mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-09-07 10:01:54 +02:00
157 lines
No EOL
5.7 KiB
JSON
157 lines
No EOL
5.7 KiB
JSON
[
|
|
{
|
|
"id": 806456046,
|
|
"name": "cnext-exploits",
|
|
"full_name": "ambionics\/cnext-exploits",
|
|
"owner": {
|
|
"login": "ambionics",
|
|
"id": 29630660,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29630660?v=4",
|
|
"html_url": "https:\/\/github.com\/ambionics",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ambionics\/cnext-exploits",
|
|
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
|
"fork": false,
|
|
"created_at": "2024-05-27T08:30:06Z",
|
|
"updated_at": "2025-03-05T16:32:46Z",
|
|
"pushed_at": "2024-09-30T08:45:56Z",
|
|
"stargazers_count": 457,
|
|
"watchers_count": 457,
|
|
"has_discussions": false,
|
|
"forks_count": 57,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 57,
|
|
"watchers": 457,
|
|
"score": 0,
|
|
"subscribers_count": 8
|
|
},
|
|
{
|
|
"id": 924126046,
|
|
"name": "CVE-2024-2961",
|
|
"full_name": "4wayhandshake\/CVE-2024-2961",
|
|
"owner": {
|
|
"login": "4wayhandshake",
|
|
"id": 122475838,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122475838?v=4",
|
|
"html_url": "https:\/\/github.com\/4wayhandshake",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/4wayhandshake\/CVE-2024-2961",
|
|
"description": "Uses CVE-2024-2961 to perform an arbitrary file read",
|
|
"fork": false,
|
|
"created_at": "2025-01-29T13:15:11Z",
|
|
"updated_at": "2025-02-01T10:48:49Z",
|
|
"pushed_at": "2025-02-01T10:48:45Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 925889678,
|
|
"name": "exploit_cve-2023-26326_using_cve-2024-2961",
|
|
"full_name": "omarelshopky\/exploit_cve-2023-26326_using_cve-2024-2961",
|
|
"owner": {
|
|
"login": "omarelshopky",
|
|
"id": 69885253,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69885253?v=4",
|
|
"html_url": "https:\/\/github.com\/omarelshopky",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/omarelshopky\/exploit_cve-2023-26326_using_cve-2024-2961",
|
|
"description": "Exploit for CVE-2023-26326 in the WordPress BuddyForms plugin, leveraging CVE-2024-2961 for remote code execution. This exploit bypasses PHP 8+ deserialization limitations by chaining vulnerabilities with php:\/\/filter.",
|
|
"fork": false,
|
|
"created_at": "2025-02-02T01:35:43Z",
|
|
"updated_at": "2025-02-02T11:26:22Z",
|
|
"pushed_at": "2025-02-02T11:26:18Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 927144920,
|
|
"name": "CVE-2024-2961_buddyforms_2.7.7",
|
|
"full_name": "suce0155\/CVE-2024-2961_buddyforms_2.7.7",
|
|
"owner": {
|
|
"login": "suce0155",
|
|
"id": 149517309,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149517309?v=4",
|
|
"html_url": "https:\/\/github.com\/suce0155",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/suce0155\/CVE-2024-2961_buddyforms_2.7.7",
|
|
"description": "CVE-2024-2961 Cnext RCE Exploit with Buddyforms 2.7.7",
|
|
"fork": false,
|
|
"created_at": "2025-02-04T13:34:33Z",
|
|
"updated_at": "2025-03-03T04:39:46Z",
|
|
"pushed_at": "2025-02-04T18:51:48Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 935953693,
|
|
"name": "PHP-file-read-to-RCE-CVE-2024-2961-",
|
|
"full_name": "regantemudo\/PHP-file-read-to-RCE-CVE-2024-2961-",
|
|
"owner": {
|
|
"login": "regantemudo",
|
|
"id": 72595630,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72595630?v=4",
|
|
"html_url": "https:\/\/github.com\/regantemudo",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/regantemudo\/PHP-file-read-to-RCE-CVE-2024-2961-",
|
|
"description": "To use, implement the Remote class, which tells the exploit how to send the payload.",
|
|
"fork": false,
|
|
"created_at": "2025-02-20T09:41:37Z",
|
|
"updated_at": "2025-02-24T04:06:53Z",
|
|
"pushed_at": "2025-02-24T04:06:50Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |