mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/20 00:31:35
This commit is contained in:
parent
e8c88987ed
commit
f6a177e14b
37 changed files with 291 additions and 99 deletions
|
@ -107,10 +107,10 @@
|
|||
"description": "CVE-2013-6282 proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-19T16:14:18Z",
|
||||
"updated_at": "2024-08-12T19:26:40Z",
|
||||
"updated_at": "2024-12-19T21:27:06Z",
|
||||
"pushed_at": "2016-12-19T16:19:07Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2024-08-12T19:29:24Z",
|
||||
"updated_at": "2024-12-19T21:05:15Z",
|
||||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2024-08-12T19:29:24Z",
|
||||
"updated_at": "2024-12-19T21:05:15Z",
|
||||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -45,8 +45,8 @@
|
|||
"description": "A tool for retrieving login credentials from Netwave IP cameras using a memory dump vulnerability (CVE-2018-17240)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-04T21:44:21Z",
|
||||
"updated_at": "2024-12-06T19:44:48Z",
|
||||
"pushed_at": "2024-12-19T09:49:38Z",
|
||||
"updated_at": "2024-12-19T18:16:51Z",
|
||||
"pushed_at": "2024-12-19T18:16:49Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2024-08-12T19:29:24Z",
|
||||
"updated_at": "2024-12-19T21:05:15Z",
|
||||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -81,13 +81,13 @@
|
|||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 6,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2024-08-12T19:29:24Z",
|
||||
"updated_at": "2024-12-19T21:05:15Z",
|
||||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -1077,6 +1077,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -235,6 +235,6 @@
|
|||
"forks": 340,
|
||||
"watchers": 2012,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
"subscribers_count": 38
|
||||
}
|
||||
]
|
|
@ -231,10 +231,10 @@
|
|||
"description": "The exploit is edited to work with different text encodings and Python 3 and is compatible with CMSMS version 2.2.9 and below.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-29T17:59:09Z",
|
||||
"updated_at": "2024-09-06T04:25:46Z",
|
||||
"updated_at": "2024-12-19T23:00:23Z",
|
||||
"pushed_at": "2024-06-09T12:39:47Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2024-08-12T19:29:24Z",
|
||||
"updated_at": "2024-12-19T21:05:15Z",
|
||||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-22T08:36:41Z",
|
||||
"updated_at": "2024-08-12T20:03:59Z",
|
||||
"updated_at": "2024-12-19T19:59:45Z",
|
||||
"pushed_at": "2020-07-23T12:55:28Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-11T22:08:47Z",
|
||||
"updated_at": "2024-12-08T19:58:51Z",
|
||||
"updated_at": "2024-12-19T19:04:27Z",
|
||||
"pushed_at": "2021-10-13T22:32:36Z",
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 134,
|
||||
"forks": 34,
|
||||
"watchers": 135,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "CVE-2021-36955",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-18T07:08:56Z",
|
||||
"updated_at": "2024-11-09T00:56:23Z",
|
||||
"updated_at": "2024-12-19T23:48:56Z",
|
||||
"pushed_at": "2023-08-15T15:42:39Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 13,
|
||||
"forks": 7,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Recursive MMIO VM Escape PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-13T05:33:28Z",
|
||||
"updated_at": "2024-10-04T17:14:10Z",
|
||||
"updated_at": "2024-12-20T00:07:19Z",
|
||||
"pushed_at": "2022-05-13T05:37:41Z",
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 169,
|
||||
"watchers": 170,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -51,10 +51,10 @@
|
|||
"description": "TP-Link Tapo c200 ver <1.1.15 - Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-11T13:56:15Z",
|
||||
"updated_at": "2022-10-09T01:03:06Z",
|
||||
"updated_at": "2024-12-20T00:00:36Z",
|
||||
"pushed_at": "2022-10-08T04:25:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -63,7 +63,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-09T15:53:48Z",
|
||||
"updated_at": "2024-12-05T04:58:09Z",
|
||||
"updated_at": "2024-12-19T23:51:56Z",
|
||||
"pushed_at": "2023-09-27T06:44:27Z",
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 315,
|
||||
"watchers": 317,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
33
2022/CVE-2022-32981.json
Normal file
33
2022/CVE-2022-32981.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 905956447,
|
||||
"name": "CVE-2022-32981",
|
||||
"full_name": "SpiralBL0CK\/CVE-2022-32981",
|
||||
"owner": {
|
||||
"login": "SpiralBL0CK",
|
||||
"id": 25670930,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4",
|
||||
"html_url": "https:\/\/github.com\/SpiralBL0CK",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SpiralBL0CK\/CVE-2022-32981",
|
||||
"description": "poc for CVE-2022-32981 under work",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-19T21:15:39Z",
|
||||
"updated_at": "2024-12-19T21:16:33Z",
|
||||
"pushed_at": "2024-12-19T21:16:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1361,7 +1361,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-09-22T17:17:26Z",
|
||||
"updated_at": "2023-09-22T17:17:44Z",
|
||||
"pushed_at": "2024-11-23T14:18:37Z",
|
||||
"pushed_at": "2024-12-20T00:06:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -77,7 +77,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-04-17T13:36:34Z",
|
||||
"updated_at": "2024-10-30T14:55:15Z",
|
||||
"pushed_at": "2024-12-06T22:29:07Z",
|
||||
"pushed_at": "2024-12-19T22:30:33Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T07:52:29Z",
|
||||
"updated_at": "2024-11-30T03:02:36Z",
|
||||
"updated_at": "2024-12-19T18:47:10Z",
|
||||
"pushed_at": "2024-11-26T08:06:06Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -15,7 +15,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-09-16T09:11:21Z",
|
||||
"updated_at": "2024-11-16T19:51:18Z",
|
||||
"pushed_at": "2024-12-06T18:33:11Z",
|
||||
"pushed_at": "2024-12-19T18:47:09Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-12-19T00:12:41Z",
|
||||
"updated_at": "2024-12-19T19:33:11Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1304,
|
||||
"watchers_count": 1304,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Fortinet FortiClient EMS SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-18T20:50:48Z",
|
||||
"updated_at": "2024-11-27T17:51:55Z",
|
||||
"updated_at": "2024-12-19T22:41:39Z",
|
||||
"pushed_at": "2024-03-20T20:42:41Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "For V8CTF M122",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-25T12:08:54Z",
|
||||
"updated_at": "2024-12-12T23:59:01Z",
|
||||
"updated_at": "2024-12-19T20:53:55Z",
|
||||
"pushed_at": "2024-08-25T12:42:14Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -527,10 +527,10 @@
|
|||
"description": "CVE-2024-24919 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-31T13:11:40Z",
|
||||
"updated_at": "2024-12-06T22:59:11Z",
|
||||
"updated_at": "2024-12-19T23:51:58Z",
|
||||
"pushed_at": "2024-05-31T15:50:57Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -539,7 +539,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
33
2024/CVE-2024-35176.json
Normal file
33
2024/CVE-2024-35176.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 905906674,
|
||||
"name": "CVE-2024-35176",
|
||||
"full_name": "SpiralBL0CK\/CVE-2024-35176",
|
||||
"owner": {
|
||||
"login": "SpiralBL0CK",
|
||||
"id": 25670930,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4",
|
||||
"html_url": "https:\/\/github.com\/SpiralBL0CK",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SpiralBL0CK\/CVE-2024-35176",
|
||||
"description": "CVE-2024-35176 poc full",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-19T19:01:53Z",
|
||||
"updated_at": "2024-12-20T00:28:19Z",
|
||||
"pushed_at": "2024-12-19T22:16:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-13T19:30:20Z",
|
||||
"updated_at": "2024-12-18T22:50:51Z",
|
||||
"updated_at": "2024-12-19T21:43:46Z",
|
||||
"pushed_at": "2024-11-29T16:56:23Z",
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 239,
|
||||
"watchers": 240,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -265,10 +265,10 @@
|
|||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T18:25:46Z",
|
||||
"updated_at": "2024-12-19T17:05:28Z",
|
||||
"updated_at": "2024-12-19T20:46:08Z",
|
||||
"pushed_at": "2024-08-27T12:22:39Z",
|
||||
"stargazers_count": 636,
|
||||
"watchers_count": 636,
|
||||
"stargazers_count": 637,
|
||||
"watchers_count": 637,
|
||||
"has_discussions": false,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
|
@ -277,7 +277,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 636,
|
||||
"watchers": 637,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
33
2024/CVE-2024-39908.json
Normal file
33
2024/CVE-2024-39908.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 905905924,
|
||||
"name": "CVE-2024-39908",
|
||||
"full_name": "SpiralBL0CK\/CVE-2024-39908",
|
||||
"owner": {
|
||||
"login": "SpiralBL0CK",
|
||||
"id": 25670930,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4",
|
||||
"html_url": "https:\/\/github.com\/SpiralBL0CK",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SpiralBL0CK\/CVE-2024-39908",
|
||||
"description": "CVE-2024-39908 full poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-19T18:59:52Z",
|
||||
"updated_at": "2024-12-19T19:00:06Z",
|
||||
"pushed_at": "2024-12-19T19:00:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-18T01:06:54Z",
|
||||
"updated_at": "2024-12-18T13:25:59Z",
|
||||
"updated_at": "2024-12-19T23:05:45Z",
|
||||
"pushed_at": "2024-12-18T01:17:11Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
33
2024/CVE-2024-50944.json
Normal file
33
2024/CVE-2024-50944.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 905989849,
|
||||
"name": "CVE-2024-50944",
|
||||
"full_name": "AbdullahAlmutawa\/CVE-2024-50944",
|
||||
"owner": {
|
||||
"login": "AbdullahAlmutawa",
|
||||
"id": 53648024,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53648024?v=4",
|
||||
"html_url": "https:\/\/github.com\/AbdullahAlmutawa",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AbdullahAlmutawa\/CVE-2024-50944",
|
||||
"description": "Integer Overflow in Cart Logic in SimplCommerce allows remote attackers to manipulate product quantities and total prices via crafted inputs that exploit insufficient validation of the quantity parameter.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-19T23:33:21Z",
|
||||
"updated_at": "2024-12-20T00:29:43Z",
|
||||
"pushed_at": "2024-12-20T00:29:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 12,
|
||||
"watchers": 76,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": true,
|
||||
"forks_count": 10,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -37,7 +37,7 @@
|
|||
"zero-day-vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 9,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
33
2024/CVE-2024-53476.json
Normal file
33
2024/CVE-2024-53476.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 906000848,
|
||||
"name": "CVE-2024-53476",
|
||||
"full_name": "AbdullahAlmutawa\/CVE-2024-53476",
|
||||
"owner": {
|
||||
"login": "AbdullahAlmutawa",
|
||||
"id": 53648024,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53648024?v=4",
|
||||
"html_url": "https:\/\/github.com\/AbdullahAlmutawa",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AbdullahAlmutawa\/CVE-2024-53476",
|
||||
"description": "SimplCommerce is affected by a race condition vulnerability in the checkout logic, allowing multiple users to purchase more products than are in stock via simultaneous checkout requests.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-20T00:27:22Z",
|
||||
"updated_at": "2024-12-20T00:27:25Z",
|
||||
"pushed_at": "2024-12-20T00:27:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"description": "CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-54679)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-06T06:02:34Z",
|
||||
"updated_at": "2024-12-12T13:07:15Z",
|
||||
"updated_at": "2024-12-19T20:35:12Z",
|
||||
"pushed_at": "2024-12-06T06:19:42Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
27
README.md
27
README.md
|
@ -5216,6 +5216,13 @@
|
|||
|
||||
- [Ozozuz/Ozozuz-IBM-Security-Verify-CVE-2024-35133](https://github.com/Ozozuz/Ozozuz-IBM-Security-Verify-CVE-2024-35133)
|
||||
|
||||
### CVE-2024-35176 (2024-05-16)
|
||||
|
||||
<code> REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.
|
||||
</code>
|
||||
|
||||
- [SpiralBL0CK/CVE-2024-35176](https://github.com/SpiralBL0CK/CVE-2024-35176)
|
||||
|
||||
### CVE-2024-35205 (-)
|
||||
|
||||
<code>The WPS Office (aka cn.wps.moffice_eng) application before 17.0.0 for Android fails to properly sanitize file names before processing them through external application interactions, leading to a form of path traversal. This potentially enables any application to dispatch a crafted library file, aiming to overwrite an existing native library utilized by WPS Office. Successful exploitation could result in the execution of arbitrary commands under the guise of WPS Office's application ID.
|
||||
|
@ -5899,6 +5906,13 @@
|
|||
|
||||
- [ph1ns/CVE-2024-39844](https://github.com/ph1ns/CVE-2024-39844)
|
||||
|
||||
### CVE-2024-39908 (2024-07-16)
|
||||
|
||||
<code> REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilities. The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. Users are advised to upgrade. Users unable to upgrade should avoid parsing untrusted XML strings.
|
||||
</code>
|
||||
|
||||
- [SpiralBL0CK/CVE-2024-39908](https://github.com/SpiralBL0CK/CVE-2024-39908)
|
||||
|
||||
### CVE-2024-39929 (2024-07-04)
|
||||
|
||||
<code>Exim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users.
|
||||
|
@ -7227,6 +7241,9 @@
|
|||
|
||||
- [Wh1teSnak3/CVE-2024-50849](https://github.com/Wh1teSnak3/CVE-2024-50849)
|
||||
|
||||
### CVE-2024-50944
|
||||
- [AbdullahAlmutawa/CVE-2024-50944](https://github.com/AbdullahAlmutawa/CVE-2024-50944)
|
||||
|
||||
### CVE-2024-50961
|
||||
- [fdzdev/CVE-2024-50961](https://github.com/fdzdev/CVE-2024-50961)
|
||||
|
||||
|
@ -7518,6 +7535,9 @@
|
|||
|
||||
- [ThottySploity/CVE-2024-53376](https://github.com/ThottySploity/CVE-2024-53376)
|
||||
|
||||
### CVE-2024-53476
|
||||
- [AbdullahAlmutawa/CVE-2024-53476](https://github.com/AbdullahAlmutawa/CVE-2024-53476)
|
||||
|
||||
### CVE-2024-53617 (2024-12-02)
|
||||
|
||||
<code>A Cross Site Scripting vulnerability in LibrePhotos before commit 32237 allows attackers to takeover any account via uploading an HTML file on behalf of the admin user using IDOR in file upload.
|
||||
|
@ -20558,6 +20578,13 @@
|
|||
|
||||
- [asahilina/agx-exploit](https://github.com/asahilina/agx-exploit)
|
||||
|
||||
### CVE-2022-32981 (2022-06-10)
|
||||
|
||||
<code>An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers.
|
||||
</code>
|
||||
|
||||
- [SpiralBL0CK/CVE-2022-32981](https://github.com/SpiralBL0CK/CVE-2022-32981)
|
||||
|
||||
### CVE-2022-32988 (2022-06-30)
|
||||
|
||||
<code>Cross Site Scripting (XSS) vulnerability in router Asus DSL-N14U-B1 1.1.2.3_805 via the "*list" parameters (e.g. filter_lwlist, keyword_rulelist, etc) in every ".asp" page containing a list of stored strings. The following asp files are affected: (1) cgi-bin/APP_Installation.asp, (2) cgi-bin/Advanced_ACL_Content.asp, (3) cgi-bin/Advanced_ADSL_Content.asp, (4) cgi-bin/Advanced_ASUSDDNS_Content.asp, (5) cgi-bin/Advanced_AiDisk_ftp.asp, (6) cgi-bin/Advanced_AiDisk_samba.asp, (7) cgi-bin/Advanced_DSL_Content.asp, (8) cgi-bin/Advanced_Firewall_Content.asp, (9) cgi-bin/Advanced_FirmwareUpgrade_Content.asp, (10) cgi-bin/Advanced_GWStaticRoute_Content.asp, (11) cgi-bin/Advanced_IPTV_Content.asp, (12) cgi-bin/Advanced_IPv6_Content.asp, (13) cgi-bin/Advanced_KeywordFilter_Content.asp, (14) cgi-bin/Advanced_LAN_Content.asp, (15) cgi-bin/Advanced_Modem_Content.asp, (16) cgi-bin/Advanced_PortTrigger_Content.asp, (17) cgi-bin/Advanced_QOSUserPrio_Content.asp, (18) cgi-bin/Advanced_QOSUserRules_Content.asp, (19) cgi-bin/Advanced_SettingBackup_Content.asp, (20) cgi-bin/Advanced_System_Content.asp, (21) cgi-bin/Advanced_URLFilter_Content.asp, (22) cgi-bin/Advanced_VPN_PPTP.asp, (23) cgi-bin/Advanced_VirtualServer_Content.asp, (24) cgi-bin/Advanced_WANPort_Content.asp, (25) cgi-bin/Advanced_WAdvanced_Content.asp, (26) cgi-bin/Advanced_WMode_Content.asp, (27) cgi-bin/Advanced_WWPS_Content.asp, (28) cgi-bin/Advanced_Wireless_Content.asp, (29) cgi-bin/Bandwidth_Limiter.asp, (30) cgi-bin/Guest_network.asp, (31) cgi-bin/Main_AccessLog_Content.asp, (32) cgi-bin/Main_AdslStatus_Content.asp, (33) cgi-bin/Main_Spectrum_Content.asp, (34) cgi-bin/Main_WebHistory_Content.asp, (35) cgi-bin/ParentalControl.asp, (36) cgi-bin/QIS_wizard.asp, (37) cgi-bin/QoS_EZQoS.asp, (38) cgi-bin/aidisk.asp, (39) cgi-bin/aidisk/Aidisk-1.asp, (40) cgi-bin/aidisk/Aidisk-2.asp, (41) cgi-bin/aidisk/Aidisk-3.asp, (42) cgi-bin/aidisk/Aidisk-4.asp, (43) cgi-bin/blocking.asp, (44) cgi-bin/cloud_main.asp, (45) cgi-bin/cloud_router_sync.asp, (46) cgi-bin/cloud_settings.asp, (47) cgi-bin/cloud_sync.asp, (48) cgi-bin/device-map/DSL_dashboard.asp, (49) cgi-bin/device-map/clients.asp, (50) cgi-bin/device-map/disk.asp, (51) cgi-bin/device-map/internet.asp, (52) cgi-bin/error_page.asp, (53) cgi-bin/index.asp, (54) cgi-bin/index2.asp, (55) cgi-bin/qis/QIS_PTM_manual_setting.asp, (56) cgi-bin/qis/QIS_admin_pass.asp, (57) cgi-bin/qis/QIS_annex_setting.asp, (58) cgi-bin/qis/QIS_bridge_cfg_tmp.asp, (59) cgi-bin/qis/QIS_detect.asp, (60) cgi-bin/qis/QIS_finish.asp, (61) cgi-bin/qis/QIS_ipoa_cfg_tmp.asp, (62) cgi-bin/qis/QIS_manual_setting.asp, (63) cgi-bin/qis/QIS_mer_cfg.asp, (64) cgi-bin/qis/QIS_mer_cfg_tmp.asp, (65) cgi-bin/qis/QIS_ppp_cfg.asp, (66) cgi-bin/qis/QIS_ppp_cfg_tmp.asp, (67) cgi-bin/qis/QIS_wireless.asp, (68) cgi-bin/query_wan_status.asp, (69) cgi-bin/query_wan_status2.asp, and (70) cgi-bin/start_apply.asp.
|
||||
|
|
Loading…
Reference in a new issue