mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/04/18 06:27:57
This commit is contained in:
parent
01aab7419d
commit
d5ce87882c
39 changed files with 217 additions and 287 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "Simple exploit for Easy RM to MP3 Converter 2.7.3.700 on Windows 7 32b.",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-30T12:17:08Z",
|
||||
"updated_at": "2018-12-31T10:09:34Z",
|
||||
"updated_at": "2024-04-18T05:04:48Z",
|
||||
"pushed_at": "2018-12-31T09:59:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-04-17T10:12:13Z",
|
||||
"updated_at": "2024-04-18T01:00:22Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1920,
|
||||
"watchers_count": 1920,
|
||||
"stargazers_count": 1921,
|
||||
"watchers_count": 1921,
|
||||
"has_discussions": true,
|
||||
"forks_count": 332,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 332,
|
||||
"watchers": 1920,
|
||||
"watchers": 1921,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-04-17T10:12:13Z",
|
||||
"updated_at": "2024-04-18T01:00:22Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1920,
|
||||
"watchers_count": 1920,
|
||||
"stargazers_count": 1921,
|
||||
"watchers_count": 1921,
|
||||
"has_discussions": true,
|
||||
"forks_count": 332,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 332,
|
||||
"watchers": 1920,
|
||||
"watchers": 1921,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -373,10 +373,10 @@
|
|||
"description": "Tomcat PUT方法任意文件写入(CVE-2017-12615)exp",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-10T16:26:45Z",
|
||||
"updated_at": "2024-03-19T10:34:28Z",
|
||||
"updated_at": "2024-04-18T01:26:02Z",
|
||||
"pushed_at": "2023-03-14T07:39:41Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": true,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -385,7 +385,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-04-17T10:12:13Z",
|
||||
"updated_at": "2024-04-18T01:00:22Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1920,
|
||||
"watchers_count": 1920,
|
||||
"stargazers_count": 1921,
|
||||
"watchers_count": 1921,
|
||||
"has_discussions": true,
|
||||
"forks_count": 332,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 332,
|
||||
"watchers": 1920,
|
||||
"watchers": 1921,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -557,10 +557,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-04-17T10:12:13Z",
|
||||
"updated_at": "2024-04-18T01:00:22Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1920,
|
||||
"watchers_count": 1920,
|
||||
"stargazers_count": 1921,
|
||||
"watchers_count": 1921,
|
||||
"has_discussions": true,
|
||||
"forks_count": 332,
|
||||
"allow_forking": true,
|
||||
|
@ -590,7 +590,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 332,
|
||||
"watchers": 1920,
|
||||
"watchers": 1921,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-04-17T10:12:13Z",
|
||||
"updated_at": "2024-04-18T01:00:22Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1920,
|
||||
"watchers_count": 1920,
|
||||
"stargazers_count": 1921,
|
||||
"watchers_count": 1921,
|
||||
"has_discussions": true,
|
||||
"forks_count": 332,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 332,
|
||||
"watchers": 1920,
|
||||
"watchers": 1921,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "This is a RCE bluetooth vulnerability on Android 8.0 and 9.0",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-01T00:23:33Z",
|
||||
"updated_at": "2024-02-23T06:01:02Z",
|
||||
"updated_at": "2024-04-18T04:15:02Z",
|
||||
"pushed_at": "2023-05-23T04:46:45Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2024-04-12T13:58:51Z",
|
||||
"updated_at": "2024-04-18T00:30:04Z",
|
||||
"pushed_at": "2023-07-20T10:51:42Z",
|
||||
"stargazers_count": 1690,
|
||||
"watchers_count": 1690,
|
||||
"stargazers_count": 1691,
|
||||
"watchers_count": 1691,
|
||||
"has_discussions": false,
|
||||
"forks_count": 361,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 361,
|
||||
"watchers": 1690,
|
||||
"watchers": 1691,
|
||||
"score": 0,
|
||||
"subscribers_count": 87
|
||||
},
|
||||
|
@ -103,10 +103,10 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2024-04-14T17:16:33Z",
|
||||
"updated_at": "2024-04-18T00:30:54Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 1139,
|
||||
"watchers_count": 1139,
|
||||
"stargazers_count": 1140,
|
||||
"watchers_count": 1140,
|
||||
"has_discussions": false,
|
||||
"forks_count": 286,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 286,
|
||||
"watchers": 1139,
|
||||
"watchers": 1140,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-04-17T10:12:13Z",
|
||||
"updated_at": "2024-04-18T01:00:22Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1920,
|
||||
"watchers_count": 1920,
|
||||
"stargazers_count": 1921,
|
||||
"watchers_count": 1921,
|
||||
"has_discussions": true,
|
||||
"forks_count": 332,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 332,
|
||||
"watchers": 1920,
|
||||
"watchers": 1921,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"forks": 21,
|
||||
"watchers": 140,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
|
|
|
@ -1527,7 +1527,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2023-05-28T11:06:10Z",
|
||||
"pushed_at": "2024-04-14T21:55:08Z",
|
||||
"pushed_at": "2024-04-18T05:10:29Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
@ -4127,10 +4127,10 @@
|
|||
"description": "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T11:06:46Z",
|
||||
"updated_at": "2024-04-11T11:36:52Z",
|
||||
"updated_at": "2024-04-18T01:25:02Z",
|
||||
"pushed_at": "2021-12-26T09:58:06Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -4139,7 +4139,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-15T02:42:43Z",
|
||||
"updated_at": "2024-04-17T19:09:59Z",
|
||||
"pushed_at": "2024-04-17T22:58:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2024-04-18T05:15:03Z",
|
||||
"pushed_at": "2024-04-18T05:14:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2024-04-14T08:22:50Z",
|
||||
"updated_at": "2024-04-18T03:46:37Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"stargazers_count": 1073,
|
||||
"watchers_count": 1073,
|
||||
"has_discussions": false,
|
||||
"forks_count": 219,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 219,
|
||||
"watchers": 1072,
|
||||
"watchers": 1073,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T10:25:59Z",
|
||||
"updated_at": "2024-04-16T16:55:30Z",
|
||||
"updated_at": "2024-04-18T02:44:36Z",
|
||||
"pushed_at": "2023-05-27T15:39:41Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 213,
|
||||
"watchers": 214,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -93,10 +93,10 @@
|
|||
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T02:28:50Z",
|
||||
"updated_at": "2024-04-08T16:54:25Z",
|
||||
"updated_at": "2024-04-18T05:08:02Z",
|
||||
"pushed_at": "2022-01-20T02:07:59Z",
|
||||
"stargazers_count": 362,
|
||||
"watchers_count": 362,
|
||||
"stargazers_count": 361,
|
||||
"watchers_count": 361,
|
||||
"has_discussions": false,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
|
@ -105,7 +105,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 98,
|
||||
"watchers": 362,
|
||||
"watchers": 361,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-12-23T12:33:21Z",
|
||||
"updated_at": "2023-03-10T01:15:25Z",
|
||||
"pushed_at": "2024-04-16T23:38:54Z",
|
||||
"pushed_at": "2024-04-18T02:47:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-10T13:02:55Z",
|
||||
"updated_at": "2024-02-21T16:04:41Z",
|
||||
"updated_at": "2024-04-18T02:18:05Z",
|
||||
"pushed_at": "2024-04-16T09:20:45Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 101,
|
||||
"watchers": 102,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -90,6 +90,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 769,
|
||||
"watchers_count": 769,
|
||||
"has_discussions": false,
|
||||
"forks_count": 139,
|
||||
"forks_count": 140,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -58,7 +58,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 139,
|
||||
"forks": 140,
|
||||
"watchers": 769,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
@ -107,10 +107,10 @@
|
|||
"description": "一款用于生成winrar程序RCE(即cve-2023-38831)的POC的工具。",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-27T14:08:36Z",
|
||||
"updated_at": "2024-04-03T02:11:07Z",
|
||||
"updated_at": "2024-04-18T02:54:46Z",
|
||||
"pushed_at": "2023-08-27T14:35:00Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-27T05:57:21Z",
|
||||
"updated_at": "2024-04-15T06:45:56Z",
|
||||
"updated_at": "2024-04-18T02:51:30Z",
|
||||
"pushed_at": "2024-01-29T02:28:11Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 201,
|
||||
"watchers": 202,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -722,6 +722,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2024/CVE-2024-0305.json
Normal file
32
2024/CVE-2024-0305.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 788238757,
|
||||
"name": "cve-2024-0305exp",
|
||||
"full_name": "jidle123\/cve-2024-0305exp",
|
||||
"owner": {
|
||||
"login": "jidle123",
|
||||
"id": 123531867,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123531867?v=4",
|
||||
"html_url": "https:\/\/github.com\/jidle123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jidle123\/cve-2024-0305exp",
|
||||
"description": "cve-2024-0305可用的exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-18T03:13:43Z",
|
||||
"updated_at": "2024-04-18T03:25:54Z",
|
||||
"pushed_at": "2024-04-18T03:30:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-04-17T15:12:06Z",
|
||||
"updated_at": "2024-04-18T02:54:18Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 1853,
|
||||
"watchers_count": 1853,
|
||||
"stargazers_count": 1854,
|
||||
"watchers_count": 1854,
|
||||
"has_discussions": false,
|
||||
"forks_count": 228,
|
||||
"forks_count": 230,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 228,
|
||||
"watchers": 1853,
|
||||
"forks": 230,
|
||||
"watchers": 1854,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T05:53:02Z",
|
||||
"updated_at": "2024-04-17T20:40:02Z",
|
||||
"updated_at": "2024-04-18T05:14:22Z",
|
||||
"pushed_at": "2024-04-16T21:00:14Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 126,
|
||||
"forks": 29,
|
||||
"watchers": 138,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -57,6 +57,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-28T21:16:10Z",
|
||||
"updated_at": "2024-04-17T16:45:52Z",
|
||||
"updated_at": "2024-04-18T03:49:26Z",
|
||||
"pushed_at": "2024-03-01T20:02:52Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -208,35 +208,5 @@
|
|||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 787627670,
|
||||
"name": "Cve-2024-21762-",
|
||||
"full_name": "Codeb3af\/Cve-2024-21762-",
|
||||
"owner": {
|
||||
"login": "Codeb3af",
|
||||
"id": 167255943,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167255943?v=4",
|
||||
"html_url": "https:\/\/github.com\/Codeb3af"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Codeb3af\/Cve-2024-21762-",
|
||||
"description": "Full exploit of Cve-2024-21762!",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T22:06:52Z",
|
||||
"updated_at": "2024-04-16T22:10:40Z",
|
||||
"pushed_at": "2024-04-16T22:15:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 783829842,
|
||||
"name": "CVE-2024-21894-POC",
|
||||
"full_name": "RansomGroupCVE\/CVE-2024-21894-POC",
|
||||
"owner": {
|
||||
"login": "RansomGroupCVE",
|
||||
"id": 166298400,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166298400?v=4",
|
||||
"html_url": "https:\/\/github.com\/RansomGroupCVE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RansomGroupCVE\/CVE-2024-21894-POC",
|
||||
"description": " Exploit CVE-2024-21894 for Vulnerable Ivanti Connect Secure and Policy Secure Gateways POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-08T16:50:32Z",
|
||||
"updated_at": "2024-04-10T17:39:32Z",
|
||||
"pushed_at": "2024-04-11T15:53:45Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 785615377,
|
||||
"name": "CVE-2024-21894-Proof-of-concept",
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": " env of CVE-2024-22243&CVE-2024-22234",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-23T10:09:51Z",
|
||||
"updated_at": "2024-03-21T07:11:41Z",
|
||||
"updated_at": "2024-04-18T01:29:27Z",
|
||||
"pushed_at": "2024-02-28T06:55:26Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 783282598,
|
||||
"name": "CVE-2024-22328-POC",
|
||||
"full_name": "RansomGroupCVE\/CVE-2024-22328-POC",
|
||||
"owner": {
|
||||
"login": "RansomGroupCVE",
|
||||
"id": 166298400,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166298400?v=4",
|
||||
"html_url": "https:\/\/github.com\/RansomGroupCVE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RansomGroupCVE\/CVE-2024-22328-POC",
|
||||
"description": "About POC CVE-2024-22328 Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-07T13:09:17Z",
|
||||
"updated_at": "2024-04-07T13:09:18Z",
|
||||
"pushed_at": "2024-04-13T16:09:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2024-24576 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-10T14:06:09Z",
|
||||
"updated_at": "2024-04-17T21:05:24Z",
|
||||
"updated_at": "2024-04-18T05:04:34Z",
|
||||
"pushed_at": "2024-04-10T14:42:34Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -138,8 +138,8 @@
|
|||
"description": "This is a simple demo for the BadBatBut vulnerability CVE-2024-24576",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-12T23:36:05Z",
|
||||
"updated_at": "2024-04-17T21:05:33Z",
|
||||
"pushed_at": "2024-04-13T00:19:45Z",
|
||||
"updated_at": "2024-04-18T04:31:18Z",
|
||||
"pushed_at": "2024-04-18T04:24:32Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -195,6 +195,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -35,5 +35,35 @@
|
|||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 788117590,
|
||||
"name": "CVE-2024-27316_poc",
|
||||
"full_name": "aeyesec\/CVE-2024-27316_poc",
|
||||
"owner": {
|
||||
"login": "aeyesec",
|
||||
"id": 61375985,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61375985?v=4",
|
||||
"html_url": "https:\/\/github.com\/aeyesec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aeyesec\/CVE-2024-27316_poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-17T20:08:05Z",
|
||||
"updated_at": "2024-04-18T01:27:19Z",
|
||||
"pushed_at": "2024-04-17T21:31:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1012,10 +1012,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-04-17T15:30:23Z",
|
||||
"updated_at": "2024-04-18T01:34:10Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3379,
|
||||
"watchers_count": 3379,
|
||||
"stargazers_count": 3380,
|
||||
"watchers_count": 3380,
|
||||
"has_discussions": false,
|
||||
"forks_count": 227,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,7 +1024,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 227,
|
||||
"watchers": 3379,
|
||||
"watchers": 3380,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 787871319,
|
||||
|
@ -57,6 +57,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-17T13:43:57Z",
|
||||
"updated_at": "2024-04-17T15:38:44Z",
|
||||
"updated_at": "2024-04-18T06:20:00Z",
|
||||
"pushed_at": "2024-04-17T14:15:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,8 +25,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T05:16:21Z",
|
||||
"updated_at": "2024-04-17T14:35:35Z",
|
||||
"updated_at": "2024-04-18T03:40:33Z",
|
||||
"pushed_at": "2024-04-13T05:20:15Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2024-3400",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T14:00:31Z",
|
||||
"updated_at": "2024-04-17T19:08:06Z",
|
||||
"pushed_at": "2024-04-17T19:05:41Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"updated_at": "2024-04-18T03:38:21Z",
|
||||
"pushed_at": "2024-04-18T05:49:19Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 26,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -283,10 +283,10 @@
|
|||
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T14:18:08Z",
|
||||
"updated_at": "2024-04-17T21:46:51Z",
|
||||
"updated_at": "2024-04-18T06:17:23Z",
|
||||
"pushed_at": "2024-04-16T22:35:43Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -295,7 +295,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 58,
|
||||
"watchers": 68,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -313,10 +313,10 @@
|
|||
"description": "CVE-2024-3400-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T16:18:56Z",
|
||||
"updated_at": "2024-04-17T13:05:58Z",
|
||||
"updated_at": "2024-04-18T02:03:38Z",
|
||||
"pushed_at": "2024-04-17T01:11:01Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -325,7 +325,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -387,7 +387,7 @@
|
|||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 787614808,
|
||||
|
@ -447,7 +447,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 787813638,
|
||||
|
@ -477,7 +477,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 787894337,
|
||||
|
@ -507,7 +507,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 788013743,
|
||||
|
@ -537,7 +537,7 @@
|
|||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 788136951,
|
||||
|
@ -567,7 +567,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 788161583,
|
||||
|
@ -597,6 +597,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 787533779,
|
||||
"name": "CVE-2024-3867-POC",
|
||||
"full_name": "RansomGroupCVE\/CVE-2024-3867-POC",
|
||||
"owner": {
|
||||
"login": "RansomGroupCVE",
|
||||
"id": 166298400,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166298400?v=4",
|
||||
"html_url": "https:\/\/github.com\/RansomGroupCVE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RansomGroupCVE\/CVE-2024-3867-POC",
|
||||
"description": "Exploiting Reflected Cross-Site Scripting (XSS) in WordPress archive-tainacan-collection Theme",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T17:52:19Z",
|
||||
"updated_at": "2024-04-16T17:52:19Z",
|
||||
"pushed_at": "2024-04-16T17:55:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
24
README.md
24
README.md
|
@ -25,6 +25,13 @@
|
|||
- [m-cetin/CVE-2024-0204](https://github.com/m-cetin/CVE-2024-0204)
|
||||
- [adminlove520/CVE-2024-0204](https://github.com/adminlove520/CVE-2024-0204)
|
||||
|
||||
### CVE-2024-0305 (2024-01-08)
|
||||
|
||||
<code>Eine Schwachstelle wurde in Guangzhou Yingke Electronic Technology Ncast bis 2017 gefunden. Sie wurde als problematisch eingestuft. Dies betrifft einen unbekannten Teil der Datei /manage/IPSetup.php der Komponente Guest Login. Durch das Manipulieren mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
|
||||
</code>
|
||||
|
||||
- [jidle123/cve-2024-0305exp](https://github.com/jidle123/cve-2024-0305exp)
|
||||
|
||||
### CVE-2024-0582 (2024-01-16)
|
||||
|
||||
<code>A memory leak flaw was found in the Linux kernel’s io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it. This flaw allows a local user to crash or potentially escalate their privileges on the system.
|
||||
|
@ -393,13 +400,6 @@
|
|||
- [phantomradar/cve-2024-3400-poc](https://github.com/phantomradar/cve-2024-3400-poc)
|
||||
- [retkoussa/CVE-2024-3400](https://github.com/retkoussa/CVE-2024-3400)
|
||||
|
||||
### CVE-2024-3867 (2024-04-16)
|
||||
|
||||
<code>The archive-tainacan-collection theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in version 2.7.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
||||
</code>
|
||||
|
||||
- [RansomGroupCVE/CVE-2024-3867-POC](https://github.com/RansomGroupCVE/CVE-2024-3867-POC)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
||||
|
@ -581,7 +581,6 @@
|
|||
- [d0rb/CVE-2024-21762](https://github.com/d0rb/CVE-2024-21762)
|
||||
- [lolminerxmrig/multicheck_CVE-2024-21762](https://github.com/lolminerxmrig/multicheck_CVE-2024-21762)
|
||||
- [AlexLondan/CVE-2024-21762-Fortinet-RCE-ALLWORK](https://github.com/AlexLondan/CVE-2024-21762-Fortinet-RCE-ALLWORK)
|
||||
- [Codeb3af/Cve-2024-21762-](https://github.com/Codeb3af/Cve-2024-21762-)
|
||||
|
||||
### CVE-2024-21887 (2024-01-12)
|
||||
|
||||
|
@ -610,7 +609,6 @@
|
|||
<code>A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack. In certain conditions this may lead to execution of arbitrary code
|
||||
</code>
|
||||
|
||||
- [RansomGroupCVE/CVE-2024-21894-POC](https://github.com/RansomGroupCVE/CVE-2024-21894-POC)
|
||||
- [AlexLondan/CVE-2024-21894-Proof-of-concept](https://github.com/AlexLondan/CVE-2024-21894-Proof-of-concept)
|
||||
|
||||
### CVE-2024-22024 (2024-02-13)
|
||||
|
@ -630,13 +628,6 @@
|
|||
|
||||
- [shellfeel/CVE-2024-22243-CVE-2024-22234](https://github.com/shellfeel/CVE-2024-22243-CVE-2024-22234)
|
||||
|
||||
### CVE-2024-22328 (2024-04-06)
|
||||
|
||||
<code>IBM Maximo Application Suite 8.10 and 8.11 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 279950.
|
||||
</code>
|
||||
|
||||
- [RansomGroupCVE/CVE-2024-22328-POC](https://github.com/RansomGroupCVE/CVE-2024-22328-POC)
|
||||
|
||||
### CVE-2024-22369 (2024-02-20)
|
||||
|
||||
<code>Deserialization of Untrusted Data vulnerability in Apache Camel SQL ComponentThis issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0.\n\nUsers are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1\n\n
|
||||
|
@ -1270,6 +1261,7 @@
|
|||
</code>
|
||||
|
||||
- [lockness-Ko/CVE-2024-27316](https://github.com/lockness-Ko/CVE-2024-27316)
|
||||
- [aeyesec/CVE-2024-27316_poc](https://github.com/aeyesec/CVE-2024-27316_poc)
|
||||
|
||||
### CVE-2024-27462
|
||||
- [Alaatk/CVE-2024-27462](https://github.com/Alaatk/CVE-2024-27462)
|
||||
|
|
Loading…
Reference in a new issue