mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/07/05 18:28:52
This commit is contained in:
parent
30ab255686
commit
f0a02ec28b
58 changed files with 534 additions and 208 deletions
|
@ -57,6 +57,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T16:06:46Z",
|
||||
"updated_at": "2024-05-13T14:42:41Z",
|
||||
"updated_at": "2024-07-05T16:20:15Z",
|
||||
"pushed_at": "2022-05-03T10:37:18Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC + Docker Environment for Python PIL\/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-15T07:44:43Z",
|
||||
"updated_at": "2024-02-20T09:23:04Z",
|
||||
"updated_at": "2024-07-05T17:31:44Z",
|
||||
"pushed_at": "2021-01-06T01:11:32Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 59,
|
||||
"watchers": 58,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -357,10 +357,10 @@
|
|||
"description": "Exploit to trigger RCE for CVE-2018-16763 on FuelCMS <= 1.4.1 and interactive shell. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T15:31:37Z",
|
||||
"updated_at": "2024-06-25T09:35:19Z",
|
||||
"updated_at": "2024-07-05T16:19:59Z",
|
||||
"pushed_at": "2022-06-01T20:45:02Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -374,7 +374,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,8 +43,8 @@
|
|||
"description": "A tool for retrieving login credentials from Netwave IP cameras using a memory dump vulnerability (CVE-2018-17240)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-04T21:44:21Z",
|
||||
"updated_at": "2024-07-04T15:39:26Z",
|
||||
"pushed_at": "2024-07-05T08:50:36Z",
|
||||
"updated_at": "2024-07-05T15:02:52Z",
|
||||
"pushed_at": "2024-07-05T15:02:51Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -2612,7 +2612,7 @@
|
|||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 824447804,
|
||||
"id": 824678662,
|
||||
"name": "CVE-2018-6574",
|
||||
"full_name": "athulmur\/CVE-2018-6574",
|
||||
"owner": {
|
||||
|
@ -2622,11 +2622,11 @@
|
|||
"html_url": "https:\/\/github.com\/athulmur"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/athulmur\/CVE-2018-6574",
|
||||
"description": null,
|
||||
"description": "A POC to demonstrate CVE-2018-6574",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T06:48:11Z",
|
||||
"updated_at": "2024-07-05T11:12:53Z",
|
||||
"pushed_at": "2024-07-05T11:12:50Z",
|
||||
"created_at": "2024-07-05T17:06:18Z",
|
||||
"updated_at": "2024-07-05T17:06:18Z",
|
||||
"pushed_at": "2024-07-05T17:06:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-11-12T14:47:25Z",
|
||||
"updated_at": "2023-08-09T21:34:18Z",
|
||||
"updated_at": "2024-07-05T17:31:57Z",
|
||||
"pushed_at": "2019-11-12T14:54:10Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -724,7 +724,7 @@
|
|||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -737,7 +737,7 @@
|
|||
"redteam-tools"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T17:14:27Z",
|
||||
"updated_at": "2024-03-20T14:28:07Z",
|
||||
"updated_at": "2024-07-05T16:20:13Z",
|
||||
"pushed_at": "2022-05-03T10:40:14Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2020-8813 - RCE through graph_realtime.php in Cacti 1.2.8",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-30T11:23:52Z",
|
||||
"updated_at": "2023-06-08T16:39:23Z",
|
||||
"updated_at": "2024-07-05T16:18:13Z",
|
||||
"pushed_at": "2024-03-16T08:25:40Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-29T10:14:32Z",
|
||||
"updated_at": "2024-07-05T12:08:57Z",
|
||||
"updated_at": "2024-07-05T15:48:43Z",
|
||||
"pushed_at": "2022-03-03T17:50:03Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 100,
|
||||
"watchers": 102,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -301,7 +301,7 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2024-07-05T08:17:00Z",
|
||||
"updated_at": "2024-07-05T12:57:47Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 980,
|
||||
"watchers_count": 980,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T11:53:57Z",
|
||||
"updated_at": "2024-04-09T12:36:00Z",
|
||||
"updated_at": "2024-07-05T17:32:23Z",
|
||||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -40,7 +40,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 166,
|
||||
"watchers": 165,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A path traversal in smbserver.py allows an attacker to read\/write arbitrary files on the server.",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-28T19:04:46Z",
|
||||
"updated_at": "2023-06-03T03:56:18Z",
|
||||
"updated_at": "2024-07-05T16:19:36Z",
|
||||
"pushed_at": "2023-01-19T11:06:33Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -109,7 +109,7 @@
|
|||
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-03T15:15:12Z",
|
||||
"updated_at": "2024-07-04T15:41:02Z",
|
||||
"updated_at": "2024-07-05T12:57:49Z",
|
||||
"pushed_at": "2021-09-13T12:12:17Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "海康威视RCE漏洞 批量检测和利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-03T17:27:59Z",
|
||||
"updated_at": "2024-07-05T03:38:26Z",
|
||||
"updated_at": "2024-07-05T18:16:40Z",
|
||||
"pushed_at": "2022-08-05T19:57:30Z",
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -148,7 +148,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 129,
|
||||
"watchers": 130,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC to test the BootROM vulnerability found in LPC55S69 and K82 Series ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-24T01:34:47Z",
|
||||
"updated_at": "2023-03-15T10:01:19Z",
|
||||
"updated_at": "2024-07-05T17:03:44Z",
|
||||
"pushed_at": "2023-02-18T19:00:03Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "A PoC exploit for CVE-2021-4191 - GitLab User Enumeration.",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-22T21:06:51Z",
|
||||
"updated_at": "2024-04-24T15:52:38Z",
|
||||
"updated_at": "2024-07-05T14:52:36Z",
|
||||
"pushed_at": "2023-08-09T10:41:22Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -63,7 +63,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T17:26:49Z",
|
||||
"updated_at": "2024-06-17T00:40:41Z",
|
||||
"updated_at": "2024-07-05T16:18:12Z",
|
||||
"pushed_at": "2024-03-16T08:25:52Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -37,7 +37,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -1966,10 +1966,10 @@
|
|||
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T00:29:03Z",
|
||||
"updated_at": "2024-05-27T00:43:09Z",
|
||||
"updated_at": "2024-07-05T15:13:36Z",
|
||||
"pushed_at": "2022-03-10T18:44:50Z",
|
||||
"stargazers_count": 631,
|
||||
"watchers_count": 631,
|
||||
"stargazers_count": 632,
|
||||
"watchers_count": 632,
|
||||
"has_discussions": false,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
|
@ -1990,7 +1990,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 98,
|
||||
"watchers": 631,
|
||||
"watchers": 632,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -153,10 +153,10 @@
|
|||
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T15:42:37Z",
|
||||
"updated_at": "2024-06-29T08:44:53Z",
|
||||
"updated_at": "2024-07-05T16:18:11Z",
|
||||
"pushed_at": "2024-03-16T08:26:06Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -172,7 +172,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A python exploit to automatically dump all the data stored by the auto-completion plugin of Ametys CMS to a local sqlite database file. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-21T19:59:11Z",
|
||||
"updated_at": "2024-04-06T08:24:24Z",
|
||||
"updated_at": "2024-07-05T16:20:09Z",
|
||||
"pushed_at": "2022-05-03T10:40:26Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-30780 - lighttpd remote denial of service",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-18T12:01:17Z",
|
||||
"updated_at": "2024-04-15T07:34:21Z",
|
||||
"updated_at": "2024-07-05T16:18:10Z",
|
||||
"pushed_at": "2024-03-16T08:26:24Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-11T11:47:17Z",
|
||||
"updated_at": "2024-05-10T10:46:46Z",
|
||||
"updated_at": "2024-07-05T16:19:45Z",
|
||||
"pushed_at": "2022-08-23T15:57:41Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"forks": 39,
|
||||
"watchers": 274,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Zimbra <9.0.0.p27 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-11T20:58:08Z",
|
||||
"updated_at": "2024-05-11T19:14:13Z",
|
||||
"updated_at": "2024-07-05T17:32:22Z",
|
||||
"pushed_at": "2022-11-24T14:59:35Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -62,7 +62,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 102,
|
||||
"watchers": 101,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pwndoc local file inclusion to remote code execution of Node.js code on the server",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-13T10:03:14Z",
|
||||
"updated_at": "2024-06-18T12:53:42Z",
|
||||
"updated_at": "2024-07-05T16:19:25Z",
|
||||
"pushed_at": "2023-09-14T20:19:41Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -687,13 +687,13 @@
|
|||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
32
2023/CVE-2023-20945.json
Normal file
32
2023/CVE-2023-20945.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 824635242,
|
||||
"name": "CVE-2023-20945",
|
||||
"full_name": "Ailenchick\/CVE-2023-20945",
|
||||
"owner": {
|
||||
"login": "Ailenchick",
|
||||
"id": 71263121,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71263121?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ailenchick"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ailenchick\/CVE-2023-20945",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T15:03:40Z",
|
||||
"updated_at": "2024-07-05T15:07:42Z",
|
||||
"pushed_at": "2024-07-05T15:07:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -58,5 +58,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 824634694,
|
||||
"name": "CVE-2023-20963",
|
||||
"full_name": "Ailenchick\/CVE-2023-20963",
|
||||
"owner": {
|
||||
"login": "Ailenchick",
|
||||
"id": 71263121,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71263121?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ailenchick"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ailenchick\/CVE-2023-20963",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T15:02:07Z",
|
||||
"updated_at": "2024-07-05T15:15:12Z",
|
||||
"pushed_at": "2024-07-05T15:02:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -58,5 +58,35 @@
|
|||
"watchers": 102,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 824610391,
|
||||
"name": "CVE-2023-27532-RCE-Only",
|
||||
"full_name": "puckiestyle\/CVE-2023-27532-RCE-Only",
|
||||
"owner": {
|
||||
"login": "puckiestyle",
|
||||
"id": 57447087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
||||
"html_url": "https:\/\/github.com\/puckiestyle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2023-27532-RCE-Only",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T14:00:48Z",
|
||||
"updated_at": "2024-07-05T14:07:57Z",
|
||||
"pushed_at": "2024-07-05T14:07:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Exploit for file upload vulnerability in BoidCMS version <=2.0.0",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-16T14:30:30Z",
|
||||
"updated_at": "2024-06-23T10:35:19Z",
|
||||
"pushed_at": "2024-06-23T10:35:16Z",
|
||||
"updated_at": "2024-07-05T18:17:10Z",
|
||||
"pushed_at": "2024-07-05T18:17:07Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -223,5 +223,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 824689719,
|
||||
"name": "CVE-2023-42793",
|
||||
"full_name": "HusenjanDev\/CVE-2023-42793",
|
||||
"owner": {
|
||||
"login": "HusenjanDev",
|
||||
"id": 88688451,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88688451?v=4",
|
||||
"html_url": "https:\/\/github.com\/HusenjanDev"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HusenjanDev\/CVE-2023-42793",
|
||||
"description": "TeamCity RCE for Linux (CVE-2023-42793)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T17:39:25Z",
|
||||
"updated_at": "2024-07-05T17:48:29Z",
|
||||
"pushed_at": "2024-07-05T17:48:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-07-04T20:27:27Z",
|
||||
"pushed_at": "2024-07-05T12:28:57Z",
|
||||
"stargazers_count": 952,
|
||||
"watchers_count": 952,
|
||||
"updated_at": "2024-07-05T18:17:52Z",
|
||||
"pushed_at": "2024-07-05T12:35:27Z",
|
||||
"stargazers_count": 954,
|
||||
"watchers_count": 954,
|
||||
"has_discussions": false,
|
||||
"forks_count": 162,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 162,
|
||||
"watchers": 952,
|
||||
"watchers": 954,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -60,7 +60,7 @@
|
|||
"redteam"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"forks": 46,
|
||||
"watchers": 200,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
"sysaid"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"forks": 13,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T09:22:59Z",
|
||||
"updated_at": "2024-07-05T09:55:36Z",
|
||||
"updated_at": "2024-07-05T15:30:38Z",
|
||||
"pushed_at": "2024-06-18T09:35:44Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"screenconnect"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"forks": 28,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -58,7 +58,7 @@
|
|||
"redteam"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"forks": 27,
|
||||
"watchers": 113,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
"zabbix"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"forks": 20,
|
||||
"watchers": 97,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-26T19:00:03Z",
|
||||
"updated_at": "2024-06-10T13:50:20Z",
|
||||
"updated_at": "2024-07-05T15:23:49Z",
|
||||
"pushed_at": "2024-02-29T12:13:21Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
@ -81,7 +81,7 @@
|
|||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -97,7 +97,7 @@
|
|||
"teamcity"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"forks": 33,
|
||||
"watchers": 127,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"forks": 33,
|
||||
"watchers": 303,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-24T10:37:26Z",
|
||||
"updated_at": "2024-07-05T06:53:36Z",
|
||||
"updated_at": "2024-07-05T16:52:50Z",
|
||||
"pushed_at": "2024-06-24T11:16:26Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 148,
|
||||
"watchers": 150,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -58,5 +58,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 824657284,
|
||||
"name": "CVE-2024-30088-Windows-poc",
|
||||
"full_name": "Zombie-Kaiser\/CVE-2024-30088-Windows-poc",
|
||||
"owner": {
|
||||
"login": "Zombie-Kaiser",
|
||||
"id": 141570642,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141570642?v=4",
|
||||
"html_url": "https:\/\/github.com\/Zombie-Kaiser"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Zombie-Kaiser\/CVE-2024-30088-Windows-poc",
|
||||
"description": "该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T16:02:56Z",
|
||||
"updated_at": "2024-07-05T16:06:36Z",
|
||||
"pushed_at": "2024-07-05T16:06:16Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "A tool for vulnerability detection and exploitation tool for CVE-2024-31982 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-22T17:04:02Z",
|
||||
"updated_at": "2024-06-23T16:15:33Z",
|
||||
"updated_at": "2024-07-05T14:59:32Z",
|
||||
"pushed_at": "2024-06-22T19:31:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -73,12 +73,12 @@
|
|||
"description": "Exploit PoC for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T19:33:08Z",
|
||||
"updated_at": "2024-07-05T02:36:29Z",
|
||||
"updated_at": "2024-07-05T14:13:42Z",
|
||||
"pushed_at": "2024-05-19T07:12:00Z",
|
||||
"stargazers_count": 460,
|
||||
"watchers_count": 460,
|
||||
"stargazers_count": 461,
|
||||
"watchers_count": 461,
|
||||
"has_discussions": false,
|
||||
"forks_count": 134,
|
||||
"forks_count": 135,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -89,8 +89,8 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 134,
|
||||
"watchers": 460,
|
||||
"forks": 135,
|
||||
"watchers": 461,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -288,13 +288,13 @@
|
|||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"forks": 23,
|
||||
"watchers": 141,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -318,13 +318,13 @@
|
|||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 73,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "CosmicSting (CVE-2024-34102)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-28T23:33:21Z",
|
||||
"updated_at": "2024-07-05T12:27:07Z",
|
||||
"updated_at": "2024-07-05T16:26:37Z",
|
||||
"pushed_at": "2024-06-28T23:34:43Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 14,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-04T13:19:47Z",
|
||||
"updated_at": "2024-07-05T10:49:18Z",
|
||||
"updated_at": "2024-07-05T16:38:50Z",
|
||||
"pushed_at": "2024-07-04T19:18:04Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -58,5 +58,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 824643210,
|
||||
"name": "CVE-2024-36401",
|
||||
"full_name": "RevoltSecurities\/CVE-2024-36401",
|
||||
"owner": {
|
||||
"login": "RevoltSecurities",
|
||||
"id": 119435129,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119435129?v=4",
|
||||
"html_url": "https:\/\/github.com\/RevoltSecurities"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RevoltSecurities\/CVE-2024-36401",
|
||||
"description": "Exploiter a Vulnerability detection and Exploitation tool for GeoServer Unauthenticated Remote Code Execution CVE-2024-36401.",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T15:24:50Z",
|
||||
"updated_at": "2024-07-05T15:33:12Z",
|
||||
"pushed_at": "2024-07-05T15:33:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-03T07:26:07Z",
|
||||
"updated_at": "2024-07-05T09:24:57Z",
|
||||
"updated_at": "2024-07-05T16:34:29Z",
|
||||
"pushed_at": "2024-07-04T04:23:40Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 20,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
32
2024/CVE-2024-37770.json
Normal file
32
2024/CVE-2024-37770.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 824660920,
|
||||
"name": "CVE-2024-37770",
|
||||
"full_name": "k3ppf0r\/CVE-2024-37770",
|
||||
"owner": {
|
||||
"login": "k3ppf0r",
|
||||
"id": 63085409,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63085409?v=4",
|
||||
"html_url": "https:\/\/github.com\/k3ppf0r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k3ppf0r\/CVE-2024-37770",
|
||||
"description": "CVE-2024-37770",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T16:13:34Z",
|
||||
"updated_at": "2024-07-05T16:25:35Z",
|
||||
"pushed_at": "2024-07-05T16:25:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2024-39943 rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js).",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T06:46:34Z",
|
||||
"updated_at": "2024-07-05T10:09:51Z",
|
||||
"updated_at": "2024-07-05T15:51:50Z",
|
||||
"pushed_at": "2024-07-05T06:51:54Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -358,10 +358,10 @@
|
|||
"description": "CVE-2024-4040 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T05:46:56Z",
|
||||
"updated_at": "2024-07-05T11:53:45Z",
|
||||
"updated_at": "2024-07-05T17:01:56Z",
|
||||
"pushed_at": "2024-07-05T11:53:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -374,7 +374,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -1189,5 +1189,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 824582405,
|
||||
"name": "CVE-2024-4577",
|
||||
"full_name": "cybersagor\/CVE-2024-4577",
|
||||
"owner": {
|
||||
"login": "cybersagor",
|
||||
"id": 132956845,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132956845?v=4",
|
||||
"html_url": "https:\/\/github.com\/cybersagor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cybersagor\/CVE-2024-4577",
|
||||
"description": "CVE-2024-4577 Exploits",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T12:47:44Z",
|
||||
"updated_at": "2024-07-05T16:43:53Z",
|
||||
"pushed_at": "2024-07-05T16:43:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -56,19 +56,19 @@
|
|||
"description": "a signal handler race condition in OpenSSH's server (sshd)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T10:55:29Z",
|
||||
"updated_at": "2024-07-05T09:17:44Z",
|
||||
"updated_at": "2024-07-05T13:08:46Z",
|
||||
"pushed_at": "2024-07-01T10:54:02Z",
|
||||
"stargazers_count": 396,
|
||||
"watchers_count": 396,
|
||||
"stargazers_count": 397,
|
||||
"watchers_count": 397,
|
||||
"has_discussions": false,
|
||||
"forks_count": 177,
|
||||
"forks_count": 178,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 177,
|
||||
"watchers": 396,
|
||||
"forks": 178,
|
||||
"watchers": 397,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -86,10 +86,10 @@
|
|||
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T12:16:21Z",
|
||||
"updated_at": "2024-07-05T07:01:45Z",
|
||||
"updated_at": "2024-07-05T18:01:51Z",
|
||||
"pushed_at": "2024-07-01T12:25:01Z",
|
||||
"stargazers_count": 359,
|
||||
"watchers_count": 359,
|
||||
"stargazers_count": 360,
|
||||
"watchers_count": 360,
|
||||
"has_discussions": false,
|
||||
"forks_count": 80,
|
||||
"allow_forking": true,
|
||||
|
@ -98,7 +98,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"watchers": 359,
|
||||
"watchers": 360,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -116,10 +116,10 @@
|
|||
"description": "32-bit PoC for CVE-2024-6387 \"regreSSHion\" -- mirror of the original 7etsuo\/cve-2024-6387-poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T12:26:40Z",
|
||||
"updated_at": "2024-07-05T10:07:39Z",
|
||||
"updated_at": "2024-07-05T13:54:38Z",
|
||||
"pushed_at": "2024-07-01T14:16:36Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 84,
|
||||
"watchers": 85,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -303,12 +303,12 @@
|
|||
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T20:33:20Z",
|
||||
"updated_at": "2024-07-05T11:48:31Z",
|
||||
"updated_at": "2024-07-05T17:46:02Z",
|
||||
"pushed_at": "2024-07-05T11:14:02Z",
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"stargazers_count": 324,
|
||||
"watchers_count": 324,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -320,8 +320,8 @@
|
|||
"redteam"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 321,
|
||||
"forks": 67,
|
||||
"watchers": 324,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -370,17 +370,17 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-07-01T22:53:32Z",
|
||||
"updated_at": "2024-07-03T16:47:03Z",
|
||||
"pushed_at": "2024-07-02T17:30:06Z",
|
||||
"pushed_at": "2024-07-05T15:34:34Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -1500,10 +1500,10 @@
|
|||
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) ",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-02T18:32:46Z",
|
||||
"updated_at": "2024-07-05T09:35:40Z",
|
||||
"pushed_at": "2024-07-04T08:54:03Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"updated_at": "2024-07-05T15:19:31Z",
|
||||
"pushed_at": "2024-07-05T15:19:28Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -1521,7 +1521,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 27,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -2044,10 +2044,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-04T13:28:53Z",
|
||||
"updated_at": "2024-07-04T13:36:00Z",
|
||||
"updated_at": "2024-07-05T13:30:06Z",
|
||||
"pushed_at": "2024-07-04T13:35:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -2056,7 +2056,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -2144,10 +2144,10 @@
|
|||
"description": "HASSH fingerprints for identifying OpenSSH servers potentially vulnerable to CVE-2024-6387 (regreSSHion).",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T02:46:57Z",
|
||||
"updated_at": "2024-07-05T05:20:56Z",
|
||||
"updated_at": "2024-07-05T15:29:53Z",
|
||||
"pushed_at": "2024-07-05T03:40:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -2156,7 +2156,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -2249,5 +2249,65 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 824639761,
|
||||
"name": "CVE-2024-6387-Finder",
|
||||
"full_name": "SiberianHacker\/CVE-2024-6387-Finder",
|
||||
"owner": {
|
||||
"login": "SiberianHacker",
|
||||
"id": 115571334,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115571334?v=4",
|
||||
"html_url": "https:\/\/github.com\/SiberianHacker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SiberianHacker\/CVE-2024-6387-Finder",
|
||||
"description": "CVE-2024-6387 SSH finder",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T15:15:41Z",
|
||||
"updated_at": "2024-07-05T15:22:29Z",
|
||||
"pushed_at": "2024-07-05T15:22:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 824676344,
|
||||
"name": "patch_regreSSHion",
|
||||
"full_name": "dgicloud\/patch_regreSSHion",
|
||||
"owner": {
|
||||
"login": "dgicloud",
|
||||
"id": 85541525,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85541525?v=4",
|
||||
"html_url": "https:\/\/github.com\/dgicloud"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dgicloud\/patch_regreSSHion",
|
||||
"description": "Correção e Atualização do OpenSSH para CVE-2024-6387",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-05T16:59:19Z",
|
||||
"updated_at": "2024-07-05T16:59:55Z",
|
||||
"pushed_at": "2024-07-05T16:59:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
24
README.md
24
README.md
|
@ -737,6 +737,7 @@
|
|||
- [olebris/CVE-2024-4577](https://github.com/olebris/CVE-2024-4577)
|
||||
- [AlperenY-cs/CVE-2024-4577](https://github.com/AlperenY-cs/CVE-2024-4577)
|
||||
- [charis3306/CVE-2024-4577](https://github.com/charis3306/CVE-2024-4577)
|
||||
- [cybersagor/CVE-2024-4577](https://github.com/cybersagor/CVE-2024-4577)
|
||||
|
||||
### CVE-2024-4701 (2024-05-10)
|
||||
|
||||
|
@ -950,6 +951,8 @@
|
|||
- [Segurmatica/CVE-2024-6387-CHECK](https://github.com/Segurmatica/CVE-2024-6387-CHECK)
|
||||
- [sardine-web/CVE-2024-6387-template](https://github.com/sardine-web/CVE-2024-6387-template)
|
||||
- [imv7/CVE-2024-6387](https://github.com/imv7/CVE-2024-6387)
|
||||
- [SiberianHacker/CVE-2024-6387-Finder](https://github.com/SiberianHacker/CVE-2024-6387-Finder)
|
||||
- [dgicloud/patch_regreSSHion](https://github.com/dgicloud/patch_regreSSHion)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
@ -2526,6 +2529,7 @@
|
|||
|
||||
- [tykawaii98/CVE-2024-30088](https://github.com/tykawaii98/CVE-2024-30088)
|
||||
- [NextGenPentesters/CVE-2024-30088-](https://github.com/NextGenPentesters/CVE-2024-30088-)
|
||||
- [Zombie-Kaiser/CVE-2024-30088-Windows-poc](https://github.com/Zombie-Kaiser/CVE-2024-30088-Windows-poc)
|
||||
|
||||
### CVE-2024-30212 (2024-05-28)
|
||||
|
||||
|
@ -3134,6 +3138,7 @@
|
|||
|
||||
- [bigb0x/CVE-2024-36401](https://github.com/bigb0x/CVE-2024-36401)
|
||||
- [Niuwoo/CVE-2024-36401](https://github.com/Niuwoo/CVE-2024-36401)
|
||||
- [RevoltSecurities/CVE-2024-36401](https://github.com/RevoltSecurities/CVE-2024-36401)
|
||||
|
||||
### CVE-2024-36416 (2024-06-10)
|
||||
|
||||
|
@ -3234,6 +3239,9 @@
|
|||
|
||||
- [Atreb92/cve-2024-37765](https://github.com/Atreb92/cve-2024-37765)
|
||||
|
||||
### CVE-2024-37770
|
||||
- [k3ppf0r/CVE-2024-37770](https://github.com/k3ppf0r/CVE-2024-37770)
|
||||
|
||||
### CVE-2024-37791 (2024-06-18)
|
||||
|
||||
<code>DuxCMS3 v3.1.3 was discovered to contain a SQL injection vulnerability via the keyword parameter at /article/Content/index?class_id.
|
||||
|
@ -3279,7 +3287,11 @@
|
|||
### CVE-2024-39203
|
||||
- [5r1an/CVE-2024-39203](https://github.com/5r1an/CVE-2024-39203)
|
||||
|
||||
### CVE-2024-39210
|
||||
### CVE-2024-39210 (2024-07-05)
|
||||
|
||||
<code>Best House Rental Management System v1.0 was discovered to contain an arbitrary file read vulnerability via the Page parameter at index.php. This vulnerability allows attackers to read arbitrary PHP files and access other sensitive information within the application.
|
||||
</code>
|
||||
|
||||
- [KRookieSec/CVE-2024-39210](https://github.com/KRookieSec/CVE-2024-39210)
|
||||
|
||||
### CVE-2024-39211 (2024-07-04)
|
||||
|
@ -4913,6 +4925,13 @@
|
|||
- [Trinadh465/frameworks_base_CVE-2023-20944](https://github.com/Trinadh465/frameworks_base_CVE-2023-20944)
|
||||
- [hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2023-20944](https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2023-20944)
|
||||
|
||||
### CVE-2023-20945 (2023-02-28)
|
||||
|
||||
<code>In phNciNfc_MfCreateXchgDataHdr of phNxpExtns_MifareStd.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-246932269
|
||||
</code>
|
||||
|
||||
- [Ailenchick/CVE-2023-20945](https://github.com/Ailenchick/CVE-2023-20945)
|
||||
|
||||
### CVE-2023-20955 (2023-03-24)
|
||||
|
||||
<code>In onPrepareOptionsMenu of AppInfoDashboardFragment.java, there is a possible way to bypass admin restrictions and uninstall applications for all users due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-258653813
|
||||
|
@ -4927,6 +4946,7 @@
|
|||
|
||||
- [pwnipc/BadParcel](https://github.com/pwnipc/BadParcel)
|
||||
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20963](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20963)
|
||||
- [Ailenchick/CVE-2023-20963](https://github.com/Ailenchick/CVE-2023-20963)
|
||||
|
||||
### CVE-2023-21036 (2023-03-24)
|
||||
|
||||
|
@ -6171,6 +6191,7 @@
|
|||
|
||||
- [horizon3ai/CVE-2023-27532](https://github.com/horizon3ai/CVE-2023-27532)
|
||||
- [sfewer-r7/CVE-2023-27532](https://github.com/sfewer-r7/CVE-2023-27532)
|
||||
- [puckiestyle/CVE-2023-27532-RCE-Only](https://github.com/puckiestyle/CVE-2023-27532-RCE-Only)
|
||||
|
||||
### CVE-2023-27564 (2023-05-10)
|
||||
|
||||
|
@ -9248,6 +9269,7 @@
|
|||
- [hotplugin0x01/CVE-2023-42793](https://github.com/hotplugin0x01/CVE-2023-42793)
|
||||
- [Zyad-Elsayed/CVE-2023-42793](https://github.com/Zyad-Elsayed/CVE-2023-42793)
|
||||
- [junnythemarksman/CVE-2023-42793](https://github.com/junnythemarksman/CVE-2023-42793)
|
||||
- [HusenjanDev/CVE-2023-42793](https://github.com/HusenjanDev/CVE-2023-42793)
|
||||
|
||||
### CVE-2023-42819 (2023-09-26)
|
||||
|
||||
|
|
Loading…
Reference in a new issue