mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
331 lines
No EOL
12 KiB
JSON
331 lines
No EOL
12 KiB
JSON
[
|
||
{
|
||
"id": 885936481,
|
||
"name": "CVE-2024-10914",
|
||
"full_name": "imnotcha0s\/CVE-2024-10914",
|
||
"owner": {
|
||
"login": "imnotcha0s",
|
||
"id": 64480742,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64480742?v=4",
|
||
"html_url": "https:\/\/github.com\/imnotcha0s",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/imnotcha0s\/CVE-2024-10914",
|
||
"description": "Exploit for cve-2024-10914: D-Link DNS-320, DNS-320LW, DNS-325, DNS-340L Version 1.00, Version 1.01.0914.2012, Version 1.01, Version 1.02, Version 1.08 Command Injection",
|
||
"fork": false,
|
||
"created_at": "2024-11-09T19:30:39Z",
|
||
"updated_at": "2024-11-27T14:57:29Z",
|
||
"pushed_at": "2024-11-09T19:31:42Z",
|
||
"stargazers_count": 11,
|
||
"watchers_count": 11,
|
||
"has_discussions": false,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 11,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 886174538,
|
||
"name": "CVE-2024-10914",
|
||
"full_name": "verylazytech\/CVE-2024-10914",
|
||
"owner": {
|
||
"login": "verylazytech",
|
||
"id": 172168670,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
|
||
"html_url": "https:\/\/github.com\/verylazytech",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-10914",
|
||
"description": "POC - CVE-2024–10914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
|
||
"fork": false,
|
||
"created_at": "2024-11-10T12:01:21Z",
|
||
"updated_at": "2025-01-13T09:55:07Z",
|
||
"pushed_at": "2024-11-27T08:26:29Z",
|
||
"stargazers_count": 43,
|
||
"watchers_count": 43,
|
||
"has_discussions": false,
|
||
"forks_count": 12,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2024-10914",
|
||
"d-link-nas",
|
||
"lfi",
|
||
"lfi-exploitation",
|
||
"poc",
|
||
"rce-exploit",
|
||
"unauthenticated-rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 12,
|
||
"watchers": 43,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 887759528,
|
||
"name": "CVE-2024-10914",
|
||
"full_name": "Egi08\/CVE-2024-10914",
|
||
"owner": {
|
||
"login": "Egi08",
|
||
"id": 60685799,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60685799?v=4",
|
||
"html_url": "https:\/\/github.com\/Egi08",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Egi08\/CVE-2024-10914",
|
||
"description": "CVE-2024-10914_Manual testing with burpsuite ",
|
||
"fork": false,
|
||
"created_at": "2024-11-13T08:33:16Z",
|
||
"updated_at": "2024-11-16T04:27:57Z",
|
||
"pushed_at": "2024-11-13T09:39:25Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 888892906,
|
||
"name": "D-Link-NAS-CVE-2024-10914-",
|
||
"full_name": "Bu0uCat\/D-Link-NAS-CVE-2024-10914-",
|
||
"owner": {
|
||
"login": "Bu0uCat",
|
||
"id": 169526025,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169526025?v=4",
|
||
"html_url": "https:\/\/github.com\/Bu0uCat",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Bu0uCat\/D-Link-NAS-CVE-2024-10914-",
|
||
"description": "这是一个D-Link rce漏洞 检测程序",
|
||
"fork": false,
|
||
"created_at": "2024-11-15T07:56:21Z",
|
||
"updated_at": "2024-11-15T07:59:44Z",
|
||
"pushed_at": "2024-11-15T07:59:36Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 889560261,
|
||
"name": "CVE-2024-10914",
|
||
"full_name": "ThemeHackers\/CVE-2024-10914",
|
||
"owner": {
|
||
"login": "ThemeHackers",
|
||
"id": 107047730,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4",
|
||
"html_url": "https:\/\/github.com\/ThemeHackers",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-10914",
|
||
"description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.",
|
||
"fork": false,
|
||
"created_at": "2024-11-16T16:32:05Z",
|
||
"updated_at": "2025-01-02T08:18:01Z",
|
||
"pushed_at": "2025-01-02T08:17:57Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 895213023,
|
||
"name": "cve-2024-10914-port",
|
||
"full_name": "retuci0\/cve-2024-10914-port",
|
||
"owner": {
|
||
"login": "retuci0",
|
||
"id": 165311393,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165311393?v=4",
|
||
"html_url": "https:\/\/github.com\/retuci0",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/retuci0\/cve-2024-10914-port",
|
||
"description": "dlink vulnerability thing in python and rust",
|
||
"fork": false,
|
||
"created_at": "2024-11-27T19:11:55Z",
|
||
"updated_at": "2024-11-27T19:12:49Z",
|
||
"pushed_at": "2024-11-27T19:12:45Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 895284938,
|
||
"name": "CVE-2024-10914-EXPLOIT",
|
||
"full_name": "K3ysTr0K3R\/CVE-2024-10914-EXPLOIT",
|
||
"owner": {
|
||
"login": "K3ysTr0K3R",
|
||
"id": 70909693,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
|
||
"html_url": "https:\/\/github.com\/K3ysTr0K3R",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2024-10914-EXPLOIT",
|
||
"description": "A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)",
|
||
"fork": false,
|
||
"created_at": "2024-11-27T23:10:20Z",
|
||
"updated_at": "2024-11-27T23:33:14Z",
|
||
"pushed_at": "2024-11-27T23:31:07Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2024-10914",
|
||
"ethical-hacking",
|
||
"exploit",
|
||
"exploitation",
|
||
"hacking",
|
||
"proof-of-concept"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 898276056,
|
||
"name": "CVE-2024-10914-Exploit",
|
||
"full_name": "jahithoque\/CVE-2024-10914-Exploit",
|
||
"owner": {
|
||
"login": "jahithoque",
|
||
"id": 61009126,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61009126?v=4",
|
||
"html_url": "https:\/\/github.com\/jahithoque",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jahithoque\/CVE-2024-10914-Exploit",
|
||
"description": "CVE-2024-10914 is a critical vulnerability affecting the D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L up to version 20241028. The function cgi_user_add in the file \/cgi-bin\/account_mgr.cgi?cmd=cgi_user_add is the culprit, allowing attackers to inject operating system commands remotely.",
|
||
"fork": false,
|
||
"created_at": "2024-12-04T05:27:36Z",
|
||
"updated_at": "2024-12-04T05:31:27Z",
|
||
"pushed_at": "2024-12-04T05:31:23Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 899673788,
|
||
"name": "D-Link",
|
||
"full_name": "redspy-sec\/D-Link",
|
||
"owner": {
|
||
"login": "redspy-sec",
|
||
"id": 142095788,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142095788?v=4",
|
||
"html_url": "https:\/\/github.com\/redspy-sec",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/redspy-sec\/D-Link",
|
||
"description": "CVE-2024-10914 D-Link Remote Code Execution (RCE)",
|
||
"fork": false,
|
||
"created_at": "2024-12-06T19:03:34Z",
|
||
"updated_at": "2025-01-12T18:34:06Z",
|
||
"pushed_at": "2024-12-07T07:32:30Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2024",
|
||
"poc",
|
||
"rce-exploit"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 907765018,
|
||
"name": "CVE-2024-10914",
|
||
"full_name": "dragonXZH\/CVE-2024-10914",
|
||
"owner": {
|
||
"login": "dragonXZH",
|
||
"id": 191017577,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191017577?v=4",
|
||
"html_url": "https:\/\/github.com\/dragonXZH",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/dragonXZH\/CVE-2024-10914",
|
||
"description": "A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)",
|
||
"fork": false,
|
||
"created_at": "2024-12-24T10:32:48Z",
|
||
"updated_at": "2024-12-24T10:42:23Z",
|
||
"pushed_at": "2024-12-24T10:42:20Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
}
|
||
] |