mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/06/27 12:29:22
This commit is contained in:
parent
ed59d06109
commit
c610d3896b
38 changed files with 245 additions and 191 deletions
|
@ -163,10 +163,10 @@
|
|||
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-08T10:10:43Z",
|
||||
"updated_at": "2024-01-27T12:59:08Z",
|
||||
"updated_at": "2024-06-27T11:19:05Z",
|
||||
"pushed_at": "2015-07-02T14:47:31Z",
|
||||
"stargazers_count": 570,
|
||||
"watchers_count": 570,
|
||||
"stargazers_count": 571,
|
||||
"watchers_count": 571,
|
||||
"has_discussions": false,
|
||||
"forks_count": 216,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 216,
|
||||
"watchers": 570,
|
||||
"watchers": 571,
|
||||
"score": 0,
|
||||
"subscribers_count": 57
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2024-04-17T13:53:57Z",
|
||||
"updated_at": "2024-06-27T11:20:03Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 719,
|
||||
"watchers_count": 719,
|
||||
"stargazers_count": 720,
|
||||
"watchers_count": 720,
|
||||
"has_discussions": false,
|
||||
"forks_count": 263,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 263,
|
||||
"watchers": 719,
|
||||
"watchers": 720,
|
||||
"score": 0,
|
||||
"subscribers_count": 48
|
||||
},
|
||||
|
|
|
@ -343,10 +343,10 @@
|
|||
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-13T11:01:41Z",
|
||||
"updated_at": "2024-06-27T05:48:07Z",
|
||||
"updated_at": "2024-06-27T06:38:06Z",
|
||||
"pushed_at": "2022-11-15T09:05:50Z",
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -355,7 +355,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 163,
|
||||
"watchers": 164,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -86,7 +86,7 @@
|
|||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -104,7 +104,7 @@
|
|||
"snyk-js-jquery-567880"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 10,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -36,7 +36,7 @@
|
|||
"snyk-js-jquery-567880"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 10,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
|
|
|
@ -889,10 +889,10 @@
|
|||
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-13T11:01:41Z",
|
||||
"updated_at": "2024-06-27T05:48:07Z",
|
||||
"updated_at": "2024-06-27T06:38:06Z",
|
||||
"pushed_at": "2022-11-15T09:05:50Z",
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -901,7 +901,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 163,
|
||||
"watchers": 164,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-30T05:21:26Z",
|
||||
"updated_at": "2024-02-24T07:53:20Z",
|
||||
"updated_at": "2024-06-27T09:48:40Z",
|
||||
"pushed_at": "2021-03-30T05:31:22Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -368,5 +368,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 820862657,
|
||||
"name": "CVE-2021-3493_CVE--2022-3357",
|
||||
"full_name": "iamz24\/CVE-2021-3493_CVE--2022-3357",
|
||||
"owner": {
|
||||
"login": "iamz24",
|
||||
"id": 97619614,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97619614?v=4",
|
||||
"html_url": "https:\/\/github.com\/iamz24"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/iamz24\/CVE-2021-3493_CVE--2022-3357",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-27T10:25:04Z",
|
||||
"updated_at": "2024-06-27T11:04:45Z",
|
||||
"pushed_at": "2024-06-27T11:04:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -938,10 +938,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2024-06-26T14:23:29Z",
|
||||
"updated_at": "2024-06-27T09:41:31Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"stargazers_count": 1009,
|
||||
"watchers_count": 1009,
|
||||
"has_discussions": false,
|
||||
"forks_count": 180,
|
||||
"allow_forking": true,
|
||||
|
@ -952,7 +952,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 180,
|
||||
"watchers": 1008,
|
||||
"watchers": 1009,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-23277 POC to write a webshell to aspnet_client",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-13T13:35:18Z",
|
||||
"updated_at": "2024-01-28T07:47:17Z",
|
||||
"updated_at": "2024-06-27T08:08:54Z",
|
||||
"pushed_at": "2022-10-24T15:01:06Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2024-06-25T01:22:41Z",
|
||||
"updated_at": "2024-06-27T08:59:23Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1139,
|
||||
"watchers_count": 1139,
|
||||
"stargazers_count": 1140,
|
||||
"watchers_count": 1140,
|
||||
"has_discussions": true,
|
||||
"forks_count": 188,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 188,
|
||||
"watchers": 1139,
|
||||
"watchers": 1140,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-12T03:59:03Z",
|
||||
"updated_at": "2024-04-21T08:47:20Z",
|
||||
"updated_at": "2024-06-27T09:27:36Z",
|
||||
"pushed_at": "2024-04-12T04:05:19Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-03T11:39:25Z",
|
||||
"updated_at": "2023-12-11T06:17:23Z",
|
||||
"updated_at": "2024-06-27T12:01:56Z",
|
||||
"pushed_at": "2022-10-10T08:57:29Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -1,32 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 529181655,
|
||||
"id": 529328915,
|
||||
"name": "CVE-2022-38766",
|
||||
"full_name": "AUTOCRYPT-RED\/CVE-2022-38766",
|
||||
"full_name": "MalHyuk\/CVE-2022-38766",
|
||||
"owner": {
|
||||
"login": "AUTOCRYPT-RED",
|
||||
"id": 112160559,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112160559?v=4",
|
||||
"html_url": "https:\/\/github.com\/AUTOCRYPT-RED"
|
||||
"login": "MalHyuk",
|
||||
"id": 59429883,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59429883?v=4",
|
||||
"html_url": "https:\/\/github.com\/MalHyuk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AUTOCRYPT-RED\/CVE-2022-38766",
|
||||
"html_url": "https:\/\/github.com\/MalHyuk\/CVE-2022-38766",
|
||||
"description": "PoC for vulnerability in Renault ZOE Keyless System(CVE-2022-38766)",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-26T08:43:40Z",
|
||||
"updated_at": "2023-09-06T08:25:28Z",
|
||||
"pushed_at": "2022-10-07T10:01:18Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"created_at": "2022-08-26T16:23:44Z",
|
||||
"updated_at": "2022-08-26T16:22:08Z",
|
||||
"pushed_at": "2022-10-07T13:05:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"forks": 4,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "harbor unauthorized detection",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-21T10:40:19Z",
|
||||
"updated_at": "2024-06-26T01:29:18Z",
|
||||
"updated_at": "2024-06-27T07:10:28Z",
|
||||
"pushed_at": "2023-03-28T04:23:42Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "pocs & exploit for CVE-2023-24871 (rce + lpe)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-21T15:01:15Z",
|
||||
"updated_at": "2024-06-26T16:29:16Z",
|
||||
"updated_at": "2024-06-27T08:30:30Z",
|
||||
"pushed_at": "2024-06-25T15:33:32Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 19,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -463,5 +463,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 820848497,
|
||||
"name": "CVE-2023-27163-ssrf-to-port-scanning",
|
||||
"full_name": "Rishabh-Kumar-Cyber-Sec\/CVE-2023-27163-ssrf-to-port-scanning",
|
||||
"owner": {
|
||||
"login": "Rishabh-Kumar-Cyber-Sec",
|
||||
"id": 58937379,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58937379?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rishabh-Kumar-Cyber-Sec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rishabh-Kumar-Cyber-Sec\/CVE-2023-27163-ssrf-to-port-scanning",
|
||||
"description": "It is a simple script to automate internal port scanning dueto SSRF in requests-baskets v 1.2.1. this script can also assisst in solving 'SAU' machine from hackthebox",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-27T09:48:14Z",
|
||||
"updated_at": "2024-06-27T09:53:26Z",
|
||||
"pushed_at": "2024-06-27T09:53:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC of CVE-2023-35086 only DoS",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-25T01:36:07Z",
|
||||
"updated_at": "2024-04-20T11:35:20Z",
|
||||
"updated_at": "2024-06-27T12:00:02Z",
|
||||
"pushed_at": "2023-07-25T01:42:02Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Ghostscript command injection vulnerability PoC (CVE-2023-36664)",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-12T18:33:57Z",
|
||||
"updated_at": "2024-06-12T22:34:15Z",
|
||||
"updated_at": "2024-06-27T08:14:28Z",
|
||||
"pushed_at": "2023-09-07T08:37:04Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T07:28:06Z",
|
||||
"updated_at": "2024-06-10T06:33:15Z",
|
||||
"updated_at": "2024-06-27T09:27:13Z",
|
||||
"pushed_at": "2023-08-25T09:38:05Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 109,
|
||||
"watchers": 110,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "😄 CVE-2023-38545堆溢出的POC和分析文章",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-12T07:16:49Z",
|
||||
"updated_at": "2024-01-10T09:09:22Z",
|
||||
"updated_at": "2024-06-27T11:49:13Z",
|
||||
"pushed_at": "2023-10-12T08:46:50Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-05-29T15:10:43Z",
|
||||
"updated_at": "2024-06-11T09:27:26Z",
|
||||
"updated_at": "2024-06-27T11:54:54Z",
|
||||
"pushed_at": "2024-01-07T15:20:55Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T12:30:53Z",
|
||||
"updated_at": "2024-06-26T19:31:35Z",
|
||||
"updated_at": "2024-06-27T11:42:52Z",
|
||||
"pushed_at": "2024-06-19T12:24:50Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 86,
|
||||
"watchers": 87,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-06-27T02:52:42Z",
|
||||
"updated_at": "2024-06-27T07:24:57Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2151,
|
||||
"watchers_count": 2151,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Analysis of the vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-17T04:35:42Z",
|
||||
"updated_at": "2024-06-21T00:11:55Z",
|
||||
"updated_at": "2024-06-27T07:38:46Z",
|
||||
"pushed_at": "2024-01-23T16:30:55Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -133,19 +133,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-23T06:03:44Z",
|
||||
"updated_at": "2024-06-26T16:06:50Z",
|
||||
"updated_at": "2024-06-27T07:27:23Z",
|
||||
"pushed_at": "2024-06-23T06:09:10Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 31,
|
||||
"forks": 12,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-10T17:02:03Z",
|
||||
"updated_at": "2024-06-27T05:20:45Z",
|
||||
"updated_at": "2024-06-27T09:08:00Z",
|
||||
"pushed_at": "2024-06-17T19:46:27Z",
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 256,
|
||||
"watchers": 257,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -103,10 +103,10 @@
|
|||
"description": "Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从而控制受影响的系统、执行任意命令、安装恶意软件或访问敏感数据。 微软已发出警告成功利用此漏洞的攻击者可以获得 SYSTEM 权限,这是 Windows 系统上的最高访问级别。这增加了与 CVE-2024-26229 相关的风险,使其成为恶意行为者的主要目标。",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-16T05:06:31Z",
|
||||
"updated_at": "2024-06-27T02:56:07Z",
|
||||
"updated_at": "2024-06-27T11:45:52Z",
|
||||
"pushed_at": "2024-06-16T05:29:26Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2024-27130",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T07:58:01Z",
|
||||
"updated_at": "2024-06-24T13:55:18Z",
|
||||
"updated_at": "2024-06-27T09:27:16Z",
|
||||
"pushed_at": "2024-05-17T10:27:07Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "CVE-2024-28995 POC Vulnerability Scanner",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-14T23:05:40Z",
|
||||
"updated_at": "2024-06-24T04:37:07Z",
|
||||
"updated_at": "2024-06-27T08:16:49Z",
|
||||
"pushed_at": "2024-06-15T12:21:28Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,20 +13,50 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-24T10:37:26Z",
|
||||
"updated_at": "2024-06-27T06:21:10Z",
|
||||
"updated_at": "2024-06-27T11:19:35Z",
|
||||
"pushed_at": "2024-06-24T11:16:26Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 75,
|
||||
"forks": 25,
|
||||
"watchers": 95,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 820782545,
|
||||
"name": "CVE-2024-30088-",
|
||||
"full_name": "NextGenPentesters\/CVE-2024-30088-",
|
||||
"owner": {
|
||||
"login": "NextGenPentesters",
|
||||
"id": 169174200,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169174200?v=4",
|
||||
"html_url": "https:\/\/github.com\/NextGenPentesters"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NextGenPentesters\/CVE-2024-30088-",
|
||||
"description": "🆘New Windows Kernel Priviledge Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-27T07:05:46Z",
|
||||
"updated_at": "2024-06-27T07:19:15Z",
|
||||
"pushed_at": "2024-06-27T07:19:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -73,12 +73,12 @@
|
|||
"description": "Exploit PoC for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T19:33:08Z",
|
||||
"updated_at": "2024-06-27T06:05:29Z",
|
||||
"updated_at": "2024-06-27T08:29:14Z",
|
||||
"pushed_at": "2024-05-19T07:12:00Z",
|
||||
"stargazers_count": 453,
|
||||
"watchers_count": 453,
|
||||
"stargazers_count": 454,
|
||||
"watchers_count": 454,
|
||||
"has_discussions": false,
|
||||
"forks_count": 126,
|
||||
"forks_count": 127,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -89,8 +89,8 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 126,
|
||||
"watchers": 453,
|
||||
"forks": 127,
|
||||
"watchers": 454,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -1479,8 +1479,8 @@
|
|||
"description": "exploit for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-20T07:37:09Z",
|
||||
"updated_at": "2024-06-26T14:38:27Z",
|
||||
"pushed_at": "2024-06-26T14:38:24Z",
|
||||
"updated_at": "2024-06-27T09:40:51Z",
|
||||
"pushed_at": "2024-06-27T09:40:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "D-Link NAS CVE-2024-3273 Exploit Tool",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-07T03:09:13Z",
|
||||
"updated_at": "2024-05-28T18:16:36Z",
|
||||
"updated_at": "2024-06-27T08:12:17Z",
|
||||
"pushed_at": "2024-04-07T04:41:26Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 820411825,
|
||||
"name": "CVE-2024-34102-RCE",
|
||||
"full_name": "ex-arny\/CVE-2024-34102-RCE",
|
||||
"owner": {
|
||||
"login": "ex-arny",
|
||||
"id": 173701847,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173701847?v=4",
|
||||
"html_url": "https:\/\/github.com\/ex-arny"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ex-arny\/CVE-2024-34102-RCE",
|
||||
"description": "CVE-2024-34102 unauthenticated RCE PoC for Magento\/adobe commerce",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-26T12:18:24Z",
|
||||
"updated_at": "2024-06-26T17:07:55Z",
|
||||
"pushed_at": "2024-06-26T17:07:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Path traversal in Ollama with rogue registry server",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-26T03:11:29Z",
|
||||
"updated_at": "2024-06-27T06:21:50Z",
|
||||
"updated_at": "2024-06-27T09:10:49Z",
|
||||
"pushed_at": "2024-06-26T07:34:31Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:52:54Z",
|
||||
"updated_at": "2024-06-26T10:26:25Z",
|
||||
"updated_at": "2024-06-27T09:27:09Z",
|
||||
"pushed_at": "2024-06-22T15:13:52Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 151,
|
||||
"watchers": 152,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for the CVE-2024-5806",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-24T16:28:35Z",
|
||||
"updated_at": "2024-06-27T05:19:10Z",
|
||||
"updated_at": "2024-06-27T11:25:44Z",
|
||||
"pushed_at": "2024-06-24T16:52:12Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
12
README.md
12
README.md
|
@ -2342,6 +2342,7 @@
|
|||
</code>
|
||||
|
||||
- [tykawaii98/CVE-2024-30088](https://github.com/tykawaii98/CVE-2024-30088)
|
||||
- [NextGenPentesters/CVE-2024-30088-](https://github.com/NextGenPentesters/CVE-2024-30088-)
|
||||
|
||||
### CVE-2024-30212 (2024-05-28)
|
||||
|
||||
|
@ -2723,13 +2724,6 @@
|
|||
|
||||
- [xbz0n/CVE-2024-33911](https://github.com/xbz0n/CVE-2024-33911)
|
||||
|
||||
### CVE-2024-34102 (2024-06-13)
|
||||
|
||||
<code>Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
|
||||
</code>
|
||||
|
||||
- [ex-arny/CVE-2024-34102-RCE](https://github.com/ex-arny/CVE-2024-34102-RCE)
|
||||
|
||||
### CVE-2024-34220 (-)
|
||||
|
||||
<code>Sourcecodester Human Resource Management System 1.0 is vulnerable to SQL Injection via the 'leave' parameter.
|
||||
|
@ -5787,6 +5781,7 @@
|
|||
- [MasterCode112/CVE-2023-27163](https://github.com/MasterCode112/CVE-2023-27163)
|
||||
- [Rubioo02/CVE-2023-27163](https://github.com/Rubioo02/CVE-2023-27163)
|
||||
- [madhavmehndiratta/CVE-2023-27163](https://github.com/madhavmehndiratta/CVE-2023-27163)
|
||||
- [Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning](https://github.com/Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning)
|
||||
|
||||
### CVE-2023-27216 (2023-04-12)
|
||||
|
||||
|
@ -15973,7 +15968,7 @@
|
|||
<code>The remote keyless system on Renault ZOE 2021 vehicles sends 433.92 MHz RF signals from the same Rolling Codes set for each door-open request, which allows for a replay attack.
|
||||
</code>
|
||||
|
||||
- [AUTOCRYPT-RED/CVE-2022-38766](https://github.com/AUTOCRYPT-RED/CVE-2022-38766)
|
||||
- [MalHyuk/CVE-2022-38766](https://github.com/MalHyuk/CVE-2022-38766)
|
||||
|
||||
### CVE-2022-38789 (2022-09-15)
|
||||
|
||||
|
@ -18525,6 +18520,7 @@
|
|||
- [pmihsan/OverlayFS-CVE-2021-3493](https://github.com/pmihsan/OverlayFS-CVE-2021-3493)
|
||||
- [smallkill/CVE-2021-3493](https://github.com/smallkill/CVE-2021-3493)
|
||||
- [ptkhai15/OverlayFS---CVE-2021-3493](https://github.com/ptkhai15/OverlayFS---CVE-2021-3493)
|
||||
- [iamz24/CVE-2021-3493_CVE--2022-3357](https://github.com/iamz24/CVE-2021-3493_CVE--2022-3357)
|
||||
|
||||
### CVE-2021-3516 (2021-06-01)
|
||||
|
||||
|
|
Loading…
Reference in a new issue