17:49Z",
|
||||
"pushed_at": "2022-10-15T00:46:03Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-13T14:24:12Z",
|
||||
"updated_at": "2024-11-07T04:30:05Z",
|
||||
"updated_at": "2025-01-16T13:12:41Z",
|
||||
"pushed_at": "2022-10-13T15:25:00Z",
|
||||
"stargazers_count": 341,
|
||||
"watchers_count": 341,
|
||||
"stargazers_count": 342,
|
||||
"watchers_count": 342,
|
||||
"has_discussions": false,
|
||||
"forks_count": 90,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 90,
|
||||
"watchers": 341,
|
||||
"watchers": 342,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
@ -743,19 +743,19 @@
|
|||
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T06:54:15Z",
|
||||
"updated_at": "2025-01-16T12:17:09Z",
|
||||
"updated_at": "2025-01-16T16:33:35Z",
|
||||
"pushed_at": "2025-01-16T09:56:36Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"forks": 7,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -112,13 +112,13 @@
|
|||
"stargazers_count": 885,
|
||||
"watchers_count": 885,
|
||||
"has_discussions": false,
|
||||
"forks_count": 74,
|
||||
"forks_count": 75,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"forks": 75,
|
||||
"watchers": 885,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
|
|
|
@ -76,19 +76,19 @@
|
|||
"description": "GameOver(lay) Ubuntu Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T22:02:42Z",
|
||||
"updated_at": "2024-12-07T15:13:21Z",
|
||||
"updated_at": "2025-01-16T15:20:27Z",
|
||||
"pushed_at": "2023-10-09T22:44:21Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 120,
|
||||
"forks": 19,
|
||||
"watchers": 121,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Exploit for CVE-2023-27532 against Veeam Backup & Replication",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T16:08:43Z",
|
||||
"updated_at": "2024-12-23T19:54:11Z",
|
||||
"updated_at": "2025-01-16T18:21:07Z",
|
||||
"pushed_at": "2023-03-23T18:03:27Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering them ineffective, working for both x32 and x64(CVE-2023-44976).",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-01T18:24:38Z",
|
||||
"updated_at": "2025-01-13T16:43:49Z",
|
||||
"updated_at": "2025-01-16T13:36:24Z",
|
||||
"pushed_at": "2024-12-26T13:43:18Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -112,13 +112,13 @@
|
|||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
33
2024/CVE-2024-43468.json
Normal file
33
2024/CVE-2024-43468.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 894482678,
|
||||
"name": "CVE-2024-43468",
|
||||
"full_name": "synacktiv\/CVE-2024-43468",
|
||||
"owner": {
|
||||
"login": "synacktiv",
|
||||
"id": 50145679,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50145679?v=4",
|
||||
"html_url": "https:\/\/github.com\/synacktiv",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/synacktiv\/CVE-2024-43468",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T12:39:44Z",
|
||||
"updated_at": "2025-01-16T17:55:03Z",
|
||||
"pushed_at": "2025-01-16T09:48:07Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-01T15:48:38Z",
|
||||
"updated_at": "2025-01-16T07:01:01Z",
|
||||
"updated_at": "2025-01-16T15:33:13Z",
|
||||
"pushed_at": "2025-01-02T16:07:23Z",
|
||||
"stargazers_count": 445,
|
||||
"watchers_count": 445,
|
||||
"stargazers_count": 446,
|
||||
"watchers_count": 446,
|
||||
"has_discussions": false,
|
||||
"forks_count": 105,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"watchers": 445,
|
||||
"watchers": 446,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,12 +14,12 @@
|
|||
"description": "POC exploit for CVE-2024-49138",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-15T00:43:37Z",
|
||||
"updated_at": "2025-01-16T12:10:35Z",
|
||||
"updated_at": "2025-01-16T18:11:13Z",
|
||||
"pushed_at": "2025-01-15T01:01:21Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 119,
|
||||
"forks": 24,
|
||||
"watchers": 133,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
33
2024/CVE-2024-50967.json
Normal file
33
2024/CVE-2024-50967.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 917699084,
|
||||
"name": "CVE-2024-50967",
|
||||
"full_name": "0xByteHunter\/CVE-2024-50967",
|
||||
"owner": {
|
||||
"login": "0xByteHunter",
|
||||
"id": 174806873,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174806873?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xByteHunter",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xByteHunter\/CVE-2024-50967",
|
||||
"description": "DATAGERRY Broken Access Control",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T13:38:20Z",
|
||||
"updated_at": "2025-01-16T13:39:48Z",
|
||||
"pushed_at": "2025-01-16T13:39:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,19 +14,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T07:26:15Z",
|
||||
"updated_at": "2025-01-16T12:29:03Z",
|
||||
"updated_at": "2025-01-16T17:55:36Z",
|
||||
"pushed_at": "2025-01-16T08:58:49Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"forks": 6,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -112,13 +112,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-16T15:33:46Z",
|
||||
"updated_at": "2025-01-01T13:11:11Z",
|
||||
"updated_at": "2025-01-16T18:11:43Z",
|
||||
"pushed_at": "2024-09-16T15:43:44Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -122,5 +122,67 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 917304934,
|
||||
"name": "CVE-2025-0282",
|
||||
"full_name": "watchtowrlabs\/CVE-2025-0282",
|
||||
"owner": {
|
||||
"login": "watchtowrlabs",
|
||||
"id": 99977116,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
|
||||
"html_url": "https:\/\/github.com\/watchtowrlabs",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/watchtowrlabs\/CVE-2025-0282",
|
||||
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-15T18:27:12Z",
|
||||
"updated_at": "2025-01-16T16:04:14Z",
|
||||
"pushed_at": "2025-01-16T15:44:15Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 917731595,
|
||||
"name": "CVE-2025-0282",
|
||||
"full_name": "sfewer-r7\/CVE-2025-0282",
|
||||
"owner": {
|
||||
"login": "sfewer-r7",
|
||||
"id": 122022313,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122022313?v=4",
|
||||
"html_url": "https:\/\/github.com\/sfewer-r7",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sfewer-r7\/CVE-2025-0282",
|
||||
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T14:45:53Z",
|
||||
"updated_at": "2025-01-16T17:53:02Z",
|
||||
"pushed_at": "2025-01-16T17:25:22Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
22
README.md
22
README.md
|
@ -10,6 +10,8 @@
|
|||
- [absholi7ly/CVE-2025-0282-Ivanti-exploit](https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit)
|
||||
- [AnonStorks/CVE-2025-0282-Full-version](https://github.com/AnonStorks/CVE-2025-0282-Full-version)
|
||||
- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter)
|
||||
- [watchtowrlabs/CVE-2025-0282](https://github.com/watchtowrlabs/CVE-2025-0282)
|
||||
- [sfewer-r7/CVE-2025-0282](https://github.com/sfewer-r7/CVE-2025-0282)
|
||||
|
||||
### CVE-2025-21385 (2025-01-09)
|
||||
|
||||
|
@ -6785,6 +6787,13 @@
|
|||
|
||||
- [RedTeamPentesting/moodle-rce-calculatedquestions](https://github.com/RedTeamPentesting/moodle-rce-calculatedquestions)
|
||||
|
||||
### CVE-2024-43468 (2024-10-08)
|
||||
|
||||
<code>Microsoft Configuration Manager Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [synacktiv/CVE-2024-43468](https://github.com/synacktiv/CVE-2024-43468)
|
||||
|
||||
### CVE-2024-43532 (2024-10-08)
|
||||
|
||||
<code>Remote Registry Service Elevation of Privilege Vulnerability
|
||||
|
@ -7753,7 +7762,11 @@
|
|||
- [verylazytech/CVE-2024-50623](https://github.com/verylazytech/CVE-2024-50623)
|
||||
- [iSee857/Cleo-CVE-2024-50623-PoC](https://github.com/iSee857/Cleo-CVE-2024-50623-PoC)
|
||||
|
||||
### CVE-2024-50633
|
||||
### CVE-2024-50633 (2025-01-16)
|
||||
|
||||
<code>A Broken Object Level Authorization (BOLA) vulnerability in Indico v3.2.9 allows attackers to access sensitive information via sending a crafted POST request to the component /api/principals.
|
||||
</code>
|
||||
|
||||
- [cetinpy/CVE-2024-50633](https://github.com/cetinpy/CVE-2024-50633)
|
||||
|
||||
### CVE-2024-50657 (2024-11-22)
|
||||
|
@ -7821,6 +7834,9 @@
|
|||
### CVE-2024-50964
|
||||
- [fdzdev/CVE-2024-50964](https://github.com/fdzdev/CVE-2024-50964)
|
||||
|
||||
### CVE-2024-50967
|
||||
- [0xByteHunter/CVE-2024-50967](https://github.com/0xByteHunter/CVE-2024-50967)
|
||||
|
||||
### CVE-2024-50968 (2024-11-14)
|
||||
|
||||
<code>A business logic vulnerability exists in the Add to Cart function of itsourcecode Agri-Trading Online Shopping System 1.0, which allows remote attackers to manipulate the quant parameter when adding a product to the cart. By setting the quantity value to -0, an attacker can exploit a flaw in the application's total price calculation logic. This vulnerability causes the total price to be reduced to zero, allowing the attacker to add items to the cart and proceed to checkout.
|
||||
|
@ -21305,6 +21321,7 @@
|
|||
- [dkstar11q/CVE-2022-31814](https://github.com/dkstar11q/CVE-2022-31814)
|
||||
- [Laburity/CVE-2022-31814](https://github.com/Laburity/CVE-2022-31814)
|
||||
- [ArunHAtter/CVE-2022-31814](https://github.com/ArunHAtter/CVE-2022-31814)
|
||||
- [Inplex-sys/CVE-2022-31814](https://github.com/Inplex-sys/CVE-2022-31814)
|
||||
|
||||
### CVE-2022-31854 (2022-07-07)
|
||||
|
||||
|
@ -26892,7 +26909,6 @@
|
|||
</code>
|
||||
|
||||
- [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481)
|
||||
- [JHVIW/jhviw.github.io](https://github.com/JHVIW/jhviw.github.io)
|
||||
|
||||
### CVE-2021-30551 (2021-06-15)
|
||||
|
||||
|
@ -30360,6 +30376,7 @@
|
|||
</code>
|
||||
|
||||
- [plsanu/Vehicle-Service-Management-System-Category-List-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Category-List-Stored-Cross-Site-Scripting-XSS)
|
||||
- [plsanu/CVE-2021-46071](https://github.com/plsanu/CVE-2021-46071)
|
||||
|
||||
### CVE-2021-46072 (2022-01-06)
|
||||
|
||||
|
@ -34913,7 +34930,6 @@
|
|||
- [b1ackros337/CVE-2020-25213](https://github.com/b1ackros337/CVE-2020-25213)
|
||||
- [BLY-Coder/Python-exploit-CVE-2020-25213](https://github.com/BLY-Coder/Python-exploit-CVE-2020-25213)
|
||||
- [E1tex/Python-CVE-2020-25213](https://github.com/E1tex/Python-CVE-2020-25213)
|
||||
- [Nguyen-id/CVE-2020-25213](https://github.com/Nguyen-id/CVE-2020-25213)
|
||||
|
||||
### CVE-2020-25223 (2020-09-25)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue