mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/31 12:31:57
This commit is contained in:
parent
3f2f8becae
commit
fddd3c5e9e
52 changed files with 285 additions and 209 deletions
|
@ -603,15 +603,15 @@
|
||||||
{
|
{
|
||||||
"id": 868559608,
|
"id": 868559608,
|
||||||
"name": "CVE-2017-7269",
|
"name": "CVE-2017-7269",
|
||||||
"full_name": "geniuszlyy\/CVE-2017-7269",
|
"full_name": "geniuszly\/CVE-2017-7269",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2017-7269",
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2017-7269",
|
||||||
"description": "is a PoC tool demonstrating an exploit for a known vulnerability in the WebDAV component of IIS6",
|
"description": "is a PoC tool demonstrating an exploit for a known vulnerability in the WebDAV component of IIS6",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-06T17:33:11Z",
|
"created_at": "2024-10-06T17:33:11Z",
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2024-12-28T15:30:30Z",
|
"updated_at": "2024-12-31T06:31:41Z",
|
||||||
"pushed_at": "2021-04-04T09:13:57Z",
|
"pushed_at": "2021-04-04T09:13:57Z",
|
||||||
"stargazers_count": 4148,
|
"stargazers_count": 4149,
|
||||||
"watchers_count": 4148,
|
"watchers_count": 4149,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1099,
|
"forks_count": 1099,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -77,7 +77,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1099,
|
"forks": 1099,
|
||||||
"watchers": 4148,
|
"watchers": 4149,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 149
|
"subscribers_count": 149
|
||||||
},
|
},
|
||||||
|
|
|
@ -134,15 +134,15 @@
|
||||||
{
|
{
|
||||||
"id": 868553994,
|
"id": 868553994,
|
||||||
"name": "CVE-2019-9193",
|
"name": "CVE-2019-9193",
|
||||||
"full_name": "geniuszlyy\/CVE-2019-9193",
|
"full_name": "geniuszly\/CVE-2019-9193",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2019-9193",
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2019-9193",
|
||||||
"description": "is a PoC tool designed to exploit an authenticated Remote Code Execution (RCE) vulnerability in specific versions of PostgreSQL (9.3 - 11.7)",
|
"description": "is a PoC tool designed to exploit an authenticated Remote Code Execution (RCE) vulnerability in specific versions of PostgreSQL (9.3 - 11.7)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-06T17:16:44Z",
|
"created_at": "2024-10-06T17:16:44Z",
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-03-07T06:55:26Z",
|
"created_at": "2021-03-07T06:55:26Z",
|
||||||
"updated_at": "2023-02-02T06:25:02Z",
|
"updated_at": "2024-12-31T08:57:35Z",
|
||||||
"pushed_at": "2021-03-07T07:09:16Z",
|
"pushed_at": "2021-03-07T07:09:16Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 0,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -57,7 +57,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
}
|
}
|
||||||
|
|
|
@ -19,13 +19,13 @@
|
||||||
"stargazers_count": 165,
|
"stargazers_count": 165,
|
||||||
"watchers_count": 165,
|
"watchers_count": 165,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 38,
|
"forks_count": 39,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 38,
|
"forks": 39,
|
||||||
"watchers": 165,
|
"watchers": 165,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2024-12-28T15:30:30Z",
|
"updated_at": "2024-12-31T06:31:41Z",
|
||||||
"pushed_at": "2021-04-04T09:13:57Z",
|
"pushed_at": "2021-04-04T09:13:57Z",
|
||||||
"stargazers_count": 4148,
|
"stargazers_count": 4149,
|
||||||
"watchers_count": 4148,
|
"watchers_count": 4149,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1099,
|
"forks_count": 1099,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -46,7 +46,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1099,
|
"forks": 1099,
|
||||||
"watchers": 4148,
|
"watchers": 4149,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 149
|
"subscribers_count": 149
|
||||||
},
|
},
|
||||||
|
|
|
@ -2,15 +2,15 @@
|
||||||
{
|
{
|
||||||
"id": 872064512,
|
"id": 872064512,
|
||||||
"name": "CVE-2020-15916",
|
"name": "CVE-2020-15916",
|
||||||
"full_name": "geniuszlyy\/CVE-2020-15916",
|
"full_name": "geniuszly\/CVE-2020-15916",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2020-15916",
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2020-15916",
|
||||||
"description": "This project is a PoC for exploiting CVE-2020-15916, a vulnerability that allows unauthorized changes to the LAN configuration of a device",
|
"description": "This project is a PoC for exploiting CVE-2020-15916, a vulnerability that allows unauthorized changes to the LAN configuration of a device",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-13T17:30:19Z",
|
"created_at": "2024-10-13T17:30:19Z",
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "CVE-2020-17136 exploit",
|
"description": "CVE-2020-17136 exploit",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-03-18T11:16:36Z",
|
"created_at": "2021-03-18T11:16:36Z",
|
||||||
"updated_at": "2024-07-18T13:43:22Z",
|
"updated_at": "2024-12-31T08:57:18Z",
|
||||||
"pushed_at": "2021-03-31T14:42:19Z",
|
"pushed_at": "2021-03-31T14:42:19Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 2,
|
"watchers_count": 3,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 2,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -848,10 +848,10 @@
|
||||||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-10-04T03:39:27Z",
|
"created_at": "2022-10-04T03:39:27Z",
|
||||||
"updated_at": "2024-12-28T01:54:56Z",
|
"updated_at": "2024-12-31T07:49:37Z",
|
||||||
"pushed_at": "2024-04-25T06:09:38Z",
|
"pushed_at": "2024-04-25T06:09:38Z",
|
||||||
"stargazers_count": 1359,
|
"stargazers_count": 1360,
|
||||||
"watchers_count": 1359,
|
"watchers_count": 1360,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 167,
|
"forks_count": 167,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -867,7 +867,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 167,
|
"forks": 167,
|
||||||
"watchers": 1359,
|
"watchers": 1360,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 15
|
"subscribers_count": 15
|
||||||
}
|
}
|
||||||
|
|
|
@ -359,10 +359,10 @@
|
||||||
"description": "Laravel RCE Exploit Script - CVE-2021-3129",
|
"description": "Laravel RCE Exploit Script - CVE-2021-3129",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-04-16T17:22:55Z",
|
"created_at": "2022-04-16T17:22:55Z",
|
||||||
"updated_at": "2024-12-17T05:59:50Z",
|
"updated_at": "2024-12-31T06:24:18Z",
|
||||||
"pushed_at": "2024-09-22T13:10:27Z",
|
"pushed_at": "2024-09-22T13:10:27Z",
|
||||||
"stargazers_count": 95,
|
"stargazers_count": 96,
|
||||||
"watchers_count": 95,
|
"watchers_count": 96,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 20,
|
"forks_count": 20,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -386,7 +386,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 20,
|
"forks": 20,
|
||||||
"watchers": 95,
|
"watchers": 96,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -395,10 +395,10 @@
|
||||||
"description": "CVE-2021-3560 analysis",
|
"description": "CVE-2021-3560 analysis",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-01-31T09:02:23Z",
|
"created_at": "2022-01-31T09:02:23Z",
|
||||||
"updated_at": "2024-11-27T19:11:24Z",
|
"updated_at": "2024-12-31T09:32:51Z",
|
||||||
"pushed_at": "2022-05-23T02:23:38Z",
|
"pushed_at": "2022-05-23T02:23:38Z",
|
||||||
"stargazers_count": 8,
|
"stargazers_count": 9,
|
||||||
"watchers_count": 8,
|
"watchers_count": 9,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -407,7 +407,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 8,
|
"watchers": 9,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -107,10 +107,10 @@
|
||||||
"description": "Remote Code Injection In Log4j",
|
"description": "Remote Code Injection In Log4j",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-10T05:23:44Z",
|
"created_at": "2021-12-10T05:23:44Z",
|
||||||
"updated_at": "2024-12-08T07:27:57Z",
|
"updated_at": "2024-12-31T10:04:30Z",
|
||||||
"pushed_at": "2022-01-18T12:01:52Z",
|
"pushed_at": "2022-01-18T12:01:52Z",
|
||||||
"stargazers_count": 460,
|
"stargazers_count": 461,
|
||||||
"watchers_count": 460,
|
"watchers_count": 461,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 122,
|
"forks_count": 122,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -119,7 +119,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 122,
|
"forks": 122,
|
||||||
"watchers": 460,
|
"watchers": 461,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 8
|
"subscribers_count": 8
|
||||||
},
|
},
|
||||||
|
|
|
@ -792,10 +792,10 @@
|
||||||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-10-04T03:39:27Z",
|
"created_at": "2022-10-04T03:39:27Z",
|
||||||
"updated_at": "2024-12-28T01:54:56Z",
|
"updated_at": "2024-12-31T07:49:37Z",
|
||||||
"pushed_at": "2024-04-25T06:09:38Z",
|
"pushed_at": "2024-04-25T06:09:38Z",
|
||||||
"stargazers_count": 1359,
|
"stargazers_count": 1360,
|
||||||
"watchers_count": 1359,
|
"watchers_count": 1360,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 167,
|
"forks_count": 167,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -811,7 +811,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 167,
|
"forks": 167,
|
||||||
"watchers": 1359,
|
"watchers": 1360,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 15
|
"subscribers_count": 15
|
||||||
}
|
}
|
||||||
|
|
|
@ -95,15 +95,15 @@
|
||||||
{
|
{
|
||||||
"id": 869025784,
|
"id": 869025784,
|
||||||
"name": "CVE-2022-2414",
|
"name": "CVE-2022-2414",
|
||||||
"full_name": "geniuszlyy\/CVE-2022-2414",
|
"full_name": "geniuszly\/CVE-2022-2414",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-2414",
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-2414",
|
||||||
"description": "is a PoC script for demonstrating an XML External Entity (XXE) vulnerability exploitation",
|
"description": "is a PoC script for demonstrating an XML External Entity (XXE) vulnerability exploitation",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-07T15:36:39Z",
|
"created_at": "2024-10-07T15:36:39Z",
|
||||||
|
|
|
@ -33,15 +33,15 @@
|
||||||
{
|
{
|
||||||
"id": 840469662,
|
"id": 840469662,
|
||||||
"name": "CVE-2022-44149",
|
"name": "CVE-2022-44149",
|
||||||
"full_name": "geniuszlyy\/CVE-2022-44149",
|
"full_name": "geniuszly\/CVE-2022-44149",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-44149",
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-44149",
|
||||||
"description": "it is script designed to interact with a router by sending a payload to its system tools. The script retrieves the router's configuration from environment variables to ensure security. It includes functions for generating an authorization header, sending a payload, and logging the process.",
|
"description": "it is script designed to interact with a router by sending a payload to its system tools. The script retrieves the router's configuration from environment variables to ensure security. It includes functions for generating an authorization header, sending a payload, and logging the process.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-09T19:27:22Z",
|
"created_at": "2024-08-09T19:27:22Z",
|
||||||
|
|
|
@ -33,15 +33,15 @@
|
||||||
{
|
{
|
||||||
"id": 840470520,
|
"id": 840470520,
|
||||||
"name": "CVE-2022-45701",
|
"name": "CVE-2022-45701",
|
||||||
"full_name": "geniuszlyy\/CVE-2022-45701",
|
"full_name": "geniuszly\/CVE-2022-45701",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-45701",
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-45701",
|
||||||
"description": "it is script designed to exploit certain vulnerabilities in routers by sending payloads through SNMP (Simple Network Management Protocol). The script automates the process of authorization, payload generation, and execution, allowing for remote command execution on the target device.",
|
"description": "it is script designed to exploit certain vulnerabilities in routers by sending payloads through SNMP (Simple Network Management Protocol). The script automates the process of authorization, payload generation, and execution, allowing for remote command execution on the target device.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-09T19:30:20Z",
|
"created_at": "2024-08-09T19:30:20Z",
|
||||||
|
|
|
@ -33,15 +33,15 @@
|
||||||
{
|
{
|
||||||
"id": 840471119,
|
"id": 840471119,
|
||||||
"name": "CVE-2022-46080",
|
"name": "CVE-2022-46080",
|
||||||
"full_name": "geniuszlyy\/CVE-2022-46080",
|
"full_name": "geniuszly\/CVE-2022-46080",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-46080",
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-46080",
|
||||||
"description": "it is script that enables Telnet on routers by sending a specially crafted request. The script allows users to specify the router's URL, Telnet port, and password. It validates the inputs and logs the process, providing feedback on whether the exploit was successful.",
|
"description": "it is script that enables Telnet on routers by sending a specially crafted request. The script allows users to specify the router's URL, Telnet port, and password. It validates the inputs and logs the process, providing feedback on whether the exploit was successful.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-09T19:32:32Z",
|
"created_at": "2024-08-09T19:32:32Z",
|
||||||
|
|
|
@ -107,10 +107,10 @@
|
||||||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-12-26T06:56:35Z",
|
"created_at": "2022-12-26T06:56:35Z",
|
||||||
"updated_at": "2024-12-31T02:53:03Z",
|
"updated_at": "2024-12-31T11:17:24Z",
|
||||||
"pushed_at": "2023-08-02T09:35:14Z",
|
"pushed_at": "2023-08-02T09:35:14Z",
|
||||||
"stargazers_count": 884,
|
"stargazers_count": 885,
|
||||||
"watchers_count": 884,
|
"watchers_count": 885,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 72,
|
"forks_count": 72,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -119,7 +119,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 72,
|
"forks": 72,
|
||||||
"watchers": 884,
|
"watchers": 885,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 26
|
"subscribers_count": 26
|
||||||
},
|
},
|
||||||
|
@ -231,10 +231,10 @@
|
||||||
"description": "CVE-2022-46689",
|
"description": "CVE-2022-46689",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-01-05T21:50:25Z",
|
"created_at": "2023-01-05T21:50:25Z",
|
||||||
"updated_at": "2024-12-06T00:25:02Z",
|
"updated_at": "2024-12-31T11:17:24Z",
|
||||||
"pushed_at": "2023-06-13T08:55:50Z",
|
"pushed_at": "2023-06-13T08:55:50Z",
|
||||||
"stargazers_count": 145,
|
"stargazers_count": 146,
|
||||||
"watchers_count": 145,
|
"watchers_count": 146,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 7,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -245,7 +245,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 7,
|
||||||
"watchers": 145,
|
"watchers": 146,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 12
|
"subscribers_count": 12
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-18T11:45:30Z",
|
"created_at": "2024-07-18T11:45:30Z",
|
||||||
"updated_at": "2024-12-30T08:58:33Z",
|
"updated_at": "2024-12-31T07:55:52Z",
|
||||||
"pushed_at": "2024-07-19T14:01:31Z",
|
"pushed_at": "2024-07-19T14:01:31Z",
|
||||||
"stargazers_count": 18,
|
"stargazers_count": 19,
|
||||||
"watchers_count": 18,
|
"watchers_count": 19,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 18,
|
"watchers": 19,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -19,13 +19,13 @@
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 3,
|
||||||
"watchers": 1,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-05T20:32:45Z",
|
"created_at": "2024-10-05T20:32:45Z",
|
||||||
"updated_at": "2024-12-31T05:58:53Z",
|
"updated_at": "2024-12-31T12:24:50Z",
|
||||||
"pushed_at": "2024-10-05T20:37:02Z",
|
"pushed_at": "2024-10-05T20:37:02Z",
|
||||||
"stargazers_count": 54,
|
"stargazers_count": 58,
|
||||||
"watchers_count": 54,
|
"watchers_count": 58,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -37,7 +37,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 8,
|
||||||
"watchers": 54,
|
"watchers": 58,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,15 +2,15 @@
|
||||||
{
|
{
|
||||||
"id": 865477756,
|
"id": 865477756,
|
||||||
"name": "GenEtherExploit",
|
"name": "GenEtherExploit",
|
||||||
"full_name": "geniuszlyy\/GenEtherExploit",
|
"full_name": "geniuszly\/GenEtherExploit",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/GenEtherExploit",
|
"html_url": "https:\/\/github.com\/geniuszly\/GenEtherExploit",
|
||||||
"description": "is a PoC exploit for the macOS vulnerability CVE-2023-40404. This PoC leverages IOKit APIs to interact with the IOUserEthernetResource network service, manipulating the system's network interfaces",
|
"description": "is a PoC exploit for the macOS vulnerability CVE-2023-40404. This PoC leverages IOKit APIs to interact with the IOUserEthernetResource network service, manipulating the system's network interfaces",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-09-30T15:41:14Z",
|
"created_at": "2024-09-30T15:41:14Z",
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-10-15T12:14:18Z",
|
"created_at": "2023-10-15T12:14:18Z",
|
||||||
"updated_at": "2024-12-21T00:56:57Z",
|
"updated_at": "2024-12-31T07:18:24Z",
|
||||||
"pushed_at": "2024-03-08T12:57:53Z",
|
"pushed_at": "2024-03-08T12:57:53Z",
|
||||||
"stargazers_count": 196,
|
"stargazers_count": 197,
|
||||||
"watchers_count": 196,
|
"watchers_count": 197,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 34,
|
"forks_count": 34,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 34,
|
"forks": 34,
|
||||||
"watchers": 196,
|
"watchers": 197,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 10
|
"subscribers_count": 10
|
||||||
},
|
},
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
|
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-10-14T09:35:07Z",
|
"created_at": "2023-10-14T09:35:07Z",
|
||||||
"updated_at": "2024-12-09T07:21:54Z",
|
"updated_at": "2024-12-31T11:10:26Z",
|
||||||
"pushed_at": "2024-05-16T07:42:00Z",
|
"pushed_at": "2024-05-16T07:42:00Z",
|
||||||
"stargazers_count": 223,
|
"stargazers_count": 224,
|
||||||
"watchers_count": 223,
|
"watchers_count": 224,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 23,
|
"forks_count": 23,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -61,7 +61,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 23,
|
"forks": 23,
|
||||||
"watchers": 223,
|
"watchers": 224,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-01-16T06:52:02Z",
|
"created_at": "2024-01-16T06:52:02Z",
|
||||||
"updated_at": "2024-12-28T12:43:30Z",
|
"updated_at": "2024-12-31T08:20:51Z",
|
||||||
"pushed_at": "2024-08-18T08:26:46Z",
|
"pushed_at": "2024-08-18T08:26:46Z",
|
||||||
"stargazers_count": 1313,
|
"stargazers_count": 1313,
|
||||||
"watchers_count": 1313,
|
"watchers_count": 1313,
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
|
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-10-27T05:57:21Z",
|
"created_at": "2023-10-27T05:57:21Z",
|
||||||
"updated_at": "2024-12-28T10:59:12Z",
|
"updated_at": "2024-12-31T06:57:19Z",
|
||||||
"pushed_at": "2024-01-29T02:28:11Z",
|
"pushed_at": "2024-01-29T02:28:11Z",
|
||||||
"stargazers_count": 235,
|
"stargazers_count": 236,
|
||||||
"watchers_count": 235,
|
"watchers_count": 236,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 29,
|
"forks_count": 29,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -57,7 +57,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 29,
|
"forks": 29,
|
||||||
"watchers": 235,
|
"watchers": 236,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
},
|
},
|
||||||
|
|
|
@ -95,15 +95,15 @@
|
||||||
{
|
{
|
||||||
"id": 866966019,
|
"id": 866966019,
|
||||||
"name": "CVE-2024-0582",
|
"name": "CVE-2024-0582",
|
||||||
"full_name": "geniuszlyy\/CVE-2024-0582",
|
"full_name": "geniuszly\/CVE-2024-0582",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-0582",
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-0582",
|
||||||
"description": "is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)",
|
"description": "is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-03T07:56:36Z",
|
"created_at": "2024-10-03T07:56:36Z",
|
||||||
|
|
|
@ -19,13 +19,13 @@
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 1,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Collapsing Categories <= 3.0.8 - Unauthenticated SQL Injection",
|
"description": "Collapsing Categories <= 3.0.8 - Unauthenticated SQL Injection",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-19T14:15:29Z",
|
"created_at": "2024-12-19T14:15:29Z",
|
||||||
"updated_at": "2024-12-19T15:53:19Z",
|
"updated_at": "2024-12-31T06:46:57Z",
|
||||||
"pushed_at": "2024-12-19T14:16:35Z",
|
"pushed_at": "2024-12-19T14:16:35Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 1,
|
"watchers_count": 2,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 1,
|
"watchers": 2,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,19 +14,19 @@
|
||||||
"description": "PoC for CVE-2024-21182",
|
"description": "PoC for CVE-2024-21182",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-29T15:48:03Z",
|
"created_at": "2024-12-29T15:48:03Z",
|
||||||
"updated_at": "2024-12-31T05:15:18Z",
|
"updated_at": "2024-12-31T08:58:18Z",
|
||||||
"pushed_at": "2024-12-29T15:56:14Z",
|
"pushed_at": "2024-12-29T15:56:14Z",
|
||||||
"stargazers_count": 23,
|
"stargazers_count": 24,
|
||||||
"watchers_count": 23,
|
"watchers_count": 24,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 4,
|
"forks_count": 5,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 5,
|
||||||
"watchers": 23,
|
"watchers": 24,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -83,10 +83,10 @@
|
||||||
"description": "PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)",
|
"description": "PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-15T07:26:59Z",
|
"created_at": "2024-07-15T07:26:59Z",
|
||||||
"updated_at": "2024-12-27T08:50:30Z",
|
"updated_at": "2024-12-31T07:44:51Z",
|
||||||
"pushed_at": "2024-07-16T23:22:14Z",
|
"pushed_at": "2024-07-16T23:22:14Z",
|
||||||
"stargazers_count": 39,
|
"stargazers_count": 40,
|
||||||
"watchers_count": 39,
|
"watchers_count": 40,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 7,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -106,7 +106,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 7,
|
||||||
"watchers": 39,
|
"watchers": 40,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -76,10 +76,10 @@
|
||||||
"description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1",
|
"description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-03-18T20:39:27Z",
|
"created_at": "2024-03-18T20:39:27Z",
|
||||||
"updated_at": "2024-12-30T04:28:59Z",
|
"updated_at": "2024-12-31T08:05:58Z",
|
||||||
"pushed_at": "2024-03-19T06:37:30Z",
|
"pushed_at": "2024-03-19T06:37:30Z",
|
||||||
"stargazers_count": 16,
|
"stargazers_count": 17,
|
||||||
"watchers_count": 16,
|
"watchers_count": 17,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -88,7 +88,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 16,
|
"watchers": 17,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -1630,15 +1630,15 @@
|
||||||
{
|
{
|
||||||
"id": 864811586,
|
"id": 864811586,
|
||||||
"name": "CVE-2024-24919",
|
"name": "CVE-2024-24919",
|
||||||
"full_name": "geniuszlyy\/CVE-2024-24919",
|
"full_name": "geniuszly\/CVE-2024-24919",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-24919",
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-24919",
|
||||||
"description": "PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses",
|
"description": "PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-09-29T08:20:56Z",
|
"created_at": "2024-09-29T08:20:56Z",
|
||||||
|
|
|
@ -380,15 +380,15 @@
|
||||||
{
|
{
|
||||||
"id": 870123268,
|
"id": 870123268,
|
||||||
"name": "CVE-2024-27198",
|
"name": "CVE-2024-27198",
|
||||||
"full_name": "geniuszlyy\/CVE-2024-27198",
|
"full_name": "geniuszly\/CVE-2024-27198",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-27198",
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-27198",
|
||||||
"description": "is a PoC tool that targets a vulnerability in the TeamCity server (CVE-2024-27198)",
|
"description": "is a PoC tool that targets a vulnerability in the TeamCity server (CVE-2024-27198)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-09T13:36:56Z",
|
"created_at": "2024-10-09T13:36:56Z",
|
||||||
|
|
|
@ -74,15 +74,15 @@
|
||||||
{
|
{
|
||||||
"id": 868072354,
|
"id": 868072354,
|
||||||
"name": "GenGravSSTIExploit",
|
"name": "GenGravSSTIExploit",
|
||||||
"full_name": "geniuszlyy\/GenGravSSTIExploit",
|
"full_name": "geniuszly\/GenGravSSTIExploit",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/GenGravSSTIExploit",
|
"html_url": "https:\/\/github.com\/geniuszly\/GenGravSSTIExploit",
|
||||||
"description": "is a PoC Python script that exploits an authenticated Server-Side Template Injection (SSTI) vulnerability in Grav CMS versions <= 1.7.44 (CVE-2024-28116)",
|
"description": "is a PoC Python script that exploits an authenticated Server-Side Template Injection (SSTI) vulnerability in Grav CMS versions <= 1.7.44 (CVE-2024-28116)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-05T12:05:06Z",
|
"created_at": "2024-10-05T12:05:06Z",
|
||||||
|
|
|
@ -76,10 +76,10 @@
|
||||||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-05-27T08:30:06Z",
|
"created_at": "2024-05-27T08:30:06Z",
|
||||||
"updated_at": "2024-12-30T11:26:49Z",
|
"updated_at": "2024-12-31T12:11:37Z",
|
||||||
"pushed_at": "2024-09-30T08:45:56Z",
|
"pushed_at": "2024-09-30T08:45:56Z",
|
||||||
"stargazers_count": 427,
|
"stargazers_count": 426,
|
||||||
"watchers_count": 427,
|
"watchers_count": 426,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 53,
|
"forks_count": 53,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -88,7 +88,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 53,
|
"forks": 53,
|
||||||
"watchers": 427,
|
"watchers": 426,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 8
|
"subscribers_count": 8
|
||||||
},
|
},
|
||||||
|
|
|
@ -362,10 +362,10 @@
|
||||||
"description": "geoserver图形化漏洞利用工具",
|
"description": "geoserver图形化漏洞利用工具",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-05T10:08:55Z",
|
"created_at": "2024-10-05T10:08:55Z",
|
||||||
"updated_at": "2024-12-26T04:19:46Z",
|
"updated_at": "2024-12-31T08:29:17Z",
|
||||||
"pushed_at": "2024-10-08T03:16:26Z",
|
"pushed_at": "2024-10-08T03:16:26Z",
|
||||||
"stargazers_count": 27,
|
"stargazers_count": 28,
|
||||||
"watchers_count": 27,
|
"watchers_count": 28,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -374,7 +374,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 27,
|
"watchers": 28,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-05T20:32:45Z",
|
"created_at": "2024-10-05T20:32:45Z",
|
||||||
"updated_at": "2024-12-31T05:58:53Z",
|
"updated_at": "2024-12-31T12:24:50Z",
|
||||||
"pushed_at": "2024-10-05T20:37:02Z",
|
"pushed_at": "2024-10-05T20:37:02Z",
|
||||||
"stargazers_count": 54,
|
"stargazers_count": 58,
|
||||||
"watchers_count": 54,
|
"watchers_count": 58,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -68,7 +68,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 8,
|
||||||
"watchers": 54,
|
"watchers": 58,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -455,15 +455,15 @@
|
||||||
{
|
{
|
||||||
"id": 865497094,
|
"id": 865497094,
|
||||||
"name": "GenCrushSSTIExploit",
|
"name": "GenCrushSSTIExploit",
|
||||||
"full_name": "geniuszlyy\/GenCrushSSTIExploit",
|
"full_name": "geniuszly\/GenCrushSSTIExploit",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/GenCrushSSTIExploit",
|
"html_url": "https:\/\/github.com\/geniuszly\/GenCrushSSTIExploit",
|
||||||
"description": "is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP",
|
"description": "is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-09-30T16:18:07Z",
|
"created_at": "2024-09-30T16:18:07Z",
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
"description": "InVesalius discovered CVE. CVE-2024-42845, CVE-2024-44825",
|
"description": "InVesalius discovered CVE. CVE-2024-42845, CVE-2024-44825",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-23T13:43:27Z",
|
"created_at": "2024-08-23T13:43:27Z",
|
||||||
"updated_at": "2024-12-30T23:20:09Z",
|
"updated_at": "2024-12-31T10:26:10Z",
|
||||||
"pushed_at": "2024-12-20T09:48:52Z",
|
"pushed_at": "2024-12-20T09:48:52Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 2,
|
"watchers_count": 2,
|
||||||
|
|
|
@ -19,13 +19,13 @@
|
||||||
"stargazers_count": 17,
|
"stargazers_count": 17,
|
||||||
"watchers_count": 17,
|
"watchers_count": 17,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 5,
|
"forks_count": 6,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 5,
|
"forks": 6,
|
||||||
"watchers": 17,
|
"watchers": 17,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
|
|
|
@ -95,15 +95,15 @@
|
||||||
{
|
{
|
||||||
"id": 870756822,
|
"id": 870756822,
|
||||||
"name": "CVE-2024-44000",
|
"name": "CVE-2024-44000",
|
||||||
"full_name": "geniuszlyy\/CVE-2024-44000",
|
"full_name": "geniuszly\/CVE-2024-44000",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-44000",
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-44000",
|
||||||
"description": "is a PoC tool designed to exploit insecurely exposed debug logs from WordPress sites and extract session cookies",
|
"description": "is a PoC tool designed to exploit insecurely exposed debug logs from WordPress sites and extract session cookies",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-10T15:58:10Z",
|
"created_at": "2024-10-10T15:58:10Z",
|
||||||
|
|
33
2024/CVE-2024-46542.json
Normal file
33
2024/CVE-2024-46542.json
Normal file
|
@ -0,0 +1,33 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 910002853,
|
||||||
|
"name": "CVE-2024-46542",
|
||||||
|
"full_name": "MarioTesoro\/CVE-2024-46542",
|
||||||
|
"owner": {
|
||||||
|
"login": "MarioTesoro",
|
||||||
|
"id": 62204045,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/MarioTesoro",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-46542",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-12-30T08:58:05Z",
|
||||||
|
"updated_at": "2024-12-31T12:17:30Z",
|
||||||
|
"pushed_at": "2024-12-31T12:17:07Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -169,10 +169,10 @@
|
||||||
"description": "RCE through a race condition in Apache Tomcat",
|
"description": "RCE through a race condition in Apache Tomcat",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-21T05:54:29Z",
|
"created_at": "2024-12-21T05:54:29Z",
|
||||||
"updated_at": "2024-12-30T15:45:48Z",
|
"updated_at": "2024-12-31T10:33:55Z",
|
||||||
"pushed_at": "2024-12-21T08:56:44Z",
|
"pushed_at": "2024-12-21T08:56:44Z",
|
||||||
"stargazers_count": 45,
|
"stargazers_count": 47,
|
||||||
"watchers_count": 45,
|
"watchers_count": 47,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 5,
|
"forks_count": 5,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -181,7 +181,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 5,
|
"forks": 5,
|
||||||
"watchers": 45,
|
"watchers": 47,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
@ -200,10 +200,10 @@
|
||||||
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
|
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-23T07:20:47Z",
|
"created_at": "2024-12-23T07:20:47Z",
|
||||||
"updated_at": "2024-12-30T18:18:04Z",
|
"updated_at": "2024-12-31T10:14:53Z",
|
||||||
"pushed_at": "2024-12-23T07:30:27Z",
|
"pushed_at": "2024-12-23T07:30:27Z",
|
||||||
"stargazers_count": 54,
|
"stargazers_count": 55,
|
||||||
"watchers_count": 54,
|
"watchers_count": 55,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 14,
|
"forks_count": 14,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -212,7 +212,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 14,
|
"forks": 14,
|
||||||
"watchers": 54,
|
"watchers": 55,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
@ -262,8 +262,8 @@
|
||||||
"description": "CVE-2024-50379-exp",
|
"description": "CVE-2024-50379-exp",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-25T02:41:31Z",
|
"created_at": "2024-12-25T02:41:31Z",
|
||||||
"updated_at": "2024-12-31T06:26:31Z",
|
"updated_at": "2024-12-31T07:11:17Z",
|
||||||
"pushed_at": "2024-12-31T06:26:28Z",
|
"pushed_at": "2024-12-31T07:11:13Z",
|
||||||
"stargazers_count": 5,
|
"stargazers_count": 5,
|
||||||
"watchers_count": 5,
|
"watchers_count": 5,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -66,5 +66,36 @@
|
||||||
"watchers": 3,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 910411215,
|
||||||
|
"name": "Cleo-CVE-2024-50623-PoC",
|
||||||
|
"full_name": "iSee857\/Cleo-CVE-2024-50623-PoC",
|
||||||
|
"owner": {
|
||||||
|
"login": "iSee857",
|
||||||
|
"id": 73977770,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/iSee857",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/iSee857\/Cleo-CVE-2024-50623-PoC",
|
||||||
|
"description": "Cleo 远程代码执行漏洞批量检测脚本(CVE-2024-50623)",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-12-31T07:43:48Z",
|
||||||
|
"updated_at": "2024-12-31T07:46:53Z",
|
||||||
|
"pushed_at": "2024-12-31T07:46:50Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -19,13 +19,13 @@
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 1,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-30T01:07:48Z",
|
"created_at": "2024-12-30T01:07:48Z",
|
||||||
"updated_at": "2024-12-31T03:48:11Z",
|
"updated_at": "2024-12-31T10:15:57Z",
|
||||||
"pushed_at": "2024-12-30T01:08:00Z",
|
"pushed_at": "2024-12-30T01:08:00Z",
|
||||||
"stargazers_count": 4,
|
"stargazers_count": 5,
|
||||||
"watchers_count": 4,
|
"watchers_count": 5,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 4,
|
"watchers": 5,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -64,15 +64,15 @@
|
||||||
{
|
{
|
||||||
"id": 866079798,
|
"id": 866079798,
|
||||||
"name": "CVE-2024-5522",
|
"name": "CVE-2024-5522",
|
||||||
"full_name": "geniuszlyy\/CVE-2024-5522",
|
"full_name": "geniuszly\/CVE-2024-5522",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-5522",
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-5522",
|
||||||
"description": "A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites",
|
"description": "A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-01T16:02:12Z",
|
"created_at": "2024-10-01T16:02:12Z",
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
|
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-01T12:16:21Z",
|
"created_at": "2024-07-01T12:16:21Z",
|
||||||
"updated_at": "2024-12-26T06:26:46Z",
|
"updated_at": "2024-12-31T12:16:09Z",
|
||||||
"pushed_at": "2024-07-01T12:25:01Z",
|
"pushed_at": "2024-07-01T12:25:01Z",
|
||||||
"stargazers_count": 380,
|
"stargazers_count": 379,
|
||||||
"watchers_count": 380,
|
"watchers_count": 379,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 90,
|
"forks_count": 90,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -57,7 +57,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 90,
|
"forks": 90,
|
||||||
"watchers": 380,
|
"watchers": 379,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 8
|
"subscribers_count": 8
|
||||||
},
|
},
|
||||||
|
@ -2185,13 +2185,13 @@
|
||||||
"stargazers_count": 63,
|
"stargazers_count": 63,
|
||||||
"watchers_count": 63,
|
"watchers_count": 63,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 24,
|
"forks_count": 25,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 24,
|
"forks": 25,
|
||||||
"watchers": 63,
|
"watchers": 63,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
|
|
|
@ -19,13 +19,13 @@
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 2,
|
"watchers_count": 2,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 3,
|
||||||
"watchers": 2,
|
"watchers": 2,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
|
|
|
@ -73,15 +73,15 @@
|
||||||
{
|
{
|
||||||
"id": 869446465,
|
"id": 869446465,
|
||||||
"name": "CVE-2024-7029",
|
"name": "CVE-2024-7029",
|
||||||
"full_name": "geniuszlyy\/CVE-2024-7029",
|
"full_name": "geniuszly\/CVE-2024-7029",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "geniuszlyy",
|
"login": "geniuszly",
|
||||||
"id": 137893386,
|
"id": 137893386,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy",
|
"html_url": "https:\/\/github.com\/geniuszly",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-7029",
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-7029",
|
||||||
"description": " A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE)",
|
"description": " A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-08T10:04:08Z",
|
"created_at": "2024-10-08T10:04:08Z",
|
||||||
|
|
46
README.md
46
README.md
|
@ -190,7 +190,7 @@
|
||||||
- [ysanatomic/io_uring_LPE-CVE-2024-0582](https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582)
|
- [ysanatomic/io_uring_LPE-CVE-2024-0582](https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582)
|
||||||
- [Forsaken0129/CVE-2024-0582](https://github.com/Forsaken0129/CVE-2024-0582)
|
- [Forsaken0129/CVE-2024-0582](https://github.com/Forsaken0129/CVE-2024-0582)
|
||||||
- [0ptyx/cve-2024-0582](https://github.com/0ptyx/cve-2024-0582)
|
- [0ptyx/cve-2024-0582](https://github.com/0ptyx/cve-2024-0582)
|
||||||
- [geniuszlyy/CVE-2024-0582](https://github.com/geniuszlyy/CVE-2024-0582)
|
- [geniuszly/CVE-2024-0582](https://github.com/geniuszly/CVE-2024-0582)
|
||||||
- [101010zyl/CVE-2024-0582](https://github.com/101010zyl/CVE-2024-0582)
|
- [101010zyl/CVE-2024-0582](https://github.com/101010zyl/CVE-2024-0582)
|
||||||
|
|
||||||
### CVE-2024-0588 (2024-04-09)
|
### CVE-2024-0588 (2024-04-09)
|
||||||
|
@ -880,7 +880,7 @@
|
||||||
- [olebris/CVE-2024-4040](https://github.com/olebris/CVE-2024-4040)
|
- [olebris/CVE-2024-4040](https://github.com/olebris/CVE-2024-4040)
|
||||||
- [entroychang/CVE-2024-4040](https://github.com/entroychang/CVE-2024-4040)
|
- [entroychang/CVE-2024-4040](https://github.com/entroychang/CVE-2024-4040)
|
||||||
- [safeer-accuknox/CrushFTP-cve-2024-4040-poc](https://github.com/safeer-accuknox/CrushFTP-cve-2024-4040-poc)
|
- [safeer-accuknox/CrushFTP-cve-2024-4040-poc](https://github.com/safeer-accuknox/CrushFTP-cve-2024-4040-poc)
|
||||||
- [geniuszlyy/GenCrushSSTIExploit](https://github.com/geniuszlyy/GenCrushSSTIExploit)
|
- [geniuszly/GenCrushSSTIExploit](https://github.com/geniuszly/GenCrushSSTIExploit)
|
||||||
- [rahisec/CVE-2024-4040](https://github.com/rahisec/CVE-2024-4040)
|
- [rahisec/CVE-2024-4040](https://github.com/rahisec/CVE-2024-4040)
|
||||||
|
|
||||||
### CVE-2024-4231 (2024-05-10)
|
### CVE-2024-4231 (2024-05-10)
|
||||||
|
@ -1220,7 +1220,7 @@
|
||||||
|
|
||||||
- [truonghuuphuc/CVE-2024-5522-Poc](https://github.com/truonghuuphuc/CVE-2024-5522-Poc)
|
- [truonghuuphuc/CVE-2024-5522-Poc](https://github.com/truonghuuphuc/CVE-2024-5522-Poc)
|
||||||
- [kryptonproject/CVE-2024-5522-PoC](https://github.com/kryptonproject/CVE-2024-5522-PoC)
|
- [kryptonproject/CVE-2024-5522-PoC](https://github.com/kryptonproject/CVE-2024-5522-PoC)
|
||||||
- [geniuszlyy/CVE-2024-5522](https://github.com/geniuszlyy/CVE-2024-5522)
|
- [geniuszly/CVE-2024-5522](https://github.com/geniuszly/CVE-2024-5522)
|
||||||
|
|
||||||
### CVE-2024-5633 (2024-07-09)
|
### CVE-2024-5633 (2024-07-09)
|
||||||
|
|
||||||
|
@ -1527,7 +1527,7 @@
|
||||||
|
|
||||||
- [bigherocenter/CVE-2024-7029-EXPLOIT](https://github.com/bigherocenter/CVE-2024-7029-EXPLOIT)
|
- [bigherocenter/CVE-2024-7029-EXPLOIT](https://github.com/bigherocenter/CVE-2024-7029-EXPLOIT)
|
||||||
- [ebrasha/CVE-2024-7029](https://github.com/ebrasha/CVE-2024-7029)
|
- [ebrasha/CVE-2024-7029](https://github.com/ebrasha/CVE-2024-7029)
|
||||||
- [geniuszlyy/CVE-2024-7029](https://github.com/geniuszlyy/CVE-2024-7029)
|
- [geniuszly/CVE-2024-7029](https://github.com/geniuszly/CVE-2024-7029)
|
||||||
|
|
||||||
### CVE-2024-7094 (2024-08-13)
|
### CVE-2024-7094 (2024-08-13)
|
||||||
|
|
||||||
|
@ -2374,7 +2374,11 @@
|
||||||
|
|
||||||
- [samogod/CVE-2024-11728](https://github.com/samogod/CVE-2024-11728)
|
- [samogod/CVE-2024-11728](https://github.com/samogod/CVE-2024-11728)
|
||||||
|
|
||||||
### CVE-2024-11972
|
### CVE-2024-11972 (2024-12-31)
|
||||||
|
|
||||||
|
<code>The Hunk Companion WordPress plugin before 1.9.0 does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary Hunk Companion WordPress plugin before 1.9.0 from the WordPress.org repo, including vulnerable Hunk Companion WordPress plugin before 1.9.0 that have been closed.
|
||||||
|
</code>
|
||||||
|
|
||||||
- [JunTakemura/exploit-CVE-2024-11972](https://github.com/JunTakemura/exploit-CVE-2024-11972)
|
- [JunTakemura/exploit-CVE-2024-11972](https://github.com/JunTakemura/exploit-CVE-2024-11972)
|
||||||
|
|
||||||
### CVE-2024-12025 (2024-12-18)
|
### CVE-2024-12025 (2024-12-18)
|
||||||
|
@ -3630,7 +3634,7 @@
|
||||||
- [Jutrm/cve-2024-24919](https://github.com/Jutrm/cve-2024-24919)
|
- [Jutrm/cve-2024-24919](https://github.com/Jutrm/cve-2024-24919)
|
||||||
- [LuisMateo1/Arbitrary-File-Read-CVE-2024-24919](https://github.com/LuisMateo1/Arbitrary-File-Read-CVE-2024-24919)
|
- [LuisMateo1/Arbitrary-File-Read-CVE-2024-24919](https://github.com/LuisMateo1/Arbitrary-File-Read-CVE-2024-24919)
|
||||||
- [AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-](https://github.com/AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-)
|
- [AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-](https://github.com/AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-)
|
||||||
- [geniuszlyy/CVE-2024-24919](https://github.com/geniuszlyy/CVE-2024-24919)
|
- [geniuszly/CVE-2024-24919](https://github.com/geniuszly/CVE-2024-24919)
|
||||||
- [skyrowalker/CVE-2024-24919](https://github.com/skyrowalker/CVE-2024-24919)
|
- [skyrowalker/CVE-2024-24919](https://github.com/skyrowalker/CVE-2024-24919)
|
||||||
- [sar-3mar/CVE-2024-24919_POC](https://github.com/sar-3mar/CVE-2024-24919_POC)
|
- [sar-3mar/CVE-2024-24919_POC](https://github.com/sar-3mar/CVE-2024-24919_POC)
|
||||||
- [NingXin2002/Check-Point_poc](https://github.com/NingXin2002/Check-Point_poc)
|
- [NingXin2002/Check-Point_poc](https://github.com/NingXin2002/Check-Point_poc)
|
||||||
|
@ -3995,7 +3999,7 @@
|
||||||
- [Stuub/RCity-CVE-2024-27198](https://github.com/Stuub/RCity-CVE-2024-27198)
|
- [Stuub/RCity-CVE-2024-27198](https://github.com/Stuub/RCity-CVE-2024-27198)
|
||||||
- [HPT-Intern-Task-Submission/CVE-2024-27198](https://github.com/HPT-Intern-Task-Submission/CVE-2024-27198)
|
- [HPT-Intern-Task-Submission/CVE-2024-27198](https://github.com/HPT-Intern-Task-Submission/CVE-2024-27198)
|
||||||
- [jrbH4CK/CVE-2024-27198](https://github.com/jrbH4CK/CVE-2024-27198)
|
- [jrbH4CK/CVE-2024-27198](https://github.com/jrbH4CK/CVE-2024-27198)
|
||||||
- [geniuszlyy/CVE-2024-27198](https://github.com/geniuszlyy/CVE-2024-27198)
|
- [geniuszly/CVE-2024-27198](https://github.com/geniuszly/CVE-2024-27198)
|
||||||
- [Cythonic1/CVE-2024-27198_POC](https://github.com/Cythonic1/CVE-2024-27198_POC)
|
- [Cythonic1/CVE-2024-27198_POC](https://github.com/Cythonic1/CVE-2024-27198_POC)
|
||||||
|
|
||||||
### CVE-2024-27292 (2024-02-29)
|
### CVE-2024-27292 (2024-02-29)
|
||||||
|
@ -4222,7 +4226,7 @@
|
||||||
|
|
||||||
- [akabe1/Graver](https://github.com/akabe1/Graver)
|
- [akabe1/Graver](https://github.com/akabe1/Graver)
|
||||||
- [gunzf0x/Grav-CMS-RCE-Authenticated](https://github.com/gunzf0x/Grav-CMS-RCE-Authenticated)
|
- [gunzf0x/Grav-CMS-RCE-Authenticated](https://github.com/gunzf0x/Grav-CMS-RCE-Authenticated)
|
||||||
- [geniuszlyy/GenGravSSTIExploit](https://github.com/geniuszlyy/GenGravSSTIExploit)
|
- [geniuszly/GenGravSSTIExploit](https://github.com/geniuszly/GenGravSSTIExploit)
|
||||||
|
|
||||||
### CVE-2024-28247 (2024-03-27)
|
### CVE-2024-28247 (2024-03-27)
|
||||||
|
|
||||||
|
@ -6510,7 +6514,7 @@
|
||||||
- [absholi7ly/CVE-2024-44000-LiteSpeed-Cache](https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache)
|
- [absholi7ly/CVE-2024-44000-LiteSpeed-Cache](https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache)
|
||||||
- [gbrsh/CVE-2024-44000](https://github.com/gbrsh/CVE-2024-44000)
|
- [gbrsh/CVE-2024-44000](https://github.com/gbrsh/CVE-2024-44000)
|
||||||
- [ifqygazhar/CVE-2024-44000-LiteSpeed-Cache](https://github.com/ifqygazhar/CVE-2024-44000-LiteSpeed-Cache)
|
- [ifqygazhar/CVE-2024-44000-LiteSpeed-Cache](https://github.com/ifqygazhar/CVE-2024-44000-LiteSpeed-Cache)
|
||||||
- [geniuszlyy/CVE-2024-44000](https://github.com/geniuszlyy/CVE-2024-44000)
|
- [geniuszly/CVE-2024-44000](https://github.com/geniuszly/CVE-2024-44000)
|
||||||
|
|
||||||
### CVE-2024-44083 (2024-08-19)
|
### CVE-2024-44083 (2024-08-19)
|
||||||
|
|
||||||
|
@ -6845,6 +6849,13 @@
|
||||||
- [EQSTLab/CVE-2024-46538](https://github.com/EQSTLab/CVE-2024-46538)
|
- [EQSTLab/CVE-2024-46538](https://github.com/EQSTLab/CVE-2024-46538)
|
||||||
- [LauLeysen/CVE-2024-46538](https://github.com/LauLeysen/CVE-2024-46538)
|
- [LauLeysen/CVE-2024-46538](https://github.com/LauLeysen/CVE-2024-46538)
|
||||||
|
|
||||||
|
### CVE-2024-46542 (2024-12-30)
|
||||||
|
|
||||||
|
<code>Veritas / Arctera Data Insight before 7.1.1 allows Application Administrators to conduct SQL injection attacks.
|
||||||
|
</code>
|
||||||
|
|
||||||
|
- [MarioTesoro/CVE-2024-46542](https://github.com/MarioTesoro/CVE-2024-46542)
|
||||||
|
|
||||||
### CVE-2024-46627 (2024-09-26)
|
### CVE-2024-46627 (2024-09-26)
|
||||||
|
|
||||||
<code>Incorrect access control in BECN DATAGERRY v2.2 allows attackers to execute arbitrary commands via crafted web requests.
|
<code>Incorrect access control in BECN DATAGERRY v2.2 allows attackers to execute arbitrary commands via crafted web requests.
|
||||||
|
@ -7315,6 +7326,7 @@
|
||||||
|
|
||||||
- [watchtowrlabs/CVE-2024-50623](https://github.com/watchtowrlabs/CVE-2024-50623)
|
- [watchtowrlabs/CVE-2024-50623](https://github.com/watchtowrlabs/CVE-2024-50623)
|
||||||
- [verylazytech/CVE-2024-50623](https://github.com/verylazytech/CVE-2024-50623)
|
- [verylazytech/CVE-2024-50623](https://github.com/verylazytech/CVE-2024-50623)
|
||||||
|
- [iSee857/Cleo-CVE-2024-50623-PoC](https://github.com/iSee857/Cleo-CVE-2024-50623-PoC)
|
||||||
|
|
||||||
### CVE-2024-50657 (2024-11-22)
|
### CVE-2024-50657 (2024-11-22)
|
||||||
|
|
||||||
|
@ -13811,7 +13823,7 @@
|
||||||
<code>A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sonoma 14.1. An app may be able to execute arbitrary code with kernel privileges.
|
<code>A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sonoma 14.1. An app may be able to execute arbitrary code with kernel privileges.
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [geniuszlyy/GenEtherExploit](https://github.com/geniuszlyy/GenEtherExploit)
|
- [geniuszly/GenEtherExploit](https://github.com/geniuszly/GenEtherExploit)
|
||||||
|
|
||||||
### CVE-2023-40429 (2023-09-26)
|
### CVE-2023-40429 (2023-09-26)
|
||||||
|
|
||||||
|
@ -16992,7 +17004,7 @@
|
||||||
- [superhac/CVE-2022-2414-POC](https://github.com/superhac/CVE-2022-2414-POC)
|
- [superhac/CVE-2022-2414-POC](https://github.com/superhac/CVE-2022-2414-POC)
|
||||||
- [amitlttwo/CVE-2022-2414-Proof-Of-Concept](https://github.com/amitlttwo/CVE-2022-2414-Proof-Of-Concept)
|
- [amitlttwo/CVE-2022-2414-Proof-Of-Concept](https://github.com/amitlttwo/CVE-2022-2414-Proof-Of-Concept)
|
||||||
- [satyasai1460/CVE-2022-2414](https://github.com/satyasai1460/CVE-2022-2414)
|
- [satyasai1460/CVE-2022-2414](https://github.com/satyasai1460/CVE-2022-2414)
|
||||||
- [geniuszlyy/CVE-2022-2414](https://github.com/geniuszlyy/CVE-2022-2414)
|
- [geniuszly/CVE-2022-2414](https://github.com/geniuszly/CVE-2022-2414)
|
||||||
|
|
||||||
### CVE-2022-2466 (2022-08-31)
|
### CVE-2022-2466 (2022-08-31)
|
||||||
|
|
||||||
|
@ -22322,7 +22334,7 @@
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [yerodin/CVE-2022-44149](https://github.com/yerodin/CVE-2022-44149)
|
- [yerodin/CVE-2022-44149](https://github.com/yerodin/CVE-2022-44149)
|
||||||
- [geniuszlyy/CVE-2022-44149](https://github.com/geniuszlyy/CVE-2022-44149)
|
- [geniuszly/CVE-2022-44149](https://github.com/geniuszly/CVE-2022-44149)
|
||||||
|
|
||||||
### CVE-2022-44183 (2022-11-21)
|
### CVE-2022-44183 (2022-11-21)
|
||||||
|
|
||||||
|
@ -22598,7 +22610,7 @@
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [yerodin/CVE-2022-45701](https://github.com/yerodin/CVE-2022-45701)
|
- [yerodin/CVE-2022-45701](https://github.com/yerodin/CVE-2022-45701)
|
||||||
- [geniuszlyy/CVE-2022-45701](https://github.com/geniuszlyy/CVE-2022-45701)
|
- [geniuszly/CVE-2022-45701](https://github.com/geniuszly/CVE-2022-45701)
|
||||||
|
|
||||||
### CVE-2022-45728 (2023-01-12)
|
### CVE-2022-45728 (2023-01-12)
|
||||||
|
|
||||||
|
@ -22658,7 +22670,7 @@
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [yerodin/CVE-2022-46080](https://github.com/yerodin/CVE-2022-46080)
|
- [yerodin/CVE-2022-46080](https://github.com/yerodin/CVE-2022-46080)
|
||||||
- [geniuszlyy/CVE-2022-46080](https://github.com/geniuszlyy/CVE-2022-46080)
|
- [geniuszly/CVE-2022-46080](https://github.com/geniuszly/CVE-2022-46080)
|
||||||
|
|
||||||
### CVE-2022-46087 (2023-01-30)
|
### CVE-2022-46087 (2023-01-30)
|
||||||
|
|
||||||
|
@ -33486,7 +33498,7 @@
|
||||||
<code>goform/AdvSetLanip endpoint on Tenda AC15 AC1900 15.03.05.19 devices allows remote attackers to execute arbitrary system commands via shell metacharacters in the lanIp POST parameter.
|
<code>goform/AdvSetLanip endpoint on Tenda AC15 AC1900 15.03.05.19 devices allows remote attackers to execute arbitrary system commands via shell metacharacters in the lanIp POST parameter.
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [geniuszlyy/CVE-2020-15916](https://github.com/geniuszlyy/CVE-2020-15916)
|
- [geniuszly/CVE-2020-15916](https://github.com/geniuszly/CVE-2020-15916)
|
||||||
|
|
||||||
### CVE-2020-15931 (2020-10-20)
|
### CVE-2020-15931 (2020-10-20)
|
||||||
|
|
||||||
|
@ -36729,7 +36741,7 @@
|
||||||
- [b4keSn4ke/CVE-2019-9193](https://github.com/b4keSn4ke/CVE-2019-9193)
|
- [b4keSn4ke/CVE-2019-9193](https://github.com/b4keSn4ke/CVE-2019-9193)
|
||||||
- [chromanite/CVE-2019-9193-PostgreSQL-9.3-11.7](https://github.com/chromanite/CVE-2019-9193-PostgreSQL-9.3-11.7)
|
- [chromanite/CVE-2019-9193-PostgreSQL-9.3-11.7](https://github.com/chromanite/CVE-2019-9193-PostgreSQL-9.3-11.7)
|
||||||
- [paulotrindadec/CVE-2019-9193](https://github.com/paulotrindadec/CVE-2019-9193)
|
- [paulotrindadec/CVE-2019-9193](https://github.com/paulotrindadec/CVE-2019-9193)
|
||||||
- [geniuszlyy/CVE-2019-9193](https://github.com/geniuszlyy/CVE-2019-9193)
|
- [geniuszly/CVE-2019-9193](https://github.com/geniuszly/CVE-2019-9193)
|
||||||
- [AxthonyV/CVE-2019-9193](https://github.com/AxthonyV/CVE-2019-9193)
|
- [AxthonyV/CVE-2019-9193](https://github.com/AxthonyV/CVE-2019-9193)
|
||||||
- [A0be/CVE-2019-9193](https://github.com/A0be/CVE-2019-9193)
|
- [A0be/CVE-2019-9193](https://github.com/A0be/CVE-2019-9193)
|
||||||
|
|
||||||
|
@ -43527,7 +43539,7 @@
|
||||||
- [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269)
|
- [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269)
|
||||||
- [Cappricio-Securities/CVE-2017-7269](https://github.com/Cappricio-Securities/CVE-2017-7269)
|
- [Cappricio-Securities/CVE-2017-7269](https://github.com/Cappricio-Securities/CVE-2017-7269)
|
||||||
- [VanishedPeople/CVE-2017-7269](https://github.com/VanishedPeople/CVE-2017-7269)
|
- [VanishedPeople/CVE-2017-7269](https://github.com/VanishedPeople/CVE-2017-7269)
|
||||||
- [geniuszlyy/CVE-2017-7269](https://github.com/geniuszlyy/CVE-2017-7269)
|
- [geniuszly/CVE-2017-7269](https://github.com/geniuszly/CVE-2017-7269)
|
||||||
- [AxthonyV/CVE-2017-7269](https://github.com/AxthonyV/CVE-2017-7269)
|
- [AxthonyV/CVE-2017-7269](https://github.com/AxthonyV/CVE-2017-7269)
|
||||||
|
|
||||||
### CVE-2017-7308 (2017-03-29)
|
### CVE-2017-7308 (2017-03-29)
|
||||||
|
|
Loading…
Reference in a new issue