mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/04/29 12:30:40
This commit is contained in:
parent
b4f81ab0f9
commit
d590e583a5
41 changed files with 276 additions and 206 deletions
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-04-28T09:09:02Z",
|
||||
"updated_at": "2024-04-29T07:51:31Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1927,
|
||||
"watchers_count": 1927,
|
||||
"stargazers_count": 1928,
|
||||
"watchers_count": 1928,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 1927,
|
||||
"watchers": 1928,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "CVE-2014-6287",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-04T18:39:30Z",
|
||||
"updated_at": "2023-04-04T19:28:29Z",
|
||||
"updated_at": "2024-04-29T09:29:40Z",
|
||||
"pushed_at": "2023-04-04T19:33:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-04-28T09:09:02Z",
|
||||
"updated_at": "2024-04-29T07:51:31Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1927,
|
||||
"watchers_count": 1927,
|
||||
"stargazers_count": 1928,
|
||||
"watchers_count": 1928,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 1927,
|
||||
"watchers": 1928,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -380,10 +380,10 @@
|
|||
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T09:43:46Z",
|
||||
"updated_at": "2024-04-10T15:10:45Z",
|
||||
"updated_at": "2024-04-29T10:20:59Z",
|
||||
"pushed_at": "2018-02-28T12:32:54Z",
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"has_discussions": false,
|
||||
"forks_count": 133,
|
||||
"allow_forking": true,
|
||||
|
@ -392,7 +392,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 133,
|
||||
"watchers": 272,
|
||||
"watchers": 273,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-04-28T09:09:02Z",
|
||||
"updated_at": "2024-04-29T07:51:31Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1927,
|
||||
"watchers_count": 1927,
|
||||
"stargazers_count": 1928,
|
||||
"watchers_count": 1928,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 1927,
|
||||
"watchers": 1928,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T09:43:46Z",
|
||||
"updated_at": "2024-04-10T15:10:45Z",
|
||||
"updated_at": "2024-04-29T10:20:59Z",
|
||||
"pushed_at": "2018-02-28T12:32:54Z",
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"has_discussions": false,
|
||||
"forks_count": 133,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 133,
|
||||
"watchers": 272,
|
||||
"watchers": 273,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -557,10 +557,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-04-28T09:09:02Z",
|
||||
"updated_at": "2024-04-29T07:51:31Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1927,
|
||||
"watchers_count": 1927,
|
||||
"stargazers_count": 1928,
|
||||
"watchers_count": 1928,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
@ -590,7 +590,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 1927,
|
||||
"watchers": 1928,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-04-28T09:09:02Z",
|
||||
"updated_at": "2024-04-29T07:51:31Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1927,
|
||||
"watchers_count": 1927,
|
||||
"stargazers_count": 1928,
|
||||
"watchers_count": 1928,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 1927,
|
||||
"watchers": 1928,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
}
|
||||
|
|
62
2020/CVE-2020-24490.json
Normal file
62
2020/CVE-2020-24490.json
Normal file
|
@ -0,0 +1,62 @@
|
|||
[
|
||||
{
|
||||
"id": 793402660,
|
||||
"name": "linux_CVE-2020-24490-beforePatch",
|
||||
"full_name": "AbrarKhan\/linux_CVE-2020-24490-beforePatch",
|
||||
"owner": {
|
||||
"login": "AbrarKhan",
|
||||
"id": 3054615,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3054615?v=4",
|
||||
"html_url": "https:\/\/github.com\/AbrarKhan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AbrarKhan\/linux_CVE-2020-24490-beforePatch",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-29T06:47:40Z",
|
||||
"updated_at": "2024-04-29T06:53:24Z",
|
||||
"pushed_at": "2024-04-29T06:53:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 793474421,
|
||||
"name": "Linux-4.19.72_CVE-2020-24490",
|
||||
"full_name": "AbrarKhan\/Linux-4.19.72_CVE-2020-24490",
|
||||
"owner": {
|
||||
"login": "AbrarKhan",
|
||||
"id": 3054615,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3054615?v=4",
|
||||
"html_url": "https:\/\/github.com\/AbrarKhan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AbrarKhan\/Linux-4.19.72_CVE-2020-24490",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-29T09:39:42Z",
|
||||
"updated_at": "2024-04-29T09:57:30Z",
|
||||
"pushed_at": "2024-04-29T09:55:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-04-28T09:09:02Z",
|
||||
"updated_at": "2024-04-29T07:51:31Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1927,
|
||||
"watchers_count": 1927,
|
||||
"stargazers_count": 1928,
|
||||
"watchers_count": 1928,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 1927,
|
||||
"watchers": 1928,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2020-5410 Spring Cloud Config directory traversal vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T20:15:58Z",
|
||||
"updated_at": "2024-03-08T06:18:30Z",
|
||||
"updated_at": "2024-04-29T06:28:14Z",
|
||||
"pushed_at": "2020-06-16T20:38:41Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -972,10 +972,10 @@
|
|||
"description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-26T13:53:10Z",
|
||||
"updated_at": "2024-04-27T11:25:17Z",
|
||||
"updated_at": "2024-04-29T06:29:42Z",
|
||||
"pushed_at": "2021-10-17T13:29:56Z",
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -987,7 +987,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 171,
|
||||
"watchers": 172,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -43,8 +43,8 @@
|
|||
"description": "Tool for finding CVE-2021-20323",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-11T16:02:07Z",
|
||||
"updated_at": "2024-01-12T17:46:12Z",
|
||||
"pushed_at": "2024-04-11T10:19:19Z",
|
||||
"updated_at": "2024-04-29T07:55:09Z",
|
||||
"pushed_at": "2024-04-29T07:55:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -90,10 +90,10 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2024-04-19T08:31:33Z",
|
||||
"updated_at": "2024-04-29T08:11:53Z",
|
||||
"pushed_at": "2023-06-08T04:01:33Z",
|
||||
"stargazers_count": 474,
|
||||
"watchers_count": 474,
|
||||
"stargazers_count": 475,
|
||||
"watchers_count": 475,
|
||||
"has_discussions": false,
|
||||
"forks_count": 152,
|
||||
"allow_forking": true,
|
||||
|
@ -104,7 +104,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 152,
|
||||
"watchers": 474,
|
||||
"watchers": 475,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-04-29T00:02:06Z",
|
||||
"updated_at": "2024-04-29T11:23:51Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"stargazers_count": 1251,
|
||||
"watchers_count": 1251,
|
||||
"has_discussions": false,
|
||||
"forks_count": 158,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 158,
|
||||
"watchers": 1249,
|
||||
"watchers": 1251,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-11T22:08:47Z",
|
||||
"updated_at": "2024-04-28T03:25:27Z",
|
||||
"updated_at": "2024-04-29T08:21:34Z",
|
||||
"pushed_at": "2021-10-13T22:32:36Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -618,10 +618,10 @@
|
|||
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-23T20:20:45Z",
|
||||
"updated_at": "2024-04-26T12:11:11Z",
|
||||
"updated_at": "2024-04-29T07:55:03Z",
|
||||
"pushed_at": "2022-12-17T16:10:46Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -630,7 +630,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 97,
|
||||
"watchers": 98,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-04-28T06:14:10Z",
|
||||
"updated_at": "2024-04-29T09:38:34Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1750,
|
||||
"watchers_count": 1750,
|
||||
"stargazers_count": 1751,
|
||||
"watchers_count": 1751,
|
||||
"has_discussions": false,
|
||||
"forks_count": 517,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 517,
|
||||
"watchers": 1750,
|
||||
"watchers": 1751,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
@ -1527,7 +1527,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2024-04-26T10:47:50Z",
|
||||
"pushed_at": "2024-04-29T01:36:19Z",
|
||||
"pushed_at": "2024-04-29T06:37:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-26T20:37:42Z",
|
||||
"updated_at": "2024-04-24T17:28:49Z",
|
||||
"updated_at": "2024-04-29T10:29:30Z",
|
||||
"pushed_at": "2022-02-26T20:45:19Z",
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 302,
|
||||
"watchers": 303,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2022-21974 \"Roaming Security Rights Management Services Remote Code Execution Vulnerability\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-26T18:53:56Z",
|
||||
"updated_at": "2024-03-21T09:38:54Z",
|
||||
"updated_at": "2024-04-29T10:30:17Z",
|
||||
"pushed_at": "2022-02-26T19:12:12Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -766,10 +766,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-04-29T00:02:06Z",
|
||||
"updated_at": "2024-04-29T11:23:51Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"stargazers_count": 1251,
|
||||
"watchers_count": 1251,
|
||||
"has_discussions": false,
|
||||
"forks_count": 158,
|
||||
"allow_forking": true,
|
||||
|
@ -785,7 +785,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 158,
|
||||
"watchers": 1249,
|
||||
"watchers": 1251,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Apache Tomcat DoS (CVE-2022-29885) Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-01T09:02:10Z",
|
||||
"updated_at": "2023-04-01T01:16:22Z",
|
||||
"updated_at": "2024-04-29T08:54:03Z",
|
||||
"pushed_at": "2022-07-05T06:23:18Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -682,10 +682,10 @@
|
|||
"description": "CVE-2023-20198-RCE, support adding\/deleting users and executing cli commands\/system commands.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-25T06:59:53Z",
|
||||
"updated_at": "2024-04-29T03:33:46Z",
|
||||
"updated_at": "2024-04-29T08:36:47Z",
|
||||
"pushed_at": "2024-04-25T07:32:57Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -694,7 +694,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -227,10 +227,10 @@
|
|||
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-06T15:09:33Z",
|
||||
"updated_at": "2024-04-28T14:11:24Z",
|
||||
"updated_at": "2024-04-29T08:55:43Z",
|
||||
"pushed_at": "2024-02-06T15:56:12Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -239,7 +239,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -563,8 +563,8 @@
|
|||
"description": "An issue was discovered in cPanel before 11.109.9999.116. Cross-Site Scripting can occur on the cpsrvd error page via an invalid webcall ID.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-21T12:26:22Z",
|
||||
"updated_at": "2024-04-23T10:45:19Z",
|
||||
"pushed_at": "2024-04-23T10:45:15Z",
|
||||
"updated_at": "2024-04-29T07:55:51Z",
|
||||
"pushed_at": "2024-04-29T07:55:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-concept code for the Android APEX key reuse vulnerability described in https:\/\/rtx.meta.security\/exploitation\/2024\/01\/30\/Android-vendors-APEX-test-keys.html",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-26T21:17:38Z",
|
||||
"updated_at": "2024-04-22T08:11:20Z",
|
||||
"updated_at": "2024-04-29T09:31:02Z",
|
||||
"pushed_at": "2024-01-31T19:33:59Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-04-28T18:06:01Z",
|
||||
"updated_at": "2024-04-29T11:16:26Z",
|
||||
"pushed_at": "2024-04-08T13:43:21Z",
|
||||
"stargazers_count": 426,
|
||||
"watchers_count": 426,
|
||||
"stargazers_count": 427,
|
||||
"watchers_count": 427,
|
||||
"has_discussions": false,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 426,
|
||||
"watchers": 427,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-27T09:43:20Z",
|
||||
"updated_at": "2024-03-11T08:53:10Z",
|
||||
"updated_at": "2024-04-29T09:11:27Z",
|
||||
"pushed_at": "2023-09-27T10:39:47Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Fortinet FortiClient EMS SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-18T20:50:48Z",
|
||||
"updated_at": "2024-04-26T03:16:01Z",
|
||||
"updated_at": "2024-04-29T11:28:00Z",
|
||||
"pushed_at": "2024-03-20T20:42:41Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -144,10 +144,10 @@
|
|||
"description": "CVE-2023-49070 exploit and CVE-2023-49070 & CVE-2023-51467 vulnerability scanner",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-11T22:35:57Z",
|
||||
"updated_at": "2024-02-16T11:40:00Z",
|
||||
"updated_at": "2024-04-29T11:54:01Z",
|
||||
"pushed_at": "2024-01-12T10:37:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -156,7 +156,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "cve-2024-0305可用的exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-18T03:13:43Z",
|
||||
"updated_at": "2024-04-19T04:22:37Z",
|
||||
"updated_at": "2024-04-29T11:55:59Z",
|
||||
"pushed_at": "2024-04-19T04:23:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-04-29T03:31:05Z",
|
||||
"updated_at": "2024-04-29T10:40:36Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 1893,
|
||||
"watchers_count": 1893,
|
||||
"stargazers_count": 1895,
|
||||
"watchers_count": 1895,
|
||||
"has_discussions": false,
|
||||
"forks_count": 234,
|
||||
"forks_count": 235,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 234,
|
||||
"watchers": 1893,
|
||||
"forks": 235,
|
||||
"watchers": 1895,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-06T15:09:33Z",
|
||||
"updated_at": "2024-04-28T14:11:24Z",
|
||||
"updated_at": "2024-04-29T08:55:43Z",
|
||||
"pushed_at": "2024-02-06T15:56:12Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-22T07:05:04Z",
|
||||
"updated_at": "2024-04-29T06:22:37Z",
|
||||
"updated_at": "2024-04-29T10:56:49Z",
|
||||
"pushed_at": "2024-04-27T20:04:01Z",
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 177,
|
||||
"watchers": 181,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-21345",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-26T16:38:17Z",
|
||||
"updated_at": "2024-04-29T06:32:55Z",
|
||||
"updated_at": "2024-04-29T11:36:45Z",
|
||||
"pushed_at": "2024-04-26T16:39:48Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 41,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2024-24576 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-10T14:06:09Z",
|
||||
"updated_at": "2024-04-20T16:07:16Z",
|
||||
"updated_at": "2024-04-29T08:53:38Z",
|
||||
"pushed_at": "2024-04-10T14:42:34Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-26218",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-26T16:41:04Z",
|
||||
"updated_at": "2024-04-29T04:52:25Z",
|
||||
"updated_at": "2024-04-29T11:10:02Z",
|
||||
"pushed_at": "2024-04-26T16:46:15Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 20,
|
||||
"forks": 8,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -279,10 +279,10 @@
|
|||
"description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-22T22:14:24Z",
|
||||
"updated_at": "2024-04-28T22:39:59Z",
|
||||
"updated_at": "2024-04-29T11:30:26Z",
|
||||
"pushed_at": "2024-04-25T17:55:35Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -302,7 +302,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Information for CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T17:03:01Z",
|
||||
"updated_at": "2024-04-25T13:09:17Z",
|
||||
"updated_at": "2024-04-29T11:36:42Z",
|
||||
"pushed_at": "2024-04-01T16:01:34Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 50,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T20:28:17Z",
|
||||
"updated_at": "2024-04-25T17:19:02Z",
|
||||
"updated_at": "2024-04-29T11:38:27Z",
|
||||
"pushed_at": "2024-03-31T00:13:39Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 73,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -493,10 +493,10 @@
|
|||
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-30T22:07:24Z",
|
||||
"updated_at": "2024-04-29T01:31:07Z",
|
||||
"updated_at": "2024-04-29T11:36:44Z",
|
||||
"pushed_at": "2024-04-02T03:38:32Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -510,7 +510,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 136,
|
||||
"watchers": 135,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -1012,10 +1012,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-04-28T23:48:08Z",
|
||||
"updated_at": "2024-04-29T11:36:56Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3436,
|
||||
"watchers_count": 3436,
|
||||
"stargazers_count": 3435,
|
||||
"watchers_count": 3435,
|
||||
"has_discussions": false,
|
||||
"forks_count": 232,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,7 +1024,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 232,
|
||||
"watchers": 3436,
|
||||
"watchers": 3435,
|
||||
"score": 0,
|
||||
"subscribers_count": 36
|
||||
},
|
||||
|
|
|
@ -283,10 +283,10 @@
|
|||
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T14:18:08Z",
|
||||
"updated_at": "2024-04-29T03:12:04Z",
|
||||
"updated_at": "2024-04-29T06:43:48Z",
|
||||
"pushed_at": "2024-04-16T22:35:43Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -295,7 +295,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 123,
|
||||
"watchers": 124,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -896,7 +896,7 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -909,7 +909,7 @@
|
|||
"python3"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -29,36 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
{
|
||||
"id": 791002416,
|
||||
"name": "CVE-2024-4040-RCE-POC",
|
||||
"full_name": "tr4c3rs\/CVE-2024-4040-RCE-POC",
|
||||
"owner": {
|
||||
"login": "tr4c3rs",
|
||||
"id": 167206794,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167206794?v=4",
|
||||
"html_url": "https:\/\/github.com\/tr4c3rs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tr4c3rs\/CVE-2024-4040-RCE-POC",
|
||||
"description": "CVE-2024-4040 (CrushFTP VFS escape) or (CrushFTP unauthenticated RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-23T23:16:36Z",
|
||||
"updated_at": "2024-04-28T02:17:32Z",
|
||||
"pushed_at": "2024-04-23T23:26:34Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 791624022,
|
||||
"name": "CVE-2024-4040-Scanner",
|
||||
|
@ -163,10 +133,10 @@
|
|||
"description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-25T19:51:38Z",
|
||||
"updated_at": "2024-04-29T00:59:43Z",
|
||||
"updated_at": "2024-04-29T07:09:57Z",
|
||||
"pushed_at": "2024-04-29T00:59:40Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -190,8 +160,38 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 793492567,
|
||||
"name": "CVE-2024-4040-CrushFTP-server",
|
||||
"full_name": "Praison001\/CVE-2024-4040-CrushFTP-server",
|
||||
"owner": {
|
||||
"login": "Praison001",
|
||||
"id": 60835238,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
|
||||
"html_url": "https:\/\/github.com\/Praison001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Praison001\/CVE-2024-4040-CrushFTP-server",
|
||||
"description": "Exploit for CVE-2024-4040 affecting CrushFTP server in all versions before 10.7.1 and 11.1.0 on all platforms",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-29T10:21:53Z",
|
||||
"updated_at": "2024-04-29T10:27:07Z",
|
||||
"pushed_at": "2024-04-29T10:27:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
10
README.md
10
README.md
|
@ -434,11 +434,11 @@
|
|||
</code>
|
||||
|
||||
- [airbus-cert/CVE-2024-4040](https://github.com/airbus-cert/CVE-2024-4040)
|
||||
- [tr4c3rs/CVE-2024-4040-RCE-POC](https://github.com/tr4c3rs/CVE-2024-4040-RCE-POC)
|
||||
- [tucommenceapousser/CVE-2024-4040-Scanner](https://github.com/tucommenceapousser/CVE-2024-4040-Scanner)
|
||||
- [rbih-boulanouar/CVE-2024-4040](https://github.com/rbih-boulanouar/CVE-2024-4040)
|
||||
- [Mufti22/CVE-2024-4040](https://github.com/Mufti22/CVE-2024-4040)
|
||||
- [Stuub/CVE-2024-4040-SSTI-LFI-PoC](https://github.com/Stuub/CVE-2024-4040-SSTI-LFI-PoC)
|
||||
- [Praison001/CVE-2024-4040-CrushFTP-server](https://github.com/Praison001/CVE-2024-4040-CrushFTP-server)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
@ -26476,6 +26476,14 @@
|
|||
|
||||
- [nathunandwani/CVE-2020-24227](https://github.com/nathunandwani/CVE-2020-24227)
|
||||
|
||||
### CVE-2020-24490 (2021-02-02)
|
||||
|
||||
<code>Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.
|
||||
</code>
|
||||
|
||||
- [AbrarKhan/linux_CVE-2020-24490-beforePatch](https://github.com/AbrarKhan/linux_CVE-2020-24490-beforePatch)
|
||||
- [AbrarKhan/Linux-4.19.72_CVE-2020-24490](https://github.com/AbrarKhan/Linux-4.19.72_CVE-2020-24490)
|
||||
|
||||
### CVE-2020-24572 (2020-08-24)
|
||||
|
||||
<code>An issue was discovered in includes/webconsole.php in RaspAP 2.5. With authenticated access, an attacker can use a misconfigured (and virtually unrestricted) web console to attack the underlying OS (Raspberry Pi) running this software, and execute commands on the system (including ones for uploading of files and execution of code).
|
||||
|
|
Loading…
Reference in a new issue