mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 12:22:21 +01:00
Auto Update 2025/01/14 18:32:54
This commit is contained in:
parent
4fe083fbab
commit
ca59258b41
56 changed files with 889 additions and 455 deletions
|
@ -526,37 +526,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 479844525,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "banomaly\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "banomaly",
|
||||
"id": 51972282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
|
||||
"html_url": "https:\/\/github.com\/banomaly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/banomaly\/CVE-2007-2447",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-09T21:12:11Z",
|
||||
"updated_at": "2022-04-09T21:12:43Z",
|
||||
"pushed_at": "2024-07-09T18:10:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 490631750,
|
||||
"name": "Samba-Usermap-exploit",
|
||||
|
@ -928,5 +897,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 826416402,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "foudadev\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "foudadev",
|
||||
"id": 40678747,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40678747?v=4",
|
||||
"html_url": "https:\/\/github.com\/foudadev",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/foudadev\/CVE-2007-2447",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-09T17:04:54Z",
|
||||
"updated_at": "2024-07-09T17:04:54Z",
|
||||
"pushed_at": "2024-07-09T17:05:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -99,37 +99,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 476225528,
|
||||
"name": "CVE-2009-2265",
|
||||
"full_name": "banomaly\/CVE-2009-2265",
|
||||
"owner": {
|
||||
"login": "banomaly",
|
||||
"id": 51972282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
|
||||
"html_url": "https:\/\/github.com\/banomaly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/banomaly\/CVE-2009-2265",
|
||||
"description": "ColdFusion 8.0.1 - Arbitrary File Upload to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T08:52:08Z",
|
||||
"updated_at": "2023-01-29T06:58:32Z",
|
||||
"pushed_at": "2022-04-14T02:55:54Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 905388637,
|
||||
"name": "Adobe-ColdFusion-8-RCE-CVE-2009-2265",
|
||||
|
|
|
@ -29,36 +29,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 478822980,
|
||||
"name": "CVE-2012-4869",
|
||||
"full_name": "banomaly\/CVE-2012-4869",
|
||||
"owner": {
|
||||
"login": "banomaly",
|
||||
"id": 51972282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
|
||||
"html_url": "https:\/\/github.com\/banomaly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/banomaly\/CVE-2012-4869",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-07T04:13:13Z",
|
||||
"updated_at": "2024-10-03T05:16:14Z",
|
||||
"pushed_at": "2022-04-14T02:56:12Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -182,7 +182,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-11-14T04:35:59Z",
|
||||
"updated_at": "2025-01-05T15:26:10Z",
|
||||
"pushed_at": "2025-01-13T19:05:30Z",
|
||||
"pushed_at": "2025-01-14T12:58:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1917,37 +1917,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 479846687,
|
||||
"name": "CVE-2014-6271",
|
||||
"full_name": "banomaly\/CVE-2014-6271",
|
||||
"owner": {
|
||||
"login": "banomaly",
|
||||
"id": 51972282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
|
||||
"html_url": "https:\/\/github.com\/banomaly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/banomaly\/CVE-2014-6271",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-09T21:24:12Z",
|
||||
"updated_at": "2022-04-09T21:24:47Z",
|
||||
"pushed_at": "2022-04-14T02:56:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 506769957,
|
||||
"name": "cgi-bin-shellshock",
|
||||
|
|
|
@ -76,8 +76,8 @@
|
|||
"description": "kernel exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T10:52:51Z",
|
||||
"updated_at": "2025-01-11T23:46:45Z",
|
||||
"pushed_at": "2022-02-07T14:33:56Z",
|
||||
"updated_at": "2025-01-14T12:55:49Z",
|
||||
"pushed_at": "2025-01-14T12:55:45Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -30,37 +30,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 481433279,
|
||||
"name": "CVE-2015-6967",
|
||||
"full_name": "banomaly\/CVE-2015-6967",
|
||||
"owner": {
|
||||
"login": "banomaly",
|
||||
"id": 51972282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
|
||||
"html_url": "https:\/\/github.com\/banomaly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/banomaly\/CVE-2015-6967",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-14T01:57:39Z",
|
||||
"updated_at": "2024-08-19T17:35:43Z",
|
||||
"pushed_at": "2022-04-14T02:59:42Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 658921245,
|
||||
"name": "CVE-2015-6967",
|
||||
|
|
|
@ -2068,37 +2068,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 481444491,
|
||||
"name": "CVE-2017-5638",
|
||||
"full_name": "banomaly\/CVE-2017-5638",
|
||||
"owner": {
|
||||
"login": "banomaly",
|
||||
"id": 51972282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
|
||||
"html_url": "https:\/\/github.com\/banomaly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/banomaly\/CVE-2017-5638",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-14T02:48:22Z",
|
||||
"updated_at": "2024-07-01T10:35:27Z",
|
||||
"pushed_at": "2022-04-14T02:52:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 580942836,
|
||||
"name": "Exploit-CVE-2017-5638",
|
||||
|
|
|
@ -989,37 +989,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 477484512,
|
||||
"name": "CVE-2018-7600",
|
||||
"full_name": "banomaly\/CVE-2018-7600",
|
||||
"owner": {
|
||||
"login": "banomaly",
|
||||
"id": 51972282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
|
||||
"html_url": "https:\/\/github.com\/banomaly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/banomaly\/CVE-2018-7600",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-03T22:45:53Z",
|
||||
"updated_at": "2023-03-13T21:35:37Z",
|
||||
"pushed_at": "2022-04-14T02:56:03Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 485290659,
|
||||
"name": "CVE-2018-7600",
|
||||
|
|
|
@ -1902,10 +1902,10 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2025-01-07T11:26:39Z",
|
||||
"updated_at": "2025-01-14T12:14:41Z",
|
||||
"pushed_at": "2021-12-02T12:00:46Z",
|
||||
"stargazers_count": 1175,
|
||||
"watchers_count": 1175,
|
||||
"stargazers_count": 1176,
|
||||
"watchers_count": 1176,
|
||||
"has_discussions": false,
|
||||
"forks_count": 345,
|
||||
"allow_forking": true,
|
||||
|
@ -1914,7 +1914,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 345,
|
||||
"watchers": 1175,
|
||||
"watchers": 1176,
|
||||
"score": 0,
|
||||
"subscribers_count": 69
|
||||
},
|
||||
|
@ -2497,10 +2497,10 @@
|
|||
"description": "Public work for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-23T03:15:53Z",
|
||||
"updated_at": "2024-08-24T09:50:01Z",
|
||||
"updated_at": "2025-01-14T12:19:03Z",
|
||||
"pushed_at": "2019-11-19T02:43:38Z",
|
||||
"stargazers_count": 289,
|
||||
"watchers_count": 289,
|
||||
"stargazers_count": 290,
|
||||
"watchers_count": 290,
|
||||
"has_discussions": false,
|
||||
"forks_count": 91,
|
||||
"allow_forking": true,
|
||||
|
@ -2509,7 +2509,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 91,
|
||||
"watchers": 289,
|
||||
"watchers": 290,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
@ -2962,10 +2962,10 @@
|
|||
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T19:46:21Z",
|
||||
"updated_at": "2024-11-04T16:40:49Z",
|
||||
"updated_at": "2025-01-14T12:23:12Z",
|
||||
"pushed_at": "2021-02-06T00:24:21Z",
|
||||
"stargazers_count": 234,
|
||||
"watchers_count": 234,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"has_discussions": false,
|
||||
"forks_count": 74,
|
||||
"allow_forking": true,
|
||||
|
@ -2974,7 +2974,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"watchers": 234,
|
||||
"watchers": 235,
|
||||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
},
|
||||
|
@ -3024,10 +3024,10 @@
|
|||
"description": "CVE-2019-0708 (BlueKeep)",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-07T10:13:11Z",
|
||||
"updated_at": "2024-12-25T11:28:16Z",
|
||||
"updated_at": "2025-01-14T12:19:27Z",
|
||||
"pushed_at": "2020-07-07T15:28:13Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -3036,7 +3036,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -171,37 +171,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 481430471,
|
||||
"name": "CVE-2019-11447",
|
||||
"full_name": "banomaly\/CVE-2019-11447",
|
||||
"owner": {
|
||||
"login": "banomaly",
|
||||
"id": 51972282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
|
||||
"html_url": "https:\/\/github.com\/banomaly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/banomaly\/CVE-2019-11447",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-14T01:45:04Z",
|
||||
"updated_at": "2022-04-14T01:56:44Z",
|
||||
"pushed_at": "2022-04-14T02:52:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 736750785,
|
||||
"name": "CVE-2019-11447_reverse_shell_upload",
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "AppXSvc Arbitrary File Security Descriptor Overwrite EoP",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-11T23:28:59Z",
|
||||
"updated_at": "2024-08-12T19:52:55Z",
|
||||
"updated_at": "2025-01-14T18:02:41Z",
|
||||
"pushed_at": "2019-09-15T17:09:51Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -126,7 +126,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -155,35 +155,35 @@
|
|||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 300985470,
|
||||
"id": 302162339,
|
||||
"name": "CVE-2019-16113",
|
||||
"full_name": "banomaly\/CVE-2019-16113",
|
||||
"full_name": "m4rm0k\/CVE-2019-16113",
|
||||
"owner": {
|
||||
"login": "banomaly",
|
||||
"id": 51972282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
|
||||
"html_url": "https:\/\/github.com\/banomaly",
|
||||
"login": "m4rm0k",
|
||||
"id": 3755563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3755563?v=4",
|
||||
"html_url": "https:\/\/github.com\/m4rm0k",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/banomaly\/CVE-2019-16113",
|
||||
"html_url": "https:\/\/github.com\/m4rm0k\/CVE-2019-16113",
|
||||
"description": "Bludit 3.9.2 - Remote command execution - CVE-2019-16113",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-03T21:38:39Z",
|
||||
"updated_at": "2024-10-24T22:21:49Z",
|
||||
"pushed_at": "2020-10-12T19:01:20Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"created_at": "2020-10-07T21:16:53Z",
|
||||
"updated_at": "2020-10-07T21:16:55Z",
|
||||
"pushed_at": "2020-10-03T21:48:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 336189382,
|
||||
|
@ -216,37 +216,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 478819535,
|
||||
"name": "CVE-2019-16113_",
|
||||
"full_name": "banomaly\/CVE-2019-16113_",
|
||||
"owner": {
|
||||
"login": "banomaly",
|
||||
"id": 51972282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
|
||||
"html_url": "https:\/\/github.com\/banomaly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/banomaly\/CVE-2019-16113_",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-07T03:57:15Z",
|
||||
"updated_at": "2024-10-17T07:18:21Z",
|
||||
"pushed_at": "2022-04-14T02:56:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 778977291,
|
||||
"name": "CVE-2019-16113",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "WordPress Backup Guard Authenticated Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-30T11:28:53Z",
|
||||
"updated_at": "2024-08-12T20:15:08Z",
|
||||
"updated_at": "2025-01-14T15:04:50Z",
|
||||
"pushed_at": "2021-07-30T11:35:54Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -333,10 +333,10 @@
|
|||
"description": "Polkit D-Bus Authentication Bypass Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-30T11:41:34Z",
|
||||
"updated_at": "2024-08-12T20:15:08Z",
|
||||
"updated_at": "2025-01-14T15:04:50Z",
|
||||
"pushed_at": "2021-07-30T11:43:32Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -345,7 +345,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -231,10 +231,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2025-01-13T00:52:10Z",
|
||||
"updated_at": "2025-01-14T13:26:52Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1609,
|
||||
"watchers_count": 1609,
|
||||
"stargazers_count": 1610,
|
||||
"watchers_count": 1610,
|
||||
"has_discussions": false,
|
||||
"forks_count": 481,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 481,
|
||||
"watchers": 1609,
|
||||
"watchers": 1610,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -9179,43 +9179,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 440154999,
|
||||
"name": "log4j-dork-scanner",
|
||||
"full_name": "cergo123\/log4j-dork-scanner",
|
||||
"owner": {
|
||||
"login": "cergo123",
|
||||
"id": 41321155,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41321155?v=4",
|
||||
"html_url": "https:\/\/github.com\/cergo123",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cergo123\/log4j-dork-scanner",
|
||||
"description": "A script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T12:01:52Z",
|
||||
"updated_at": "2024-08-23T22:44:57Z",
|
||||
"pushed_at": "2021-12-20T12:03:48Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2021-44228",
|
||||
"dork-scanner",
|
||||
"log4j",
|
||||
"python-script",
|
||||
"scanner"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 440177006,
|
||||
"name": "log4shell-war-fixer",
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 8,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"has_discussions": true,
|
||||
"forks_count": 47,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
"unisoc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"forks": 48,
|
||||
"watchers": 320,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-22T10:38:02Z",
|
||||
"updated_at": "2025-01-02T22:31:57Z",
|
||||
"updated_at": "2025-01-14T16:35:23Z",
|
||||
"pushed_at": "2024-01-24T13:45:56Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
33
2023/CVE-2023-32590.json
Normal file
33
2023/CVE-2023-32590.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 915586971,
|
||||
"name": "CVE-2023-32590",
|
||||
"full_name": "RandomRobbieBF\/CVE-2023-32590",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-32590",
|
||||
"description": "Subscribe to Category <= 2.7.4 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-12T09:03:52Z",
|
||||
"updated_at": "2025-01-14T12:42:54Z",
|
||||
"pushed_at": "2025-01-12T09:04:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2025-01-14T00:54:58Z",
|
||||
"updated_at": "2025-01-14T17:20:49Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1382,
|
||||
"watchers_count": 1382,
|
||||
"stargazers_count": 1384,
|
||||
"watchers_count": 1384,
|
||||
"has_discussions": false,
|
||||
"forks_count": 238,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 238,
|
||||
"watchers": 1382,
|
||||
"watchers": 1384,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -255,5 +255,36 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 916614674,
|
||||
"name": "pulse-meter",
|
||||
"full_name": "rxwx\/pulse-meter",
|
||||
"owner": {
|
||||
"login": "rxwx",
|
||||
"id": 2202542,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
|
||||
"html_url": "https:\/\/github.com\/rxwx",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rxwx\/pulse-meter",
|
||||
"description": "Parses the System Snapshot from an Ivanti Connect Secure applicance to identify possible IOCs related to CVE-2023-46805, CVE-2024-21887 and CVE-2025-0282.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-14T12:54:19Z",
|
||||
"updated_at": "2025-01-14T13:36:46Z",
|
||||
"pushed_at": "2025-01-14T13:36:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -262,10 +262,10 @@
|
|||
"description": "CVE-2024-0044",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-19T02:51:14Z",
|
||||
"updated_at": "2025-01-09T14:50:12Z",
|
||||
"updated_at": "2025-01-14T13:34:13Z",
|
||||
"pushed_at": "2024-08-24T06:32:58Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -278,7 +278,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
33
2024/CVE-2024-10571.json
Normal file
33
2024/CVE-2024-10571.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 916037793,
|
||||
"name": "CVE-2024-10571",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-10571",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10571",
|
||||
"description": "Chartify – WordPress Chart Plugin <= 2.9.5 - Unauthenticated Local File Inclusion via source",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-13T10:38:31Z",
|
||||
"updated_at": "2025-01-14T12:39:22Z",
|
||||
"pushed_at": "2025-01-13T10:38:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-11396.json
Normal file
33
2024/CVE-2024-11396.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 916075937,
|
||||
"name": "CVE-2024-11396",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-11396",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-11396",
|
||||
"description": "Event monster <= 1.4.3 - Information Exposure Via Visitors List Export",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-13T12:12:12Z",
|
||||
"updated_at": "2025-01-14T12:38:39Z",
|
||||
"pushed_at": "2025-01-13T12:12:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-12157.json
Normal file
33
2024/CVE-2024-12157.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 913334922,
|
||||
"name": "CVE-2024-12157",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-12157",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12157",
|
||||
"description": "Popup – MailChimp, GetResponse and ActiveCampaign Intergrations <= 3.2.6 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-07T13:40:05Z",
|
||||
"updated_at": "2025-01-14T12:42:29Z",
|
||||
"pushed_at": "2025-01-07T13:41:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-12252.json
Normal file
33
2024/CVE-2024-12252.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 913410162,
|
||||
"name": "CVE-2024-12252",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-12252",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12252",
|
||||
"description": "SEO LAT Auto Post <= 2.2.1 - Missing Authorization to File Overwrite\/Upload (Remote Code Execution)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-07T16:22:35Z",
|
||||
"updated_at": "2025-01-14T12:42:05Z",
|
||||
"pushed_at": "2025-01-07T16:28:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-12404.json
Normal file
33
2024/CVE-2024-12404.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 914905137,
|
||||
"name": "CVE-2024-12404",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-12404",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12404",
|
||||
"description": "CF Internal Link Shortcode <= 1.1.0 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-10T14:52:22Z",
|
||||
"updated_at": "2025-01-14T12:41:00Z",
|
||||
"pushed_at": "2025-01-10T14:53:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-12535.json
Normal file
33
2024/CVE-2024-12535.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 913375484,
|
||||
"name": "CVE-2024-12535",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-12535",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12535",
|
||||
"description": "Host PHP Info <= 1.0.4 - Missing Authorization to Unauthenticated Sensitive Information Disclosure",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-07T15:08:14Z",
|
||||
"updated_at": "2025-01-14T12:42:19Z",
|
||||
"pushed_at": "2025-01-07T15:09:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -215,5 +215,36 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 916614674,
|
||||
"name": "pulse-meter",
|
||||
"full_name": "rxwx\/pulse-meter",
|
||||
"owner": {
|
||||
"login": "rxwx",
|
||||
"id": 2202542,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
|
||||
"html_url": "https:\/\/github.com\/rxwx",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rxwx\/pulse-meter",
|
||||
"description": "Parses the System Snapshot from an Ivanti Connect Secure applicance to identify possible IOCs related to CVE-2023-46805, CVE-2024-21887 and CVE-2025-0282.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-14T12:54:19Z",
|
||||
"updated_at": "2025-01-14T13:36:46Z",
|
||||
"pushed_at": "2025-01-14T13:36:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -76,12 +76,12 @@
|
|||
"description": "Exploit PoC for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T19:33:08Z",
|
||||
"updated_at": "2025-01-13T20:13:25Z",
|
||||
"updated_at": "2025-01-14T14:41:23Z",
|
||||
"pushed_at": "2024-05-19T07:12:00Z",
|
||||
"stargazers_count": 520,
|
||||
"watchers_count": 520,
|
||||
"stargazers_count": 521,
|
||||
"watchers_count": 521,
|
||||
"has_discussions": false,
|
||||
"forks_count": 146,
|
||||
"forks_count": 147,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -92,8 +92,8 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 146,
|
||||
"watchers": 520,
|
||||
"forks": 147,
|
||||
"watchers": 521,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -111,8 +111,8 @@
|
|||
"description": "CVE-2024-35250 PoC - Optimized & Condensed Form of Varwara's PoC",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-13T18:24:48Z",
|
||||
"updated_at": "2025-01-13T18:37:11Z",
|
||||
"pushed_at": "2025-01-13T18:38:26Z",
|
||||
"updated_at": "2025-01-14T16:51:38Z",
|
||||
"pushed_at": "2025-01-14T16:51:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
33
2024/CVE-2024-3605.json
Normal file
33
2024/CVE-2024-3605.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 915570014,
|
||||
"name": "CVE-2024-3605",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-3605",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-3605",
|
||||
"description": "WP Hotel Booking <= 2.1.0 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-12T07:53:02Z",
|
||||
"updated_at": "2025-01-14T12:40:20Z",
|
||||
"pushed_at": "2025-01-12T07:54:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -501,15 +501,15 @@
|
|||
{
|
||||
"id": 851683675,
|
||||
"name": "Cve-2024-38063",
|
||||
"full_name": "Brownpanda29\/Cve-2024-38063",
|
||||
"full_name": "brownpanda29\/Cve-2024-38063",
|
||||
"owner": {
|
||||
"login": "Brownpanda29",
|
||||
"login": "brownpanda29",
|
||||
"id": 147920175,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147920175?v=4",
|
||||
"html_url": "https:\/\/github.com\/Brownpanda29",
|
||||
"html_url": "https:\/\/github.com\/brownpanda29",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Brownpanda29\/Cve-2024-38063",
|
||||
"html_url": "https:\/\/github.com\/brownpanda29\/Cve-2024-38063",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-09-03T14:36:35Z",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Makes IDA (most versions) to crash upon opening it. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-25T12:33:14Z",
|
||||
"updated_at": "2025-01-09T06:39:31Z",
|
||||
"updated_at": "2025-01-14T15:52:54Z",
|
||||
"pushed_at": "2024-08-30T09:58:12Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-08T01:56:41Z",
|
||||
"updated_at": "2025-01-11T05:59:03Z",
|
||||
"updated_at": "2025-01-14T15:20:53Z",
|
||||
"pushed_at": "2025-01-11T05:59:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-03T07:05:33Z",
|
||||
"updated_at": "2025-01-13T09:53:17Z",
|
||||
"updated_at": "2025-01-14T18:05:52Z",
|
||||
"pushed_at": "2025-01-03T08:20:03Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 9,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -384,13 +384,13 @@
|
|||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
33
2024/CVE-2024-49699.json
Normal file
33
2024/CVE-2024-49699.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 914941212,
|
||||
"name": "CVE-2024-49699",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-49699",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-49699",
|
||||
"description": "ARPrice <= 4.0.3 - Authenticated (Subscriber+) PHP Object Injection",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-10T16:15:07Z",
|
||||
"updated_at": "2025-01-14T12:40:49Z",
|
||||
"pushed_at": "2025-01-10T16:18:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -262,10 +262,10 @@
|
|||
"description": "CVE-2024-50379-exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-25T02:41:31Z",
|
||||
"updated_at": "2025-01-14T11:50:00Z",
|
||||
"updated_at": "2025-01-14T18:05:32Z",
|
||||
"pushed_at": "2024-12-31T07:11:13Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -274,7 +274,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
33
2024/CVE-2024-50491.json
Normal file
33
2024/CVE-2024-50491.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 915564003,
|
||||
"name": "CVE-2024-50491",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-50491",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-50491",
|
||||
"description": "RSVP ME <= 1.9.9 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-12T07:26:48Z",
|
||||
"updated_at": "2025-01-14T12:40:35Z",
|
||||
"pushed_at": "2025-01-12T07:27:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-5124 poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-03T03:18:48Z",
|
||||
"updated_at": "2025-01-13T18:16:21Z",
|
||||
"updated_at": "2025-01-14T18:04:03Z",
|
||||
"pushed_at": "2024-12-03T04:01:32Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
33
2024/CVE-2024-51818.json
Normal file
33
2024/CVE-2024-51818.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 914288330,
|
||||
"name": "CVE-2024-51818",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-51818",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-51818",
|
||||
"description": "Fancy Product Designer <= 6.4.3 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-09T10:00:30Z",
|
||||
"updated_at": "2025-01-14T12:41:40Z",
|
||||
"pushed_at": "2025-01-09T10:01:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CyberPanel authenticated RCE < 2.3.8",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-15T22:40:52Z",
|
||||
"updated_at": "2025-01-09T08:56:12Z",
|
||||
"updated_at": "2025-01-14T18:05:01Z",
|
||||
"pushed_at": "2024-12-19T09:36:58Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
33
2024/CVE-2024-54292.json
Normal file
33
2024/CVE-2024-54292.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 913434304,
|
||||
"name": "CVE-2024-54292",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-54292",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54292",
|
||||
"description": "Appsplate <= 2.1.3 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-07T17:14:57Z",
|
||||
"updated_at": "2025-01-14T12:41:56Z",
|
||||
"pushed_at": "2025-01-07T17:15:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Escape macOS Sandbox using sharedfilelistd exploit",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-08T09:55:44Z",
|
||||
"updated_at": "2025-01-14T11:32:32Z",
|
||||
"updated_at": "2025-01-14T18:13:40Z",
|
||||
"pushed_at": "2025-01-09T06:34:50Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 43,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
33
2024/CVE-2024-56058.json
Normal file
33
2024/CVE-2024-56058.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 916058182,
|
||||
"name": "CVE-2024-56058",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-56058",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56058",
|
||||
"description": "VRPConnector <= 2.0.1 - Unauthenticated PHP Object Injection",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-13T11:27:53Z",
|
||||
"updated_at": "2025-01-14T12:39:13Z",
|
||||
"pushed_at": "2025-01-13T11:30:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-56059.json
Normal file
33
2024/CVE-2024-56059.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 916073116,
|
||||
"name": "CVE-2024-56059",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-56059",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56059",
|
||||
"description": "Partners <= 0.2.0 - Unauthenticated PHP Object Injection",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-13T12:05:21Z",
|
||||
"updated_at": "2025-01-14T12:38:58Z",
|
||||
"pushed_at": "2025-01-13T12:05:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-56064.json
Normal file
33
2024/CVE-2024-56064.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 914434121,
|
||||
"name": "CVE-2024-56064",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-56064",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56064",
|
||||
"description": "WP SuperBackup <= 2.3.3 - Unauthenticated Arbitrary File Upload",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-09T15:35:39Z",
|
||||
"updated_at": "2025-01-14T12:41:11Z",
|
||||
"pushed_at": "2025-01-09T15:36:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-56067.json
Normal file
33
2024/CVE-2024-56067.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 914305639,
|
||||
"name": "CVE-2024-56067",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-56067",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-56067",
|
||||
"description": "WP SuperBackup <= 2.3.3 - Missing Authorization to Unauthenticated Back-Up File Download",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-09T10:40:33Z",
|
||||
"updated_at": "2025-01-14T12:41:21Z",
|
||||
"pushed_at": "2025-01-09T10:42:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-20T03:34:01Z",
|
||||
"updated_at": "2025-01-12T18:35:39Z",
|
||||
"updated_at": "2025-01-14T18:05:18Z",
|
||||
"pushed_at": "2024-12-23T12:51:54Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 37,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Proof of Concept Exploit for CVE-2024-9465",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-03T12:16:44Z",
|
||||
"updated_at": "2025-01-13T18:16:00Z",
|
||||
"updated_at": "2025-01-14T18:04:05Z",
|
||||
"pushed_at": "2024-12-03T12:21:35Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Safely detect if an Ivanti server is vulnerable to CVE-2025-0282",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-09T18:43:08Z",
|
||||
"updated_at": "2025-01-13T22:15:51Z",
|
||||
"updated_at": "2025-01-14T14:23:44Z",
|
||||
"pushed_at": "2025-01-10T21:27:47Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -107,10 +107,10 @@
|
|||
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-11T02:06:51Z",
|
||||
"updated_at": "2025-01-14T02:14:50Z",
|
||||
"updated_at": "2025-01-14T15:03:56Z",
|
||||
"pushed_at": "2025-01-11T23:54:06Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -153,5 +153,36 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 916614674,
|
||||
"name": "pulse-meter",
|
||||
"full_name": "rxwx\/pulse-meter",
|
||||
"owner": {
|
||||
"login": "rxwx",
|
||||
"id": 2202542,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
|
||||
"html_url": "https:\/\/github.com\/rxwx",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rxwx\/pulse-meter",
|
||||
"description": "Parses the System Snapshot from an Ivanti Connect Secure applicance to identify possible IOCs related to CVE-2023-46805, CVE-2024-21887 and CVE-2025-0282.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-14T12:54:19Z",
|
||||
"updated_at": "2025-01-14T13:36:46Z",
|
||||
"pushed_at": "2025-01-14T13:36:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
122
README.md
122
README.md
|
@ -11,6 +11,7 @@
|
|||
- [NyxanGoat/CVE-2025-0282-PoC](https://github.com/NyxanGoat/CVE-2025-0282-PoC)
|
||||
- [absholi7ly/CVE-2025-0282-Ivanti-exploit](https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit)
|
||||
- [AnonStorks/CVE-2025-0282-Full-version](https://github.com/AnonStorks/CVE-2025-0282-Full-version)
|
||||
- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter)
|
||||
|
||||
### CVE-2025-22352 (2025-01-07)
|
||||
|
||||
|
@ -866,6 +867,13 @@
|
|||
|
||||
- [alperenugurlu/CVE-2024-3596-Detector](https://github.com/alperenugurlu/CVE-2024-3596-Detector)
|
||||
|
||||
### CVE-2024-3605 (2024-06-20)
|
||||
|
||||
<code>The WP Hotel Booking plugin for WordPress is vulnerable to SQL Injection via the 'room_type' parameter of the /wphb/v1/rooms/search-rooms REST API endpoint in all versions up to, and including, 2.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-3605](https://github.com/RandomRobbieBF/CVE-2024-3605)
|
||||
|
||||
### CVE-2024-3656 (2024-10-09)
|
||||
|
||||
<code>A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.
|
||||
|
@ -2231,6 +2239,13 @@
|
|||
|
||||
- [bevennyamande/CVE-2024-10557](https://github.com/bevennyamande/CVE-2024-10557)
|
||||
|
||||
### CVE-2024-10571 (2024-11-14)
|
||||
|
||||
<code>The Chartify – WordPress Chart Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.9.5 via the 'source' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-10571](https://github.com/RandomRobbieBF/CVE-2024-10571)
|
||||
|
||||
### CVE-2024-10586 (2024-11-09)
|
||||
|
||||
<code>The Debug Tool plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the dbt_pull_image() function and missing file type validation in all versions up to, and including, 2.2. This makes it possible for unauthenticated attackers to to create arbitrary files such as .php files that can be leveraged for remote code execution.
|
||||
|
@ -2412,6 +2427,13 @@
|
|||
|
||||
- [Piyush-Bhor/CVE-2024-11394](https://github.com/Piyush-Bhor/CVE-2024-11394)
|
||||
|
||||
### CVE-2024-11396 (2025-01-13)
|
||||
|
||||
<code>The Event Monster – Event Management, Tickets Booking, Upcoming Event plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.4.3 via the Visitors List Export file. During the export, a CSV file is created in the wp-content folder with a hardcoded filename that is publicly accessible. This makes it possible for unauthenticated attackers to extract data about event visitors, that includes first and last names, email, and phone number.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-11396](https://github.com/RandomRobbieBF/CVE-2024-11396)
|
||||
|
||||
### CVE-2024-11412 (2024-11-21)
|
||||
|
||||
<code>The Shine PDF Embeder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'shinepdf' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
||||
|
@ -2503,6 +2525,13 @@
|
|||
|
||||
- [McTavishSue/CVE-2024-12155](https://github.com/McTavishSue/CVE-2024-12155)
|
||||
|
||||
### CVE-2024-12157 (2025-01-07)
|
||||
|
||||
<code>The Popup – MailChimp, GetResponse and ActiveCampaign Intergrations plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter of the 'upc_delete_db_record' AJAX action in all versions up to, and including, 3.2.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-12157](https://github.com/RandomRobbieBF/CVE-2024-12157)
|
||||
|
||||
### CVE-2024-12172 (2024-12-12)
|
||||
|
||||
<code>The WP Courses LMS – Online Courses Builder, eLearning Courses, Courses Solution, Education Courses plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpc_update_user_meta_option() function in all versions up to, and including, 3.2.21. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary user's metadata which can be levereged to block an administrator from accessing their site when wp_capabilities is set to 0.
|
||||
|
@ -2518,6 +2547,13 @@
|
|||
- [RandomRobbieBF/CVE-2024-12209](https://github.com/RandomRobbieBF/CVE-2024-12209)
|
||||
- [Nxploited/CVE-2024-12209](https://github.com/Nxploited/CVE-2024-12209)
|
||||
|
||||
### CVE-2024-12252 (2025-01-07)
|
||||
|
||||
<code>The SEO LAT Auto Post plugin for WordPress is vulnerable to file overwrite due to a missing capability check on the remote_update AJAX action in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to overwrite the seo-beginner-auto-post.php file which can be leveraged to achieve remote code execution.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-12252](https://github.com/RandomRobbieBF/CVE-2024-12252)
|
||||
|
||||
### CVE-2024-12270 (2024-12-07)
|
||||
|
||||
<code>The Beautiful taxonomy filters plugin for WordPress is vulnerable to SQL Injection via the 'selects[0][term]' parameter in all versions up to, and including, 2.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
||||
|
@ -2528,6 +2564,13 @@
|
|||
### CVE-2024-12345
|
||||
- [RoyaRadin/CVE-2024-12345-POC](https://github.com/RoyaRadin/CVE-2024-12345-POC)
|
||||
|
||||
### CVE-2024-12404 (2025-01-11)
|
||||
|
||||
<code>The CF Internal Link Shortcode plugin for WordPress is vulnerable to SQL Injection via the 'post_title' parameter in all versions up to, and including, 1.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-12404](https://github.com/RandomRobbieBF/CVE-2024-12404)
|
||||
|
||||
### CVE-2024-12471 (2025-01-07)
|
||||
|
||||
<code>The Post Saint: ChatGPT, GPT4, DALL-E, Stable Diffusion, Pexels, Dezgo AI Text & Image Generator plugin for WordPress is vulnerable to arbitrary files uploads due to a missing capability check and file type validation on the add_image_to_library AJAX action function in all versions up to, and including, 1.3.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files that make remote code execution possible.
|
||||
|
@ -2542,6 +2585,13 @@
|
|||
|
||||
- [LiChaser/CVE-2024-12484](https://github.com/LiChaser/CVE-2024-12484)
|
||||
|
||||
### CVE-2024-12535 (2025-01-07)
|
||||
|
||||
<code>The Host PHP Info plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-12535](https://github.com/RandomRobbieBF/CVE-2024-12535)
|
||||
|
||||
### CVE-2024-12542 (2025-01-09)
|
||||
|
||||
<code>The linkID plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 0.1.2. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited.
|
||||
|
@ -2957,6 +3007,7 @@
|
|||
- [seajaysec/Ivanti-Connect-Around-Scan](https://github.com/seajaysec/Ivanti-Connect-Around-Scan)
|
||||
- [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped)
|
||||
- [tucommenceapousser/CVE-2024-21887](https://github.com/tucommenceapousser/CVE-2024-21887)
|
||||
- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter)
|
||||
|
||||
### CVE-2024-21893 (2024-01-31)
|
||||
|
||||
|
@ -5891,7 +5942,7 @@
|
|||
- [ThemeHackers/CVE-2024-38063](https://github.com/ThemeHackers/CVE-2024-38063)
|
||||
- [KernelKraze/CVE-2024-38063_PoC](https://github.com/KernelKraze/CVE-2024-38063_PoC)
|
||||
- [ps-interactive/cve-2024-38063](https://github.com/ps-interactive/cve-2024-38063)
|
||||
- [Brownpanda29/Cve-2024-38063](https://github.com/Brownpanda29/Cve-2024-38063)
|
||||
- [brownpanda29/Cve-2024-38063](https://github.com/brownpanda29/Cve-2024-38063)
|
||||
- [FrancescoDiSalesGithub/quick-fix-cve-2024-38063](https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063)
|
||||
- [Faizan-Khanx/CVE-2024-38063](https://github.com/Faizan-Khanx/CVE-2024-38063)
|
||||
- [ArenaldyP/CVE-2024-38063-Medium](https://github.com/ArenaldyP/CVE-2024-38063-Medium)
|
||||
|
@ -7441,6 +7492,9 @@
|
|||
|
||||
- [RandomRobbieBF/CVE-2024-49681](https://github.com/RandomRobbieBF/CVE-2024-49681)
|
||||
|
||||
### CVE-2024-49699
|
||||
- [RandomRobbieBF/CVE-2024-49699](https://github.com/RandomRobbieBF/CVE-2024-49699)
|
||||
|
||||
### CVE-2024-50251 (2024-11-09)
|
||||
|
||||
<code>In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_payload: sanitize offset and length before calling skb_checksum()\n\nIf access to offset + length is larger than the skbuff length, then\nskb_checksum() triggers BUG_ON().\n\nskb_checksum() internally subtracts the length parameter while iterating\nover skbuff, BUG_ON(len) at the end of it checks that the expected\nlength to be included in the checksum calculation is fully consumed.
|
||||
|
@ -7577,6 +7631,13 @@
|
|||
|
||||
- [RandomRobbieBF/CVE-2024-50490](https://github.com/RandomRobbieBF/CVE-2024-50490)
|
||||
|
||||
### CVE-2024-50491 (2024-10-28)
|
||||
|
||||
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Micah Blu RSVP ME allows SQL Injection.This issue affects RSVP ME: from n/a through 1.9.9.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-50491](https://github.com/RandomRobbieBF/CVE-2024-50491)
|
||||
|
||||
### CVE-2024-50493 (2024-10-29)
|
||||
|
||||
<code>Unrestricted Upload of File with Dangerous Type vulnerability in masterhomepage Automatic Translation allows Upload a Web Shell to a Web Server.This issue affects Automatic Translation: from n/a through 1.0.4.
|
||||
|
@ -7845,6 +7906,9 @@
|
|||
|
||||
- [l20170217b/CVE-2024-51747](https://github.com/l20170217b/CVE-2024-51747)
|
||||
|
||||
### CVE-2024-51818
|
||||
- [RandomRobbieBF/CVE-2024-51818](https://github.com/RandomRobbieBF/CVE-2024-51818)
|
||||
|
||||
### CVE-2024-52002 (2024-11-08)
|
||||
|
||||
<code>Combodo iTop is a simple, web based IT Service Management tool. Several url endpoints are subject to a Cross-Site Request Forgery (CSRF) vulnerability. Please refer to the linked GHSA for the complete list. This issue has been addressed in version 3.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
|
||||
|
@ -8049,6 +8113,13 @@
|
|||
|
||||
- [RandomRobbieBF/CVE-2024-54262](https://github.com/RandomRobbieBF/CVE-2024-54262)
|
||||
|
||||
### CVE-2024-54292 (2024-12-13)
|
||||
|
||||
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Appsplate Appsplate allows SQL Injection.This issue affects Appsplate: from n/a through 2.1.3.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-54292](https://github.com/RandomRobbieBF/CVE-2024-54292)
|
||||
|
||||
### CVE-2024-54330 (2024-12-13)
|
||||
|
||||
<code>Server-Side Request Forgery (SSRF) vulnerability in Hep Hep Hurra (HHH) Hurrakify allows Server Side Request Forgery.This issue affects Hurrakify: from n/a through 2.4.
|
||||
|
@ -8220,6 +8291,34 @@
|
|||
|
||||
- [RandomRobbieBF/CVE-2024-55988](https://github.com/RandomRobbieBF/CVE-2024-55988)
|
||||
|
||||
### CVE-2024-56058 (2024-12-18)
|
||||
|
||||
<code>Deserialization of Untrusted Data vulnerability in Gueststream VRPConnector allows Object Injection.This issue affects VRPConnector: from n/a through 2.0.1.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-56058](https://github.com/RandomRobbieBF/CVE-2024-56058)
|
||||
|
||||
### CVE-2024-56059 (2024-12-18)
|
||||
|
||||
<code>Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability in Mighty Digital Partners allows Object Injection.This issue affects Partners: from n/a through 0.2.0.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-56059](https://github.com/RandomRobbieBF/CVE-2024-56059)
|
||||
|
||||
### CVE-2024-56064 (2024-12-31)
|
||||
|
||||
<code>Unrestricted Upload of File with Dangerous Type vulnerability in Azzaroco WP SuperBackup allows Upload a Web Shell to a Web Server.This issue affects WP SuperBackup: from n/a through 2.3.3.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-56064](https://github.com/RandomRobbieBF/CVE-2024-56064)
|
||||
|
||||
### CVE-2024-56067 (2024-12-31)
|
||||
|
||||
<code>Missing Authorization vulnerability in Azzaroco WP SuperBackup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP SuperBackup: from n/a through 2.3.3.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-56067](https://github.com/RandomRobbieBF/CVE-2024-56067)
|
||||
|
||||
### CVE-2024-56115 (2024-12-18)
|
||||
|
||||
<code>A vulnerability in Amiro.CMS before 7.8.4 exists due to the failure to take measures to neutralize special elements. It allows remote attackers to conduct a Cross-Site Scripting (XSS) attack.
|
||||
|
@ -12520,6 +12619,13 @@
|
|||
- [Tris0n/CVE-2023-32571-POC](https://github.com/Tris0n/CVE-2023-32571-POC)
|
||||
- [vert16x/CVE-2023-32571-POC](https://github.com/vert16x/CVE-2023-32571-POC)
|
||||
|
||||
### CVE-2023-32590 (2023-12-20)
|
||||
|
||||
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Daniel Söderström / Sidney van de Stouwe Subscribe to Category.This issue affects Subscribe to Category: from n/a through 2.7.4.\n\n
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2023-32590](https://github.com/RandomRobbieBF/CVE-2023-32590)
|
||||
|
||||
### CVE-2023-32629 (2023-07-26)
|
||||
|
||||
<code>Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels
|
||||
|
@ -15733,6 +15839,7 @@
|
|||
- [Chocapikk/CVE-2023-46805](https://github.com/Chocapikk/CVE-2023-46805)
|
||||
- [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped)
|
||||
- [w2xim3/CVE-2023-46805](https://github.com/w2xim3/CVE-2023-46805)
|
||||
- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter)
|
||||
|
||||
### CVE-2023-46813 (2023-10-27)
|
||||
|
||||
|
@ -29737,7 +29844,6 @@
|
|||
- [TotallyNotAHaxxer/f-for-java](https://github.com/TotallyNotAHaxxer/f-for-java)
|
||||
- [spasam/log4j2-exploit](https://github.com/spasam/log4j2-exploit)
|
||||
- [bumheehan/cve-2021-44228-log4j-test](https://github.com/bumheehan/cve-2021-44228-log4j-test)
|
||||
- [cergo123/log4j-dork-scanner](https://github.com/cergo123/log4j-dork-scanner)
|
||||
- [dmitsuo/log4shell-war-fixer](https://github.com/dmitsuo/log4shell-war-fixer)
|
||||
- [Y0-kan/Log4jShell-Scan](https://github.com/Y0-kan/Log4jShell-Scan)
|
||||
- [julian911015/Log4j-Scanner-Exploit](https://github.com/julian911015/Log4j-Scanner-Exploit)
|
||||
|
@ -37766,7 +37872,6 @@
|
|||
- [dinesh876/CVE-2019-11447-POC](https://github.com/dinesh876/CVE-2019-11447-POC)
|
||||
- [ColdFusionX/CVE-2019-11447_CuteNews-AvatarUploadRCE](https://github.com/ColdFusionX/CVE-2019-11447_CuteNews-AvatarUploadRCE)
|
||||
- [thewhiteh4t/cve-2019-11447](https://github.com/thewhiteh4t/cve-2019-11447)
|
||||
- [banomaly/CVE-2019-11447](https://github.com/banomaly/CVE-2019-11447)
|
||||
- [substing/CVE-2019-11447_reverse_shell_upload](https://github.com/substing/CVE-2019-11447_reverse_shell_upload)
|
||||
- [CRFSlick/CVE-2019-11447-POC](https://github.com/CRFSlick/CVE-2019-11447-POC)
|
||||
- [ojo5/CVE-2019-11447.c](https://github.com/ojo5/CVE-2019-11447.c)
|
||||
|
@ -38837,9 +38942,8 @@
|
|||
- [hg8/CVE-2019-16113-PoC](https://github.com/hg8/CVE-2019-16113-PoC)
|
||||
- [Kenun99/CVE-2019-16113-Dockerfile](https://github.com/Kenun99/CVE-2019-16113-Dockerfile)
|
||||
- [dldygnl/CVE-2019-16113](https://github.com/dldygnl/CVE-2019-16113)
|
||||
- [banomaly/CVE-2019-16113](https://github.com/banomaly/CVE-2019-16113)
|
||||
- [m4rm0k/CVE-2019-16113](https://github.com/m4rm0k/CVE-2019-16113)
|
||||
- [DXY0411/CVE-2019-16113](https://github.com/DXY0411/CVE-2019-16113)
|
||||
- [banomaly/CVE-2019-16113_](https://github.com/banomaly/CVE-2019-16113_)
|
||||
- [mind2hex/CVE-2019-16113](https://github.com/mind2hex/CVE-2019-16113)
|
||||
- [tronghoang89/cve-2019-16113](https://github.com/tronghoang89/cve-2019-16113)
|
||||
|
||||
|
@ -41012,7 +41116,6 @@
|
|||
- [0xAJ2K/CVE-2018-7600](https://github.com/0xAJ2K/CVE-2018-7600)
|
||||
- [rafaelcaria/drupalgeddon2-CVE-2018-7600](https://github.com/rafaelcaria/drupalgeddon2-CVE-2018-7600)
|
||||
- [vphnguyen/ANM_CVE-2018-7600](https://github.com/vphnguyen/ANM_CVE-2018-7600)
|
||||
- [banomaly/CVE-2018-7600](https://github.com/banomaly/CVE-2018-7600)
|
||||
- [anldori/CVE-2018-7600](https://github.com/anldori/CVE-2018-7600)
|
||||
- [r0lh/CVE-2018-7600](https://github.com/r0lh/CVE-2018-7600)
|
||||
- [killeveee/CVE-2018-7600](https://github.com/killeveee/CVE-2018-7600)
|
||||
|
@ -43869,7 +43972,6 @@
|
|||
- [testpilot031/vulnerability_struts-2.3.31](https://github.com/testpilot031/vulnerability_struts-2.3.31)
|
||||
- [readloud/CVE-2017-5638](https://github.com/readloud/CVE-2017-5638)
|
||||
- [Tankirat/CVE-2017-5638](https://github.com/Tankirat/CVE-2017-5638)
|
||||
- [banomaly/CVE-2017-5638](https://github.com/banomaly/CVE-2017-5638)
|
||||
- [mfdev-solution/Exploit-CVE-2017-5638](https://github.com/mfdev-solution/Exploit-CVE-2017-5638)
|
||||
- [mritunjay-k/CVE-2017-5638](https://github.com/mritunjay-k/CVE-2017-5638)
|
||||
- [FredBrave/CVE-2017-5638-ApacheStruts2.3.5](https://github.com/FredBrave/CVE-2017-5638-ApacheStruts2.3.5)
|
||||
|
@ -47701,7 +47803,6 @@
|
|||
</code>
|
||||
|
||||
- [dix0nym/CVE-2015-6967](https://github.com/dix0nym/CVE-2015-6967)
|
||||
- [banomaly/CVE-2015-6967](https://github.com/banomaly/CVE-2015-6967)
|
||||
- [FredBrave/CVE-2015-6967](https://github.com/FredBrave/CVE-2015-6967)
|
||||
- [3mpir3Albert/HTB_Nibbles](https://github.com/3mpir3Albert/HTB_Nibbles)
|
||||
|
||||
|
@ -48534,7 +48635,6 @@
|
|||
- [b4keSn4ke/CVE-2014-6271](https://github.com/b4keSn4ke/CVE-2014-6271)
|
||||
- [hadrian3689/shellshock](https://github.com/hadrian3689/shellshock)
|
||||
- [akr3ch/CVE-2014-6271](https://github.com/akr3ch/CVE-2014-6271)
|
||||
- [banomaly/CVE-2014-6271](https://github.com/banomaly/CVE-2014-6271)
|
||||
- [Gurguii/cgi-bin-shellshock](https://github.com/Gurguii/cgi-bin-shellshock)
|
||||
- [anujbhan/shellshock-victim-host](https://github.com/anujbhan/shellshock-victim-host)
|
||||
- [FilipStudeny/-CVE-2014-6271-Shellshock-Remote-Command-Injection-](https://github.com/FilipStudeny/-CVE-2014-6271-Shellshock-Remote-Command-Injection-)
|
||||
|
@ -49409,7 +49509,6 @@
|
|||
</code>
|
||||
|
||||
- [bitc0de/Elastix-Remote-Code-Execution](https://github.com/bitc0de/Elastix-Remote-Code-Execution)
|
||||
- [banomaly/CVE-2012-4869](https://github.com/banomaly/CVE-2012-4869)
|
||||
|
||||
### CVE-2012-4929 (2012-09-15)
|
||||
|
||||
|
@ -49981,7 +50080,6 @@
|
|||
- [zaphoxx/zaphoxx-coldfusion](https://github.com/zaphoxx/zaphoxx-coldfusion)
|
||||
- [n3rdh4x0r/CVE-2009-2265](https://github.com/n3rdh4x0r/CVE-2009-2265)
|
||||
- [p1ckzi/CVE-2009-2265](https://github.com/p1ckzi/CVE-2009-2265)
|
||||
- [banomaly/CVE-2009-2265](https://github.com/banomaly/CVE-2009-2265)
|
||||
- [0xDTC/Adobe-ColdFusion-8-RCE-CVE-2009-2265](https://github.com/0xDTC/Adobe-ColdFusion-8-RCE-CVE-2009-2265)
|
||||
|
||||
### CVE-2009-2692 (2009-08-14)
|
||||
|
@ -50266,7 +50364,6 @@
|
|||
- [3t4n/samba-3.0.24-CVE-2007-2447-vunerable-](https://github.com/3t4n/samba-3.0.24-CVE-2007-2447-vunerable-)
|
||||
- [xbufu/CVE-2007-2447](https://github.com/xbufu/CVE-2007-2447)
|
||||
- [s4msec/CVE-2007-2447](https://github.com/s4msec/CVE-2007-2447)
|
||||
- [banomaly/CVE-2007-2447](https://github.com/banomaly/CVE-2007-2447)
|
||||
- [Nosferatuvjr/Samba-Usermap-exploit](https://github.com/Nosferatuvjr/Samba-Usermap-exploit)
|
||||
- [testaross4/CVE-2007-2447](https://github.com/testaross4/CVE-2007-2447)
|
||||
- [mr-l0n3lly/CVE-2007-2447](https://github.com/mr-l0n3lly/CVE-2007-2447)
|
||||
|
@ -50279,6 +50376,7 @@
|
|||
- [ShivamDey/Samba-CVE-2007-2447-Exploit](https://github.com/ShivamDey/Samba-CVE-2007-2447-Exploit)
|
||||
- [Juantos/cve-2007-2447](https://github.com/Juantos/cve-2007-2447)
|
||||
- [IamLucif3r/CVE-2007-2447-Exploit](https://github.com/IamLucif3r/CVE-2007-2447-Exploit)
|
||||
- [foudadev/CVE-2007-2447](https://github.com/foudadev/CVE-2007-2447)
|
||||
|
||||
### CVE-2007-3280 (2007-06-19)
|
||||
|
||||
|
|
Loading…
Reference in a new issue