mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2024/05/15 12:29:09
This commit is contained in:
parent
4aba31211d
commit
f5da7cb6e9
44 changed files with 322 additions and 248 deletions
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2024-04-28T15:17:52Z",
|
||||
"updated_at": "2024-05-15T06:40:05Z",
|
||||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 942,
|
||||
"watchers_count": 942,
|
||||
"stargazers_count": 941,
|
||||
"watchers_count": 941,
|
||||
"has_discussions": false,
|
||||
"forks_count": 392,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 392,
|
||||
"watchers": 942,
|
||||
"watchers": 941,
|
||||
"score": 0,
|
||||
"subscribers_count": 65
|
||||
},
|
||||
|
|
|
@ -873,10 +873,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-18T05:38:39Z",
|
||||
"updated_at": "2022-03-18T05:38:50Z",
|
||||
"updated_at": "2024-05-15T08:40:23Z",
|
||||
"pushed_at": "2022-03-18T05:38:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -885,7 +885,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -343,10 +343,10 @@
|
|||
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-13T11:01:41Z",
|
||||
"updated_at": "2024-05-14T22:49:56Z",
|
||||
"updated_at": "2024-05-15T06:25:53Z",
|
||||
"pushed_at": "2022-11-15T09:05:50Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -355,7 +355,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 145,
|
||||
"watchers": 146,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
32
2018/CVE-2018-14716.json
Normal file
32
2018/CVE-2018-14716.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 800870191,
|
||||
"name": "CVE-2018-14716",
|
||||
"full_name": "0xB455\/CVE-2018-14716",
|
||||
"owner": {
|
||||
"login": "0xB455",
|
||||
"id": 17347389,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17347389?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xB455"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xB455\/CVE-2018-14716",
|
||||
"description": "PoC for CVE-2018-14716",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-15T06:47:02Z",
|
||||
"updated_at": "2024-05-15T07:03:06Z",
|
||||
"pushed_at": "2024-05-15T07:02:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2018-6066 using VBA",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-24T13:59:12Z",
|
||||
"updated_at": "2024-04-28T09:35:46Z",
|
||||
"updated_at": "2024-05-15T06:21:17Z",
|
||||
"pushed_at": "2022-10-24T15:44:18Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"has_discussions": false,
|
||||
"forks_count": 73,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 73,
|
||||
"forks": 71,
|
||||
"watchers": 166,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-05-15T01:11:33Z",
|
||||
"updated_at": "2024-05-15T12:06:14Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4028,
|
||||
"watchers_count": 4028,
|
||||
"stargazers_count": 4030,
|
||||
"watchers_count": 4030,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1080,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1080,
|
||||
"watchers": 4028,
|
||||
"watchers": 4030,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-25T23:44:16Z",
|
||||
"updated_at": "2024-04-28T09:35:04Z",
|
||||
"updated_at": "2024-05-15T06:20:30Z",
|
||||
"pushed_at": "2020-02-26T00:58:39Z",
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 161,
|
||||
"watchers": 162,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -133,12 +133,12 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2024-05-09T18:04:28Z",
|
||||
"updated_at": "2024-05-15T10:21:42Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 651,
|
||||
"watchers_count": 651,
|
||||
"stargazers_count": 652,
|
||||
"watchers_count": 652,
|
||||
"has_discussions": false,
|
||||
"forks_count": 199,
|
||||
"forks_count": 198,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -146,8 +146,8 @@
|
|||
"cve-2020-0796"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 199,
|
||||
"watchers": 651,
|
||||
"forks": 198,
|
||||
"watchers": 652,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
@ -446,12 +446,12 @@
|
|||
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T18:34:40Z",
|
||||
"updated_at": "2024-05-15T03:33:32Z",
|
||||
"updated_at": "2024-05-15T10:22:00Z",
|
||||
"pushed_at": "2023-02-26T07:01:03Z",
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"has_discussions": false,
|
||||
"forks_count": 121,
|
||||
"forks_count": 122,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -462,8 +462,8 @@
|
|||
"smbghost"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 121,
|
||||
"watchers": 319,
|
||||
"forks": 122,
|
||||
"watchers": 320,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
@ -913,19 +913,19 @@
|
|||
"description": "CVE-2020-0796_CoronaBlue_SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-16T15:31:52Z",
|
||||
"updated_at": "2023-09-28T11:12:36Z",
|
||||
"updated_at": "2024-05-15T10:21:15Z",
|
||||
"pushed_at": "2020-03-19T08:06:51Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1096,12 +1096,12 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2024-05-11T09:20:19Z",
|
||||
"updated_at": "2024-05-15T06:36:53Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1291,
|
||||
"watchers_count": 1291,
|
||||
"stargazers_count": 1290,
|
||||
"watchers_count": 1290,
|
||||
"has_discussions": false,
|
||||
"forks_count": 345,
|
||||
"forks_count": 346,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1113,8 +1113,8 @@
|
|||
"smbghost"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 345,
|
||||
"watchers": 1291,
|
||||
"forks": 346,
|
||||
"watchers": 1290,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2024-05-13T04:31:45Z",
|
||||
"updated_at": "2024-05-15T06:20:39Z",
|
||||
"pushed_at": "2023-07-20T10:51:42Z",
|
||||
"stargazers_count": 1690,
|
||||
"watchers_count": 1690,
|
||||
"stargazers_count": 1691,
|
||||
"watchers_count": 1691,
|
||||
"has_discussions": false,
|
||||
"forks_count": 361,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 361,
|
||||
"watchers": 1690,
|
||||
"watchers": 1691,
|
||||
"score": 0,
|
||||
"subscribers_count": 87
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-05-15T01:11:33Z",
|
||||
"updated_at": "2024-05-15T12:06:14Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4028,
|
||||
"watchers_count": 4028,
|
||||
"stargazers_count": 4030,
|
||||
"watchers_count": 4030,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1080,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1080,
|
||||
"watchers": 4028,
|
||||
"watchers": 4030,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -889,10 +889,10 @@
|
|||
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-13T11:01:41Z",
|
||||
"updated_at": "2024-05-14T22:49:56Z",
|
||||
"updated_at": "2024-05-15T06:25:53Z",
|
||||
"pushed_at": "2022-11-15T09:05:50Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -901,7 +901,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 145,
|
||||
"watchers": 146,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "wpDiscuz 7.0.4 Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-13T23:10:19Z",
|
||||
"updated_at": "2024-04-28T09:35:22Z",
|
||||
"updated_at": "2024-05-15T06:20:49Z",
|
||||
"pushed_at": "2021-06-15T17:30:23Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -103,10 +103,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-12-21T23:23:43Z",
|
||||
"updated_at": "2024-04-28T09:36:25Z",
|
||||
"updated_at": "2024-05-15T06:22:00Z",
|
||||
"pushed_at": "2023-12-21T23:43:48Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "4.9 Kernel Exploit for CVE-2020-27786",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-13T08:04:19Z",
|
||||
"updated_at": "2024-04-28T09:35:38Z",
|
||||
"updated_at": "2024-05-15T06:21:07Z",
|
||||
"pushed_at": "2022-12-03T06:46:11Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Simple CVE-2021-20294 poc",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-21T16:15:21Z",
|
||||
"updated_at": "2024-05-05T09:26:44Z",
|
||||
"updated_at": "2024-05-15T07:41:34Z",
|
||||
"pushed_at": "2023-01-21T22:37:16Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1224,19 +1224,19 @@
|
|||
"description": "CVE-2021-3156 - Sudo Baron Samedit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T06:29:26Z",
|
||||
"updated_at": "2024-04-15T08:01:21Z",
|
||||
"updated_at": "2024-05-15T12:06:38Z",
|
||||
"pushed_at": "2022-02-12T19:33:07Z",
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 216,
|
||||
"forks": 36,
|
||||
"watchers": 217,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-04T17:15:58Z",
|
||||
"updated_at": "2024-04-28T09:35:21Z",
|
||||
"updated_at": "2024-05-15T06:20:48Z",
|
||||
"pushed_at": "2021-05-10T20:42:33Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 800865797,
|
||||
"name": "CVE-2021-34646",
|
||||
"full_name": "0xB455\/CVE-2021-34646",
|
||||
"owner": {
|
||||
"login": "0xB455",
|
||||
"id": 17347389,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17347389?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xB455"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xB455\/CVE-2021-34646",
|
||||
"description": "PoC for CVE-2021-34646",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-15T06:35:42Z",
|
||||
"updated_at": "2024-05-15T06:41:15Z",
|
||||
"pushed_at": "2024-05-15T06:41:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -493,10 +493,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2024-05-11T09:17:11Z",
|
||||
"updated_at": "2024-05-15T06:20:54Z",
|
||||
"pushed_at": "2023-10-11T18:44:51Z",
|
||||
"stargazers_count": 783,
|
||||
"watchers_count": 783,
|
||||
"stargazers_count": 784,
|
||||
"watchers_count": 784,
|
||||
"has_discussions": false,
|
||||
"forks_count": 174,
|
||||
"allow_forking": true,
|
||||
|
@ -512,7 +512,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 174,
|
||||
"watchers": 783,
|
||||
"watchers": 784,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -787,11 +787,11 @@
|
|||
"html_url": "https:\/\/github.com\/winnpixie"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/winnpixie\/log4noshell",
|
||||
"description": "Java agent that disables Apache Log4J's JNDI Lookup. Fixes CVE-2021-44228, aka \"Log4Shell.\"",
|
||||
"description": "A Java Agent that disables Apache Log4J's JNDI Lookup to mitigate CVE-2021-44228 (\"Log4Shell\").",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T21:59:31Z",
|
||||
"updated_at": "2023-09-28T11:33:57Z",
|
||||
"pushed_at": "2024-02-22T10:47:41Z",
|
||||
"updated_at": "2024-05-15T11:29:06Z",
|
||||
"pushed_at": "2024-05-15T11:27:40Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
|
@ -1527,7 +1527,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2024-04-29T17:48:37Z",
|
||||
"pushed_at": "2024-05-13T01:55:15Z",
|
||||
"pushed_at": "2024-05-15T07:03:07Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
@ -3636,10 +3636,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2024-05-15T06:20:57Z",
|
||||
"updated_at": "2024-05-15T12:06:21Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3359,
|
||||
"watchers_count": 3359,
|
||||
"stargazers_count": 3360,
|
||||
"watchers_count": 3360,
|
||||
"has_discussions": true,
|
||||
"forks_count": 740,
|
||||
"allow_forking": true,
|
||||
|
@ -3648,7 +3648,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 740,
|
||||
"watchers": 3359,
|
||||
"watchers": 3360,
|
||||
"score": 0,
|
||||
"subscribers_count": 57
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2022-22947",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-02T11:58:55Z",
|
||||
"updated_at": "2024-05-14T06:32:58Z",
|
||||
"updated_at": "2024-05-15T10:46:59Z",
|
||||
"pushed_at": "2022-03-03T14:03:30Z",
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"stargazers_count": 218,
|
||||
"watchers_count": 218,
|
||||
"has_discussions": false,
|
||||
"forks_count": 62,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 217,
|
||||
"forks": 61,
|
||||
"watchers": 218,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
"has_discussions": false,
|
||||
"forks_count": 105,
|
||||
"forks_count": 106,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"tomcat"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"forks": 106,
|
||||
"watchers": 348,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-46463(Harbor 未授权)",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-17T14:58:14Z",
|
||||
"updated_at": "2024-04-22T01:11:23Z",
|
||||
"updated_at": "2024-05-15T11:58:33Z",
|
||||
"pushed_at": "2023-01-19T12:47:21Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -586,10 +586,10 @@
|
|||
"description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-26T02:34:44Z",
|
||||
"updated_at": "2024-05-14T15:20:02Z",
|
||||
"updated_at": "2024-05-15T12:05:07Z",
|
||||
"pushed_at": "2024-04-24T02:34:16Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -598,7 +598,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -631,35 +631,5 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 800176493,
|
||||
"name": "CVE-2023-22527",
|
||||
"full_name": "ttate10\/CVE-2023-22527",
|
||||
"owner": {
|
||||
"login": "ttate10",
|
||||
"id": 145155075,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145155075?v=4",
|
||||
"html_url": "https:\/\/github.com\/ttate10"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ttate10\/CVE-2023-22527",
|
||||
"description": "PoC for the NAPLISTENER exploit: https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-22527 (Purpose: To practice automating exploits)",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-13T21:04:45Z",
|
||||
"updated_at": "2024-05-13T22:48:52Z",
|
||||
"pushed_at": "2024-05-13T22:48:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -470,10 +470,10 @@
|
|||
"description": "Joomla! < 4.2.8 - Unauthenticated information disclosure",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-24T11:50:16Z",
|
||||
"updated_at": "2024-05-15T06:21:34Z",
|
||||
"updated_at": "2024-05-15T07:54:41Z",
|
||||
"pushed_at": "2023-12-27T11:30:46Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -489,7 +489,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit for CVE-2023-27532 against Veeam Backup & Replication",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T16:08:43Z",
|
||||
"updated_at": "2024-05-10T10:49:34Z",
|
||||
"updated_at": "2024-05-15T07:54:41Z",
|
||||
"pushed_at": "2023-03-23T18:03:27Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 101,
|
||||
"watchers": 102,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-24T21:59:23Z",
|
||||
"updated_at": "2024-05-09T18:05:05Z",
|
||||
"updated_at": "2024-05-15T08:25:50Z",
|
||||
"pushed_at": "2023-10-12T19:18:32Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 127,
|
||||
"watchers": 128,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-33733 reportlab RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-30T22:22:50Z",
|
||||
"updated_at": "2024-05-14T17:49:07Z",
|
||||
"updated_at": "2024-05-15T08:28:53Z",
|
||||
"pushed_at": "2023-09-05T15:49:14Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 96,
|
||||
"watchers": 97,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for Spring Kafka Deserialization Vulnerability CVE-2023-34040",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-30T12:09:15Z",
|
||||
"updated_at": "2024-02-22T07:07:45Z",
|
||||
"updated_at": "2024-05-15T09:18:06Z",
|
||||
"pushed_at": "2023-08-30T12:18:35Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -32,35 +32,5 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 704890581,
|
||||
"name": "CVE-2023-3710",
|
||||
"full_name": "Mahdi22228\/CVE-2023-3710",
|
||||
"owner": {
|
||||
"login": "Mahdi22228",
|
||||
"id": 123639864,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123639864?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mahdi22228"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mahdi22228\/CVE-2023-3710",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-14T12:18:15Z",
|
||||
"updated_at": "2023-10-14T12:18:15Z",
|
||||
"pushed_at": "2023-10-14T12:18:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-20T07:14:06Z",
|
||||
"updated_at": "2024-04-28T02:56:20Z",
|
||||
"updated_at": "2024-05-15T07:39:08Z",
|
||||
"pushed_at": "2024-01-21T05:04:01Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 61,
|
||||
"watchers": 65,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-05-15T06:29:03Z",
|
||||
"updated_at": "2024-05-15T11:43:25Z",
|
||||
"pushed_at": "2024-05-14T09:04:25Z",
|
||||
"stargazers_count": 623,
|
||||
"watchers_count": 623,
|
||||
"stargazers_count": 631,
|
||||
"watchers_count": 631,
|
||||
"has_discussions": false,
|
||||
"forks_count": 107,
|
||||
"forks_count": 109,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 107,
|
||||
"watchers": 623,
|
||||
"forks": 109,
|
||||
"watchers": 631,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "exploit for f5-big-ip RCE cve-2023-46747",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-01T09:31:05Z",
|
||||
"updated_at": "2024-05-15T06:21:56Z",
|
||||
"updated_at": "2024-05-15T11:25:54Z",
|
||||
"pushed_at": "2024-03-26T03:01:04Z",
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 187,
|
||||
"watchers": 188,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 6,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-05-15T06:22:06Z",
|
||||
"updated_at": "2024-05-15T06:36:26Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 1928,
|
||||
"watchers_count": 1928,
|
||||
"stargazers_count": 1927,
|
||||
"watchers_count": 1927,
|
||||
"has_discussions": false,
|
||||
"forks_count": 239,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 239,
|
||||
"watchers": 1928,
|
||||
"watchers": 1927,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 602,
|
||||
"watchers_count": 602,
|
||||
"has_discussions": false,
|
||||
"forks_count": 131,
|
||||
"forks_count": 133,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 131,
|
||||
"forks": 133,
|
||||
"watchers": 602,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
|
@ -253,10 +253,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-15T10:38:27Z",
|
||||
"updated_at": "2024-03-31T15:30:17Z",
|
||||
"updated_at": "2024-05-15T10:16:16Z",
|
||||
"pushed_at": "2024-03-17T21:43:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -265,7 +265,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
32
2024/CVE-2024-22026.json
Normal file
32
2024/CVE-2024-22026.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 800980981,
|
||||
"name": "CVE-2024-22026",
|
||||
"full_name": "securekomodo\/CVE-2024-22026",
|
||||
"owner": {
|
||||
"login": "securekomodo",
|
||||
"id": 4809643,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4809643?v=4",
|
||||
"html_url": "https:\/\/github.com\/securekomodo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/securekomodo\/CVE-2024-22026",
|
||||
"description": "Exploit POC for CVE-2024-22026 affecting Ivanti EPMM \"MobileIron Core\"",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-15T11:20:45Z",
|
||||
"updated_at": "2024-05-15T11:40:32Z",
|
||||
"pushed_at": "2024-05-15T11:40:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "POC for CVE-2024-27804",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T14:17:06Z",
|
||||
"updated_at": "2024-05-15T06:12:51Z",
|
||||
"updated_at": "2024-05-15T11:44:10Z",
|
||||
"pushed_at": "2024-05-14T14:55:23Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 50,
|
||||
"forks": 13,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -198,10 +198,10 @@
|
|||
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T14:21:49Z",
|
||||
"updated_at": "2024-05-15T06:25:15Z",
|
||||
"pushed_at": "2024-05-14T20:08:41Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"updated_at": "2024-05-15T11:30:24Z",
|
||||
"pushed_at": "2024-05-15T09:19:27Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -213,6 +213,7 @@
|
|||
"backdoors",
|
||||
"cve",
|
||||
"cve-2024-27956",
|
||||
"exploit",
|
||||
"hack",
|
||||
"hacking",
|
||||
"html",
|
||||
|
@ -221,7 +222,6 @@
|
|||
"rce",
|
||||
"reverse-shell",
|
||||
"shell",
|
||||
"web",
|
||||
"website",
|
||||
"windows",
|
||||
"wordpress",
|
||||
|
@ -230,8 +230,38 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 800894301,
|
||||
"name": "CVE-2024-27956-RCE-File-Package",
|
||||
"full_name": "W3BW\/CVE-2024-27956-RCE-File-Package",
|
||||
"owner": {
|
||||
"login": "W3BW",
|
||||
"id": 169884248,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169884248?v=4",
|
||||
"html_url": "https:\/\/github.com\/W3BW"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/W3BW\/CVE-2024-27956-RCE-File-Package",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-05-15T07:48:54Z",
|
||||
"updated_at": "2024-05-15T08:11:52Z",
|
||||
"pushed_at": "2024-05-15T08:11:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-07T23:03:55Z",
|
||||
"updated_at": "2024-05-13T04:54:47Z",
|
||||
"updated_at": "2024-05-15T07:27:30Z",
|
||||
"pushed_at": "2024-04-11T01:38:55Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -133,19 +133,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-04-14T15:16:16Z",
|
||||
"updated_at": "2024-05-12T11:58:50Z",
|
||||
"updated_at": "2024-05-15T10:06:01Z",
|
||||
"pushed_at": "2024-04-14T15:20:34Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
14
README.md
14
README.md
|
@ -758,6 +758,9 @@
|
|||
|
||||
- [0dteam/CVE-2024-22024](https://github.com/0dteam/CVE-2024-22024)
|
||||
|
||||
### CVE-2024-22026
|
||||
- [securekomodo/CVE-2024-22026](https://github.com/securekomodo/CVE-2024-22026)
|
||||
|
||||
### CVE-2024-22145
|
||||
- [RandomRobbieBF/CVE-2024-22145](https://github.com/RandomRobbieBF/CVE-2024-22145)
|
||||
|
||||
|
@ -1558,6 +1561,7 @@
|
|||
- [k3ppf0r/CVE-2024-27956](https://github.com/k3ppf0r/CVE-2024-27956)
|
||||
- [nancyariah4/CVE-2024-27956](https://github.com/nancyariah4/CVE-2024-27956)
|
||||
- [AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956](https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956)
|
||||
- [W3BW/CVE-2024-27956-RCE-File-Package](https://github.com/W3BW/CVE-2024-27956-RCE-File-Package)
|
||||
|
||||
### CVE-2024-27971
|
||||
- [truonghuuphuc/CVE-2024-27971-Note](https://github.com/truonghuuphuc/CVE-2024-27971-Note)
|
||||
|
@ -2706,7 +2710,6 @@
|
|||
</code>
|
||||
|
||||
- [vpxuser/CVE-2023-3710-POC](https://github.com/vpxuser/CVE-2023-3710-POC)
|
||||
- [Mahdi22228/CVE-2023-3710](https://github.com/Mahdi22228/CVE-2023-3710)
|
||||
|
||||
### CVE-2023-3711 (2023-09-12)
|
||||
|
||||
|
@ -3947,7 +3950,6 @@
|
|||
- [Boogipop/CVE-2023-22527-Godzilla-MEMSHELL](https://github.com/Boogipop/CVE-2023-22527-Godzilla-MEMSHELL)
|
||||
- [M0untainShley/CVE-2023-22527-MEMSHELL](https://github.com/M0untainShley/CVE-2023-22527-MEMSHELL)
|
||||
- [vulncheck-oss/cve-2023-22527](https://github.com/vulncheck-oss/cve-2023-22527)
|
||||
- [ttate10/CVE-2023-22527](https://github.com/ttate10/CVE-2023-22527)
|
||||
|
||||
### CVE-2023-22551 (2023-01-01)
|
||||
|
||||
|
@ -19910,6 +19912,7 @@
|
|||
</code>
|
||||
|
||||
- [motikan2010/CVE-2021-34646](https://github.com/motikan2010/CVE-2021-34646)
|
||||
- [0xB455/CVE-2021-34646](https://github.com/0xB455/CVE-2021-34646)
|
||||
|
||||
### CVE-2021-34730 (2021-08-18)
|
||||
|
||||
|
@ -34440,6 +34443,13 @@
|
|||
- [tin-z/CVE-2018-14714-POC](https://github.com/tin-z/CVE-2018-14714-POC)
|
||||
- [sunn1day/CVE-2018-14714-POC](https://github.com/sunn1day/CVE-2018-14714-POC)
|
||||
|
||||
### CVE-2018-14716 (2018-08-06)
|
||||
|
||||
<code>A Server Side Template Injection (SSTI) was discovered in the SEOmatic plugin before 3.1.4 for Craft CMS, because requests that don't match any elements incorrectly generate the canonicalUrl, and can lead to execution of Twig code.
|
||||
</code>
|
||||
|
||||
- [0xB455/CVE-2018-14716](https://github.com/0xB455/CVE-2018-14716)
|
||||
|
||||
### CVE-2018-14729 (2019-05-22)
|
||||
|
||||
<code>The database backup feature in upload/source/admincp/admincp_db.php in Discuz! 2.5 and 3.4 allows remote attackers to execute arbitrary PHP code.
|
||||
|
|
Loading…
Reference in a new issue