mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/08/10 18:29:15
This commit is contained in:
parent
68763fa1da
commit
f67662b8a3
30 changed files with 165 additions and 118 deletions
|
@ -395,6 +395,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -452,7 +452,7 @@
|
|||
"stargazers_count": 841,
|
||||
"watchers_count": 841,
|
||||
"has_discussions": false,
|
||||
"forks_count": 426,
|
||||
"forks_count": 425,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -462,7 +462,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 426,
|
||||
"forks": 425,
|
||||
"watchers": 841,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "an RCE (remote command execution) approach of CVE-2018-7750",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-06T10:01:13Z",
|
||||
"updated_at": "2024-07-16T19:04:08Z",
|
||||
"updated_at": "2024-08-10T12:39:20Z",
|
||||
"pushed_at": "2018-11-06T10:10:31Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 23,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-27T06:30:32Z",
|
||||
"updated_at": "2024-06-17T17:48:19Z",
|
||||
"updated_at": "2024-08-10T14:59:01Z",
|
||||
"pushed_at": "2018-12-30T11:53:08Z",
|
||||
"stargazers_count": 334,
|
||||
"watchers_count": 334,
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"has_discussions": false,
|
||||
"forks_count": 108,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 108,
|
||||
"watchers": 334,
|
||||
"watchers": 332,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-08T20:04:56Z",
|
||||
"updated_at": "2024-02-24T11:42:08Z",
|
||||
"updated_at": "2024-08-10T14:27:36Z",
|
||||
"pushed_at": "2018-08-08T20:12:20Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 114,
|
||||
"watchers": 115,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-08-10T03:40:52Z",
|
||||
"updated_at": "2024-08-10T14:59:06Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4080,
|
||||
"watchers_count": 4080,
|
||||
"stargazers_count": 4079,
|
||||
"watchers_count": 4079,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1087,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1087,
|
||||
"watchers": 4080,
|
||||
"watchers": 4079,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-08-10T03:40:52Z",
|
||||
"updated_at": "2024-08-10T14:59:06Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4080,
|
||||
"watchers_count": 4080,
|
||||
"stargazers_count": 4079,
|
||||
"watchers_count": 4079,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1087,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1087,
|
||||
"watchers": 4080,
|
||||
"watchers": 4079,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-15T17:32:24Z",
|
||||
"updated_at": "2024-04-16T12:34:59Z",
|
||||
"updated_at": "2024-08-10T14:03:15Z",
|
||||
"pushed_at": "2021-01-23T01:25:22Z",
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 140,
|
||||
"watchers": 141,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-25T17:14:38Z",
|
||||
"updated_at": "2024-08-02T01:43:25Z",
|
||||
"updated_at": "2024-08-10T18:10:31Z",
|
||||
"pushed_at": "2021-07-09T19:38:41Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 172,
|
||||
"watchers": 173,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Confluence Server Webwork OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T07:15:17Z",
|
||||
"updated_at": "2024-08-06T15:58:12Z",
|
||||
"updated_at": "2024-08-10T18:06:44Z",
|
||||
"pushed_at": "2021-12-03T22:09:31Z",
|
||||
"stargazers_count": 306,
|
||||
"watchers_count": 306,
|
||||
"stargazers_count": 307,
|
||||
"watchers_count": 307,
|
||||
"has_discussions": false,
|
||||
"forks_count": 81,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 81,
|
||||
"watchers": 306,
|
||||
"watchers": 307,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -1950,10 +1950,10 @@
|
|||
"description": "Proof of concept for pwnkit vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T14:43:57Z",
|
||||
"updated_at": "2024-05-10T10:44:07Z",
|
||||
"updated_at": "2024-08-10T12:59:58Z",
|
||||
"pushed_at": "2023-01-12T19:23:29Z",
|
||||
"stargazers_count": 335,
|
||||
"watchers_count": 335,
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -1962,7 +1962,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 335,
|
||||
"watchers": 336,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -10123,7 +10123,7 @@
|
|||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -10134,7 +10134,7 @@
|
|||
"vmsa-2021-0028"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"forks": 39,
|
||||
"watchers": 203,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-32947 walkthough and demo",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-17T08:21:47Z",
|
||||
"updated_at": "2024-08-07T04:18:21Z",
|
||||
"updated_at": "2024-08-10T14:33:07Z",
|
||||
"pushed_at": "2023-09-18T03:04:48Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 147,
|
||||
"watchers": 149,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "POC of CVE-2022-36537",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-09T14:15:52Z",
|
||||
"updated_at": "2024-07-17T14:47:45Z",
|
||||
"updated_at": "2024-08-10T17:53:16Z",
|
||||
"pushed_at": "2023-10-18T02:01:03Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -67,7 +67,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -75,10 +75,10 @@
|
|||
"description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-25T00:41:45Z",
|
||||
"updated_at": "2023-10-24T17:46:48Z",
|
||||
"updated_at": "2024-08-10T17:51:51Z",
|
||||
"pushed_at": "2023-09-25T00:48:41Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -87,7 +87,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "VM Escape for Parallels Desktop <18.1.1",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-05T14:11:18Z",
|
||||
"updated_at": "2024-04-02T17:41:01Z",
|
||||
"updated_at": "2024-08-10T17:57:23Z",
|
||||
"pushed_at": "2023-05-07T13:24:23Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -64,7 +64,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-04T07:48:13Z",
|
||||
"updated_at": "2024-07-21T00:51:09Z",
|
||||
"updated_at": "2024-08-10T14:49:56Z",
|
||||
"pushed_at": "2024-01-08T03:34:51Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 124,
|
||||
"watchers": 125,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-05-13T19:40:43Z",
|
||||
"updated_at": "2023-05-18T01:12:48Z",
|
||||
"updated_at": "2024-08-10T17:51:58Z",
|
||||
"pushed_at": "2023-05-13T21:56:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-05-03T15:56:04Z",
|
||||
"updated_at": "2024-06-17T10:34:46Z",
|
||||
"updated_at": "2024-08-10T17:51:19Z",
|
||||
"pushed_at": "2023-05-03T15:58:56Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-29922 Batch detection script",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-23T06:06:50Z",
|
||||
"updated_at": "2024-06-25T01:04:31Z",
|
||||
"updated_at": "2024-08-10T17:53:39Z",
|
||||
"pushed_at": "2023-05-23T06:48:40Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Camaleon CMS v2.7.0 contain a Server-Side Template Injection (SSTI) vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-25T12:35:27Z",
|
||||
"updated_at": "2024-01-23T19:51:16Z",
|
||||
"updated_at": "2024-08-10T17:54:07Z",
|
||||
"pushed_at": "2023-05-26T12:07:24Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "POC for CVE-2023-34362 affecting MOVEit Transfer",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-09T18:44:22Z",
|
||||
"updated_at": "2023-08-22T15:04:35Z",
|
||||
"updated_at": "2024-08-10T17:57:09Z",
|
||||
"pushed_at": "2023-07-09T18:48:21Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -156,7 +156,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -736,10 +736,10 @@
|
|||
"description": "CVE-2023-38831 WinRaR Exploit Generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-12T14:07:00Z",
|
||||
"updated_at": "2024-02-07T15:04:56Z",
|
||||
"updated_at": "2024-08-10T17:51:53Z",
|
||||
"pushed_at": "2023-09-12T16:39:44Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -754,7 +754,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 1045,
|
||||
"watchers_count": 1045,
|
||||
"has_discussions": false,
|
||||
"forks_count": 176,
|
||||
"forks_count": 177,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 176,
|
||||
"forks": 177,
|
||||
"watchers": 1045,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-08-10T11:50:11Z",
|
||||
"updated_at": "2024-08-10T14:45:22Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2204,
|
||||
"watchers_count": 2204,
|
||||
"stargazers_count": 2205,
|
||||
"watchers_count": 2205,
|
||||
"has_discussions": false,
|
||||
"forks_count": 288,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 288,
|
||||
"watchers": 2204,
|
||||
"watchers": 2205,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
40
2024/CVE-2024-3105.json
Normal file
40
2024/CVE-2024-3105.json
Normal file
|
@ -0,0 +1,40 @@
|
|||
[
|
||||
{
|
||||
"id": 840743710,
|
||||
"name": "CVE-2024-3105-PoC",
|
||||
"full_name": "hunThubSpace\/CVE-2024-3105-PoC",
|
||||
"owner": {
|
||||
"login": "hunThubSpace",
|
||||
"id": 49031710,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49031710?v=4",
|
||||
"html_url": "https:\/\/github.com\/hunThubSpace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hunThubSpace\/CVE-2024-3105-PoC",
|
||||
"description": "A PoC Exploit for CVE-2024-3105 - The Woody code snippets – Insert Header Footer Code, AdSense Ads plugin for WordPress Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-10T14:52:44Z",
|
||||
"updated_at": "2024-08-10T15:25:48Z",
|
||||
"pushed_at": "2024-08-10T15:22:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"bugbounty",
|
||||
"cve",
|
||||
"cve-2024-3105",
|
||||
"ethical-hacking",
|
||||
"exploit",
|
||||
"penetration-testing",
|
||||
"web"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "原文已被作者删除,备份用,非原创,EXP & POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-09T01:18:48Z",
|
||||
"updated_at": "2024-08-10T12:09:31Z",
|
||||
"updated_at": "2024-08-10T18:32:56Z",
|
||||
"pushed_at": "2024-08-09T17:18:10Z",
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"has_discussions": false,
|
||||
"forks_count": 174,
|
||||
"forks_count": 178,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 174,
|
||||
"watchers": 232,
|
||||
"forks": 178,
|
||||
"watchers": 247,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "RDL的堆溢出导致的RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-09T05:00:44Z",
|
||||
"updated_at": "2024-08-10T11:52:37Z",
|
||||
"updated_at": "2024-08-10T18:22:06Z",
|
||||
"pushed_at": "2024-08-09T10:12:42Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 106,
|
||||
"watchers": 110,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -108,13 +108,13 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
@ -193,10 +193,10 @@
|
|||
"description": "检测RDL服务是否运行,快速排查受影响资产",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-10T01:10:06Z",
|
||||
"updated_at": "2024-08-10T04:27:16Z",
|
||||
"updated_at": "2024-08-10T12:53:25Z",
|
||||
"pushed_at": "2024-08-10T02:19:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -253,19 +253,19 @@
|
|||
"description": "基于135端口检测目标是否存在CVE-2024-38077漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-10T09:31:55Z",
|
||||
"updated_at": "2024-08-10T10:05:54Z",
|
||||
"updated_at": "2024-08-10T12:49:43Z",
|
||||
"pushed_at": "2024-08-10T09:48:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -14,17 +14,17 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-08-05T16:26:18Z",
|
||||
"updated_at": "2024-08-07T18:33:15Z",
|
||||
"pushed_at": "2024-08-05T16:41:15Z",
|
||||
"pushed_at": "2024-08-10T17:38:53Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -502,6 +502,13 @@
|
|||
- [DANO-AMP/CVE-2024-3094](https://github.com/DANO-AMP/CVE-2024-3094)
|
||||
- [robertdfrench/ifuncd-up](https://github.com/robertdfrench/ifuncd-up)
|
||||
|
||||
### CVE-2024-3105 (2024-06-15)
|
||||
|
||||
<code>The Woody code snippets – Insert Header Footer Code, AdSense Ads plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.5.0 via the 'insert_php' shortcode. This is due to the plugin not restricting the usage of the functionality to high level authorized users. This makes it possible for authenticated attackers, with contributor-level access and above, to execute code on the server.
|
||||
</code>
|
||||
|
||||
- [hunThubSpace/CVE-2024-3105-PoC](https://github.com/hunThubSpace/CVE-2024-3105-PoC)
|
||||
|
||||
### CVE-2024-3116 (2024-04-04)
|
||||
|
||||
<code>pgAdmin <= 8.4 is affected by a Remote Code Execution (RCE) vulnerability through the validate binary path API. This vulnerability allows attackers to execute arbitrary code on the server hosting PGAdmin, posing a severe risk to the database management system's integrity and the security of the underlying data.\n
|
||||
|
|
Loading…
Reference in a new issue