mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/06/08 18:29:02
This commit is contained in:
parent
9ec7b56823
commit
f91d28657a
31 changed files with 174 additions and 136 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2024-06-02T15:58:15Z",
|
||||
"updated_at": "2024-06-08T14:14:11Z",
|
||||
"pushed_at": "2023-01-22T09:39:45Z",
|
||||
"stargazers_count": 385,
|
||||
"watchers_count": 385,
|
||||
"stargazers_count": 386,
|
||||
"watchers_count": 386,
|
||||
"has_discussions": false,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 385,
|
||||
"watchers": 386,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2008-4250 Conficker",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-11T15:27:50Z",
|
||||
"updated_at": "2024-06-08T11:47:45Z",
|
||||
"updated_at": "2024-06-08T15:34:01Z",
|
||||
"pushed_at": "2024-06-05T02:26:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -36,6 +36,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-25T06:11:54Z",
|
||||
"updated_at": "2023-09-28T10:46:55Z",
|
||||
"updated_at": "2024-06-08T13:52:08Z",
|
||||
"pushed_at": "2017-12-25T06:21:23Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 24,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -258,8 +258,8 @@
|
|||
"description": "wp-includes\/rest-api\/endpoints\/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json\/wp\/v2\/users request.",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T21:19:33Z",
|
||||
"updated_at": "2024-05-28T16:37:48Z",
|
||||
"pushed_at": "2024-05-28T16:37:45Z",
|
||||
"updated_at": "2024-06-08T16:06:29Z",
|
||||
"pushed_at": "2024-06-08T16:06:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
File diff suppressed because one or more lines are too long
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T06:06:36Z",
|
||||
"updated_at": "2020-11-25T07:32:06Z",
|
||||
"updated_at": "2024-06-08T16:40:10Z",
|
||||
"pushed_at": "2020-09-08T06:09:54Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -1690,10 +1690,10 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2024-05-08T08:30:09Z",
|
||||
"updated_at": "2024-06-08T18:17:00Z",
|
||||
"pushed_at": "2022-03-30T14:02:04Z",
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -1702,7 +1702,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 248,
|
||||
"watchers": 247,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -415,13 +415,13 @@
|
|||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"forks": 111,
|
||||
"watchers": 429,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "海康威视RCE漏洞 批量检测和利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-03T17:27:59Z",
|
||||
"updated_at": "2024-06-08T05:13:23Z",
|
||||
"updated_at": "2024-06-08T12:44:06Z",
|
||||
"pushed_at": "2022-08-05T19:57:30Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -148,7 +148,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 126,
|
||||
"watchers": 127,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -369,10 +369,10 @@
|
|||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2024-06-04T09:54:01Z",
|
||||
"updated_at": "2024-06-08T17:30:18Z",
|
||||
"pushed_at": "2024-04-26T03:16:26Z",
|
||||
"stargazers_count": 1098,
|
||||
"watchers_count": 1098,
|
||||
"stargazers_count": 1097,
|
||||
"watchers_count": 1097,
|
||||
"has_discussions": false,
|
||||
"forks_count": 528,
|
||||
"allow_forking": true,
|
||||
|
@ -383,7 +383,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 528,
|
||||
"watchers": 1098,
|
||||
"watchers": 1097,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
@ -1842,7 +1842,7 @@
|
|||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1857,7 +1857,7 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 6,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -1314,10 +1314,10 @@
|
|||
"description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947) 注入哥斯拉内存马",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-16T15:27:41Z",
|
||||
"updated_at": "2024-04-05T15:00:35Z",
|
||||
"updated_at": "2024-06-08T13:34:17Z",
|
||||
"pushed_at": "2022-05-16T15:33:37Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -1326,7 +1326,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 51,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2024-06-05T04:48:04Z",
|
||||
"updated_at": "2024-06-08T17:16:48Z",
|
||||
"pushed_at": "2023-08-02T09:35:14Z",
|
||||
"stargazers_count": 870,
|
||||
"watchers_count": 870,
|
||||
"stargazers_count": 871,
|
||||
"watchers_count": 871,
|
||||
"has_discussions": false,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 870,
|
||||
"watchers": 871,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "GameOver(lay) Ubuntu Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T22:02:42Z",
|
||||
"updated_at": "2024-05-31T16:07:12Z",
|
||||
"updated_at": "2024-06-08T15:39:49Z",
|
||||
"pushed_at": "2023-10-09T22:44:21Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 101,
|
||||
"watchers": 102,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Chamilo CVE-2023-34960 Batch scan\/exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-09T11:24:33Z",
|
||||
"updated_at": "2024-04-12T05:37:26Z",
|
||||
"updated_at": "2024-06-08T14:47:14Z",
|
||||
"pushed_at": "2023-07-09T11:57:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-15T12:14:18Z",
|
||||
"updated_at": "2024-06-02T16:14:45Z",
|
||||
"updated_at": "2024-06-08T16:26:21Z",
|
||||
"pushed_at": "2024-03-08T12:57:53Z",
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 186,
|
||||
"watchers": 187,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-06-08T02:49:35Z",
|
||||
"updated_at": "2024-06-08T17:42:51Z",
|
||||
"pushed_at": "2024-05-29T14:55:57Z",
|
||||
"stargazers_count": 782,
|
||||
"watchers_count": 782,
|
||||
"stargazers_count": 783,
|
||||
"watchers_count": 783,
|
||||
"has_discussions": false,
|
||||
"forks_count": 138,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 138,
|
||||
"watchers": 782,
|
||||
"watchers": 783,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-02T14:15:27Z",
|
||||
"updated_at": "2024-06-07T14:56:24Z",
|
||||
"updated_at": "2024-06-08T15:29:46Z",
|
||||
"pushed_at": "2024-06-03T05:03:46Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 2086,
|
||||
"watchers_count": 2086,
|
||||
"has_discussions": false,
|
||||
"forks_count": 266,
|
||||
"forks_count": 267,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 266,
|
||||
"forks": 267,
|
||||
"watchers": 2086,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T15:17:59Z",
|
||||
"updated_at": "2024-06-08T10:08:11Z",
|
||||
"updated_at": "2024-06-08T14:49:37Z",
|
||||
"pushed_at": "2024-02-19T20:00:35Z",
|
||||
"stargazers_count": 627,
|
||||
"watchers_count": 627,
|
||||
"stargazers_count": 628,
|
||||
"watchers_count": 628,
|
||||
"has_discussions": false,
|
||||
"forks_count": 140,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 140,
|
||||
"watchers": 627,
|
||||
"watchers": 628,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -230,14 +230,14 @@
|
|||
{
|
||||
"id": 809314858,
|
||||
"name": "0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
|
||||
"full_name": "0bl1v10nf0rg0773n\/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
|
||||
"full_name": "ivanbg2004\/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
|
||||
"owner": {
|
||||
"login": "0bl1v10nf0rg0773n",
|
||||
"login": "ivanbg2004",
|
||||
"id": 124943966,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124943966?v=4",
|
||||
"html_url": "https:\/\/github.com\/0bl1v10nf0rg0773n"
|
||||
"html_url": "https:\/\/github.com\/ivanbg2004"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0bl1v10nf0rg0773n\/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
|
||||
"html_url": "https:\/\/github.com\/ivanbg2004\/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
|
||||
"description": "0BL1V10N's CVE-2024-25600 for Bricks Builder (TryHackMe) plugin for WordPress exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-02T10:49:03Z",
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-31T20:11:37Z",
|
||||
"updated_at": "2024-06-08T10:23:23Z",
|
||||
"updated_at": "2024-06-08T16:28:02Z",
|
||||
"pushed_at": "2024-06-08T09:12:43Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -31,8 +31,8 @@
|
|||
"vulnerability-scanners"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 46,
|
||||
"forks": 10,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Telesquare TLR-2005KSH_RCE (CVE-2024-29269) Batch scan\/exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-12T07:36:08Z",
|
||||
"updated_at": "2024-04-12T08:33:10Z",
|
||||
"updated_at": "2024-06-08T14:54:09Z",
|
||||
"pushed_at": "2024-04-12T07:58:16Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1012,10 +1012,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-06-08T04:39:38Z",
|
||||
"updated_at": "2024-06-08T18:17:17Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3470,
|
||||
"watchers_count": 3470,
|
||||
"stargazers_count": 3469,
|
||||
"watchers_count": 3469,
|
||||
"has_discussions": false,
|
||||
"forks_count": 232,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,7 +1024,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 232,
|
||||
"watchers": 3470,
|
||||
"watchers": 3469,
|
||||
"score": 0,
|
||||
"subscribers_count": 39
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Exploit PoC for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T19:33:08Z",
|
||||
"updated_at": "2024-06-07T15:16:59Z",
|
||||
"updated_at": "2024-06-08T14:13:12Z",
|
||||
"pushed_at": "2024-05-19T07:12:00Z",
|
||||
"stargazers_count": 436,
|
||||
"watchers_count": 436,
|
||||
"stargazers_count": 437,
|
||||
"watchers_count": 437,
|
||||
"has_discussions": false,
|
||||
"forks_count": 119,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 119,
|
||||
"watchers": 436,
|
||||
"watchers": 437,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-32640 | Automated SQLi Exploitation PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-16T01:02:32Z",
|
||||
"updated_at": "2024-06-06T00:12:38Z",
|
||||
"updated_at": "2024-06-08T14:42:16Z",
|
||||
"pushed_at": "2024-05-16T21:07:32Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -37,7 +37,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -403,10 +403,10 @@
|
|||
"description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-16T21:24:15Z",
|
||||
"updated_at": "2024-05-08T09:15:12Z",
|
||||
"updated_at": "2024-06-08T15:29:04Z",
|
||||
"pushed_at": "2024-04-17T11:03:32Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -415,7 +415,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-20T10:02:23Z",
|
||||
"updated_at": "2024-06-07T03:28:03Z",
|
||||
"updated_at": "2024-06-08T16:09:28Z",
|
||||
"pushed_at": "2024-06-07T03:28:00Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T05:50:23Z",
|
||||
"updated_at": "2024-06-08T10:21:27Z",
|
||||
"updated_at": "2024-06-08T18:03:03Z",
|
||||
"pushed_at": "2024-06-07T11:49:08Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 49,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -133,10 +133,10 @@
|
|||
"description": "POC & $BASH script for CVE-2024-4577",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:51:39Z",
|
||||
"updated_at": "2024-06-08T12:07:00Z",
|
||||
"updated_at": "2024-06-08T18:11:51Z",
|
||||
"pushed_at": "2024-06-07T18:37:44Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -163,19 +163,19 @@
|
|||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:52:54Z",
|
||||
"updated_at": "2024-06-08T12:17:43Z",
|
||||
"updated_at": "2024-06-08T17:55:28Z",
|
||||
"pushed_at": "2024-06-07T09:53:15Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 53,
|
||||
"forks": 10,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -223,10 +223,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T10:40:37Z",
|
||||
"updated_at": "2024-06-07T20:43:49Z",
|
||||
"updated_at": "2024-06-08T15:34:01Z",
|
||||
"pushed_at": "2024-06-07T15:06:52Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -481,20 +481,20 @@
|
|||
},
|
||||
{
|
||||
"id": 812271703,
|
||||
"name": "CVE-2024-4577-PoC",
|
||||
"full_name": "ZephrFish\/CVE-2024-4577-PoC",
|
||||
"name": "CVE-2024-4577-PHP-RCE",
|
||||
"full_name": "ZephrFish\/CVE-2024-4577-PHP-RCE",
|
||||
"owner": {
|
||||
"login": "ZephrFish",
|
||||
"id": 5783068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZephrFish"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2024-4577-PoC",
|
||||
"description": "PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
|
||||
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2024-4577-PHP-RCE",
|
||||
"description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-08T12:23:35Z",
|
||||
"updated_at": "2024-06-08T12:24:44Z",
|
||||
"pushed_at": "2024-06-08T12:24:41Z",
|
||||
"updated_at": "2024-06-08T15:59:30Z",
|
||||
"pushed_at": "2024-06-08T15:59:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -502,10 +502,47 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2024-4577",
|
||||
"pentest",
|
||||
"php",
|
||||
"poc",
|
||||
"rce-exploit",
|
||||
"redteam"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 812283983,
|
||||
"name": "CVE-2024-4577-PHP-RCE",
|
||||
"full_name": "xcanwin\/CVE-2024-4577-PHP-RCE",
|
||||
"owner": {
|
||||
"login": "xcanwin",
|
||||
"id": 14187349,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14187349?v=4",
|
||||
"html_url": "https:\/\/github.com\/xcanwin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xcanwin\/CVE-2024-4577-PHP-RCE",
|
||||
"description": "全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-08T13:04:45Z",
|
||||
"updated_at": "2024-06-08T18:14:25Z",
|
||||
"pushed_at": "2024-06-08T14:04:13Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -337,8 +337,8 @@
|
|||
"description": "CVE-2024-4956 Python exploitation utility",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-05T15:37:39Z",
|
||||
"updated_at": "2024-06-07T20:03:30Z",
|
||||
"pushed_at": "2024-06-07T20:03:27Z",
|
||||
"updated_at": "2024-06-08T16:13:06Z",
|
||||
"pushed_at": "2024-06-08T16:13:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -637,7 +637,8 @@
|
|||
- [0x20c/CVE-2024-4577-nuclei](https://github.com/0x20c/CVE-2024-4577-nuclei)
|
||||
- [manuelinfosec/CVE-2024-4577](https://github.com/manuelinfosec/CVE-2024-4577)
|
||||
- [zomasec/CVE-2024-4577](https://github.com/zomasec/CVE-2024-4577)
|
||||
- [ZephrFish/CVE-2024-4577-PoC](https://github.com/ZephrFish/CVE-2024-4577-PoC)
|
||||
- [ZephrFish/CVE-2024-4577-PHP-RCE](https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE)
|
||||
- [xcanwin/CVE-2024-4577-PHP-RCE](https://github.com/xcanwin/CVE-2024-4577-PHP-RCE)
|
||||
|
||||
### CVE-2024-4701 (2024-05-10)
|
||||
|
||||
|
@ -1613,7 +1614,7 @@
|
|||
- [K3ysTr0K3R/CVE-2024-25600-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT)
|
||||
- [X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE](https://github.com/X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE)
|
||||
- [RHYru9/CVE-2024-25600-mass](https://github.com/RHYru9/CVE-2024-25600-mass)
|
||||
- [0bl1v10nf0rg0773n/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress](https://github.com/0bl1v10nf0rg0773n/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress)
|
||||
- [ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress](https://github.com/ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress)
|
||||
- [k3lpi3b4nsh33/CVE-2024-25600](https://github.com/k3lpi3b4nsh33/CVE-2024-25600)
|
||||
- [WanLiChangChengWanLiChang/CVE-2024-25600](https://github.com/WanLiChangChengWanLiChang/CVE-2024-25600)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue