mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 09:34:11 +01:00
Auto Update 2025/01/22 00:32:37
This commit is contained in:
parent
d7c9c899f8
commit
f5b8217d70
39 changed files with 194 additions and 142 deletions
|
@ -78,10 +78,10 @@
|
|||
"description": "Private keys vulnerable to Debian OpenSSL bug (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-15T10:28:03Z",
|
||||
"updated_at": "2024-10-13T05:42:15Z",
|
||||
"updated_at": "2025-01-21T21:45:18Z",
|
||||
"pushed_at": "2024-05-18T14:17:24Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"description": "My journey through WebKit CVE-2016-4622 Exploitation process",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-07T00:46:19Z",
|
||||
"updated_at": "2024-08-25T14:04:31Z",
|
||||
"updated_at": "2025-01-21T22:11:02Z",
|
||||
"pushed_at": "2020-04-12T19:46:40Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2025-01-18T01:48:29Z",
|
||||
"updated_at": "2025-01-21T23:37:51Z",
|
||||
"pushed_at": "2022-12-11T10:44:39Z",
|
||||
"stargazers_count": 527,
|
||||
"watchers_count": 527,
|
||||
"stargazers_count": 528,
|
||||
"watchers_count": 528,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 527,
|
||||
"watchers": 528,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2025-01-17T06:23:10Z",
|
||||
"updated_at": "2025-01-21T20:48:30Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1802,
|
||||
"watchers_count": 1802,
|
||||
|
@ -267,13 +267,13 @@
|
|||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"forks": 43,
|
||||
"watchers": 144,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
|
@ -45,7 +45,7 @@
|
|||
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:08:27Z",
|
||||
"updated_at": "2024-12-22T14:00:19Z",
|
||||
"updated_at": "2025-01-21T22:11:01Z",
|
||||
"pushed_at": "2020-01-22T20:23:51Z",
|
||||
"stargazers_count": 572,
|
||||
"watchers_count": 572,
|
||||
|
@ -177,10 +177,10 @@
|
|||
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T09:49:17Z",
|
||||
"updated_at": "2024-12-06T23:51:10Z",
|
||||
"updated_at": "2025-01-21T22:11:01Z",
|
||||
"pushed_at": "2021-01-24T20:18:04Z",
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -189,7 +189,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 156,
|
||||
"watchers": 155,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -76,7 +76,7 @@
|
|||
"description": "MacOS kernel memory leak (4 bytes)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-10T14:30:16Z",
|
||||
"updated_at": "2024-08-15T03:57:59Z",
|
||||
"updated_at": "2025-01-21T22:11:02Z",
|
||||
"pushed_at": "2020-04-14T06:57:49Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2025-01-16T03:08:57Z",
|
||||
"updated_at": "2025-01-21T20:25:14Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 1204,
|
||||
"watchers_count": 1204,
|
||||
"stargazers_count": 1205,
|
||||
"watchers_count": 1205,
|
||||
"has_discussions": false,
|
||||
"forks_count": 283,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 283,
|
||||
"watchers": 1204,
|
||||
"watchers": 1205,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-17T05:35:01Z",
|
||||
"updated_at": "2024-12-03T10:19:36Z",
|
||||
"updated_at": "2025-01-21T23:20:59Z",
|
||||
"pushed_at": "2022-12-15T07:33:15Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 85,
|
||||
"watchers": 86,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "Exploit for CVE-2021-30807",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-09T20:11:42Z",
|
||||
"updated_at": "2024-11-10T14:44:04Z",
|
||||
"updated_at": "2025-01-21T22:11:09Z",
|
||||
"pushed_at": "2021-11-29T13:50:42Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
|
|
|
@ -45,7 +45,7 @@
|
|||
"description": "Collection of materials relating to FORCEDENTRY",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-25T03:00:01Z",
|
||||
"updated_at": "2025-01-02T21:48:11Z",
|
||||
"updated_at": "2025-01-21T22:11:11Z",
|
||||
"pushed_at": "2024-03-30T22:17:05Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
|
|
|
@ -107,7 +107,7 @@
|
|||
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-01T12:41:03Z",
|
||||
"updated_at": "2024-11-16T08:09:19Z",
|
||||
"updated_at": "2025-01-21T22:11:13Z",
|
||||
"pushed_at": "2022-03-01T16:11:31Z",
|
||||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
|
|
|
@ -486,7 +486,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2025-01-18T22:40:31Z",
|
||||
"updated_at": "2025-01-21T22:11:06Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 963,
|
||||
"watchers_count": 963,
|
||||
|
|
|
@ -1982,7 +1982,7 @@
|
|||
"description": "Proof of concept for pwnkit vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T14:43:57Z",
|
||||
"updated_at": "2024-12-24T08:36:17Z",
|
||||
"updated_at": "2025-01-21T20:48:36Z",
|
||||
"pushed_at": "2023-01-12T19:23:29Z",
|
||||
"stargazers_count": 338,
|
||||
"watchers_count": 338,
|
||||
|
|
|
@ -308,8 +308,8 @@
|
|||
"description": "Check Point Security Gateways RCE via CVE-2021-40438",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-21T13:16:24Z",
|
||||
"updated_at": "2025-01-21T16:47:39Z",
|
||||
"pushed_at": "2025-01-21T16:03:56Z",
|
||||
"updated_at": "2025-01-21T20:17:16Z",
|
||||
"pushed_at": "2025-01-21T20:17:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -461,7 +461,7 @@
|
|||
"description": "CVE-2021-41773 playground",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T07:17:05Z",
|
||||
"updated_at": "2024-11-22T13:23:13Z",
|
||||
"updated_at": "2025-01-21T22:11:09Z",
|
||||
"pushed_at": "2021-10-07T17:56:38Z",
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
|
|
|
@ -622,7 +622,7 @@
|
|||
"description": "Hashes for vulnerable LOG4J versions",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T18:06:06Z",
|
||||
"updated_at": "2025-01-06T02:36:36Z",
|
||||
"updated_at": "2025-01-21T20:35:54Z",
|
||||
"pushed_at": "2021-12-17T17:02:24Z",
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
|
@ -884,10 +884,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2025-01-14T03:16:00Z",
|
||||
"updated_at": "2025-01-21T21:32:29Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 935,
|
||||
"watchers_count": 935,
|
||||
"stargazers_count": 934,
|
||||
"watchers_count": 934,
|
||||
"has_discussions": false,
|
||||
"forks_count": 141,
|
||||
"allow_forking": true,
|
||||
|
@ -916,7 +916,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 141,
|
||||
"watchers": 935,
|
||||
"watchers": 934,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
@ -1467,7 +1467,7 @@
|
|||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:18:46Z",
|
||||
"updated_at": "2025-01-19T07:23:11Z",
|
||||
"updated_at": "2025-01-21T20:35:54Z",
|
||||
"pushed_at": "2022-04-07T14:47:03Z",
|
||||
"stargazers_count": 854,
|
||||
"watchers_count": 854,
|
||||
|
@ -2027,7 +2027,7 @@
|
|||
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T00:29:03Z",
|
||||
"updated_at": "2025-01-19T18:55:44Z",
|
||||
"updated_at": "2025-01-21T20:48:35Z",
|
||||
"pushed_at": "2022-03-10T18:44:50Z",
|
||||
"stargazers_count": 637,
|
||||
"watchers_count": 637,
|
||||
|
@ -3749,10 +3749,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2025-01-15T07:32:58Z",
|
||||
"updated_at": "2025-01-21T18:27:36Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3408,
|
||||
"watchers_count": 3408,
|
||||
"stargazers_count": 3407,
|
||||
"watchers_count": 3407,
|
||||
"has_discussions": true,
|
||||
"forks_count": 740,
|
||||
"allow_forking": true,
|
||||
|
@ -3761,7 +3761,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 740,
|
||||
"watchers": 3408,
|
||||
"watchers": 3407,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
@ -9580,7 +9580,7 @@
|
|||
"description": "Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T22:14:24Z",
|
||||
"updated_at": "2024-07-07T09:47:47Z",
|
||||
"updated_at": "2025-01-21T20:35:55Z",
|
||||
"pushed_at": "2022-01-10T19:13:04Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
|
|
|
@ -141,7 +141,7 @@
|
|||
"description": "Public testing data. Samples of log4j library versions to help log4j scanners \/ detectors improve their accuracy for detecting CVE-2021-45046 and CVE-2021-44228. TAG_TESTING, OWNER_KEN, DC_PUBLIC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-16T18:12:29Z",
|
||||
"updated_at": "2023-09-11T19:22:43Z",
|
||||
"updated_at": "2025-01-21T20:35:54Z",
|
||||
"pushed_at": "2021-12-30T05:15:54Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Android kernel exploitation for CVE-2022-20409",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-21T22:42:50Z",
|
||||
"updated_at": "2025-01-21T10:55:22Z",
|
||||
"updated_at": "2025-01-21T23:07:38Z",
|
||||
"pushed_at": "2024-10-17T16:26:39Z",
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 169,
|
||||
"watchers": 170,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T10:25:59Z",
|
||||
"updated_at": "2025-01-01T14:03:35Z",
|
||||
"updated_at": "2025-01-21T20:48:38Z",
|
||||
"pushed_at": "2023-05-27T15:39:41Z",
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T15:53:21Z",
|
||||
"updated_at": "2024-11-26T06:21:11Z",
|
||||
"updated_at": "2025-01-21T20:48:36Z",
|
||||
"pushed_at": "2022-02-07T15:55:03Z",
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 239,
|
||||
"watchers": 238,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -96,7 +96,7 @@
|
|||
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T02:28:50Z",
|
||||
"updated_at": "2024-11-02T16:24:21Z",
|
||||
"updated_at": "2025-01-21T20:35:55Z",
|
||||
"pushed_at": "2022-01-20T02:07:59Z",
|
||||
"stargazers_count": 361,
|
||||
"watchers_count": 361,
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "cve-2022-23131 zabbix-saml-bypass-exp",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-18T11:51:47Z",
|
||||
"updated_at": "2025-01-04T08:11:13Z",
|
||||
"updated_at": "2025-01-21T23:15:09Z",
|
||||
"pushed_at": "2024-08-11T18:14:56Z",
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 150,
|
||||
"watchers": 151,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-19T12:46:45Z",
|
||||
"updated_at": "2025-01-16T01:30:59Z",
|
||||
"updated_at": "2025-01-21T22:11:14Z",
|
||||
"pushed_at": "2022-09-06T14:05:22Z",
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
|
|
|
@ -48,10 +48,10 @@
|
|||
"description": "Bootloader unlock using CVE-2022-38694 for Anbernic Unisoc T820 devices",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-27T14:28:13Z",
|
||||
"updated_at": "2024-12-10T09:48:51Z",
|
||||
"updated_at": "2025-01-22T00:15:23Z",
|
||||
"pushed_at": "2024-10-15T10:16:57Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -60,7 +60,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -743,10 +743,10 @@
|
|||
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T06:54:15Z",
|
||||
"updated_at": "2025-01-21T14:12:13Z",
|
||||
"updated_at": "2025-01-21T19:37:31Z",
|
||||
"pushed_at": "2025-01-16T09:56:36Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -755,7 +755,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 59,
|
||||
"watchers": 61,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
@ -805,8 +805,8 @@
|
|||
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T15:32:21Z",
|
||||
"updated_at": "2025-01-21T17:56:07Z",
|
||||
"pushed_at": "2025-01-21T17:56:03Z",
|
||||
"updated_at": "2025-01-22T00:11:35Z",
|
||||
"pushed_at": "2025-01-22T00:11:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -76,7 +76,7 @@
|
|||
"description": "CVE-2023-34362: MOVEit Transfer Unauthenticated RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-12T12:56:12Z",
|
||||
"updated_at": "2024-09-27T17:00:38Z",
|
||||
"updated_at": "2025-01-21T22:11:17Z",
|
||||
"pushed_at": "2024-03-24T00:46:38Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "lazy way to create CVE-2023-38831 winrar file for testing",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-24T16:03:07Z",
|
||||
"updated_at": "2024-12-09T01:45:14Z",
|
||||
"updated_at": "2025-01-21T20:35:59Z",
|
||||
"pushed_at": "2023-08-24T16:13:02Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
|
@ -45,7 +45,7 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2025-01-18T22:50:54Z",
|
||||
"updated_at": "2025-01-21T20:35:59Z",
|
||||
"pushed_at": "2023-11-26T06:46:44Z",
|
||||
"stargazers_count": 783,
|
||||
"watchers_count": 783,
|
||||
|
|
|
@ -402,37 +402,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 725243332,
|
||||
"name": "activemq-cve-2023-46604-duplicate",
|
||||
"full_name": "tomasmussi-mulesoft\/activemq-cve-2023-46604-duplicate",
|
||||
"owner": {
|
||||
"login": "tomasmussi-mulesoft",
|
||||
"id": 87021051,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87021051?v=4",
|
||||
"html_url": "https:\/\/github.com\/tomasmussi-mulesoft",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tomasmussi-mulesoft\/activemq-cve-2023-46604-duplicate",
|
||||
"description": "Repository to exploit CVE-2023-46604 reported for ActiveMQ",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-29T18:30:02Z",
|
||||
"updated_at": "2024-12-11T14:20:35Z",
|
||||
"pushed_at": "2024-11-02T13:29:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 728564712,
|
||||
"name": "CVE-Lab",
|
||||
|
@ -557,6 +526,37 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 737375747,
|
||||
"name": "activemq-cve-2023-46604",
|
||||
"full_name": "tomasmussi\/activemq-cve-2023-46604",
|
||||
"owner": {
|
||||
"login": "tomasmussi",
|
||||
"id": 12720693,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12720693?v=4",
|
||||
"html_url": "https:\/\/github.com\/tomasmussi",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tomasmussi\/activemq-cve-2023-46604",
|
||||
"description": "Repository to exploit CVE-2023-46604 reported for ActiveMQ",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-30T20:02:19Z",
|
||||
"updated_at": "2025-01-21T20:11:40Z",
|
||||
"pushed_at": "2025-01-21T20:11:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 740774996,
|
||||
"name": "cve-2023-46604",
|
||||
|
|
|
@ -297,19 +297,19 @@
|
|||
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-27T09:02:08Z",
|
||||
"updated_at": "2025-01-21T08:01:21Z",
|
||||
"updated_at": "2025-01-21T22:38:43Z",
|
||||
"pushed_at": "2024-09-30T12:48:08Z",
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 134,
|
||||
"forks": 18,
|
||||
"watchers": 135,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -438,5 +438,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 920321578,
|
||||
"name": "Project-Exploiting-CVE-2024-27198-RCE-Vulnerability",
|
||||
"full_name": "ArtemCyberLab\/Project-Exploiting-CVE-2024-27198-RCE-Vulnerability",
|
||||
"owner": {
|
||||
"login": "ArtemCyberLab",
|
||||
"id": 193649833,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193649833?v=4",
|
||||
"html_url": "https:\/\/github.com\/ArtemCyberLab",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ArtemCyberLab\/Project-Exploiting-CVE-2024-27198-RCE-Vulnerability",
|
||||
"description": "In this project, I exploited the CVE-2024-27198-RCE vulnerability to perform a remote code execution (RCE) attack on a vulnerable TeamCity server.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-22T00:09:41Z",
|
||||
"updated_at": "2025-01-22T00:16:40Z",
|
||||
"pushed_at": "2025-01-22T00:16:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -76,7 +76,7 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2025-01-19T21:10:28Z",
|
||||
"updated_at": "2025-01-21T22:11:19Z",
|
||||
"pushed_at": "2024-09-30T08:45:56Z",
|
||||
"stargazers_count": 428,
|
||||
"watchers_count": 428,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T12:39:44Z",
|
||||
"updated_at": "2025-01-21T17:29:39Z",
|
||||
"updated_at": "2025-01-21T23:57:55Z",
|
||||
"pushed_at": "2025-01-16T09:48:07Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 53,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"forks": 29,
|
||||
"watchers": 83,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T07:26:15Z",
|
||||
"updated_at": "2025-01-21T17:35:07Z",
|
||||
"updated_at": "2025-01-21T22:12:30Z",
|
||||
"pushed_at": "2025-01-16T08:58:49Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -45,8 +45,8 @@
|
|||
"description": "Checks for authentication bypass vulnerability inFortinet's FortiOS, potentially exploited by remote attackers.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-18T15:17:07Z",
|
||||
"updated_at": "2025-01-21T18:23:33Z",
|
||||
"pushed_at": "2025-01-21T18:23:30Z",
|
||||
"updated_at": "2025-01-22T00:29:48Z",
|
||||
"pushed_at": "2025-01-22T00:29:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-17T16:10:38Z",
|
||||
"updated_at": "2025-01-20T10:36:02Z",
|
||||
"updated_at": "2025-01-21T23:20:25Z",
|
||||
"pushed_at": "2024-10-17T16:28:17Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-16T14:45:53Z",
|
||||
"updated_at": "2025-01-21T15:43:50Z",
|
||||
"updated_at": "2025-01-21T23:59:22Z",
|
||||
"pushed_at": "2025-01-16T20:09:52Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -15,7 +15,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2025-01-19T05:31:13Z",
|
||||
"updated_at": "2025-01-20T04:16:51Z",
|
||||
"pushed_at": "2025-01-20T04:17:36Z",
|
||||
"pushed_at": "2025-01-21T21:09:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
33
README.md
33
README.md
|
@ -4321,6 +4321,7 @@
|
|||
- [jrbH4CK/CVE-2024-27198](https://github.com/jrbH4CK/CVE-2024-27198)
|
||||
- [geniuszly/CVE-2024-27198](https://github.com/geniuszly/CVE-2024-27198)
|
||||
- [Cythonic1/CVE-2024-27198_POC](https://github.com/Cythonic1/CVE-2024-27198_POC)
|
||||
- [ArtemCyberLab/Project-Exploiting-CVE-2024-27198-RCE-Vulnerability](https://github.com/ArtemCyberLab/Project-Exploiting-CVE-2024-27198-RCE-Vulnerability)
|
||||
|
||||
### CVE-2024-27292 (2024-02-29)
|
||||
|
||||
|
@ -7461,7 +7462,11 @@
|
|||
|
||||
- [OpenXP-Research/CVE-2024-48360](https://github.com/OpenXP-Research/CVE-2024-48360)
|
||||
|
||||
### CVE-2024-48392
|
||||
### CVE-2024-48392 (2025-01-21)
|
||||
|
||||
<code>OrangeScrum v2.0.11 is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into user email due to lack of input validation, which could lead to account takeover.
|
||||
</code>
|
||||
|
||||
- [Renzusclarke/CVE-2024-48392-PoC](https://github.com/Renzusclarke/CVE-2024-48392-PoC)
|
||||
|
||||
### CVE-2024-48415 (2024-10-22)
|
||||
|
@ -8360,13 +8365,25 @@
|
|||
|
||||
- [nscan9/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection](https://github.com/nscan9/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection)
|
||||
|
||||
### CVE-2024-54792
|
||||
### CVE-2024-54792 (2025-01-21)
|
||||
|
||||
<code>A Cross-Site Request Forgery (CSRF) vulnerability has been found in SpagoBI v3.5.1 in the user administration panel. An authenticated user can lead another user into executing unwanted actions inside the application they are logged in, like adding, editing or deleting users.
|
||||
</code>
|
||||
|
||||
- [MarioTesoro/CVE-2024-54792](https://github.com/MarioTesoro/CVE-2024-54792)
|
||||
|
||||
### CVE-2024-54794
|
||||
### CVE-2024-54794 (2025-01-21)
|
||||
|
||||
<code>The script input feature of SpagoBI 3.5.1 allows arbitrary code execution.
|
||||
</code>
|
||||
|
||||
- [MarioTesoro/CVE-2024-54794](https://github.com/MarioTesoro/CVE-2024-54794)
|
||||
|
||||
### CVE-2024-54795
|
||||
### CVE-2024-54795 (2025-01-21)
|
||||
|
||||
<code>SpagoBI v3.5.1 contains multiple Stored Cross-Site Scripting (XSS) vulnerabilities in the create/edit forms of the worksheet designer function.
|
||||
</code>
|
||||
|
||||
- [MarioTesoro/CVE-2024-54795](https://github.com/MarioTesoro/CVE-2024-54795)
|
||||
|
||||
### CVE-2024-54819 (2025-01-07)
|
||||
|
@ -8414,7 +8431,11 @@
|
|||
|
||||
- [SyFi/CVE-2024-55503](https://github.com/SyFi/CVE-2024-55503)
|
||||
|
||||
### CVE-2024-55504
|
||||
### CVE-2024-55504 (2025-01-21)
|
||||
|
||||
<code>An issue in RAR Extractor - Unarchiver Free and Pro v.6.4.0 allows local attackers to inject arbitrary code potentially leading to remote control and unauthorized access to sensitive user data via the exploit_combined.dylib component on MacOS.
|
||||
</code>
|
||||
|
||||
- [SyFi/CVE-2024-55504](https://github.com/SyFi/CVE-2024-55504)
|
||||
|
||||
### CVE-2024-55511 (2025-01-16)
|
||||
|
@ -16029,11 +16050,11 @@
|
|||
- [NKeshawarz/CVE-2023-46604-RCE](https://github.com/NKeshawarz/CVE-2023-46604-RCE)
|
||||
- [minhangxiaohui/ActiveMQ_CVE-2023-46604](https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604)
|
||||
- [nitzanoligo/CVE-2023-46604-demo](https://github.com/nitzanoligo/CVE-2023-46604-demo)
|
||||
- [tomasmussi-mulesoft/activemq-cve-2023-46604-duplicate](https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604-duplicate)
|
||||
- [dcm2406/CVE-Lab](https://github.com/dcm2406/CVE-Lab)
|
||||
- [mrpentst/CVE-2023-46604](https://github.com/mrpentst/CVE-2023-46604)
|
||||
- [dcm2406/CVE-2023-46604](https://github.com/dcm2406/CVE-2023-46604)
|
||||
- [Mudoleto/Broker_ApacheMQ](https://github.com/Mudoleto/Broker_ApacheMQ)
|
||||
- [tomasmussi/activemq-cve-2023-46604](https://github.com/tomasmussi/activemq-cve-2023-46604)
|
||||
- [hh-hunter/cve-2023-46604](https://github.com/hh-hunter/cve-2023-46604)
|
||||
- [stegano5/ExploitScript-CVE-2023-46604](https://github.com/stegano5/ExploitScript-CVE-2023-46604)
|
||||
- [Arlenhiack/ActiveMQ-RCE-Exploit](https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit)
|
||||
|
|
Loading…
Add table
Reference in a new issue