mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/31 12:31:57
This commit is contained in:
parent
3f2f8becae
commit
fddd3c5e9e
52 changed files with 285 additions and 209 deletions
|
@ -603,15 +603,15 @@
|
|||
{
|
||||
"id": 868559608,
|
||||
"name": "CVE-2017-7269",
|
||||
"full_name": "geniuszlyy\/CVE-2017-7269",
|
||||
"full_name": "geniuszly\/CVE-2017-7269",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2017-7269",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2017-7269",
|
||||
"description": "is a PoC tool demonstrating an exploit for a known vulnerability in the WebDAV component of IIS6",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-06T17:33:11Z",
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-12-28T15:30:30Z",
|
||||
"updated_at": "2024-12-31T06:31:41Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4148,
|
||||
"watchers_count": 4148,
|
||||
"stargazers_count": 4149,
|
||||
"watchers_count": 4149,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1099,
|
||||
"allow_forking": true,
|
||||
|
@ -77,7 +77,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1099,
|
||||
"watchers": 4148,
|
||||
"watchers": 4149,
|
||||
"score": 0,
|
||||
"subscribers_count": 149
|
||||
},
|
||||
|
|
|
@ -134,15 +134,15 @@
|
|||
{
|
||||
"id": 868553994,
|
||||
"name": "CVE-2019-9193",
|
||||
"full_name": "geniuszlyy\/CVE-2019-9193",
|
||||
"full_name": "geniuszly\/CVE-2019-9193",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2019-9193",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2019-9193",
|
||||
"description": "is a PoC tool designed to exploit an authenticated Remote Code Execution (RCE) vulnerability in specific versions of PostgreSQL (9.3 - 11.7)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-06T17:16:44Z",
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T06:55:26Z",
|
||||
"updated_at": "2023-02-02T06:25:02Z",
|
||||
"updated_at": "2024-12-31T08:57:35Z",
|
||||
"pushed_at": "2021-03-07T07:09:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"forks": 39,
|
||||
"watchers": 165,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-12-28T15:30:30Z",
|
||||
"updated_at": "2024-12-31T06:31:41Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4148,
|
||||
"watchers_count": 4148,
|
||||
"stargazers_count": 4149,
|
||||
"watchers_count": 4149,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1099,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1099,
|
||||
"watchers": 4148,
|
||||
"watchers": 4149,
|
||||
"score": 0,
|
||||
"subscribers_count": 149
|
||||
},
|
||||
|
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 872064512,
|
||||
"name": "CVE-2020-15916",
|
||||
"full_name": "geniuszlyy\/CVE-2020-15916",
|
||||
"full_name": "geniuszly\/CVE-2020-15916",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2020-15916",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2020-15916",
|
||||
"description": "This project is a PoC for exploiting CVE-2020-15916, a vulnerability that allows unauthorized changes to the LAN configuration of a device",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-13T17:30:19Z",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2020-17136 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-18T11:16:36Z",
|
||||
"updated_at": "2024-07-18T13:43:22Z",
|
||||
"updated_at": "2024-12-31T08:57:18Z",
|
||||
"pushed_at": "2021-03-31T14:42:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -848,10 +848,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-12-28T01:54:56Z",
|
||||
"updated_at": "2024-12-31T07:49:37Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1359,
|
||||
"watchers_count": 1359,
|
||||
"stargazers_count": 1360,
|
||||
"watchers_count": 1360,
|
||||
"has_discussions": false,
|
||||
"forks_count": 167,
|
||||
"allow_forking": true,
|
||||
|
@ -867,7 +867,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 167,
|
||||
"watchers": 1359,
|
||||
"watchers": 1360,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -359,10 +359,10 @@
|
|||
"description": "Laravel RCE Exploit Script - CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-16T17:22:55Z",
|
||||
"updated_at": "2024-12-17T05:59:50Z",
|
||||
"updated_at": "2024-12-31T06:24:18Z",
|
||||
"pushed_at": "2024-09-22T13:10:27Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -386,7 +386,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -395,10 +395,10 @@
|
|||
"description": "CVE-2021-3560 analysis",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-31T09:02:23Z",
|
||||
"updated_at": "2024-11-27T19:11:24Z",
|
||||
"updated_at": "2024-12-31T09:32:51Z",
|
||||
"pushed_at": "2022-05-23T02:23:38Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -407,7 +407,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "Remote Code Injection In Log4j",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T05:23:44Z",
|
||||
"updated_at": "2024-12-08T07:27:57Z",
|
||||
"updated_at": "2024-12-31T10:04:30Z",
|
||||
"pushed_at": "2022-01-18T12:01:52Z",
|
||||
"stargazers_count": 460,
|
||||
"watchers_count": 460,
|
||||
"stargazers_count": 461,
|
||||
"watchers_count": 461,
|
||||
"has_discussions": false,
|
||||
"forks_count": 122,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 122,
|
||||
"watchers": 460,
|
||||
"watchers": 461,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -792,10 +792,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-12-28T01:54:56Z",
|
||||
"updated_at": "2024-12-31T07:49:37Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1359,
|
||||
"watchers_count": 1359,
|
||||
"stargazers_count": 1360,
|
||||
"watchers_count": 1360,
|
||||
"has_discussions": false,
|
||||
"forks_count": 167,
|
||||
"allow_forking": true,
|
||||
|
@ -811,7 +811,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 167,
|
||||
"watchers": 1359,
|
||||
"watchers": 1360,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -95,15 +95,15 @@
|
|||
{
|
||||
"id": 869025784,
|
||||
"name": "CVE-2022-2414",
|
||||
"full_name": "geniuszlyy\/CVE-2022-2414",
|
||||
"full_name": "geniuszly\/CVE-2022-2414",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-2414",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-2414",
|
||||
"description": "is a PoC script for demonstrating an XML External Entity (XXE) vulnerability exploitation",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-07T15:36:39Z",
|
||||
|
|
|
@ -33,15 +33,15 @@
|
|||
{
|
||||
"id": 840469662,
|
||||
"name": "CVE-2022-44149",
|
||||
"full_name": "geniuszlyy\/CVE-2022-44149",
|
||||
"full_name": "geniuszly\/CVE-2022-44149",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-44149",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-44149",
|
||||
"description": "it is script designed to interact with a router by sending a payload to its system tools. The script retrieves the router's configuration from environment variables to ensure security. It includes functions for generating an authorization header, sending a payload, and logging the process.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-09T19:27:22Z",
|
||||
|
|
|
@ -33,15 +33,15 @@
|
|||
{
|
||||
"id": 840470520,
|
||||
"name": "CVE-2022-45701",
|
||||
"full_name": "geniuszlyy\/CVE-2022-45701",
|
||||
"full_name": "geniuszly\/CVE-2022-45701",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-45701",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-45701",
|
||||
"description": "it is script designed to exploit certain vulnerabilities in routers by sending payloads through SNMP (Simple Network Management Protocol). The script automates the process of authorization, payload generation, and execution, allowing for remote command execution on the target device.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-09T19:30:20Z",
|
||||
|
|
|
@ -33,15 +33,15 @@
|
|||
{
|
||||
"id": 840471119,
|
||||
"name": "CVE-2022-46080",
|
||||
"full_name": "geniuszlyy\/CVE-2022-46080",
|
||||
"full_name": "geniuszly\/CVE-2022-46080",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-46080",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-46080",
|
||||
"description": "it is script that enables Telnet on routers by sending a specially crafted request. The script allows users to specify the router's URL, Telnet port, and password. It validates the inputs and logs the process, providing feedback on whether the exploit was successful.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-09T19:32:32Z",
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2024-12-31T02:53:03Z",
|
||||
"updated_at": "2024-12-31T11:17:24Z",
|
||||
"pushed_at": "2023-08-02T09:35:14Z",
|
||||
"stargazers_count": 884,
|
||||
"watchers_count": 884,
|
||||
"stargazers_count": 885,
|
||||
"watchers_count": 885,
|
||||
"has_discussions": false,
|
||||
"forks_count": 72,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 72,
|
||||
"watchers": 884,
|
||||
"watchers": 885,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
@ -231,10 +231,10 @@
|
|||
"description": "CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T21:50:25Z",
|
||||
"updated_at": "2024-12-06T00:25:02Z",
|
||||
"updated_at": "2024-12-31T11:17:24Z",
|
||||
"pushed_at": "2023-06-13T08:55:50Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -245,7 +245,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 145,
|
||||
"watchers": 146,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-18T11:45:30Z",
|
||||
"updated_at": "2024-12-30T08:58:33Z",
|
||||
"updated_at": "2024-12-31T07:55:52Z",
|
||||
"pushed_at": "2024-07-19T14:01:31Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T20:32:45Z",
|
||||
"updated_at": "2024-12-31T05:58:53Z",
|
||||
"updated_at": "2024-12-31T12:24:50Z",
|
||||
"pushed_at": "2024-10-05T20:37:02Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -37,7 +37,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 54,
|
||||
"watchers": 58,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 865477756,
|
||||
"name": "GenEtherExploit",
|
||||
"full_name": "geniuszlyy\/GenEtherExploit",
|
||||
"full_name": "geniuszly\/GenEtherExploit",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/GenEtherExploit",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/GenEtherExploit",
|
||||
"description": "is a PoC exploit for the macOS vulnerability CVE-2023-40404. This PoC leverages IOKit APIs to interact with the IOUserEthernetResource network service, manipulating the system's network interfaces",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-30T15:41:14Z",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-15T12:14:18Z",
|
||||
"updated_at": "2024-12-21T00:56:57Z",
|
||||
"updated_at": "2024-12-31T07:18:24Z",
|
||||
"pushed_at": "2024-03-08T12:57:53Z",
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 196,
|
||||
"watchers": 197,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-14T09:35:07Z",
|
||||
"updated_at": "2024-12-09T07:21:54Z",
|
||||
"updated_at": "2024-12-31T11:10:26Z",
|
||||
"pushed_at": "2024-05-16T07:42:00Z",
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 223,
|
||||
"watchers": 224,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-12-28T12:43:30Z",
|
||||
"updated_at": "2024-12-31T08:20:51Z",
|
||||
"pushed_at": "2024-08-18T08:26:46Z",
|
||||
"stargazers_count": 1313,
|
||||
"watchers_count": 1313,
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-27T05:57:21Z",
|
||||
"updated_at": "2024-12-28T10:59:12Z",
|
||||
"updated_at": "2024-12-31T06:57:19Z",
|
||||
"pushed_at": "2024-01-29T02:28:11Z",
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"stargazers_count": 236,
|
||||
"watchers_count": 236,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 235,
|
||||
"watchers": 236,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -95,15 +95,15 @@
|
|||
{
|
||||
"id": 866966019,
|
||||
"name": "CVE-2024-0582",
|
||||
"full_name": "geniuszlyy\/CVE-2024-0582",
|
||||
"full_name": "geniuszly\/CVE-2024-0582",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-0582",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-0582",
|
||||
"description": "is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-03T07:56:36Z",
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Collapsing Categories <= 3.0.8 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-19T14:15:29Z",
|
||||
"updated_at": "2024-12-19T15:53:19Z",
|
||||
"updated_at": "2024-12-31T06:46:57Z",
|
||||
"pushed_at": "2024-12-19T14:16:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "PoC for CVE-2024-21182",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-29T15:48:03Z",
|
||||
"updated_at": "2024-12-31T05:15:18Z",
|
||||
"updated_at": "2024-12-31T08:58:18Z",
|
||||
"pushed_at": "2024-12-29T15:56:14Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 23,
|
||||
"forks": 5,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -83,10 +83,10 @@
|
|||
"description": "PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-15T07:26:59Z",
|
||||
"updated_at": "2024-12-27T08:50:30Z",
|
||||
"updated_at": "2024-12-31T07:44:51Z",
|
||||
"pushed_at": "2024-07-16T23:22:14Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -106,7 +106,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-18T20:39:27Z",
|
||||
"updated_at": "2024-12-30T04:28:59Z",
|
||||
"updated_at": "2024-12-31T08:05:58Z",
|
||||
"pushed_at": "2024-03-19T06:37:30Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1630,15 +1630,15 @@
|
|||
{
|
||||
"id": 864811586,
|
||||
"name": "CVE-2024-24919",
|
||||
"full_name": "geniuszlyy\/CVE-2024-24919",
|
||||
"full_name": "geniuszly\/CVE-2024-24919",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-24919",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-24919",
|
||||
"description": "PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-29T08:20:56Z",
|
||||
|
|
|
@ -380,15 +380,15 @@
|
|||
{
|
||||
"id": 870123268,
|
||||
"name": "CVE-2024-27198",
|
||||
"full_name": "geniuszlyy\/CVE-2024-27198",
|
||||
"full_name": "geniuszly\/CVE-2024-27198",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-27198",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-27198",
|
||||
"description": "is a PoC tool that targets a vulnerability in the TeamCity server (CVE-2024-27198)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-09T13:36:56Z",
|
||||
|
|
|
@ -74,15 +74,15 @@
|
|||
{
|
||||
"id": 868072354,
|
||||
"name": "GenGravSSTIExploit",
|
||||
"full_name": "geniuszlyy\/GenGravSSTIExploit",
|
||||
"full_name": "geniuszly\/GenGravSSTIExploit",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/GenGravSSTIExploit",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/GenGravSSTIExploit",
|
||||
"description": "is a PoC Python script that exploits an authenticated Server-Side Template Injection (SSTI) vulnerability in Grav CMS versions <= 1.7.44 (CVE-2024-28116)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T12:05:06Z",
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2024-12-30T11:26:49Z",
|
||||
"updated_at": "2024-12-31T12:11:37Z",
|
||||
"pushed_at": "2024-09-30T08:45:56Z",
|
||||
"stargazers_count": 427,
|
||||
"watchers_count": 427,
|
||||
"stargazers_count": 426,
|
||||
"watchers_count": 426,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 427,
|
||||
"watchers": 426,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -362,10 +362,10 @@
|
|||
"description": "geoserver图形化漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T10:08:55Z",
|
||||
"updated_at": "2024-12-26T04:19:46Z",
|
||||
"updated_at": "2024-12-31T08:29:17Z",
|
||||
"pushed_at": "2024-10-08T03:16:26Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -374,7 +374,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T20:32:45Z",
|
||||
"updated_at": "2024-12-31T05:58:53Z",
|
||||
"updated_at": "2024-12-31T12:24:50Z",
|
||||
"pushed_at": "2024-10-05T20:37:02Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -68,7 +68,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 54,
|
||||
"watchers": 58,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -455,15 +455,15 @@
|
|||
{
|
||||
"id": 865497094,
|
||||
"name": "GenCrushSSTIExploit",
|
||||
"full_name": "geniuszlyy\/GenCrushSSTIExploit",
|
||||
"full_name": "geniuszly\/GenCrushSSTIExploit",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/GenCrushSSTIExploit",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/GenCrushSSTIExploit",
|
||||
"description": "is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-30T16:18:07Z",
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "InVesalius discovered CVE. CVE-2024-42845, CVE-2024-44825",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-23T13:43:27Z",
|
||||
"updated_at": "2024-12-30T23:20:09Z",
|
||||
"updated_at": "2024-12-31T10:26:10Z",
|
||||
"pushed_at": "2024-12-20T09:48:52Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -95,15 +95,15 @@
|
|||
{
|
||||
"id": 870756822,
|
||||
"name": "CVE-2024-44000",
|
||||
"full_name": "geniuszlyy\/CVE-2024-44000",
|
||||
"full_name": "geniuszly\/CVE-2024-44000",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-44000",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-44000",
|
||||
"description": "is a PoC tool designed to exploit insecurely exposed debug logs from WordPress sites and extract session cookies",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-10T15:58:10Z",
|
||||
|
|
33
2024/CVE-2024-46542.json
Normal file
33
2024/CVE-2024-46542.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 910002853,
|
||||
"name": "CVE-2024-46542",
|
||||
"full_name": "MarioTesoro\/CVE-2024-46542",
|
||||
"owner": {
|
||||
"login": "MarioTesoro",
|
||||
"id": 62204045,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4",
|
||||
"html_url": "https:\/\/github.com\/MarioTesoro",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-46542",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-30T08:58:05Z",
|
||||
"updated_at": "2024-12-31T12:17:30Z",
|
||||
"pushed_at": "2024-12-31T12:17:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -169,10 +169,10 @@
|
|||
"description": "RCE through a race condition in Apache Tomcat",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-21T05:54:29Z",
|
||||
"updated_at": "2024-12-30T15:45:48Z",
|
||||
"updated_at": "2024-12-31T10:33:55Z",
|
||||
"pushed_at": "2024-12-21T08:56:44Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 45,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -200,10 +200,10 @@
|
|||
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-23T07:20:47Z",
|
||||
"updated_at": "2024-12-30T18:18:04Z",
|
||||
"updated_at": "2024-12-31T10:14:53Z",
|
||||
"pushed_at": "2024-12-23T07:30:27Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -212,7 +212,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -262,8 +262,8 @@
|
|||
"description": "CVE-2024-50379-exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-25T02:41:31Z",
|
||||
"updated_at": "2024-12-31T06:26:31Z",
|
||||
"pushed_at": "2024-12-31T06:26:28Z",
|
||||
"updated_at": "2024-12-31T07:11:17Z",
|
||||
"pushed_at": "2024-12-31T07:11:13Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -66,5 +66,36 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 910411215,
|
||||
"name": "Cleo-CVE-2024-50623-PoC",
|
||||
"full_name": "iSee857\/Cleo-CVE-2024-50623-PoC",
|
||||
"owner": {
|
||||
"login": "iSee857",
|
||||
"id": 73977770,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4",
|
||||
"html_url": "https:\/\/github.com\/iSee857",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/iSee857\/Cleo-CVE-2024-50623-PoC",
|
||||
"description": "Cleo 远程代码执行漏洞批量检测脚本(CVE-2024-50623)",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-31T07:43:48Z",
|
||||
"updated_at": "2024-12-31T07:46:53Z",
|
||||
"pushed_at": "2024-12-31T07:46:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-30T01:07:48Z",
|
||||
"updated_at": "2024-12-31T03:48:11Z",
|
||||
"updated_at": "2024-12-31T10:15:57Z",
|
||||
"pushed_at": "2024-12-30T01:08:00Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -64,15 +64,15 @@
|
|||
{
|
||||
"id": 866079798,
|
||||
"name": "CVE-2024-5522",
|
||||
"full_name": "geniuszlyy\/CVE-2024-5522",
|
||||
"full_name": "geniuszly\/CVE-2024-5522",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-5522",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-5522",
|
||||
"description": "A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-01T16:02:12Z",
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T12:16:21Z",
|
||||
"updated_at": "2024-12-26T06:26:46Z",
|
||||
"updated_at": "2024-12-31T12:16:09Z",
|
||||
"pushed_at": "2024-07-01T12:25:01Z",
|
||||
"stargazers_count": 380,
|
||||
"watchers_count": 380,
|
||||
"stargazers_count": 379,
|
||||
"watchers_count": 379,
|
||||
"has_discussions": false,
|
||||
"forks_count": 90,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 90,
|
||||
"watchers": 380,
|
||||
"watchers": 379,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -2185,13 +2185,13 @@
|
|||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"forks": 25,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -73,15 +73,15 @@
|
|||
{
|
||||
"id": 869446465,
|
||||
"name": "CVE-2024-7029",
|
||||
"full_name": "geniuszlyy\/CVE-2024-7029",
|
||||
"full_name": "geniuszly\/CVE-2024-7029",
|
||||
"owner": {
|
||||
"login": "geniuszlyy",
|
||||
"login": "geniuszly",
|
||||
"id": 137893386,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
||||
"html_url": "https:\/\/github.com\/geniuszly",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-7029",
|
||||
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-7029",
|
||||
"description": " A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-08T10:04:08Z",
|
||||
|
|
46
README.md
46
README.md
|
@ -190,7 +190,7 @@
|
|||
- [ysanatomic/io_uring_LPE-CVE-2024-0582](https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582)
|
||||
- [Forsaken0129/CVE-2024-0582](https://github.com/Forsaken0129/CVE-2024-0582)
|
||||
- [0ptyx/cve-2024-0582](https://github.com/0ptyx/cve-2024-0582)
|
||||
- [geniuszlyy/CVE-2024-0582](https://github.com/geniuszlyy/CVE-2024-0582)
|
||||
- [geniuszly/CVE-2024-0582](https://github.com/geniuszly/CVE-2024-0582)
|
||||
- [101010zyl/CVE-2024-0582](https://github.com/101010zyl/CVE-2024-0582)
|
||||
|
||||
### CVE-2024-0588 (2024-04-09)
|
||||
|
@ -880,7 +880,7 @@
|
|||
- [olebris/CVE-2024-4040](https://github.com/olebris/CVE-2024-4040)
|
||||
- [entroychang/CVE-2024-4040](https://github.com/entroychang/CVE-2024-4040)
|
||||
- [safeer-accuknox/CrushFTP-cve-2024-4040-poc](https://github.com/safeer-accuknox/CrushFTP-cve-2024-4040-poc)
|
||||
- [geniuszlyy/GenCrushSSTIExploit](https://github.com/geniuszlyy/GenCrushSSTIExploit)
|
||||
- [geniuszly/GenCrushSSTIExploit](https://github.com/geniuszly/GenCrushSSTIExploit)
|
||||
- [rahisec/CVE-2024-4040](https://github.com/rahisec/CVE-2024-4040)
|
||||
|
||||
### CVE-2024-4231 (2024-05-10)
|
||||
|
@ -1220,7 +1220,7 @@
|
|||
|
||||
- [truonghuuphuc/CVE-2024-5522-Poc](https://github.com/truonghuuphuc/CVE-2024-5522-Poc)
|
||||
- [kryptonproject/CVE-2024-5522-PoC](https://github.com/kryptonproject/CVE-2024-5522-PoC)
|
||||
- [geniuszlyy/CVE-2024-5522](https://github.com/geniuszlyy/CVE-2024-5522)
|
||||
- [geniuszly/CVE-2024-5522](https://github.com/geniuszly/CVE-2024-5522)
|
||||
|
||||
### CVE-2024-5633 (2024-07-09)
|
||||
|
||||
|
@ -1527,7 +1527,7 @@
|
|||
|
||||
- [bigherocenter/CVE-2024-7029-EXPLOIT](https://github.com/bigherocenter/CVE-2024-7029-EXPLOIT)
|
||||
- [ebrasha/CVE-2024-7029](https://github.com/ebrasha/CVE-2024-7029)
|
||||
- [geniuszlyy/CVE-2024-7029](https://github.com/geniuszlyy/CVE-2024-7029)
|
||||
- [geniuszly/CVE-2024-7029](https://github.com/geniuszly/CVE-2024-7029)
|
||||
|
||||
### CVE-2024-7094 (2024-08-13)
|
||||
|
||||
|
@ -2374,7 +2374,11 @@
|
|||
|
||||
- [samogod/CVE-2024-11728](https://github.com/samogod/CVE-2024-11728)
|
||||
|
||||
### CVE-2024-11972
|
||||
### CVE-2024-11972 (2024-12-31)
|
||||
|
||||
<code>The Hunk Companion WordPress plugin before 1.9.0 does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary Hunk Companion WordPress plugin before 1.9.0 from the WordPress.org repo, including vulnerable Hunk Companion WordPress plugin before 1.9.0 that have been closed.
|
||||
</code>
|
||||
|
||||
- [JunTakemura/exploit-CVE-2024-11972](https://github.com/JunTakemura/exploit-CVE-2024-11972)
|
||||
|
||||
### CVE-2024-12025 (2024-12-18)
|
||||
|
@ -3630,7 +3634,7 @@
|
|||
- [Jutrm/cve-2024-24919](https://github.com/Jutrm/cve-2024-24919)
|
||||
- [LuisMateo1/Arbitrary-File-Read-CVE-2024-24919](https://github.com/LuisMateo1/Arbitrary-File-Read-CVE-2024-24919)
|
||||
- [AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-](https://github.com/AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-)
|
||||
- [geniuszlyy/CVE-2024-24919](https://github.com/geniuszlyy/CVE-2024-24919)
|
||||
- [geniuszly/CVE-2024-24919](https://github.com/geniuszly/CVE-2024-24919)
|
||||
- [skyrowalker/CVE-2024-24919](https://github.com/skyrowalker/CVE-2024-24919)
|
||||
- [sar-3mar/CVE-2024-24919_POC](https://github.com/sar-3mar/CVE-2024-24919_POC)
|
||||
- [NingXin2002/Check-Point_poc](https://github.com/NingXin2002/Check-Point_poc)
|
||||
|
@ -3995,7 +3999,7 @@
|
|||
- [Stuub/RCity-CVE-2024-27198](https://github.com/Stuub/RCity-CVE-2024-27198)
|
||||
- [HPT-Intern-Task-Submission/CVE-2024-27198](https://github.com/HPT-Intern-Task-Submission/CVE-2024-27198)
|
||||
- [jrbH4CK/CVE-2024-27198](https://github.com/jrbH4CK/CVE-2024-27198)
|
||||
- [geniuszlyy/CVE-2024-27198](https://github.com/geniuszlyy/CVE-2024-27198)
|
||||
- [geniuszly/CVE-2024-27198](https://github.com/geniuszly/CVE-2024-27198)
|
||||
- [Cythonic1/CVE-2024-27198_POC](https://github.com/Cythonic1/CVE-2024-27198_POC)
|
||||
|
||||
### CVE-2024-27292 (2024-02-29)
|
||||
|
@ -4222,7 +4226,7 @@
|
|||
|
||||
- [akabe1/Graver](https://github.com/akabe1/Graver)
|
||||
- [gunzf0x/Grav-CMS-RCE-Authenticated](https://github.com/gunzf0x/Grav-CMS-RCE-Authenticated)
|
||||
- [geniuszlyy/GenGravSSTIExploit](https://github.com/geniuszlyy/GenGravSSTIExploit)
|
||||
- [geniuszly/GenGravSSTIExploit](https://github.com/geniuszly/GenGravSSTIExploit)
|
||||
|
||||
### CVE-2024-28247 (2024-03-27)
|
||||
|
||||
|
@ -6510,7 +6514,7 @@
|
|||
- [absholi7ly/CVE-2024-44000-LiteSpeed-Cache](https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache)
|
||||
- [gbrsh/CVE-2024-44000](https://github.com/gbrsh/CVE-2024-44000)
|
||||
- [ifqygazhar/CVE-2024-44000-LiteSpeed-Cache](https://github.com/ifqygazhar/CVE-2024-44000-LiteSpeed-Cache)
|
||||
- [geniuszlyy/CVE-2024-44000](https://github.com/geniuszlyy/CVE-2024-44000)
|
||||
- [geniuszly/CVE-2024-44000](https://github.com/geniuszly/CVE-2024-44000)
|
||||
|
||||
### CVE-2024-44083 (2024-08-19)
|
||||
|
||||
|
@ -6845,6 +6849,13 @@
|
|||
- [EQSTLab/CVE-2024-46538](https://github.com/EQSTLab/CVE-2024-46538)
|
||||
- [LauLeysen/CVE-2024-46538](https://github.com/LauLeysen/CVE-2024-46538)
|
||||
|
||||
### CVE-2024-46542 (2024-12-30)
|
||||
|
||||
<code>Veritas / Arctera Data Insight before 7.1.1 allows Application Administrators to conduct SQL injection attacks.
|
||||
</code>
|
||||
|
||||
- [MarioTesoro/CVE-2024-46542](https://github.com/MarioTesoro/CVE-2024-46542)
|
||||
|
||||
### CVE-2024-46627 (2024-09-26)
|
||||
|
||||
<code>Incorrect access control in BECN DATAGERRY v2.2 allows attackers to execute arbitrary commands via crafted web requests.
|
||||
|
@ -7315,6 +7326,7 @@
|
|||
|
||||
- [watchtowrlabs/CVE-2024-50623](https://github.com/watchtowrlabs/CVE-2024-50623)
|
||||
- [verylazytech/CVE-2024-50623](https://github.com/verylazytech/CVE-2024-50623)
|
||||
- [iSee857/Cleo-CVE-2024-50623-PoC](https://github.com/iSee857/Cleo-CVE-2024-50623-PoC)
|
||||
|
||||
### CVE-2024-50657 (2024-11-22)
|
||||
|
||||
|
@ -13811,7 +13823,7 @@
|
|||
<code>A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sonoma 14.1. An app may be able to execute arbitrary code with kernel privileges.
|
||||
</code>
|
||||
|
||||
- [geniuszlyy/GenEtherExploit](https://github.com/geniuszlyy/GenEtherExploit)
|
||||
- [geniuszly/GenEtherExploit](https://github.com/geniuszly/GenEtherExploit)
|
||||
|
||||
### CVE-2023-40429 (2023-09-26)
|
||||
|
||||
|
@ -16992,7 +17004,7 @@
|
|||
- [superhac/CVE-2022-2414-POC](https://github.com/superhac/CVE-2022-2414-POC)
|
||||
- [amitlttwo/CVE-2022-2414-Proof-Of-Concept](https://github.com/amitlttwo/CVE-2022-2414-Proof-Of-Concept)
|
||||
- [satyasai1460/CVE-2022-2414](https://github.com/satyasai1460/CVE-2022-2414)
|
||||
- [geniuszlyy/CVE-2022-2414](https://github.com/geniuszlyy/CVE-2022-2414)
|
||||
- [geniuszly/CVE-2022-2414](https://github.com/geniuszly/CVE-2022-2414)
|
||||
|
||||
### CVE-2022-2466 (2022-08-31)
|
||||
|
||||
|
@ -22322,7 +22334,7 @@
|
|||
</code>
|
||||
|
||||
- [yerodin/CVE-2022-44149](https://github.com/yerodin/CVE-2022-44149)
|
||||
- [geniuszlyy/CVE-2022-44149](https://github.com/geniuszlyy/CVE-2022-44149)
|
||||
- [geniuszly/CVE-2022-44149](https://github.com/geniuszly/CVE-2022-44149)
|
||||
|
||||
### CVE-2022-44183 (2022-11-21)
|
||||
|
||||
|
@ -22598,7 +22610,7 @@
|
|||
</code>
|
||||
|
||||
- [yerodin/CVE-2022-45701](https://github.com/yerodin/CVE-2022-45701)
|
||||
- [geniuszlyy/CVE-2022-45701](https://github.com/geniuszlyy/CVE-2022-45701)
|
||||
- [geniuszly/CVE-2022-45701](https://github.com/geniuszly/CVE-2022-45701)
|
||||
|
||||
### CVE-2022-45728 (2023-01-12)
|
||||
|
||||
|
@ -22658,7 +22670,7 @@
|
|||
</code>
|
||||
|
||||
- [yerodin/CVE-2022-46080](https://github.com/yerodin/CVE-2022-46080)
|
||||
- [geniuszlyy/CVE-2022-46080](https://github.com/geniuszlyy/CVE-2022-46080)
|
||||
- [geniuszly/CVE-2022-46080](https://github.com/geniuszly/CVE-2022-46080)
|
||||
|
||||
### CVE-2022-46087 (2023-01-30)
|
||||
|
||||
|
@ -33486,7 +33498,7 @@
|
|||
<code>goform/AdvSetLanip endpoint on Tenda AC15 AC1900 15.03.05.19 devices allows remote attackers to execute arbitrary system commands via shell metacharacters in the lanIp POST parameter.
|
||||
</code>
|
||||
|
||||
- [geniuszlyy/CVE-2020-15916](https://github.com/geniuszlyy/CVE-2020-15916)
|
||||
- [geniuszly/CVE-2020-15916](https://github.com/geniuszly/CVE-2020-15916)
|
||||
|
||||
### CVE-2020-15931 (2020-10-20)
|
||||
|
||||
|
@ -36729,7 +36741,7 @@
|
|||
- [b4keSn4ke/CVE-2019-9193](https://github.com/b4keSn4ke/CVE-2019-9193)
|
||||
- [chromanite/CVE-2019-9193-PostgreSQL-9.3-11.7](https://github.com/chromanite/CVE-2019-9193-PostgreSQL-9.3-11.7)
|
||||
- [paulotrindadec/CVE-2019-9193](https://github.com/paulotrindadec/CVE-2019-9193)
|
||||
- [geniuszlyy/CVE-2019-9193](https://github.com/geniuszlyy/CVE-2019-9193)
|
||||
- [geniuszly/CVE-2019-9193](https://github.com/geniuszly/CVE-2019-9193)
|
||||
- [AxthonyV/CVE-2019-9193](https://github.com/AxthonyV/CVE-2019-9193)
|
||||
- [A0be/CVE-2019-9193](https://github.com/A0be/CVE-2019-9193)
|
||||
|
||||
|
@ -43527,7 +43539,7 @@
|
|||
- [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269)
|
||||
- [Cappricio-Securities/CVE-2017-7269](https://github.com/Cappricio-Securities/CVE-2017-7269)
|
||||
- [VanishedPeople/CVE-2017-7269](https://github.com/VanishedPeople/CVE-2017-7269)
|
||||
- [geniuszlyy/CVE-2017-7269](https://github.com/geniuszlyy/CVE-2017-7269)
|
||||
- [geniuszly/CVE-2017-7269](https://github.com/geniuszly/CVE-2017-7269)
|
||||
- [AxthonyV/CVE-2017-7269](https://github.com/AxthonyV/CVE-2017-7269)
|
||||
|
||||
### CVE-2017-7308 (2017-03-29)
|
||||
|
|
Loading…
Reference in a new issue