mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/10/27 12:30:50
This commit is contained in:
parent
2a99f6e402
commit
f062fc11d5
27 changed files with 312 additions and 72 deletions
|
@ -462,10 +462,10 @@
|
|||
"description": "Dirty Cow exploit - CVE-2016-5195",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-25T21:08:01Z",
|
||||
"updated_at": "2024-10-21T07:46:03Z",
|
||||
"updated_at": "2024-10-27T09:08:04Z",
|
||||
"pushed_at": "2021-04-08T11:35:12Z",
|
||||
"stargazers_count": 856,
|
||||
"watchers_count": 856,
|
||||
"stargazers_count": 857,
|
||||
"watchers_count": 857,
|
||||
"has_discussions": false,
|
||||
"forks_count": 428,
|
||||
"allow_forking": true,
|
||||
|
@ -478,7 +478,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 428,
|
||||
"watchers": 856,
|
||||
"watchers": 857,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-30T16:32:13Z",
|
||||
"updated_at": "2024-09-24T20:30:05Z",
|
||||
"updated_at": "2024-10-27T07:37:04Z",
|
||||
"pushed_at": "2020-01-12T02:34:45Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 181,
|
||||
"watchers": 182,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2024-10-25T07:46:33Z",
|
||||
"updated_at": "2024-10-27T08:24:18Z",
|
||||
"pushed_at": "2024-06-16T15:35:20Z",
|
||||
"stargazers_count": 944,
|
||||
"watchers_count": 944,
|
||||
"stargazers_count": 945,
|
||||
"watchers_count": 945,
|
||||
"has_discussions": false,
|
||||
"forks_count": 178,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 178,
|
||||
"watchers": 944,
|
||||
"watchers": 945,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -329,10 +329,10 @@
|
|||
"description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-28T05:00:37Z",
|
||||
"updated_at": "2024-08-12T20:06:13Z",
|
||||
"updated_at": "2024-10-27T07:00:57Z",
|
||||
"pushed_at": "2020-10-10T17:19:51Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -350,7 +350,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -541,10 +541,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2024-09-25T00:16:44Z",
|
||||
"updated_at": "2024-10-27T07:27:25Z",
|
||||
"pushed_at": "2023-10-11T18:44:51Z",
|
||||
"stargazers_count": 796,
|
||||
"watchers_count": 796,
|
||||
"stargazers_count": 797,
|
||||
"watchers_count": 797,
|
||||
"has_discussions": false,
|
||||
"forks_count": 169,
|
||||
"allow_forking": true,
|
||||
|
@ -560,7 +560,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 169,
|
||||
"watchers": 796,
|
||||
"watchers": 797,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2024-10-25T09:10:36Z",
|
||||
"updated_at": "2024-10-27T08:01:57Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1163,
|
||||
"watchers_count": 1163,
|
||||
"stargazers_count": 1162,
|
||||
"watchers_count": 1162,
|
||||
"has_discussions": true,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 190,
|
||||
"watchers": 1163,
|
||||
"watchers": 1162,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "HTTP3-attacks (CVE-2022-30592)",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-06T09:57:43Z",
|
||||
"updated_at": "2024-10-26T21:39:52Z",
|
||||
"updated_at": "2024-10-27T07:14:29Z",
|
||||
"pushed_at": "2022-12-18T03:36:03Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-28T08:45:55Z",
|
||||
"updated_at": "2024-08-12T20:32:49Z",
|
||||
"updated_at": "2024-10-27T07:45:09Z",
|
||||
"pushed_at": "2023-10-01T08:36:06Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"forks": 17,
|
||||
"watchers": 87,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -297,10 +297,10 @@
|
|||
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-27T09:02:08Z",
|
||||
"updated_at": "2024-10-27T03:42:00Z",
|
||||
"updated_at": "2024-10-27T12:22:43Z",
|
||||
"pushed_at": "2024-09-30T12:48:08Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -309,7 +309,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
33
2024/CVE-2024-0113.json
Normal file
33
2024/CVE-2024-0113.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 879251944,
|
||||
"name": "CVE-2024-0113",
|
||||
"full_name": "zetraxz\/CVE-2024-0113",
|
||||
"owner": {
|
||||
"login": "zetraxz",
|
||||
"id": 186395163,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186395163?v=4",
|
||||
"html_url": "https:\/\/github.com\/zetraxz",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zetraxz\/CVE-2024-0113",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T12:22:08Z",
|
||||
"updated_at": "2024-10-27T12:22:12Z",
|
||||
"pushed_at": "2024-10-27T12:22:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -76,10 +76,10 @@
|
|||
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-13T09:17:28Z",
|
||||
"updated_at": "2024-10-25T05:28:59Z",
|
||||
"updated_at": "2024-10-27T09:37:22Z",
|
||||
"pushed_at": "2024-03-16T00:35:12Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 121,
|
||||
"watchers": 122,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -184,5 +184,36 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 879202426,
|
||||
"name": "CVE-2024-23113",
|
||||
"full_name": "Jaden1419\/CVE-2024-23113",
|
||||
"owner": {
|
||||
"login": "Jaden1419",
|
||||
"id": 186391854,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186391854?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jaden1419",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jaden1419\/CVE-2024-23113",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T09:32:08Z",
|
||||
"updated_at": "2024-10-27T09:56:21Z",
|
||||
"pushed_at": "2024-10-27T09:53:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -249,10 +249,10 @@
|
|||
"description": "0BL1V10N's CVE-2024-25600 for Bricks Builder (TryHackMe) plugin for WordPress exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-02T10:49:03Z",
|
||||
"updated_at": "2024-10-25T12:12:47Z",
|
||||
"updated_at": "2024-10-27T12:20:13Z",
|
||||
"pushed_at": "2024-06-02T11:12:04Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": true,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -261,7 +261,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -122,5 +122,36 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 879205539,
|
||||
"name": "CVE-2024-28987",
|
||||
"full_name": "Jaden1419\/CVE-2024-28987",
|
||||
"owner": {
|
||||
"login": "Jaden1419",
|
||||
"id": 186391854,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186391854?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jaden1419",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jaden1419\/CVE-2024-28987",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T09:43:54Z",
|
||||
"updated_at": "2024-10-27T09:56:35Z",
|
||||
"pushed_at": "2024-10-27T09:52:25Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2024-10-22T11:12:22Z",
|
||||
"updated_at": "2024-10-27T10:06:21Z",
|
||||
"pushed_at": "2024-09-30T08:45:56Z",
|
||||
"stargazers_count": 404,
|
||||
"watchers_count": 404,
|
||||
"stargazers_count": 405,
|
||||
"watchers_count": 405,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 404,
|
||||
"watchers": 405,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-30090 - LPE PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-17T08:38:47Z",
|
||||
"updated_at": "2024-10-26T20:35:55Z",
|
||||
"updated_at": "2024-10-27T10:58:44Z",
|
||||
"pushed_at": "2024-10-17T09:53:33Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 879205634,
|
||||
"name": "CVE-2024-43532",
|
||||
"full_name": "Jaden1419\/CVE-2024-43532",
|
||||
"owner": {
|
||||
"login": "Jaden1419",
|
||||
"id": 186391854,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186391854?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jaden1419",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jaden1419\/CVE-2024-43532",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T09:44:17Z",
|
||||
"updated_at": "2024-10-27T09:56:17Z",
|
||||
"pushed_at": "2024-10-27T09:53:56Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-14T09:38:04Z",
|
||||
"updated_at": "2024-10-21T03:17:37Z",
|
||||
"updated_at": "2024-10-27T10:51:31Z",
|
||||
"pushed_at": "2024-10-14T09:43:53Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T00:15:18Z",
|
||||
"updated_at": "2024-10-26T05:49:22Z",
|
||||
"updated_at": "2024-10-27T12:12:42Z",
|
||||
"pushed_at": "2024-10-05T00:18:49Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -515,7 +515,7 @@
|
|||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -528,7 +528,7 @@
|
|||
"redteam"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -60,5 +60,36 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 879185083,
|
||||
"name": "CVE-2024-47575",
|
||||
"full_name": "Jaden1419\/CVE-2024-47575",
|
||||
"owner": {
|
||||
"login": "Jaden1419",
|
||||
"id": 186391854,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186391854?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jaden1419",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jaden1419\/CVE-2024-47575",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T08:24:35Z",
|
||||
"updated_at": "2024-10-27T09:56:39Z",
|
||||
"pushed_at": "2024-10-27T09:30:44Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-48569.json
Normal file
33
2024/CVE-2024-48569.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 879186454,
|
||||
"name": "CVE-2024-48569",
|
||||
"full_name": "MarioTesoro\/CVE-2024-48569",
|
||||
"owner": {
|
||||
"login": "MarioTesoro",
|
||||
"id": 62204045,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4",
|
||||
"html_url": "https:\/\/github.com\/MarioTesoro",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-48569",
|
||||
"description": "Proof of concept of multiple Stored Cross-Site Scripting (XSS) vulnerabilities discovered in ACI Worldwide Proactive Risk Manager v 9.1.1.0",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T08:29:59Z",
|
||||
"updated_at": "2024-10-27T09:03:10Z",
|
||||
"pushed_at": "2024-10-27T09:00:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2024/CVE-2024-48904.json
Normal file
33
2024/CVE-2024-48904.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 879184940,
|
||||
"name": "CVE-2024-48904",
|
||||
"full_name": "zetraxz\/CVE-2024-48904",
|
||||
"owner": {
|
||||
"login": "zetraxz",
|
||||
"id": 186395163,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186395163?v=4",
|
||||
"html_url": "https:\/\/github.com\/zetraxz",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zetraxz\/CVE-2024-48904",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-27T08:24:03Z",
|
||||
"updated_at": "2024-10-27T10:15:09Z",
|
||||
"pushed_at": "2024-10-27T10:14:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,19 +14,19 @@
|
|||
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-10T06:27:59Z",
|
||||
"updated_at": "2024-10-27T03:56:31Z",
|
||||
"updated_at": "2024-10-27T12:17:08Z",
|
||||
"pushed_at": "2024-10-17T05:12:29Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 74,
|
||||
"forks": 12,
|
||||
"watchers": 76,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -129,7 +129,7 @@
|
|||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -142,7 +142,7 @@
|
|||
"shellfs"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
17
README.md
17
README.md
|
@ -62,6 +62,13 @@
|
|||
- [nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-0049](https://github.com/nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-0049)
|
||||
- [Aakashmom/frameworks_av_android10_r33_CVE-2024-0049](https://github.com/Aakashmom/frameworks_av_android10_r33_CVE-2024-0049)
|
||||
|
||||
### CVE-2024-0113 (2024-08-09)
|
||||
|
||||
<code>NVIDIA Mellanox OS, ONYX, Skyway, and MetroX-3 XCC contain a vulnerability in the web support, where an attacker can cause a CGI path traversal by a specially crafted URI. A successful exploit of this vulnerability might lead to escalation of privileges and information disclosure.
|
||||
</code>
|
||||
|
||||
- [zetraxz/CVE-2024-0113](https://github.com/zetraxz/CVE-2024-0113)
|
||||
|
||||
### CVE-2024-0195 (2024-01-02)
|
||||
|
||||
<code>Es wurde eine Schwachstelle in spider-flow 0.4.3 gefunden. Sie wurde als kritisch eingestuft. Es betrifft die Funktion FunctionService.saveFunction der Datei src/main/java/org/spiderflow/controller/FunctionController.java. Durch Manipulieren mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
|
||||
|
@ -2271,6 +2278,7 @@
|
|||
- [maybelookis/CVE-2024-23113](https://github.com/maybelookis/CVE-2024-23113)
|
||||
- [p33d/CVE-2024-23113](https://github.com/p33d/CVE-2024-23113)
|
||||
- [groshi/CVE-2024-23113-Private-POC](https://github.com/groshi/CVE-2024-23113-Private-POC)
|
||||
- [Jaden1419/CVE-2024-23113](https://github.com/Jaden1419/CVE-2024-23113)
|
||||
|
||||
### CVE-2024-23208 (2024-01-23)
|
||||
|
||||
|
@ -3425,6 +3433,7 @@
|
|||
- [horizon3ai/CVE-2024-28987](https://github.com/horizon3ai/CVE-2024-28987)
|
||||
- [PlayerFridei/CVE-2024-28987](https://github.com/PlayerFridei/CVE-2024-28987)
|
||||
- [HazeLook/CVE-2024-28987](https://github.com/HazeLook/CVE-2024-28987)
|
||||
- [Jaden1419/CVE-2024-28987](https://github.com/Jaden1419/CVE-2024-28987)
|
||||
|
||||
### CVE-2024-28995 (2024-06-06)
|
||||
|
||||
|
@ -5320,6 +5329,7 @@
|
|||
|
||||
### CVE-2024-43532
|
||||
- [HazeLook/CVE-2024-43532](https://github.com/HazeLook/CVE-2024-43532)
|
||||
- [Jaden1419/CVE-2024-43532](https://github.com/Jaden1419/CVE-2024-43532)
|
||||
|
||||
### CVE-2024-43582
|
||||
- [jinxongwi/CVE-2024-43582-RCE](https://github.com/jinxongwi/CVE-2024-43582-RCE)
|
||||
|
@ -5601,6 +5611,7 @@
|
|||
### CVE-2024-47575
|
||||
- [maybelookis/CVE-2024-47575](https://github.com/maybelookis/CVE-2024-47575)
|
||||
- [HazeLook/CVE-2024-47575](https://github.com/HazeLook/CVE-2024-47575)
|
||||
- [Jaden1419/CVE-2024-47575](https://github.com/Jaden1419/CVE-2024-47575)
|
||||
|
||||
### CVE-2024-47854
|
||||
- [MarioTesoro/CVE-2024-47854](https://github.com/MarioTesoro/CVE-2024-47854)
|
||||
|
@ -5617,6 +5628,9 @@
|
|||
### CVE-2024-48427
|
||||
- [vighneshnair7/CVE-2024-48427](https://github.com/vighneshnair7/CVE-2024-48427)
|
||||
|
||||
### CVE-2024-48569
|
||||
- [MarioTesoro/CVE-2024-48569](https://github.com/MarioTesoro/CVE-2024-48569)
|
||||
|
||||
### CVE-2024-48605
|
||||
- [surajhacx/HelakuruV.1.1-DLLHijack](https://github.com/surajhacx/HelakuruV.1.1-DLLHijack)
|
||||
|
||||
|
@ -5626,6 +5640,9 @@
|
|||
### CVE-2024-48652
|
||||
- [paragbagul111/CVE-2024-48652](https://github.com/paragbagul111/CVE-2024-48652)
|
||||
|
||||
### CVE-2024-48904
|
||||
- [zetraxz/CVE-2024-48904](https://github.com/zetraxz/CVE-2024-48904)
|
||||
|
||||
### CVE-2024-48914
|
||||
- [EQSTLab/CVE-2024-48914](https://github.com/EQSTLab/CVE-2024-48914)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue