mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/01 00:31:34
This commit is contained in:
parent
06be4ea863
commit
d37409851e
27 changed files with 253 additions and 85 deletions
|
@ -1,34 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 29914821,
|
||||
"name": "jboss-autopwn",
|
||||
"full_name": "ChristianPapathanasiou\/jboss-autopwn",
|
||||
"id": 53392873,
|
||||
"name": "jboss-autopwn-1",
|
||||
"full_name": "1872892142\/jboss-autopwn-1",
|
||||
"owner": {
|
||||
"login": "ChristianPapathanasiou",
|
||||
"id": 5354349,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5354349?v=4",
|
||||
"html_url": "https:\/\/github.com\/ChristianPapathanasiou",
|
||||
"login": "1872892142",
|
||||
"id": 10019398,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10019398?v=4",
|
||||
"html_url": "https:\/\/github.com\/1872892142",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ChristianPapathanasiou\/jboss-autopwn",
|
||||
"html_url": "https:\/\/github.com\/1872892142\/jboss-autopwn-1",
|
||||
"description": "JBoss Autopwn as featured at BlackHat Europe 2010 - this version incorporates CVE-2010-0738 the JBoss authentication bypass VERB manipulation vulnerability as discovered by Minded Security",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-27T13:16:45Z",
|
||||
"updated_at": "2023-07-10T13:32:16Z",
|
||||
"created_at": "2016-03-08T07:43:18Z",
|
||||
"updated_at": "2016-03-08T07:43:20Z",
|
||||
"pushed_at": "2015-01-27T13:23:18Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 15,
|
||||
"forks": 9,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 62456741,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2017-9506 - SSRF",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-25T11:25:18Z",
|
||||
"updated_at": "2024-11-05T04:49:25Z",
|
||||
"updated_at": "2024-11-30T22:18:17Z",
|
||||
"pushed_at": "2022-02-14T22:00:28Z",
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 187,
|
||||
"watchers": 188,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "This is an edited version of the CVE-2018-19422 exploit to fix an small but annoying issue I had.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T17:23:23Z",
|
||||
"updated_at": "2024-09-20T23:15:33Z",
|
||||
"updated_at": "2024-11-30T21:58:15Z",
|
||||
"pushed_at": "2022-04-29T17:27:22Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-25T23:44:16Z",
|
||||
"updated_at": "2024-10-21T23:41:44Z",
|
||||
"updated_at": "2024-11-30T22:18:26Z",
|
||||
"pushed_at": "2020-02-26T00:58:39Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 162,
|
||||
"watchers": 163,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -1657,13 +1657,13 @@
|
|||
"stargazers_count": 270,
|
||||
"watchers_count": 270,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"forks": 51,
|
||||
"watchers": 270,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
|
|
|
@ -873,10 +873,10 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x0d3ad\/CVE-2021-3129",
|
||||
"description": "CVE-2021-3129 Laravel Ignition RCE Exploit",
|
||||
"description": "CVE-2021-3129 (Laravel Ignition RCE Exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-29T05:09:41Z",
|
||||
"updated_at": "2024-10-05T05:58:32Z",
|
||||
"updated_at": "2024-11-30T19:25:07Z",
|
||||
"pushed_at": "2024-10-05T05:58:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -588,10 +588,10 @@
|
|||
"description": "Exploit for CVE-2021-3560 (Polkit) - Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-02T23:56:31Z",
|
||||
"updated_at": "2024-02-19T06:22:46Z",
|
||||
"updated_at": "2024-11-30T21:29:18Z",
|
||||
"pushed_at": "2022-06-26T16:26:27Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -611,7 +611,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -537,7 +537,7 @@
|
|||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -554,7 +554,7 @@
|
|||
"shodan"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof-of-concept and write-up for the CVE-2022-32832 vulnerability patched in iOS 15.6",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-21T13:09:50Z",
|
||||
"updated_at": "2024-10-21T10:38:25Z",
|
||||
"updated_at": "2024-11-30T19:16:15Z",
|
||||
"pushed_at": "2022-07-21T13:44:32Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 96,
|
||||
"watchers": 95,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-02T18:38:01Z",
|
||||
"updated_at": "2024-11-23T23:33:47Z",
|
||||
"updated_at": "2024-11-30T19:15:36Z",
|
||||
"pushed_at": "2024-11-10T17:21:28Z",
|
||||
"stargazers_count": 395,
|
||||
"watchers_count": 395,
|
||||
"stargazers_count": 394,
|
||||
"watchers_count": 394,
|
||||
"has_discussions": false,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 395,
|
||||
"watchers": 394,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "BoxBilling<=4.22.1.5 - Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-01T11:53:14Z",
|
||||
"updated_at": "2023-12-05T02:10:47Z",
|
||||
"updated_at": "2024-11-30T21:39:36Z",
|
||||
"pushed_at": "2023-04-01T15:45:53Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -91,5 +91,36 @@
|
|||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 896632413,
|
||||
"name": "zimbra8_lab",
|
||||
"full_name": "romero-javi\/zimbra8_lab",
|
||||
"owner": {
|
||||
"login": "romero-javi",
|
||||
"id": 95502860,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95502860?v=4",
|
||||
"html_url": "https:\/\/github.com\/romero-javi",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/romero-javi\/zimbra8_lab",
|
||||
"description": "Zimbra Lab de CVE-2022-37042 y CVE-2022-37393 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-30T22:06:12Z",
|
||||
"updated_at": "2024-11-30T22:26:20Z",
|
||||
"pushed_at": "2024-11-30T22:26:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -184,5 +184,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 896616091,
|
||||
"name": "CVE-2023-0297",
|
||||
"full_name": "oxapavan\/CVE-2023-0297",
|
||||
"owner": {
|
||||
"login": "oxapavan",
|
||||
"id": 106510266,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106510266?v=4",
|
||||
"html_url": "https:\/\/github.com\/oxapavan",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/oxapavan\/CVE-2023-0297",
|
||||
"description": "CVE-2023-0297 is a critical pre-authentication remote code execution (RCE) vulnerability in pyLoad versions before 0.5.0b3.dev31.",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-30T20:53:40Z",
|
||||
"updated_at": "2024-11-30T20:58:41Z",
|
||||
"pushed_at": "2024-11-30T20:57:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -76,10 +76,10 @@
|
|||
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T21:40:09Z",
|
||||
"updated_at": "2024-11-06T23:54:09Z",
|
||||
"updated_at": "2024-11-30T20:03:53Z",
|
||||
"pushed_at": "2023-10-17T22:04:13Z",
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -97,7 +97,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 129,
|
||||
"watchers": 130,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -321,5 +321,36 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 896579626,
|
||||
"name": "CVE-2023-41425",
|
||||
"full_name": "0x0d3ad\/CVE-2023-41425",
|
||||
"owner": {
|
||||
"login": "0x0d3ad",
|
||||
"id": 18898977,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18898977?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x0d3ad",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x0d3ad\/CVE-2023-41425",
|
||||
"description": "CVE-2023-41425 (XSS to RCE, Wonder CMS 3.2.0 <= 3.4.2)",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-30T18:34:05Z",
|
||||
"updated_at": "2024-11-30T19:28:45Z",
|
||||
"pushed_at": "2024-11-30T18:43:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T11:30:25Z",
|
||||
"updated_at": "2024-11-26T02:13:08Z",
|
||||
"updated_at": "2024-12-01T00:06:22Z",
|
||||
"pushed_at": "2024-11-19T11:37:09Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -236,7 +236,7 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -247,7 +247,7 @@
|
|||
"paloaltonetworks"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-29T06:13:36Z",
|
||||
"updated_at": "2024-11-30T14:03:16Z",
|
||||
"updated_at": "2024-11-30T23:16:16Z",
|
||||
"pushed_at": "2024-11-29T21:02:56Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands.",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-22T10:53:45Z",
|
||||
"updated_at": "2024-08-26T06:01:17Z",
|
||||
"updated_at": "2024-12-01T00:14:42Z",
|
||||
"pushed_at": "2024-02-22T10:54:26Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -293,7 +293,7 @@
|
|||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -310,7 +310,7 @@
|
|||
"teamcity"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 2,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-15T08:07:05Z",
|
||||
"updated_at": "2024-11-28T03:05:52Z",
|
||||
"updated_at": "2024-11-30T19:19:14Z",
|
||||
"pushed_at": "2024-09-08T21:23:34Z",
|
||||
"stargazers_count": 418,
|
||||
"watchers_count": 418,
|
||||
"stargazers_count": 419,
|
||||
"watchers_count": 419,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 418,
|
||||
"watchers": 419,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -197,10 +197,10 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x0d3ad\/CVE-2024-34102",
|
||||
"description": "Magento XXE (CVE-2024-34102)",
|
||||
"description": "CVE-2024-34102 (Magento XXE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-30T16:49:26Z",
|
||||
"updated_at": "2024-07-07T16:06:06Z",
|
||||
"updated_at": "2024-11-30T19:29:05Z",
|
||||
"pushed_at": "2024-07-01T17:42:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -483,11 +483,11 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x0d3ad\/CVE-2024-36401",
|
||||
"description": "CVE-2024-36401 GeoServer Remote Code Execution",
|
||||
"description": "CVE-2024-36401 (GeoServer Remote Code Execution)",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-27T19:13:49Z",
|
||||
"updated_at": "2024-11-28T01:53:47Z",
|
||||
"pushed_at": "2024-11-27T19:20:14Z",
|
||||
"updated_at": "2024-11-30T19:28:17Z",
|
||||
"pushed_at": "2024-11-30T19:28:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
33
2024/CVE-2024-42327.json
Normal file
33
2024/CVE-2024-42327.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 896657083,
|
||||
"name": "cve-2024-42327",
|
||||
"full_name": "aramosf\/cve-2024-42327",
|
||||
"owner": {
|
||||
"login": "aramosf",
|
||||
"id": 3511842,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3511842?v=4",
|
||||
"html_url": "https:\/\/github.com\/aramosf",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aramosf\/cve-2024-42327",
|
||||
"description": "cve-2024-42327 ZBX-25623",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-01T00:15:27Z",
|
||||
"updated_at": "2024-12-01T00:23:17Z",
|
||||
"pushed_at": "2024-12-01T00:23:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -2884,5 +2884,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 896590705,
|
||||
"name": "CVE-2024-6387",
|
||||
"full_name": "oxapavan\/CVE-2024-6387",
|
||||
"owner": {
|
||||
"login": "oxapavan",
|
||||
"id": 106510266,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106510266?v=4",
|
||||
"html_url": "https:\/\/github.com\/oxapavan",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/oxapavan\/CVE-2024-6387",
|
||||
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-30T19:14:05Z",
|
||||
"updated_at": "2024-11-30T19:41:03Z",
|
||||
"pushed_at": "2024-11-30T19:40:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"description": "A PoC for CVE-2024–8309",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-28T17:11:52Z",
|
||||
"updated_at": "2024-11-28T08:05:10Z",
|
||||
"updated_at": "2024-11-30T19:40:18Z",
|
||||
"pushed_at": "2024-10-05T20:40:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary File Download",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-18T10:14:45Z",
|
||||
"updated_at": "2024-11-19T09:28:54Z",
|
||||
"updated_at": "2024-11-30T21:26:29Z",
|
||||
"pushed_at": "2024-11-18T10:15:49Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
13
README.md
13
README.md
|
@ -1426,6 +1426,7 @@
|
|||
- [identity-threat-labs/CVE-2024-6387-Vulnerability-Checker](https://github.com/identity-threat-labs/CVE-2024-6387-Vulnerability-Checker)
|
||||
- [identity-threat-labs/Article-RegreSSHion-CVE-2024-6387](https://github.com/identity-threat-labs/Article-RegreSSHion-CVE-2024-6387)
|
||||
- [YassDEV221608/CVE-2024-6387](https://github.com/YassDEV221608/CVE-2024-6387)
|
||||
- [oxapavan/CVE-2024-6387](https://github.com/oxapavan/CVE-2024-6387)
|
||||
|
||||
### CVE-2024-6473 (2024-09-03)
|
||||
|
||||
|
@ -5987,6 +5988,13 @@
|
|||
|
||||
- [fj016/CVE-2024-41992-PoC](https://github.com/fj016/CVE-2024-41992-PoC)
|
||||
|
||||
### CVE-2024-42327 (2024-11-27)
|
||||
|
||||
<code>A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
|
||||
</code>
|
||||
|
||||
- [aramosf/cve-2024-42327](https://github.com/aramosf/cve-2024-42327)
|
||||
|
||||
### CVE-2024-42346 (2024-09-20)
|
||||
|
||||
<code>Galaxy is a free, open-source system for analyzing data, authoring workflows, training and education, publishing tools, managing infrastructure, and more. The editor visualization, /visualizations endpoint, can be used to store HTML tags and trigger javascript execution upon edit operation. All supported branches of Galaxy (and more back to release_20.05) were amended with the supplied patches. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
||||
|
@ -7257,6 +7265,7 @@
|
|||
- [overgrowncarrot1/CVE-2023-0297](https://github.com/overgrowncarrot1/CVE-2023-0297)
|
||||
- [btar1gan/exploit_CVE-2023-0297](https://github.com/btar1gan/exploit_CVE-2023-0297)
|
||||
- [S4MY9/CVE-2023-0297](https://github.com/S4MY9/CVE-2023-0297)
|
||||
- [oxapavan/CVE-2023-0297](https://github.com/oxapavan/CVE-2023-0297)
|
||||
|
||||
### CVE-2023-0315 (2023-01-16)
|
||||
|
||||
|
@ -13276,6 +13285,7 @@
|
|||
- [0xDTC/WonderCMS-4.3.2-XSS-to-RCE-Exploits-CVE-2023-41425](https://github.com/0xDTC/WonderCMS-4.3.2-XSS-to-RCE-Exploits-CVE-2023-41425)
|
||||
- [h3athen/CVE-2023-41425](https://github.com/h3athen/CVE-2023-41425)
|
||||
- [Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE](https://github.com/Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE)
|
||||
- [0x0d3ad/CVE-2023-41425](https://github.com/0x0d3ad/CVE-2023-41425)
|
||||
|
||||
### CVE-2023-41436 (2023-09-15)
|
||||
|
||||
|
@ -20564,6 +20574,7 @@
|
|||
- [GreyNoise-Intelligence/Zimbra_CVE-2022-37042-_CVE-2022-27925](https://github.com/GreyNoise-Intelligence/Zimbra_CVE-2022-37042-_CVE-2022-27925)
|
||||
- [aels/CVE-2022-37042](https://github.com/aels/CVE-2022-37042)
|
||||
- [0xf4n9x/CVE-2022-37042](https://github.com/0xf4n9x/CVE-2022-37042)
|
||||
- [romero-javi/zimbra8_lab](https://github.com/romero-javi/zimbra8_lab)
|
||||
|
||||
### CVE-2022-37177 (2022-08-29)
|
||||
|
||||
|
@ -48396,7 +48407,7 @@
|
|||
<code>The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
|
||||
</code>
|
||||
|
||||
- [ChristianPapathanasiou/jboss-autopwn](https://github.com/ChristianPapathanasiou/jboss-autopwn)
|
||||
- [1872892142/jboss-autopwn-1](https://github.com/1872892142/jboss-autopwn-1)
|
||||
- [gitcollect/jboss-autopwn](https://github.com/gitcollect/jboss-autopwn)
|
||||
|
||||
### CVE-2010-1205 (2010-06-30)
|
||||
|
|
Loading…
Reference in a new issue