mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2024/08/08 00:29:17
This commit is contained in:
parent
0848103795
commit
d3a2417d81
30 changed files with 236 additions and 84 deletions
|
@ -27,7 +27,7 @@
|
||||||
"forks": 20,
|
"forks": 20,
|
||||||
"watchers": 58,
|
"watchers": 58,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 5
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"id": 238993261,
|
"id": 238993261,
|
||||||
|
|
|
@ -27,7 +27,7 @@
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 3,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 37
|
"subscribers_count": 36
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"id": 320642790,
|
"id": 320642790,
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Github repository which contains a functional exploit for CVE-2021-39165",
|
"description": "Github repository which contains a functional exploit for CVE-2021-39165",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-15T18:14:46Z",
|
"created_at": "2022-03-15T18:14:46Z",
|
||||||
"updated_at": "2023-09-28T11:37:04Z",
|
"updated_at": "2024-08-07T22:13:16Z",
|
||||||
"pushed_at": "2022-07-13T09:39:13Z",
|
"pushed_at": "2022-07-13T09:39:13Z",
|
||||||
"stargazers_count": 23,
|
"stargazers_count": 22,
|
||||||
"watchers_count": 23,
|
"watchers_count": 22,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -29,7 +29,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 8,
|
||||||
"watchers": 23,
|
"watchers": 22,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -223,10 +223,10 @@
|
||||||
"description": "CVE-2021-40444 PoC",
|
"description": "CVE-2021-40444 PoC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-09-10T16:55:53Z",
|
"created_at": "2021-09-10T16:55:53Z",
|
||||||
"updated_at": "2024-08-07T17:10:05Z",
|
"updated_at": "2024-08-07T20:23:36Z",
|
||||||
"pushed_at": "2021-12-25T18:31:02Z",
|
"pushed_at": "2021-12-25T18:31:02Z",
|
||||||
"stargazers_count": 1566,
|
"stargazers_count": 1567,
|
||||||
"watchers_count": 1566,
|
"watchers_count": 1567,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 481,
|
"forks_count": 481,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -235,7 +235,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 481,
|
"forks": 481,
|
||||||
"watchers": 1566,
|
"watchers": 1567,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 28
|
"subscribers_count": 28
|
||||||
},
|
},
|
||||||
|
|
|
@ -48,13 +48,13 @@
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 2,
|
"watchers_count": 2,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 2,
|
||||||
"watchers": 2,
|
"watchers": 2,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
|
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-09-12T19:22:44Z",
|
"created_at": "2022-09-12T19:22:44Z",
|
||||||
"updated_at": "2024-08-06T20:02:08Z",
|
"updated_at": "2024-08-07T21:16:16Z",
|
||||||
"pushed_at": "2022-09-19T19:41:34Z",
|
"pushed_at": "2022-09-19T19:41:34Z",
|
||||||
"stargazers_count": 281,
|
"stargazers_count": 282,
|
||||||
"watchers_count": 281,
|
"watchers_count": 282,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 42,
|
"forks_count": 42,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 42,
|
"forks": 42,
|
||||||
"watchers": 281,
|
"watchers": 282,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 6
|
"subscribers_count": 6
|
||||||
},
|
},
|
||||||
|
|
|
@ -621,13 +621,13 @@
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 3,
|
"watchers_count": 3,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 2,
|
||||||
"watchers": 3,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
|
|
@ -407,10 +407,10 @@
|
||||||
"description": "Joomla! < 4.2.8 - Unauthenticated information disclosure",
|
"description": "Joomla! < 4.2.8 - Unauthenticated information disclosure",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-03-24T11:50:16Z",
|
"created_at": "2023-03-24T11:50:16Z",
|
||||||
"updated_at": "2024-07-10T16:38:06Z",
|
"updated_at": "2024-08-07T22:34:01Z",
|
||||||
"pushed_at": "2023-12-27T11:30:46Z",
|
"pushed_at": "2023-12-27T11:30:46Z",
|
||||||
"stargazers_count": 76,
|
"stargazers_count": 77,
|
||||||
"watchers_count": 76,
|
"watchers_count": 77,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 17,
|
"forks_count": 17,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -426,7 +426,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 17,
|
"forks": 17,
|
||||||
"watchers": 76,
|
"watchers": 77,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "pocs & exploit for CVE-2023-24871 (rce + lpe)",
|
"description": "pocs & exploit for CVE-2023-24871 (rce + lpe)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-06-21T15:01:15Z",
|
"created_at": "2024-06-21T15:01:15Z",
|
||||||
"updated_at": "2024-07-29T16:04:10Z",
|
"updated_at": "2024-08-07T20:47:41Z",
|
||||||
"pushed_at": "2024-07-17T12:34:16Z",
|
"pushed_at": "2024-07-17T12:34:16Z",
|
||||||
"stargazers_count": 41,
|
"stargazers_count": 42,
|
||||||
"watchers_count": 41,
|
"watchers_count": 42,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 12,
|
"forks_count": 12,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 12,
|
"forks": 12,
|
||||||
"watchers": 41,
|
"watchers": 42,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -74,7 +74,7 @@
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-04-17T13:36:34Z",
|
"created_at": "2024-04-17T13:36:34Z",
|
||||||
"updated_at": "2024-07-26T13:32:23Z",
|
"updated_at": "2024-07-26T13:32:23Z",
|
||||||
"pushed_at": "2024-07-30T22:10:56Z",
|
"pushed_at": "2024-08-07T22:55:05Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -43,10 +43,10 @@
|
||||||
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
|
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-06-16T20:15:36Z",
|
"created_at": "2023-06-16T20:15:36Z",
|
||||||
"updated_at": "2024-07-11T06:01:41Z",
|
"updated_at": "2024-08-07T19:18:29Z",
|
||||||
"pushed_at": "2024-05-08T16:17:07Z",
|
"pushed_at": "2024-05-08T16:17:07Z",
|
||||||
"stargazers_count": 124,
|
"stargazers_count": 125,
|
||||||
"watchers_count": 124,
|
"watchers_count": 125,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 23,
|
"forks_count": 23,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -55,7 +55,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 23,
|
"forks": 23,
|
||||||
"watchers": 124,
|
"watchers": 125,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
32
2023/CVE-2023-31355.json
Normal file
32
2023/CVE-2023-31355.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 729134774,
|
||||||
|
"name": "cve-2023-31355-poc",
|
||||||
|
"full_name": "Freax13\/cve-2023-31355-poc",
|
||||||
|
"owner": {
|
||||||
|
"login": "Freax13",
|
||||||
|
"id": 14952658,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14952658?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/Freax13"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/Freax13\/cve-2023-31355-poc",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2023-12-08T13:51:37Z",
|
||||||
|
"updated_at": "2024-08-07T19:22:56Z",
|
||||||
|
"pushed_at": "2023-12-09T13:35:12Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -297,10 +297,10 @@
|
||||||
"html_url": "https:\/\/github.com\/aditibv"
|
"html_url": "https:\/\/github.com\/aditibv"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/aditibv\/MOVEit-CVE-2023-34362",
|
"html_url": "https:\/\/github.com\/aditibv\/MOVEit-CVE-2023-34362",
|
||||||
"description": null,
|
"description": "This repository investigates the exploitation of CVE-2023-34362 in the MOVEit file transfer server by the TA505 (Cl0p) ransomware group. It explores the group's tactics and past campaigns targeting file transfer applications, aiming to enhance understanding and defensive measures against such threats. ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-04T21:13:48Z",
|
"created_at": "2024-07-04T21:13:48Z",
|
||||||
"updated_at": "2024-07-04T21:47:27Z",
|
"updated_at": "2024-08-07T20:25:25Z",
|
||||||
"pushed_at": "2024-07-04T21:17:13Z",
|
"pushed_at": "2024-07-04T21:17:13Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-09-16T09:11:21Z",
|
"created_at": "2023-09-16T09:11:21Z",
|
||||||
"updated_at": "2024-07-27T09:07:06Z",
|
"updated_at": "2024-07-27T09:07:06Z",
|
||||||
"pushed_at": "2024-07-30T18:42:09Z",
|
"pushed_at": "2024-08-07T19:07:56Z",
|
||||||
"stargazers_count": 59,
|
"stargazers_count": 59,
|
||||||
"watchers_count": 59,
|
"watchers_count": 59,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220",
|
"description": "This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-07T15:08:30Z",
|
"created_at": "2024-07-07T15:08:30Z",
|
||||||
"updated_at": "2024-08-04T09:56:43Z",
|
"updated_at": "2024-08-07T21:43:49Z",
|
||||||
"pushed_at": "2024-07-27T00:19:17Z",
|
"pushed_at": "2024-07-27T00:19:17Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 7,
|
||||||
"watchers_count": 6,
|
"watchers_count": 7,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -33,7 +33,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 2,
|
||||||
"watchers": 6,
|
"watchers": 7,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
@ -129,8 +129,8 @@
|
||||||
"description": "CVE-2023-4220 POC RCE",
|
"description": "CVE-2023-4220 POC RCE",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-08T07:31:35Z",
|
"created_at": "2024-07-08T07:31:35Z",
|
||||||
"updated_at": "2024-07-31T00:01:03Z",
|
"updated_at": "2024-08-07T23:36:24Z",
|
||||||
"pushed_at": "2024-07-29T05:46:07Z",
|
"pushed_at": "2024-08-07T23:36:20Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 3,
|
"watchers_count": 3,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering them ineffective, working for both x32 and x64(CVE-2023-44976).",
|
"description": "A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering them ineffective, working for both x32 and x64(CVE-2023-44976).",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-10-01T18:24:38Z",
|
"created_at": "2023-10-01T18:24:38Z",
|
||||||
"updated_at": "2024-08-06T06:51:47Z",
|
"updated_at": "2024-08-07T21:38:28Z",
|
||||||
"pushed_at": "2024-07-06T23:35:51Z",
|
"pushed_at": "2024-07-06T23:35:51Z",
|
||||||
"stargazers_count": 55,
|
"stargazers_count": 54,
|
||||||
"watchers_count": 55,
|
"watchers_count": 54,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 11,
|
"forks_count": 11,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 11,
|
"forks": 11,
|
||||||
"watchers": 55,
|
"watchers": 54,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. ",
|
"description": "Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-10-24T17:19:32Z",
|
"created_at": "2023-10-24T17:19:32Z",
|
||||||
"updated_at": "2024-08-03T01:36:40Z",
|
"updated_at": "2024-08-07T23:24:41Z",
|
||||||
"pushed_at": "2023-10-26T14:16:05Z",
|
"pushed_at": "2023-10-26T14:16:05Z",
|
||||||
"stargazers_count": 68,
|
"stargazers_count": 69,
|
||||||
"watchers_count": 68,
|
"watchers_count": 69,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 11,
|
"forks_count": 11,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -41,7 +41,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 11,
|
"forks": 11,
|
||||||
"watchers": 68,
|
"watchers": 69,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -18,13 +18,13 @@
|
||||||
"stargazers_count": 121,
|
"stargazers_count": 121,
|
||||||
"watchers_count": 121,
|
"watchers_count": 121,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 23,
|
"forks_count": 24,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 23,
|
"forks": 24,
|
||||||
"watchers": 121,
|
"watchers": 121,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
|
|
|
@ -43,10 +43,10 @@
|
||||||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-02-16T15:17:59Z",
|
"created_at": "2024-02-16T15:17:59Z",
|
||||||
"updated_at": "2024-08-05T22:03:55Z",
|
"updated_at": "2024-08-07T19:15:21Z",
|
||||||
"pushed_at": "2024-02-19T20:00:35Z",
|
"pushed_at": "2024-02-19T20:00:35Z",
|
||||||
"stargazers_count": 656,
|
"stargazers_count": 657,
|
||||||
"watchers_count": 656,
|
"watchers_count": 657,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 146,
|
"forks_count": 146,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -55,7 +55,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 146,
|
"forks": 146,
|
||||||
"watchers": 656,
|
"watchers": 657,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 10
|
"subscribers_count": 10
|
||||||
},
|
},
|
||||||
|
|
|
@ -48,7 +48,7 @@
|
||||||
"stargazers_count": 122,
|
"stargazers_count": 122,
|
||||||
"watchers_count": 122,
|
"watchers_count": 122,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 30,
|
"forks_count": 31,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
|
@ -58,7 +58,7 @@
|
||||||
"redteam"
|
"redteam"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 30,
|
"forks": 31,
|
||||||
"watchers": 122,
|
"watchers": 122,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
|
32
2024/CVE-2024-21978.json
Normal file
32
2024/CVE-2024-21978.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 740045599,
|
||||||
|
"name": "cve-2024-21978-poc",
|
||||||
|
"full_name": "Freax13\/cve-2024-21978-poc",
|
||||||
|
"owner": {
|
||||||
|
"login": "Freax13",
|
||||||
|
"id": 14952658,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14952658?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/Freax13"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/Freax13\/cve-2024-21978-poc",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-01-07T11:07:01Z",
|
||||||
|
"updated_at": "2024-08-07T19:23:44Z",
|
||||||
|
"pushed_at": "2024-01-07T15:29:51Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2024/CVE-2024-21980.json
Normal file
32
2024/CVE-2024-21980.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 741649413,
|
||||||
|
"name": "cve-2024-21980-poc",
|
||||||
|
"full_name": "Freax13\/cve-2024-21980-poc",
|
||||||
|
"owner": {
|
||||||
|
"login": "Freax13",
|
||||||
|
"id": 14952658,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14952658?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/Freax13"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/Freax13\/cve-2024-21980-poc",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-01-10T20:35:38Z",
|
||||||
|
"updated_at": "2024-08-07T19:24:26Z",
|
||||||
|
"pushed_at": "2024-01-10T20:43:07Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
|
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-06-10T17:02:03Z",
|
"created_at": "2024-06-10T17:02:03Z",
|
||||||
"updated_at": "2024-08-06T00:48:12Z",
|
"updated_at": "2024-08-07T18:37:31Z",
|
||||||
"pushed_at": "2024-07-04T10:39:15Z",
|
"pushed_at": "2024-07-04T10:39:15Z",
|
||||||
"stargazers_count": 289,
|
"stargazers_count": 290,
|
||||||
"watchers_count": 289,
|
"watchers_count": 290,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 57,
|
"forks_count": 57,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 57,
|
"forks": 57,
|
||||||
"watchers": 289,
|
"watchers": 290,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
},
|
},
|
||||||
|
@ -133,10 +133,10 @@
|
||||||
"description": "A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a privileged user",
|
"description": "A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a privileged user",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-04T17:40:51Z",
|
"created_at": "2024-08-04T17:40:51Z",
|
||||||
"updated_at": "2024-08-06T22:05:08Z",
|
"updated_at": "2024-08-07T23:05:04Z",
|
||||||
"pushed_at": "2024-08-06T22:05:05Z",
|
"pushed_at": "2024-08-06T22:05:05Z",
|
||||||
"stargazers_count": 12,
|
"stargazers_count": 15,
|
||||||
"watchers_count": 12,
|
"watchers_count": 15,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -145,7 +145,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 12,
|
"watchers": 15,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -83,10 +83,10 @@
|
||||||
"description": "CVE-2024-32113 Apache OFBIZ Batch Scanning",
|
"description": "CVE-2024-32113 Apache OFBIZ Batch Scanning",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-07T07:12:56Z",
|
"created_at": "2024-08-07T07:12:56Z",
|
||||||
"updated_at": "2024-08-07T07:18:23Z",
|
"updated_at": "2024-08-07T22:31:36Z",
|
||||||
"pushed_at": "2024-08-07T07:16:26Z",
|
"pushed_at": "2024-08-07T07:16:26Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 1,
|
"watchers_count": 3,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -95,7 +95,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 1,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -230,10 +230,10 @@
|
||||||
"description": "GeoServer Remote Code Execution",
|
"description": "GeoServer Remote Code Execution",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-30T18:43:40Z",
|
"created_at": "2024-07-30T18:43:40Z",
|
||||||
"updated_at": "2024-08-05T19:27:24Z",
|
"updated_at": "2024-08-07T21:07:02Z",
|
||||||
"pushed_at": "2024-08-02T14:57:26Z",
|
"pushed_at": "2024-08-02T14:57:26Z",
|
||||||
"stargazers_count": 55,
|
"stargazers_count": 56,
|
||||||
"watchers_count": 55,
|
"watchers_count": 56,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 12,
|
"forks_count": 12,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -242,7 +242,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 12,
|
"forks": 12,
|
||||||
"watchers": 55,
|
"watchers": 56,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -43,10 +43,10 @@
|
||||||
"description": "CVE-2024-37085 VMware ESXi RCE Vulnerability",
|
"description": "CVE-2024-37085 VMware ESXi RCE Vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-06T18:23:43Z",
|
"created_at": "2024-08-06T18:23:43Z",
|
||||||
"updated_at": "2024-08-06T18:29:31Z",
|
"updated_at": "2024-08-07T22:58:24Z",
|
||||||
"pushed_at": "2024-08-06T18:25:19Z",
|
"pushed_at": "2024-08-06T18:25:19Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 1,
|
"watchers_count": 2,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -55,7 +55,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 1,
|
"watchers": 2,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
32
2024/CVE-2024-41570.json
Normal file
32
2024/CVE-2024-41570.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 828329292,
|
||||||
|
"name": "Havoc-C2-SSRF-poc",
|
||||||
|
"full_name": "chebuya\/Havoc-C2-SSRF-poc",
|
||||||
|
"owner": {
|
||||||
|
"login": "chebuya",
|
||||||
|
"id": 146861503,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146861503?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/chebuya"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/chebuya\/Havoc-C2-SSRF-poc",
|
||||||
|
"description": "CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-07-13T19:54:27Z",
|
||||||
|
"updated_at": "2024-08-07T20:22:27Z",
|
||||||
|
"pushed_at": "2024-08-07T20:22:25Z",
|
||||||
|
"stargazers_count": 30,
|
||||||
|
"watchers_count": 30,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 7,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 7,
|
||||||
|
"watchers": 30,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -260,10 +260,10 @@
|
||||||
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-01T20:33:20Z",
|
"created_at": "2024-07-01T20:33:20Z",
|
||||||
"updated_at": "2024-08-07T10:46:14Z",
|
"updated_at": "2024-08-07T23:57:00Z",
|
||||||
"pushed_at": "2024-07-14T09:58:48Z",
|
"pushed_at": "2024-07-14T09:58:48Z",
|
||||||
"stargazers_count": 428,
|
"stargazers_count": 429,
|
||||||
"watchers_count": 428,
|
"watchers_count": 429,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 85,
|
"forks_count": 85,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -278,7 +278,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 85,
|
"forks": 85,
|
||||||
"watchers": 428,
|
"watchers": 429,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 6
|
"subscribers_count": 6
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Calibre 远程代码执行(CVE-2024-6782)Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.",
|
"description": "Calibre 远程代码执行(CVE-2024-6782)Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-06T15:31:48Z",
|
"created_at": "2024-08-06T15:31:48Z",
|
||||||
"updated_at": "2024-08-07T13:32:43Z",
|
"updated_at": "2024-08-07T23:52:59Z",
|
||||||
"pushed_at": "2024-08-06T15:35:37Z",
|
"pushed_at": "2024-08-06T15:35:37Z",
|
||||||
"stargazers_count": 4,
|
"stargazers_count": 5,
|
||||||
"watchers_count": 4,
|
"watchers_count": 5,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 4,
|
"watchers": 5,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
24
README.md
24
README.md
|
@ -1442,6 +1442,20 @@
|
||||||
- [h4x0r-dz/CVE-2024-21893.py](https://github.com/h4x0r-dz/CVE-2024-21893.py)
|
- [h4x0r-dz/CVE-2024-21893.py](https://github.com/h4x0r-dz/CVE-2024-21893.py)
|
||||||
- [Chocapikk/CVE-2024-21893-to-CVE-2024-21887](https://github.com/Chocapikk/CVE-2024-21893-to-CVE-2024-21887)
|
- [Chocapikk/CVE-2024-21893-to-CVE-2024-21887](https://github.com/Chocapikk/CVE-2024-21893-to-CVE-2024-21887)
|
||||||
|
|
||||||
|
### CVE-2024-21978 (2024-08-05)
|
||||||
|
|
||||||
|
<code>Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.
|
||||||
|
</code>
|
||||||
|
|
||||||
|
- [Freax13/cve-2024-21978-poc](https://github.com/Freax13/cve-2024-21978-poc)
|
||||||
|
|
||||||
|
### CVE-2024-21980 (2024-08-05)
|
||||||
|
|
||||||
|
<code>Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.
|
||||||
|
</code>
|
||||||
|
|
||||||
|
- [Freax13/cve-2024-21980-poc](https://github.com/Freax13/cve-2024-21980-poc)
|
||||||
|
|
||||||
### CVE-2024-22002 (2024-06-18)
|
### CVE-2024-22002 (2024-06-18)
|
||||||
|
|
||||||
<code>CORSAIR iCUE 5.9.105 with iCUE Murals on Windows allows unprivileged users to insert DLL files in the cuepkg-1.2.6 subdirectory of the installation directory.
|
<code>CORSAIR iCUE 5.9.105 with iCUE Murals on Windows allows unprivileged users to insert DLL files in the cuepkg-1.2.6 subdirectory of the installation directory.
|
||||||
|
@ -3946,6 +3960,9 @@
|
||||||
### CVE-2024-41302
|
### CVE-2024-41302
|
||||||
- [patrickdeanramos/CVE-2024-41302-Bookea-tu-Mesa-is-vulnerable-to-SQL-Injection](https://github.com/patrickdeanramos/CVE-2024-41302-Bookea-tu-Mesa-is-vulnerable-to-SQL-Injection)
|
- [patrickdeanramos/CVE-2024-41302-Bookea-tu-Mesa-is-vulnerable-to-SQL-Injection](https://github.com/patrickdeanramos/CVE-2024-41302-Bookea-tu-Mesa-is-vulnerable-to-SQL-Injection)
|
||||||
|
|
||||||
|
### CVE-2024-41570
|
||||||
|
- [chebuya/Havoc-C2-SSRF-poc](https://github.com/chebuya/Havoc-C2-SSRF-poc)
|
||||||
|
|
||||||
### CVE-2024-41628 (2024-07-26)
|
### CVE-2024-41628 (2024-07-26)
|
||||||
|
|
||||||
<code>Directory Traversal vulnerability in Severalnines Cluster Control 1.9.8 before 1.9.8-9778, 2.0.0 before 2.0.0-9779, and 2.1.0 before 2.1.0-9780 allows a remote attacker to include and display file content in an HTTP request via the CMON API.
|
<code>Directory Traversal vulnerability in Severalnines Cluster Control 1.9.8 before 1.9.8-9778, 2.0.0 before 2.0.0-9779, and 2.1.0 before 2.1.0-9780 allows a remote attacker to include and display file content in an HTTP request via the CMON API.
|
||||||
|
@ -7564,6 +7581,13 @@
|
||||||
|
|
||||||
- [Freax13/cve-2023-31346-poc](https://github.com/Freax13/cve-2023-31346-poc)
|
- [Freax13/cve-2023-31346-poc](https://github.com/Freax13/cve-2023-31346-poc)
|
||||||
|
|
||||||
|
### CVE-2023-31355 (2024-08-05)
|
||||||
|
|
||||||
|
<code>Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.
|
||||||
|
</code>
|
||||||
|
|
||||||
|
- [Freax13/cve-2023-31355-poc](https://github.com/Freax13/cve-2023-31355-poc)
|
||||||
|
|
||||||
### CVE-2023-31419 (2023-10-26)
|
### CVE-2023-31419 (2023-10-26)
|
||||||
|
|
||||||
<code>A flaw was discovered in Elasticsearch, affecting the _search API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service.\n\n\n\n\n
|
<code>A flaw was discovered in Elasticsearch, affecting the _search API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service.\n\n\n\n\n
|
||||||
|
|
Loading…
Reference in a new issue