mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/02/13 00:26:09
This commit is contained in:
parent
d30f8eabe0
commit
c59e2a3e54
25 changed files with 178 additions and 73 deletions
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": true,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "OS X 10.11.6 LPE PoC for CVE-2016-4655 \/ CVE-2016-4656",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-02T12:42:14Z",
|
||||
"updated_at": "2023-12-26T03:49:59Z",
|
||||
"updated_at": "2024-02-12T18:40:15Z",
|
||||
"pushed_at": "2016-10-04T16:36:18Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
32
2017/CVE-2017-0089.json
Normal file
32
2017/CVE-2017-0089.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 754437399,
|
||||
"name": "Added-Pentest-Ground-to-vulnerable-websites-for-training",
|
||||
"full_name": "rainhawk13\/Added-Pentest-Ground-to-vulnerable-websites-for-training",
|
||||
"owner": {
|
||||
"login": "rainhawk13",
|
||||
"id": 133608975,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133608975?v=4",
|
||||
"html_url": "https:\/\/github.com\/rainhawk13"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rainhawk13\/Added-Pentest-Ground-to-vulnerable-websites-for-training",
|
||||
"description": "CVE-2017-0089 Learn more at National Vulnerability Database (NVD) • CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-08T03:33:56Z",
|
||||
"updated_at": "2024-02-13T00:03:41Z",
|
||||
"pushed_at": "2024-02-13T00:09:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2024-02-04T20:26:29Z",
|
||||
"updated_at": "2024-02-12T20:49:58Z",
|
||||
"pushed_at": "2022-04-14T18:23:38Z",
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"has_discussions": false,
|
||||
"forks_count": 87,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 87,
|
||||
"watchers": 330,
|
||||
"watchers": 331,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2024-01-08T08:13:59Z",
|
||||
"updated_at": "2024-02-12T21:45:27Z",
|
||||
"pushed_at": "2021-08-07T16:48:55Z",
|
||||
"stargazers_count": 396,
|
||||
"watchers_count": 396,
|
||||
"stargazers_count": 397,
|
||||
"watchers_count": 397,
|
||||
"has_discussions": false,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 396,
|
||||
"watchers": 397,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -1842,13 +1842,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-25T18:18:15Z",
|
||||
"updated_at": "2024-01-19T12:27:08Z",
|
||||
"updated_at": "2024-02-12T23:33:39Z",
|
||||
"pushed_at": "2020-03-29T20:32:16Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -1290,5 +1290,65 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 756532685,
|
||||
"name": "CVE-2021-1675-CVE-2021-34527",
|
||||
"full_name": "whoami-chmod777\/CVE-2021-1675-CVE-2021-34527",
|
||||
"owner": {
|
||||
"login": "whoami-chmod777",
|
||||
"id": 33582093,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33582093?v=4",
|
||||
"html_url": "https:\/\/github.com\/whoami-chmod777"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/whoami-chmod777\/CVE-2021-1675-CVE-2021-34527",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-12T20:54:51Z",
|
||||
"updated_at": "2024-02-12T20:55:03Z",
|
||||
"pushed_at": "2024-02-12T20:54:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 756534030,
|
||||
"name": "CVE-2021-1675---PrintNightmare-LPE-PowerShell-",
|
||||
"full_name": "whoami-chmod777\/CVE-2021-1675---PrintNightmare-LPE-PowerShell-",
|
||||
"owner": {
|
||||
"login": "whoami-chmod777",
|
||||
"id": 33582093,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33582093?v=4",
|
||||
"html_url": "https:\/\/github.com\/whoami-chmod777"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/whoami-chmod777\/CVE-2021-1675---PrintNightmare-LPE-PowerShell-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-12T20:59:08Z",
|
||||
"updated_at": "2024-02-12T20:59:21Z",
|
||||
"pushed_at": "2024-02-12T20:59:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -2172,6 +2172,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-11T22:08:47Z",
|
||||
"updated_at": "2024-02-03T00:28:39Z",
|
||||
"updated_at": "2024-02-12T21:06:14Z",
|
||||
"pushed_at": "2021-10-13T22:32:36Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 95,
|
||||
"watchers": 94,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -493,10 +493,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2024-02-07T02:03:04Z",
|
||||
"updated_at": "2024-02-12T21:40:36Z",
|
||||
"pushed_at": "2023-10-11T18:44:51Z",
|
||||
"stargazers_count": 776,
|
||||
"watchers_count": 776,
|
||||
"stargazers_count": 777,
|
||||
"watchers_count": 777,
|
||||
"has_discussions": false,
|
||||
"forks_count": 174,
|
||||
"allow_forking": true,
|
||||
|
@ -512,7 +512,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 174,
|
||||
"watchers": 776,
|
||||
"watchers": 777,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -907,12 +907,12 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-02-12T16:42:32Z",
|
||||
"pushed_at": "2023-11-08T21:02:16Z",
|
||||
"updated_at": "2024-02-12T22:40:44Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1698,
|
||||
"watchers_count": 1698,
|
||||
"has_discussions": false,
|
||||
"forks_count": 502,
|
||||
"forks_count": 503,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -923,7 +923,7 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 502,
|
||||
"forks": 503,
|
||||
"watchers": 1698,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
|
|
|
@ -706,7 +706,7 @@
|
|||
"description": "I'm trying",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-12T21:41:38Z",
|
||||
"updated_at": "2022-06-12T21:41:38Z",
|
||||
"updated_at": "2024-02-12T20:12:09Z",
|
||||
"pushed_at": "2022-06-12T21:49:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-13T13:17:20Z",
|
||||
"updated_at": "2024-02-12T16:48:41Z",
|
||||
"updated_at": "2024-02-12T18:46:44Z",
|
||||
"pushed_at": "2024-02-11T03:01:51Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -886,10 +886,10 @@
|
|||
"description": "An advanced RCE tool tailored for exploiting a vulnerability in Cacti v1.2.22. Crafted with precision, this utility aids security researchers in analyzing and understanding the depth of the CVE-2022-46169 flaw. Use responsibly and ethically.",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-10T17:00:50Z",
|
||||
"updated_at": "2023-09-10T17:52:45Z",
|
||||
"updated_at": "2024-02-12T18:30:39Z",
|
||||
"pushed_at": "2023-09-10T17:14:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -912,7 +912,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -416,7 +416,7 @@
|
|||
"description": "A PoC for CVE 2023-20198",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-23T16:04:23Z",
|
||||
"updated_at": "2023-12-22T01:05:39Z",
|
||||
"updated_at": "2024-02-12T20:11:46Z",
|
||||
"pushed_at": "2023-10-23T19:10:41Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
|
|
|
@ -283,10 +283,10 @@
|
|||
"description": "Atlassian Confluence - Remote Code Execution (CVE-2023-22527)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-23T08:53:46Z",
|
||||
"updated_at": "2024-01-23T10:20:13Z",
|
||||
"updated_at": "2024-02-12T18:35:12Z",
|
||||
"pushed_at": "2024-01-23T09:04:15Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -295,7 +295,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -133,7 +133,7 @@
|
|||
"description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-22T10:38:02Z",
|
||||
"updated_at": "2024-02-10T08:19:40Z",
|
||||
"updated_at": "2024-02-12T21:55:31Z",
|
||||
"pushed_at": "2024-01-24T13:45:56Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-32233: Linux内核中的安全漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-16T03:06:40Z",
|
||||
"updated_at": "2024-02-05T17:52:45Z",
|
||||
"updated_at": "2024-02-12T21:42:00Z",
|
||||
"pushed_at": "2023-05-16T04:34:16Z",
|
||||
"stargazers_count": 353,
|
||||
"watchers_count": 353,
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"has_discussions": false,
|
||||
"forks_count": 79,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 79,
|
||||
"watchers": 353,
|
||||
"watchers": 354,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Original PoC for CVE-2023-32784",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T17:08:55Z",
|
||||
"updated_at": "2024-02-10T06:01:09Z",
|
||||
"updated_at": "2024-02-12T21:28:17Z",
|
||||
"pushed_at": "2023-08-17T19:26:55Z",
|
||||
"stargazers_count": 605,
|
||||
"watchers_count": 605,
|
||||
"stargazers_count": 606,
|
||||
"watchers_count": 606,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 605,
|
||||
"watchers": 606,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Proof of concept script to check if the site is vulnerable to CVE-2023-35078",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-29T19:58:33Z",
|
||||
"updated_at": "2023-08-12T22:49:34Z",
|
||||
"updated_at": "2024-02-12T18:33:47Z",
|
||||
"pushed_at": "2023-07-29T22:49:12Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC and Detection for CVE-2024-21626",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-01T15:28:37Z",
|
||||
"updated_at": "2024-02-12T07:30:29Z",
|
||||
"updated_at": "2024-02-12T19:54:37Z",
|
||||
"pushed_at": "2024-02-06T16:09:05Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "File Upload vulnerability in MCMS 5.3.5",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-12T06:19:19Z",
|
||||
"updated_at": "2024-02-12T15:06:52Z",
|
||||
"updated_at": "2024-02-12T23:20:54Z",
|
||||
"pushed_at": "2024-02-12T07:04:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-26T21:39:26Z",
|
||||
"updated_at": "2024-01-26T21:40:59Z",
|
||||
"updated_at": "2024-02-12T18:38:29Z",
|
||||
"pushed_at": "2024-01-26T21:46:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
15
README.md
15
README.md
|
@ -395,7 +395,11 @@
|
|||
### CVE-2024-24336
|
||||
- [nitipoom-jar/CVE-2024-24336](https://github.com/nitipoom-jar/CVE-2024-24336)
|
||||
|
||||
### CVE-2024-24337
|
||||
### CVE-2024-24337 (-)
|
||||
|
||||
<code>CSV Injection vulnerability in '/members/moremember.pl' and '/admin/aqbudgets.pl' endpoints in Koha Library Management System version 23.05.05 and earlier allows attackers to to inject DDE commands into csv exports via the 'Budget' and 'Patrons Member' components.
|
||||
</code>
|
||||
|
||||
- [nitipoom-jar/CVE-2024-24337](https://github.com/nitipoom-jar/CVE-2024-24337)
|
||||
|
||||
### CVE-2024-24396 (-)
|
||||
|
@ -14162,6 +14166,8 @@
|
|||
- [jj4152/cve-2021-1675](https://github.com/jj4152/cve-2021-1675)
|
||||
- [r1skkam/PrintNightmare](https://github.com/r1skkam/PrintNightmare)
|
||||
- [peckre/PNCVE-Win10-20H2-Exploit](https://github.com/peckre/PNCVE-Win10-20H2-Exploit)
|
||||
- [whoami-chmod777/CVE-2021-1675-CVE-2021-34527](https://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527)
|
||||
- [whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell-](https://github.com/whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell-)
|
||||
|
||||
### CVE-2021-1699 (2021-01-12)
|
||||
|
||||
|
@ -32650,6 +32656,13 @@
|
|||
- [belyakovvitagmailt/4B5F5F4Bp](https://github.com/belyakovvitagmailt/4B5F5F4Bp)
|
||||
- [MarkusCarelli1/4B5F5F4Bp](https://github.com/MarkusCarelli1/4B5F5F4Bp)
|
||||
|
||||
### CVE-2017-0089 (2017-03-16)
|
||||
|
||||
<code>Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Uniscribe Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, and CVE-2017-0090.
|
||||
</code>
|
||||
|
||||
- [rainhawk13/Added-Pentest-Ground-to-vulnerable-websites-for-training](https://github.com/rainhawk13/Added-Pentest-Ground-to-vulnerable-websites-for-training)
|
||||
|
||||
### CVE-2017-0100 (2017-03-16)
|
||||
|
||||
<code>A DCOM object in Helppane.exe in Microsoft Windows 7 SP1; Windows Server 2008 R2; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows local users to gain privileges via a crafted application, aka "Windows HelpPane Elevation of Privilege Vulnerability."
|
||||
|
|
Loading…
Reference in a new issue