mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/10/27 00:30:55
This commit is contained in:
parent
b36aa43334
commit
d1deaa8dca
26 changed files with 83 additions and 147 deletions
|
@ -45,10 +45,10 @@
|
|||
"description": "BMC Bladelogic RSCD exploits including remote code execution - CVE-2016-1542, CVE-2016-1543, CVE-2016-5063",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-24T16:03:22Z",
|
||||
"updated_at": "2024-08-12T19:35:45Z",
|
||||
"updated_at": "2024-10-26T18:51:45Z",
|
||||
"pushed_at": "2020-04-17T14:38:14Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "frp bypass without account overwrite",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-08T12:26:23Z",
|
||||
"updated_at": "2024-01-19T11:41:15Z",
|
||||
"updated_at": "2024-10-26T18:29:55Z",
|
||||
"pushed_at": "2017-10-08T12:26:24Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-24T05:34:05Z",
|
||||
"updated_at": "2024-10-22T09:54:11Z",
|
||||
"updated_at": "2024-10-26T20:58:01Z",
|
||||
"pushed_at": "2020-10-16T12:09:45Z",
|
||||
"stargazers_count": 506,
|
||||
"watchers_count": 506,
|
||||
"stargazers_count": 507,
|
||||
"watchers_count": 507,
|
||||
"has_discussions": false,
|
||||
"forks_count": 453,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 453,
|
||||
"watchers": 506,
|
||||
"watchers": 507,
|
||||
"score": 0,
|
||||
"subscribers_count": 58
|
||||
},
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
"webkit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"forks": 52,
|
||||
"watchers": 201,
|
||||
"score": 0,
|
||||
"subscribers_count": 32
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by march 2023. Uses CVE-2019-16253 as a payload to obtain a system shell. ",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-19T19:47:13Z",
|
||||
"updated_at": "2024-09-30T01:16:37Z",
|
||||
"updated_at": "2024-10-26T22:39:41Z",
|
||||
"pushed_at": "2024-03-20T19:12:39Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
}
|
||||
|
|
|
@ -711,13 +711,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "writeup of CVE-2020-1362",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-17T07:35:05Z",
|
||||
"updated_at": "2024-08-12T20:03:50Z",
|
||||
"updated_at": "2024-10-26T21:02:39Z",
|
||||
"pushed_at": "2020-07-17T07:54:26Z",
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 230,
|
||||
"watchers": 231,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
}
|
||||
|
|
|
@ -90,6 +90,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 406,
|
||||
"watchers_count": 406,
|
||||
"has_discussions": false,
|
||||
"forks_count": 136,
|
||||
"forks_count": 137,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 136,
|
||||
"forks": 137,
|
||||
"watchers": 406,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -50,19 +50,19 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2024-10-24T10:24:15Z",
|
||||
"updated_at": "2024-10-26T19:36:59Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 790,
|
||||
"watchers_count": 790,
|
||||
"stargazers_count": 791,
|
||||
"watchers_count": 791,
|
||||
"has_discussions": false,
|
||||
"forks_count": 120,
|
||||
"forks_count": 121,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 120,
|
||||
"watchers": 790,
|
||||
"forks": 121,
|
||||
"watchers": 791,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -186,36 +186,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 878669450,
|
||||
"name": "SQLPad-RCE-Exploit-CVE-2022-0944",
|
||||
"full_name": "LipeOzyy\/SQLPad-RCE-Exploit-CVE-2022-0944",
|
||||
"owner": {
|
||||
"login": "LipeOzyy",
|
||||
"id": 151560338,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151560338?v=4",
|
||||
"html_url": "https:\/\/github.com\/LipeOzyy",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LipeOzyy\/SQLPad-RCE-Exploit-CVE-2022-0944",
|
||||
"description": "CVE-2022-0944 Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-25T20:31:09Z",
|
||||
"updated_at": "2024-10-26T14:04:56Z",
|
||||
"pushed_at": "2024-10-26T14:04:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "HTTP3-attacks (CVE-2022-30592)",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-06T09:57:43Z",
|
||||
"updated_at": "2024-09-23T14:27:22Z",
|
||||
"updated_at": "2024-10-26T21:39:52Z",
|
||||
"pushed_at": "2022-12-18T03:36:03Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "CVE-2023-22726",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-29T10:38:30Z",
|
||||
"updated_at": "2024-10-22T20:33:24Z",
|
||||
"pushed_at": "2024-10-22T20:33:20Z",
|
||||
"updated_at": "2024-10-26T19:57:56Z",
|
||||
"pushed_at": "2024-10-26T19:57:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault.",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-18T21:03:07Z",
|
||||
"updated_at": "2024-01-12T13:10:03Z",
|
||||
"updated_at": "2024-10-26T20:23:49Z",
|
||||
"pushed_at": "2024-03-01T11:01:42Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -299,10 +299,10 @@
|
|||
"description": "CVE-2023-46747-Mass-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-24T20:51:31Z",
|
||||
"updated_at": "2024-10-26T12:00:41Z",
|
||||
"updated_at": "2024-10-26T19:29:56Z",
|
||||
"pushed_at": "2024-10-24T20:52:43Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -311,7 +311,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-10-24T13:07:30Z",
|
||||
"updated_at": "2024-10-26T19:59:59Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2267,
|
||||
"watchers_count": 2267,
|
||||
"stargazers_count": 2266,
|
||||
"watchers_count": 2266,
|
||||
"has_discussions": false,
|
||||
"forks_count": 297,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 297,
|
||||
"watchers": 2267,
|
||||
"watchers": 2266,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "CVE-2024-21413 PoC for THM Lab",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-17T14:52:52Z",
|
||||
"updated_at": "2024-10-26T15:36:22Z",
|
||||
"updated_at": "2024-10-26T22:06:05Z",
|
||||
"pushed_at": "2024-03-13T02:44:28Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -231,10 +231,10 @@
|
|||
"description": "CVE-2024-23692 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T03:27:47Z",
|
||||
"updated_at": "2024-09-16T17:52:12Z",
|
||||
"updated_at": "2024-10-26T18:49:37Z",
|
||||
"pushed_at": "2024-06-18T04:06:25Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -124,10 +124,10 @@
|
|||
"description": "Fully automated PoC - CVE-2024-25641 - RCE - Cacti < v1.2.26 🌵",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:27:25Z",
|
||||
"updated_at": "2024-10-07T18:39:32Z",
|
||||
"updated_at": "2024-10-26T23:01:48Z",
|
||||
"pushed_at": "2024-09-03T05:21:04Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -136,7 +136,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -122,36 +122,5 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 878948399,
|
||||
"name": "CVE-2024-28987",
|
||||
"full_name": "GordonPol1\/CVE-2024-28987",
|
||||
"owner": {
|
||||
"login": "GordonPol1",
|
||||
"id": 186390432,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186390432?v=4",
|
||||
"html_url": "https:\/\/github.com\/GordonPol1",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GordonPol1\/CVE-2024-28987",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-26T14:52:33Z",
|
||||
"updated_at": "2024-10-26T14:52:37Z",
|
||||
"pushed_at": "2024-10-26T14:52:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-24T10:37:26Z",
|
||||
"updated_at": "2024-10-20T00:38:08Z",
|
||||
"updated_at": "2024-10-26T23:20:19Z",
|
||||
"pushed_at": "2024-07-31T19:11:55Z",
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 223,
|
||||
"watchers": 224,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-30090 - LPE PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-17T08:38:47Z",
|
||||
"updated_at": "2024-10-24T17:18:48Z",
|
||||
"updated_at": "2024-10-26T20:35:55Z",
|
||||
"pushed_at": "2024-10-17T09:53:33Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-13T19:30:20Z",
|
||||
"updated_at": "2024-10-25T06:40:04Z",
|
||||
"updated_at": "2024-10-26T23:54:35Z",
|
||||
"pushed_at": "2024-10-17T18:36:54Z",
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 183,
|
||||
"watchers": 185,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -307,10 +307,10 @@
|
|||
"description": "A simple scanner for identifying vulnerable cups-browsed instances on your network",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-07T07:25:18Z",
|
||||
"updated_at": "2024-10-23T12:09:54Z",
|
||||
"updated_at": "2024-10-26T20:27:30Z",
|
||||
"pushed_at": "2024-10-07T16:59:47Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -319,7 +319,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-29T10:58:15Z",
|
||||
"updated_at": "2024-10-25T07:46:02Z",
|
||||
"updated_at": "2024-10-27T00:05:30Z",
|
||||
"pushed_at": "2024-10-04T09:39:09Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 114,
|
||||
"watchers": 115,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -3425,7 +3425,6 @@
|
|||
- [horizon3ai/CVE-2024-28987](https://github.com/horizon3ai/CVE-2024-28987)
|
||||
- [PlayerFridei/CVE-2024-28987](https://github.com/PlayerFridei/CVE-2024-28987)
|
||||
- [HazeLook/CVE-2024-28987](https://github.com/HazeLook/CVE-2024-28987)
|
||||
- [GordonPol1/CVE-2024-28987](https://github.com/GordonPol1/CVE-2024-28987)
|
||||
|
||||
### CVE-2024-28995 (2024-06-06)
|
||||
|
||||
|
@ -14252,7 +14251,6 @@
|
|||
- [0xRoqeeb/sqlpad-rce-exploit-CVE-2022-0944](https://github.com/0xRoqeeb/sqlpad-rce-exploit-CVE-2022-0944)
|
||||
- [Robocopsita/CVE-2022-0944_RCE_POC](https://github.com/Robocopsita/CVE-2022-0944_RCE_POC)
|
||||
- [toneillcodes/CVE-2022-0944](https://github.com/toneillcodes/CVE-2022-0944)
|
||||
- [LipeOzyy/SQLPad-RCE-Exploit-CVE-2022-0944](https://github.com/LipeOzyy/SQLPad-RCE-Exploit-CVE-2022-0944)
|
||||
|
||||
### CVE-2022-0952 (2022-05-02)
|
||||
|
||||
|
|
Loading…
Reference in a new issue