mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/19 18:32:14
This commit is contained in:
parent
330e877853
commit
e8c88987ed
37 changed files with 263 additions and 143 deletions
|
@ -145,8 +145,8 @@
|
|||
"description": "Adobe ColdFusion 8 - Remote Command Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-18T18:12:56Z",
|
||||
"updated_at": "2024-12-18T22:09:58Z",
|
||||
"pushed_at": "2024-12-18T22:09:55Z",
|
||||
"updated_at": "2024-12-19T17:05:13Z",
|
||||
"pushed_at": "2024-12-19T17:05:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -159,6 +159,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -80,7 +80,7 @@
|
|||
"forks": 340,
|
||||
"watchers": 2012,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
"subscribers_count": 38
|
||||
},
|
||||
{
|
||||
"id": 281288274,
|
||||
|
|
|
@ -49,7 +49,7 @@
|
|||
"forks": 340,
|
||||
"watchers": 2012,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
"subscribers_count": 38
|
||||
},
|
||||
{
|
||||
"id": 286429427,
|
||||
|
|
|
@ -149,10 +149,10 @@
|
|||
"description": "To determine if an APK is vulnerable to CVE-2017-13156",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-10T23:32:29Z",
|
||||
"updated_at": "2024-06-20T21:49:20Z",
|
||||
"updated_at": "2024-12-19T15:16:31Z",
|
||||
"pushed_at": "2022-06-11T04:40:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -161,7 +161,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -180,10 +180,10 @@
|
|||
"description": "Android Application Vulnerability Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-20T21:56:02Z",
|
||||
"updated_at": "2024-06-01T12:38:28Z",
|
||||
"updated_at": "2024-12-19T15:02:28Z",
|
||||
"pushed_at": "2024-02-21T10:34:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -192,7 +192,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -80,7 +80,7 @@
|
|||
"forks": 340,
|
||||
"watchers": 2012,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
"subscribers_count": 38
|
||||
},
|
||||
{
|
||||
"id": 400940873,
|
||||
|
|
|
@ -611,7 +611,7 @@
|
|||
"forks": 340,
|
||||
"watchers": 2012,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
"subscribers_count": 38
|
||||
},
|
||||
{
|
||||
"id": 285784115,
|
||||
|
|
|
@ -45,8 +45,8 @@
|
|||
"description": "Results of my research I have done on CVE-2021-30481 and on wallhacks in the videogame Counter-Strike 2",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-31T09:43:39Z",
|
||||
"updated_at": "2024-12-06T21:34:24Z",
|
||||
"pushed_at": "2024-12-06T21:34:21Z",
|
||||
"updated_at": "2024-12-19T16:14:05Z",
|
||||
"pushed_at": "2024-12-19T16:14:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2024-12-18T02:50:06Z",
|
||||
"updated_at": "2024-12-19T16:20:00Z",
|
||||
"pushed_at": "2022-07-10T22:23:13Z",
|
||||
"stargazers_count": 992,
|
||||
"watchers_count": 992,
|
||||
"stargazers_count": 993,
|
||||
"watchers_count": 993,
|
||||
"has_discussions": false,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 190,
|
||||
"watchers": 992,
|
||||
"watchers": 993,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
},
|
||||
|
|
|
@ -200,10 +200,10 @@
|
|||
"description": "Apache APISIX < 2.12.1 Remote Code Execution and Docker Lab",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-20T16:35:55Z",
|
||||
"updated_at": "2023-11-18T07:54:06Z",
|
||||
"updated_at": "2024-12-19T13:32:51Z",
|
||||
"pushed_at": "2022-03-20T18:09:34Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -217,7 +217,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Authenticated Vertical Privilege Escalation Vulnerability in Blood Donor Management System",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-23T14:03:41Z",
|
||||
"updated_at": "2022-10-24T00:50:52Z",
|
||||
"updated_at": "2024-12-19T15:23:33Z",
|
||||
"pushed_at": "2022-10-23T15:46:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Cross Site Scripting in Blood Donor Management System Using CodeIgniter - 1.0",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-01T05:36:20Z",
|
||||
"updated_at": "2022-11-02T01:06:04Z",
|
||||
"updated_at": "2024-12-19T15:23:32Z",
|
||||
"pushed_at": "2022-11-01T05:37:16Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "RCE Exploit and Research ",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-12T22:33:31Z",
|
||||
"updated_at": "2023-02-13T13:43:16Z",
|
||||
"updated_at": "2024-12-19T15:23:35Z",
|
||||
"pushed_at": "2022-10-15T06:42:44Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -36,7 +36,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Cross Site Scripting in Teacher's Record Management System using CodeIgnitor",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-03T09:06:39Z",
|
||||
"updated_at": "2022-11-04T00:57:10Z",
|
||||
"updated_at": "2024-12-19T15:23:18Z",
|
||||
"pushed_at": "2022-11-03T09:08:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Privilege Escalation in Teachers Record Management System using CodeIgnitor",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-03T09:10:24Z",
|
||||
"updated_at": "2022-11-04T00:57:15Z",
|
||||
"updated_at": "2024-12-19T15:23:19Z",
|
||||
"pushed_at": "2022-11-03T09:11:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-11-20T11:33:46Z",
|
||||
"updated_at": "2022-11-20T11:33:46Z",
|
||||
"updated_at": "2024-12-19T15:23:20Z",
|
||||
"pushed_at": "2022-11-20T11:34:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-11-20T11:35:05Z",
|
||||
"updated_at": "2022-11-20T11:35:05Z",
|
||||
"updated_at": "2024-12-19T15:23:21Z",
|
||||
"pushed_at": "2022-11-20T11:35:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-26T16:18:41Z",
|
||||
"updated_at": "2024-12-10T11:18:40Z",
|
||||
"updated_at": "2024-12-19T14:57:41Z",
|
||||
"pushed_at": "2023-09-26T19:04:21Z",
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 229,
|
||||
"watchers": 230,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-09T19:56:07Z",
|
||||
"updated_at": "2024-11-22T15:47:42Z",
|
||||
"updated_at": "2024-12-19T17:34:11Z",
|
||||
"pushed_at": "2024-11-09T16:38:20Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2024-12-16T14:43:13Z",
|
||||
"updated_at": "2024-12-19T18:09:57Z",
|
||||
"pushed_at": "2023-11-26T06:46:44Z",
|
||||
"stargazers_count": 784,
|
||||
"watchers_count": 784,
|
||||
"stargazers_count": 783,
|
||||
"watchers_count": 783,
|
||||
"has_discussions": false,
|
||||
"forks_count": 140,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 140,
|
||||
"watchers": 784,
|
||||
"watchers": 783,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -699,7 +699,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-04-17T13:10:34Z",
|
||||
"updated_at": "2024-10-30T15:47:10Z",
|
||||
"pushed_at": "2024-12-06T16:20:41Z",
|
||||
"pushed_at": "2024-12-19T17:01:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -222,7 +222,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-01-09T16:58:06Z",
|
||||
"updated_at": "2024-11-22T23:28:43Z",
|
||||
"pushed_at": "2024-12-06T17:19:32Z",
|
||||
"pushed_at": "2024-12-19T17:57:59Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-10793 poc exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-17T18:44:53Z",
|
||||
"updated_at": "2024-12-17T09:54:23Z",
|
||||
"updated_at": "2024-12-19T13:21:31Z",
|
||||
"pushed_at": "2024-11-17T19:51:53Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,8 +26,39 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 905828907,
|
||||
"name": "CVE-2024-10793",
|
||||
"full_name": "MAHajian\/CVE-2024-10793",
|
||||
"owner": {
|
||||
"login": "MAHajian",
|
||||
"id": 139576061,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139576061?v=4",
|
||||
"html_url": "https:\/\/github.com\/MAHajian",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MAHajian\/CVE-2024-10793",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-19T15:50:53Z",
|
||||
"updated_at": "2024-12-19T16:38:19Z",
|
||||
"pushed_at": "2024-12-19T16:38:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-12-19T09:58:05Z",
|
||||
"updated_at": "2024-12-19T18:00:30Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2302,
|
||||
"watchers_count": 2302,
|
||||
"stargazers_count": 2303,
|
||||
"watchers_count": 2303,
|
||||
"has_discussions": false,
|
||||
"forks_count": 299,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 299,
|
||||
"watchers": 2302,
|
||||
"watchers": 2303,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
@ -206,10 +206,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-16T17:33:13Z",
|
||||
"updated_at": "2024-12-18T11:44:02Z",
|
||||
"updated_at": "2024-12-19T12:32:50Z",
|
||||
"pushed_at": "2024-12-16T17:38:23Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -218,7 +218,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
33
2024/CVE-2024-12025.json
Normal file
33
2024/CVE-2024-12025.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 905785373,
|
||||
"name": "CVE-2024-12025",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-12025",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-12025",
|
||||
"description": "Collapsing Categories <= 3.0.8 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-19T14:15:29Z",
|
||||
"updated_at": "2024-12-19T15:53:19Z",
|
||||
"pushed_at": "2024-12-19T14:16:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T15:17:59Z",
|
||||
"updated_at": "2024-12-15T22:10:15Z",
|
||||
"updated_at": "2024-12-19T12:52:26Z",
|
||||
"pushed_at": "2024-02-19T20:00:35Z",
|
||||
"stargazers_count": 709,
|
||||
"watchers_count": 709,
|
||||
"stargazers_count": 710,
|
||||
"watchers_count": 710,
|
||||
"has_discussions": false,
|
||||
"forks_count": 153,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 153,
|
||||
"watchers": 709,
|
||||
"watchers": 710,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-21T10:27:52Z",
|
||||
"updated_at": "2024-11-22T23:41:40Z",
|
||||
"updated_at": "2024-12-19T14:51:10Z",
|
||||
"pushed_at": "2024-10-27T17:49:33Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "CVE-2024-3400",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-13T14:00:31Z",
|
||||
"updated_at": "2024-12-19T00:57:57Z",
|
||||
"updated_at": "2024-12-19T14:25:45Z",
|
||||
"pushed_at": "2024-04-18T07:11:17Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -386,10 +386,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T21:21:41Z",
|
||||
"updated_at": "2024-11-08T09:41:35Z",
|
||||
"updated_at": "2024-12-19T15:21:51Z",
|
||||
"pushed_at": "2024-04-17T21:04:22Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -398,7 +398,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -265,10 +265,10 @@
|
|||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T18:25:46Z",
|
||||
"updated_at": "2024-12-16T19:49:24Z",
|
||||
"updated_at": "2024-12-19T17:05:28Z",
|
||||
"pushed_at": "2024-08-27T12:22:39Z",
|
||||
"stargazers_count": 635,
|
||||
"watchers_count": 635,
|
||||
"stargazers_count": 636,
|
||||
"watchers_count": 636,
|
||||
"has_discussions": false,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
|
@ -277,7 +277,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 635,
|
||||
"watchers": 636,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Makes IDA (most versions) to crash upon opening it. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-25T12:33:14Z",
|
||||
"updated_at": "2024-12-13T18:32:33Z",
|
||||
"updated_at": "2024-12-19T13:52:38Z",
|
||||
"pushed_at": "2024-08-30T09:58:12Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 71,
|
||||
"watchers": 72,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -169,10 +169,10 @@
|
|||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:52:54Z",
|
||||
"updated_at": "2024-12-17T09:01:43Z",
|
||||
"updated_at": "2024-12-19T13:12:16Z",
|
||||
"pushed_at": "2024-06-22T15:13:52Z",
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 242,
|
||||
"watchers": 243,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -262,8 +262,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-18T03:39:57Z",
|
||||
"updated_at": "2024-12-19T00:45:19Z",
|
||||
"pushed_at": "2024-12-19T00:45:15Z",
|
||||
"updated_at": "2024-12-19T18:16:50Z",
|
||||
"pushed_at": "2024-12-19T18:16:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T08:57:18Z",
|
||||
"updated_at": "2024-12-19T08:08:51Z",
|
||||
"updated_at": "2024-12-19T14:09:31Z",
|
||||
"pushed_at": "2024-11-19T09:15:26Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 94,
|
||||
"watchers": 96,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1,33 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 905424548,
|
||||
"id": 905529726,
|
||||
"name": "CVE-2024-50379-POC",
|
||||
"full_name": "v3153\/CVE-2024-50379-POC",
|
||||
"full_name": "yiliufeng168\/CVE-2024-50379-POC",
|
||||
"owner": {
|
||||
"login": "v3153",
|
||||
"id": 93032617,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93032617?v=4",
|
||||
"html_url": "https:\/\/github.com\/v3153",
|
||||
"login": "yiliufeng168",
|
||||
"id": 61577401,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61577401?v=4",
|
||||
"html_url": "https:\/\/github.com\/yiliufeng168",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/v3153\/CVE-2024-50379-POC",
|
||||
"html_url": "https:\/\/github.com\/yiliufeng168\/CVE-2024-50379-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-18T19:53:46Z",
|
||||
"updated_at": "2024-12-19T12:04:43Z",
|
||||
"pushed_at": "2024-12-19T06:00:40Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"created_at": "2024-12-19T02:43:18Z",
|
||||
"updated_at": "2024-12-19T02:43:18Z",
|
||||
"pushed_at": "2024-12-18T20:18:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -45,19 +45,19 @@
|
|||
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T17:42:55Z",
|
||||
"updated_at": "2024-12-19T08:53:55Z",
|
||||
"updated_at": "2024-12-19T15:39:23Z",
|
||||
"pushed_at": "2024-12-19T03:23:02Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 59,
|
||||
"forks": 25,
|
||||
"watchers": 61,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
33
2024/CVE-2024-54262.json
Normal file
33
2024/CVE-2024-54262.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 905797737,
|
||||
"name": "CVE-2024-54262",
|
||||
"full_name": "RandomRobbieBF\/CVE-2024-54262",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54262",
|
||||
"description": "Import Export For WooCommerce <= 1.5 - Authenticated (Subscriber+) Arbitrary File Upload",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-19T14:42:06Z",
|
||||
"updated_at": "2024-12-19T16:52:15Z",
|
||||
"pushed_at": "2024-12-19T14:43:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T06:21:36Z",
|
||||
"updated_at": "2024-12-19T09:42:49Z",
|
||||
"updated_at": "2024-12-19T13:21:39Z",
|
||||
"pushed_at": "2024-12-13T07:28:34Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
31
README.md
31
README.md
|
@ -2156,6 +2156,7 @@
|
|||
</code>
|
||||
|
||||
- [windz3r0day/CVE-2024-10793](https://github.com/windz3r0day/CVE-2024-10793)
|
||||
- [MAHajian/CVE-2024-10793](https://github.com/MAHajian/CVE-2024-10793)
|
||||
|
||||
### CVE-2024-10914 (2024-11-06)
|
||||
|
||||
|
@ -2323,6 +2324,13 @@
|
|||
### CVE-2024-11972
|
||||
- [JunTakemura/exploit-CVE-2024-11972](https://github.com/JunTakemura/exploit-CVE-2024-11972)
|
||||
|
||||
### CVE-2024-12025 (2024-12-18)
|
||||
|
||||
<code>The Collapsing Categories plugin for WordPress is vulnerable to SQL Injection via the 'taxonomy' parameter of the /wp-json/collapsing-categories/v1/get REST API in all versions up to, and including, 3.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-12025](https://github.com/RandomRobbieBF/CVE-2024-12025)
|
||||
|
||||
### CVE-2024-12155 (2024-12-06)
|
||||
|
||||
<code>The SV100 Companion plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the settings_import() function in all versions up to, and including, 2.0.02. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
|
||||
|
@ -5748,7 +5756,11 @@
|
|||
- [Galaxy-system/cve-2024-38816](https://github.com/Galaxy-system/cve-2024-38816)
|
||||
- [Anthony1078/App-vulnerable](https://github.com/Anthony1078/App-vulnerable)
|
||||
|
||||
### CVE-2024-38819
|
||||
### CVE-2024-38819 (2024-12-19)
|
||||
|
||||
<code>Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.
|
||||
</code>
|
||||
|
||||
- [masa42/CVE-2024-38819-POC](https://github.com/masa42/CVE-2024-38819-POC)
|
||||
- [GhostS3c/CVE-2024-38819](https://github.com/GhostS3c/CVE-2024-38819)
|
||||
|
||||
|
@ -7048,10 +7060,10 @@
|
|||
|
||||
### CVE-2024-50379 (2024-12-17)
|
||||
|
||||
<code>Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.08, which fixes the issue.
|
||||
<code>Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.
|
||||
</code>
|
||||
|
||||
- [v3153/CVE-2024-50379-POC](https://github.com/v3153/CVE-2024-50379-POC)
|
||||
- [yiliufeng168/CVE-2024-50379-POC](https://github.com/yiliufeng168/CVE-2024-50379-POC)
|
||||
|
||||
### CVE-2024-50395 (2024-11-22)
|
||||
|
||||
|
@ -7525,6 +7537,13 @@
|
|||
- [XiaomingX/CVE-2024-53677-S2-067](https://github.com/XiaomingX/CVE-2024-53677-S2-067)
|
||||
- [dustblessnotdust/CVE-2024-53677-S2-067-thread](https://github.com/dustblessnotdust/CVE-2024-53677-S2-067-thread)
|
||||
|
||||
### CVE-2024-54262 (2024-12-13)
|
||||
|
||||
<code>Unrestricted Upload of File with Dangerous Type vulnerability in Siddharth Nagar Import Export For WooCommerce allows Upload a Web Shell to a Web Server.This issue affects Import Export For WooCommerce: from n/a through 1.5.
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-54262](https://github.com/RandomRobbieBF/CVE-2024-54262)
|
||||
|
||||
### CVE-2024-54679 (2024-12-05)
|
||||
|
||||
<code>CyberPanel (aka Cyber Panel) before 6778ad1 does not require the FilemanagerAdmin capability for restartMySQL actions.
|
||||
|
@ -25268,7 +25287,11 @@
|
|||
|
||||
- [theogobinet/CVE-2021-26088](https://github.com/theogobinet/CVE-2021-26088)
|
||||
|
||||
### CVE-2021-26102
|
||||
### CVE-2021-26102 (2024-12-19)
|
||||
|
||||
<code>A relative path traversal vulnerability (CWE-23) in FortiWAN version 4.5.7 and below, 4.4 all versions may allow a remote non-authenticated attacker to delete files on the system by sending a crafted POST request. In particular, deleting specific configuration files will reset the Admin password to its default value.
|
||||
</code>
|
||||
|
||||
- [SleepyCofe/CVE-2021-26102](https://github.com/SleepyCofe/CVE-2021-26102)
|
||||
|
||||
### CVE-2021-26121
|
||||
|
|
Loading…
Reference in a new issue