mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/04/29 18:38:44
This commit is contained in:
parent
d590e583a5
commit
f08ee13d80
32 changed files with 135 additions and 116 deletions
|
@ -13,12 +13,12 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2024-04-26T17:29:17Z",
|
||||
"updated_at": "2024-04-29T12:50:07Z",
|
||||
"pushed_at": "2023-01-22T09:39:45Z",
|
||||
"stargazers_count": 380,
|
||||
"watchers_count": 380,
|
||||
"stargazers_count": 381,
|
||||
"watchers_count": 381,
|
||||
"has_discussions": false,
|
||||
"forks_count": 113,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -26,8 +26,8 @@
|
|||
"cve-2008-0166"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"watchers": 380,
|
||||
"forks": 114,
|
||||
"watchers": 381,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Primefaces <= 5.2.21, 5.3.8 or 6.0 - Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-03T03:11:24Z",
|
||||
"updated_at": "2024-04-25T18:35:43Z",
|
||||
"updated_at": "2024-04-29T15:04:06Z",
|
||||
"pushed_at": "2024-02-27T11:56:02Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 81,
|
||||
"watchers": 82,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -315,11 +315,11 @@
|
|||
"html_url": "https:\/\/github.com\/K3ysTr0K3R"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2018-14847-EXPLOIT",
|
||||
"description": null,
|
||||
"description": "A PoC exploit for CVE-2018-14847 - MikroTik WinBox File Read",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-22T22:33:25Z",
|
||||
"updated_at": "2024-04-28T23:59:37Z",
|
||||
"pushed_at": "2024-04-28T23:59:34Z",
|
||||
"updated_at": "2024-04-29T15:19:02Z",
|
||||
"pushed_at": "2024-04-29T14:37:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -327,7 +327,22 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"credential-disclosure",
|
||||
"credentials",
|
||||
"cve-2018-14847",
|
||||
"directory-traversal",
|
||||
"exploit",
|
||||
"exploitation",
|
||||
"file-read",
|
||||
"hacked",
|
||||
"mikrotik",
|
||||
"poc",
|
||||
"proof-of-concept",
|
||||
"router",
|
||||
"routeros",
|
||||
"winbox"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
|
|
|
@ -120,17 +120,17 @@
|
|||
"fork": false,
|
||||
"created_at": "2018-10-03T10:18:04Z",
|
||||
"updated_at": "2024-04-24T15:38:52Z",
|
||||
"pushed_at": "2019-03-24T11:20:27Z",
|
||||
"pushed_at": "2024-04-29T13:17:43Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"forks": 31,
|
||||
"watchers": 93,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Apache OFBiz 16.11.04 is susceptible to XML external entity injection (XXE injection)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-24T12:23:21Z",
|
||||
"updated_at": "2024-04-28T06:33:49Z",
|
||||
"pushed_at": "2024-04-28T06:33:46Z",
|
||||
"updated_at": "2024-04-29T16:29:19Z",
|
||||
"pushed_at": "2024-04-29T16:29:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -163,8 +163,8 @@
|
|||
"description": "CVE-2019-9670 is used to find XXE bug",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-24T12:32:18Z",
|
||||
"updated_at": "2024-04-27T11:15:24Z",
|
||||
"pushed_at": "2024-04-27T11:15:21Z",
|
||||
"updated_at": "2024-04-29T16:49:04Z",
|
||||
"pushed_at": "2024-04-29T16:49:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -43,8 +43,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-29T09:39:42Z",
|
||||
"updated_at": "2024-04-29T09:57:30Z",
|
||||
"pushed_at": "2024-04-29T09:55:36Z",
|
||||
"updated_at": "2024-04-29T12:29:16Z",
|
||||
"pushed_at": "2024-04-29T12:29:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -43,8 +43,8 @@
|
|||
"description": "Tool for finding CVE-2021-20323",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-11T16:02:07Z",
|
||||
"updated_at": "2024-04-29T07:55:09Z",
|
||||
"pushed_at": "2024-04-29T07:55:06Z",
|
||||
"updated_at": "2024-04-29T16:33:23Z",
|
||||
"pushed_at": "2024-04-29T16:33:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -856,7 +856,7 @@
|
|||
"stargazers_count": 1251,
|
||||
"watchers_count": 1251,
|
||||
"has_discussions": false,
|
||||
"forks_count": 158,
|
||||
"forks_count": 159,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -869,7 +869,7 @@
|
|||
"vcenter"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 158,
|
||||
"forks": 159,
|
||||
"watchers": 1251,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Confluence Server Webwork OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T07:15:17Z",
|
||||
"updated_at": "2024-04-28T03:47:21Z",
|
||||
"updated_at": "2024-04-29T17:15:41Z",
|
||||
"pushed_at": "2021-12-03T22:09:31Z",
|
||||
"stargazers_count": 305,
|
||||
"watchers_count": 305,
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"has_discussions": false,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 305,
|
||||
"watchers": 304,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -10,10 +10,10 @@
|
|||
"html_url": "https:\/\/github.com\/and0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/and0x00\/CVE-2021-32789",
|
||||
"description": "💣 Wordpress WooCommerce users dump exploit",
|
||||
"description": "💣 Wordpress WooCommerce users dump exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-17T19:51:24Z",
|
||||
"updated_at": "2023-09-01T23:32:42Z",
|
||||
"updated_at": "2024-04-29T15:45:01Z",
|
||||
"pushed_at": "2023-02-17T20:06:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Tool for finding CVE-2021-42063",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-28T06:09:14Z",
|
||||
"updated_at": "2024-04-28T06:10:04Z",
|
||||
"pushed_at": "2024-04-28T06:09:59Z",
|
||||
"updated_at": "2024-04-29T16:20:13Z",
|
||||
"pushed_at": "2024-04-29T16:20:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -907,7 +907,7 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-04-29T09:38:34Z",
|
||||
"updated_at": "2024-04-29T14:45:02Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1751,
|
||||
"watchers_count": 1751,
|
||||
|
@ -1423,10 +1423,10 @@
|
|||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:18:46Z",
|
||||
"updated_at": "2024-04-27T16:15:50Z",
|
||||
"updated_at": "2024-04-29T14:48:44Z",
|
||||
"pushed_at": "2022-04-07T14:47:03Z",
|
||||
"stargazers_count": 850,
|
||||
"watchers_count": 850,
|
||||
"stargazers_count": 851,
|
||||
"watchers_count": 851,
|
||||
"has_discussions": false,
|
||||
"forks_count": 175,
|
||||
"allow_forking": true,
|
||||
|
@ -1448,7 +1448,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 175,
|
||||
"watchers": 850,
|
||||
"watchers": 851,
|
||||
"score": 0,
|
||||
"subscribers_count": 33
|
||||
},
|
||||
|
@ -1526,8 +1526,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2024-04-26T10:47:50Z",
|
||||
"pushed_at": "2024-04-29T06:37:49Z",
|
||||
"updated_at": "2024-04-29T17:48:37Z",
|
||||
"pushed_at": "2024-04-29T17:50:50Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
@ -11705,7 +11705,7 @@
|
|||
"description": ":page_with_curl: A report about CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-19T08:03:05Z",
|
||||
"updated_at": "2023-10-28T09:52:20Z",
|
||||
"updated_at": "2024-04-29T17:22:54Z",
|
||||
"pushed_at": "2022-07-19T08:08:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-0995 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-26T21:46:09Z",
|
||||
"updated_at": "2024-04-08T13:38:08Z",
|
||||
"updated_at": "2024-04-29T14:48:44Z",
|
||||
"pushed_at": "2022-03-27T09:07:01Z",
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"has_discussions": false,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 493,
|
||||
"watchers": 494,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Android kernel exploitation for CVE-2022-20409",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-21T22:42:50Z",
|
||||
"updated_at": "2024-04-28T09:35:48Z",
|
||||
"updated_at": "2024-04-29T13:06:42Z",
|
||||
"pushed_at": "2023-08-05T20:56:12Z",
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 140,
|
||||
"watchers": 141,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -771,7 +771,7 @@
|
|||
"stargazers_count": 1251,
|
||||
"watchers_count": 1251,
|
||||
"has_discussions": false,
|
||||
"forks_count": 158,
|
||||
"forks_count": 159,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -784,7 +784,7 @@
|
|||
"vcenter"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 158,
|
||||
"forks": 159,
|
||||
"watchers": 1251,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2024-04-27T11:25:05Z",
|
||||
"updated_at": "2024-04-29T17:51:49Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1132,
|
||||
"watchers_count": 1132,
|
||||
"stargazers_count": 1133,
|
||||
"watchers_count": 1133,
|
||||
"has_discussions": true,
|
||||
"forks_count": 188,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 188,
|
||||
"watchers": 1132,
|
||||
"watchers": 1133,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -682,10 +682,10 @@
|
|||
"description": "CVE-2023-20198-RCE, support adding\/deleting users and executing cli commands\/system commands.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-25T06:59:53Z",
|
||||
"updated_at": "2024-04-29T08:36:47Z",
|
||||
"updated_at": "2024-04-29T14:03:17Z",
|
||||
"pushed_at": "2024-04-25T07:32:57Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -694,7 +694,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 7,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -563,8 +563,8 @@
|
|||
"description": "An issue was discovered in cPanel before 11.109.9999.116. Cross-Site Scripting can occur on the cpsrvd error page via an invalid webcall ID.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-21T12:26:22Z",
|
||||
"updated_at": "2024-04-29T07:55:51Z",
|
||||
"pushed_at": "2024-04-29T07:55:48Z",
|
||||
"updated_at": "2024-04-29T16:38:58Z",
|
||||
"pushed_at": "2024-04-29T16:38:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-23T19:06:36Z",
|
||||
"updated_at": "2024-04-23T07:50:16Z",
|
||||
"updated_at": "2024-04-29T18:31:35Z",
|
||||
"pushed_at": "2023-10-29T11:12:26Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -236,10 +236,10 @@
|
|||
"description": "CVE-2023-5360 Exploit\/POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-13T12:51:34Z",
|
||||
"updated_at": "2024-04-23T07:50:16Z",
|
||||
"updated_at": "2024-04-29T13:46:24Z",
|
||||
"pushed_at": "2023-11-21T03:56:11Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -250,7 +250,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T04:11:06Z",
|
||||
"updated_at": "2024-03-29T19:46:50Z",
|
||||
"updated_at": "2024-04-29T14:16:29Z",
|
||||
"pushed_at": "2024-03-29T04:31:31Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"forks": 26,
|
||||
"watchers": 181,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-21345",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-26T16:38:17Z",
|
||||
"updated_at": "2024-04-29T11:36:45Z",
|
||||
"updated_at": "2024-04-29T13:23:19Z",
|
||||
"pushed_at": "2024-04-26T16:39:48Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 43,
|
||||
"forks": 15,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-23334",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-28T22:30:21Z",
|
||||
"updated_at": "2024-03-18T15:29:36Z",
|
||||
"updated_at": "2024-04-29T14:17:31Z",
|
||||
"pushed_at": "2024-02-29T02:00:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-26218",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-26T16:41:04Z",
|
||||
"updated_at": "2024-04-29T11:10:02Z",
|
||||
"updated_at": "2024-04-29T17:58:15Z",
|
||||
"pushed_at": "2024-04-26T16:46:15Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 24,
|
||||
"forks": 10,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-27T11:03:36Z",
|
||||
"updated_at": "2024-04-29T02:29:49Z",
|
||||
"updated_at": "2024-04-29T17:55:49Z",
|
||||
"pushed_at": "2024-04-27T11:37:02Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CubeCart <= 6.5.4 is vulnerable to an arbitrary file upload that leads to remote code execution (RCE).",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-24T16:31:17Z",
|
||||
"updated_at": "2024-04-25T01:29:07Z",
|
||||
"pushed_at": "2024-04-24T19:14:05Z",
|
||||
"updated_at": "2024-04-29T18:09:37Z",
|
||||
"pushed_at": "2024-04-29T18:09:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Scanner for CVE-2024-4040",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-23T09:31:29Z",
|
||||
"updated_at": "2024-04-28T22:49:06Z",
|
||||
"updated_at": "2024-04-29T17:57:43Z",
|
||||
"pushed_at": "2024-04-23T09:45:57Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 36,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
@ -73,10 +73,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-25T04:45:38Z",
|
||||
"updated_at": "2024-04-28T16:21:59Z",
|
||||
"updated_at": "2024-04-29T14:40:31Z",
|
||||
"pushed_at": "2024-04-25T04:56:50Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -133,10 +133,10 @@
|
|||
"description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-25T19:51:38Z",
|
||||
"updated_at": "2024-04-29T07:09:57Z",
|
||||
"updated_at": "2024-04-29T17:58:15Z",
|
||||
"pushed_at": "2024-04-29T00:59:40Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -160,7 +160,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1599,7 +1599,11 @@
|
|||
### CVE-2024-33386
|
||||
- [keaidmmc/CVE-2024-33386](https://github.com/keaidmmc/CVE-2024-33386)
|
||||
|
||||
### CVE-2024-33438
|
||||
### CVE-2024-33438 (2024-04-29)
|
||||
|
||||
<code>File Upload vulnerability in CubeCart before 6.5.5 allows an authenticated user to execute arbitrary code via a crafted .phar file.
|
||||
</code>
|
||||
|
||||
- [julio-cfa/CVE-2024-33438](https://github.com/julio-cfa/CVE-2024-33438)
|
||||
|
||||
### CVE-2024-65230
|
||||
|
|
Loading…
Reference in a new issue